Skip to main content

Identity and Access Management

Identity and access management (IAM) platforms authenticate users, enforce access policies, manage identity lifecycles, and federate trust across organisational boundaries. These systems underpin security controls across all other technology domains: a compromised identity provider exposes every integrated application.

This page covers centralised identity platforms providing authentication services, user directory, and access policy enforcement. Adjacent capabilities exist elsewhere: Privileged Access Management addresses elevated access controls, Multi-Factor Authentication details secondary authentication mechanisms, and Single Sign-On and Federation explains trust establishment patterns.

Assessment methodology

Tool assessments derive from official vendor documentation, published API references, release notes, and technical specifications as of 2026-01-11. Feature availability varies by product tier, deployment model, and region. Verify current capabilities directly with vendors during procurement.

Requirements taxonomy

This taxonomy defines evaluation criteria for identity and access management platforms. Requirements are organised by functional area and weighted by typical priority for mission-driven organisations operating across multiple jurisdictions with federated partner relationships.

Functional requirements

Core capabilities that define what an IAM platform must provide.

User authentication

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
F1.1Username/password authenticationNative credential store with password policy enforcement including complexity, history, and expiration rulesFull: configurable policies per realm/tenant, breach detection integration. Partial: fixed policies.Review password policy documentationEssential
F1.2Multi-factor authenticationBuilt-in support for secondary authentication factors beyond passwordFull: TOTP, WebAuthn/passkeys, SMS, email, push notification. Partial: single method only.Review MFA documentation; test factor enrollmentEssential
F1.3Passwordless authenticationSupport for authentication without passwords using WebAuthn, FIDO2, or passkeysFull: WebAuthn passwordless with device attestation. Partial: limited device support. None: password required.Review passwordless documentation; test flowImportant
F1.4Social identity federationAccept authentication from social providers (Google, Microsoft, Apple, Facebook)Full: multiple providers, attribute mapping, account linking. Partial: limited providers.Review social login documentationContext-dependent
F1.5Adaptive authenticationDynamic authentication requirements based on risk signals (location, device, behaviour)Full: configurable risk policies, step-up authentication. Partial: basic conditional access.Review adaptive auth documentationImportant
F1.6Brute force protectionAutomatic protection against credential stuffing and brute force attacksFull: account lockout, IP blocking, CAPTCHA, rate limiting. Partial: basic lockout only.Review security documentationEssential

Protocol support

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
F2.1OpenID Connect supportStandards-compliant OIDC implementation for modern web and mobile applicationsFull: OIDC Core, Discovery, Dynamic Registration, Session Management. Partial: Core only.Review OIDC documentation; test with OIDC debuggerEssential
F2.2SAML 2.0 supportSupport for SAML-based SSO with legacy and enterprise applicationsFull: SP and IdP roles, metadata exchange, signing/encryption. Partial: IdP only.Review SAML documentation; test with SAML tracerEssential
F2.3OAuth 2.0 supportOAuth 2.0 authorisation server for API access controlFull: Authorization Code, PKCE, Client Credentials, Device Flow, Refresh Tokens. Partial: limited grants.Review OAuth documentationEssential
F2.4LDAP interfaceLDAP protocol access for legacy application compatibilityFull: LDAP bind, search, compare with schema customisation. Partial: read-only or limited ops.Review LDAP documentation; test with ldapsearchImportant
F2.5RADIUS supportRADIUS protocol for network access authentication (VPN, WiFi)Full: PAP, CHAP, EAP methods. Partial: limited methods. None: no RADIUS.Review RADIUS documentationContext-dependent
F2.6SCIM provisioningSCIM 2.0 for automated user provisioning to downstream applicationsFull: SCIM 2.0 server and client, user/group operations. Partial: limited operations.Review SCIM documentationImportant

Directory services

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
F3.1User directoryCentral storage of user accounts with profile attributesFull: custom attributes, validation rules, schema extension. Partial: fixed schema.Review user management documentationEssential
F3.2Group managementHierarchical group structures for permission aggregationFull: nested groups, dynamic membership, group types. Partial: flat groups only.Review group documentationEssential
F3.3External directory syncSynchronisation with external directories (AD, LDAP, HR systems)Full: bidirectional sync, conflict resolution, scheduled jobs. Partial: one-way or manual.Review sync documentationImportant
F3.4Custom schema supportExtensible user and group schemas for organisation-specific attributesFull: custom attribute types, validation, indexing. Partial: limited extension.Review schema documentationImportant
F3.5Self-service profile managementUser access to view and update own profile attributesFull: configurable editable fields, verification flows. Partial: limited fields.Review self-service documentationImportant

Identity lifecycle

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
F4.1Self-service registrationUser self-registration with configurable approval workflowsFull: customisable forms, email verification, admin approval. Partial: basic registration.Review registration documentationImportant
F4.2Automated provisioningAutomatic account creation/updates from authoritative sourcesFull: event-driven provisioning, transformation rules. Partial: scheduled sync only.Review provisioning documentationImportant
F4.3Deprovisioning workflowsAutomated or triggered account disable/delete processesFull: immediate disable, delayed delete, manager notification. Partial: manual only.Review offboarding documentationEssential
F4.4Access reviews and recertificationPeriodic review of user access entitlementsFull: scheduled campaigns, manager attestation, automatic revocation. Partial: reporting only.Review access review documentationImportant
F4.5Account recoverySelf-service account recovery through verified channelsFull: email, SMS, security questions, admin delegation. Partial: single method.Review recovery documentationEssential
F4.6Lifecycle automationWorkflow engine for identity lifecycle eventsFull: custom workflows, approvals, escalation. Partial: fixed workflows.Review workflow documentationDesirable

Access control

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
F5.1Role-based access controlAssignment of permissions through role membershipFull: custom roles, role hierarchy, separation of duties. Partial: fixed roles.Review RBAC documentationEssential
F5.2Attribute-based access controlDynamic access decisions based on user and resource attributesFull: policy language, real-time evaluation. Partial: limited attributes.Review ABAC documentationDesirable
F5.3Fine-grained authorisationGranular permission control beyond role assignmentFull: resource-level permissions, conditions, denies. Partial: coarse permissions.Review authorisation documentationImportant
F5.4Delegated administrationScoped admin rights for organisational unitsFull: tenant isolation, delegated domains. Partial: global admin only.Review delegation documentationImportant
F5.5Consent managementUser consent capture and enforcement for data processingFull: consent flows, withdrawal, audit trail. Partial: basic consent.Review consent documentationImportant

Technical requirements

Infrastructure, architecture, and deployment considerations.

Deployment and hosting

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
T1.1Self-hosted deploymentDeployment on organisation-controlled infrastructureFull: complete feature parity, documented deployment. Partial: feature limitations. None: SaaS only.Review deployment documentationImportant
T1.2Container deploymentOfficial container images for Docker/Kubernetes deploymentFull: official images, Helm charts, operators. Partial: community images.Check container registries, Helm repositoriesDesirable
T1.3High availabilityRedundant deployment eliminating single points of failureFull: active-active clustering, automatic failover. Partial: active-passive.Review HA architecture documentationEssential
T1.4Geographic distributionMulti-region deployment for latency and resilienceFull: configurable regions, data replication. Partial: single region.Review multi-region documentationContext-dependent
T1.5Database requirementsBackend database options and requirementsDocument supported databases, versions, HA configurationsReview infrastructure documentationImportant

Scalability and performance

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
T2.1Horizontal scalingCapacity addition through additional nodesFull: stateless nodes, load balancing. Partial: session affinity required.Review scaling documentationImportant
T2.2Authentication throughputDocumented authentication capacity metricsFull: published benchmarks with methodology. Partial: general claims.Review performance documentationDesirable
T2.3User capacityMaximum supported user count and cost implicationsFull: documented limits by tier. Partial: unclear limits.Review limits documentationEssential
T2.4Token performanceToken issuance and validation performance characteristicsFull: published token operation metrics. Partial: general guidance.Review token documentationDesirable

Integration architecture

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
T3.1REST APIComprehensive API for identity operationsFull: complete feature coverage, versioned, documented. Partial: limited coverage.Review API documentation completenessEssential
T3.2Event webhooksPush notifications for identity eventsFull: configurable events, retry logic, signing. Partial: limited events.Review webhook documentationImportant
T3.3Pre-built connectorsAvailable integrations with common applicationsList available connectors, note native vs marketplaceReview integrations catalogueDesirable
T3.4SDK availabilityClient libraries for application integrationFull: multiple languages, maintained, documented. Partial: limited languages.Review SDK documentationImportant
T3.5Customisation extensibilityExtension points for custom logic (authentication flows, claims)Full: custom code execution, policy language. Partial: configuration only.Review extensibility documentationImportant

Security requirements

Security controls and data protection capabilities.

Authentication security

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
S1.1Password hashingSecure password storage using modern algorithmsFull: Argon2/bcrypt/scrypt with configurable parameters. Partial: SHA with salt.Review security documentationEssential
S1.2Credential encryptionEncryption of stored credentials and secretsFull: HSM integration, encrypted storage. Partial: application encryption.Review key management documentationEssential
S1.3Session securitySecure session management and token handlingFull: secure cookies, token binding, rotation. Partial: basic sessions.Review session security documentationEssential
S1.4Phishing resistanceProtection against credential phishing attacksFull: WebAuthn support, phishing-resistant MFA. Partial: standard MFA.Review anti-phishing documentationImportant

Audit and compliance

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
S2.1Comprehensive audit logsDetailed logging of all identity operationsFull: authentication, admin actions, configuration changes, API calls. Partial: limited events.Review audit log documentationEssential
S2.2Log export and integrationAbility to export logs to external SIEM/logging systemsFull: real-time streaming, multiple formats. Partial: batch export.Review log integration documentationImportant
S2.3Log retentionConfigurable audit log retention periodsFull: configurable retention, archival. Partial: fixed retention.Review retention documentationImportant
S2.4Compliance reportingPre-built reports for compliance requirementsFull: SOC 2, ISO 27001, GDPR reports. Partial: basic reports.Review compliance documentationContext-dependent

Security certifications

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
S3.1SOC 2 certificationSystem and Organisation Controls Type 2 auditFull: current SOC 2 Type II report. Partial: Type I or pending.Request audit reportsImportant
S3.2ISO 27001 certificationInformation security management system certificationFull: current certification. Partial: in progress.Verify certificate validityImportant
S3.3FedRAMP/StateRAMPUS government security authorisationFull: authorised. Partial: in process. None: not applicable.Check FedRAMP marketplaceContext-dependent
S3.4GDPR complianceDemonstrated GDPR compliance for EU dataFull: DPA, documented compliance. Partial: self-attested.Review DPA, privacy documentationImportant

Operational requirements

Day-to-day administration and maintenance considerations.

Administration

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
O1.1Web administration consoleBrowser-based interface for system administrationFull: comprehensive UI, responsive, accessible. Partial: limited functionality.Review admin console documentationEssential
O1.2CLI administrationCommand-line tools for scripted administrationFull: comprehensive CLI, scriptable. Partial: limited commands.Review CLI documentationImportant
O1.3Infrastructure as codeDeclarative configuration managementFull: Terraform/Pulumi providers, GitOps support. Partial: limited IaC.Review IaC documentationDesirable
O1.4Multi-tenancyLogical separation for multiple organisational unitsFull: isolated tenants, delegated admin. Partial: shared configuration.Review multi-tenant documentationContext-dependent

Monitoring and observability

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
O2.1Health endpointsAPI endpoints for service health monitoringFull: liveness, readiness, detailed health. Partial: basic health.Review health check documentationImportant
O2.2Metrics exposureOperational metrics for monitoring systemsFull: Prometheus/OpenMetrics, detailed metrics. Partial: limited metrics.Review metrics documentationImportant
O2.3Distributed tracingRequest tracing for debugging and performance analysisFull: OpenTelemetry support. Partial: proprietary tracing.Review tracing documentationDesirable
O2.4Alerting capabilitiesBuilt-in alerting for operational eventsFull: configurable alerts, multiple channels. Partial: basic alerts.Review alerting documentationDesirable

Backup and recovery

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
O3.1Configuration backupExport/import of system configurationFull: complete config export, version control friendly. Partial: limited export.Review backup documentationEssential
O3.2Data backupUser and group data backup capabilitiesFull: automated backup, point-in-time recovery. Partial: manual backup.Review data backup documentationEssential
O3.3Disaster recoveryDocumented DR procedures and capabilitiesFull: documented RTO/RPO, tested procedures. Partial: general guidance.Review DR documentationImportant

Commercial requirements

Licensing, pricing, and vendor assessment considerations.

Pricing and licensing

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
C1.1Pricing model transparencyClear, predictable pricing structureFull: published pricing, calculator. Partial: quote required.Review pricing documentationEssential
C1.2Nonprofit/NGO pricingDiscounted or donated licensing for qualifying organisationsFull: documented programme, clear eligibility. Partial: case-by-case.Contact vendor, review programmeImportant
C1.3User-based vs consumption pricingPricing basis and scaling characteristicsDocument model and scaling costReview pricing structureImportant
C1.4Feature tier transparencyClear documentation of features by tierFull: detailed feature matrix. Partial: general tier descriptions.Review feature comparisonEssential

Vendor assessment

IDRequirementDescriptionAssessment criteriaVerification methodTypical priority
C2.1Vendor stabilityFinancial and operational stability indicatorsFull: public company or substantial backing. Partial: startup with funding.Research company backgroundImportant
C2.2Development activityEvidence of ongoing product developmentFull: regular releases, public roadmap. Partial: infrequent updates.Review release history, roadmapImportant
C2.3Support optionsAvailable support tiers and response timesFull: 24/7 option, documented SLAs. Partial: business hours only.Review support documentationImportant
C2.4Data portabilityAbility to export data for migrationFull: complete data export, documented format. Partial: limited export.Review export documentationEssential
C2.5Jurisdictional considerationsVendor headquarters and applicable legal regimeDocument jurisdiction, CLOUD Act exposure, data processing locationsReview legal documentationImportant

Comparison matrices

The following matrices provide side-by-side comparison of assessed tools. Assessments reflect documented capabilities as of 2026-01-11.

Rating key:

  • ● Full support: Meets criteria completely
  • ◐ Partial support: Meets criteria with limitations
  • ○ Minimal support: Basic capability only
  • ✗ Not supported: Capability absent
  • $ Paid tier required
  • E Enterprise tier required
  • P Plugin/extension required

Solution overview

SolutionTypeLicenceCurrent versionDeploymentHeadquarters
KeycloakFOSSApache 2.026.4.7Self-hosted, containersCNCF (vendor-neutral)
authentikFOSSMIT (core)2025.12Self-hosted, containersGermany (Authentik Security)
FreeIPAFOSSGPL v34.12.5Self-hosted (RHEL/Fedora)Red Hat (US)
OpenLDAPFOSSOpenLDAP Public2.6.10 LTSSelf-hostedOpenLDAP Foundation
OktaCommercialProprietarySaaSCloud onlyUnited States
Microsoft Entra IDCommercialProprietarySaaSCloud onlyUnited States
Auth0CommercialProprietarySaaSCloud, private cloudUnited States (Okta)
JumpCloudCommercialProprietarySaaSCloud, with agentsUnited States

Protocol and standards support

SolutionOIDCSAML 2.0OAuth 2.0LDAPRADIUSSCIM
Keycloak◐ P
authentik● E
FreeIPA
OpenLDAP
Okta
Microsoft Entra ID
Auth0
JumpCloud

Assessment notes:

  • FreeIPA primarily functions as a Kerberos/LDAP directory with limited modern protocol support; OIDC/OAuth requires additional components
  • OpenLDAP provides directory services only; authentication protocols require separate identity provider integration
  • Microsoft Entra ID LDAP support requires Azure AD Domain Services (additional service)
  • Auth0 SCIM support is provider-only (outbound provisioning), not server (inbound)

Authentication capabilities

SolutionMFA methodsPasswordlessSocial loginAdaptive authBrute force protection
Keycloak● TOTP, WebAuthn, SMS
authentik● TOTP, WebAuthn, SMS, Duo
FreeIPA◐ TOTP, RADIUS
OpenLDAP
Okta● TOTP, WebAuthn, push, SMS
Microsoft Entra ID● TOTP, WebAuthn, push, SMS
Auth0● TOTP, WebAuthn, push, SMS
JumpCloud● TOTP, WebAuthn, push

Assessment notes:

  • Keycloak WebAuthn support is comprehensive including passkeys with device attestation
  • authentik added Telegram as social login source in 2025.10; supports extensive social providers
  • FreeIPA MFA relies on TOTP or external RADIUS; no native push notification
  • OpenLDAP provides no native authentication UI; MFA requires application layer

Directory and lifecycle capabilities

SolutionUser directoryGroup managementExternal syncSelf-serviceProvisioning workflows
Keycloak● LDAP, AD
authentik● LDAP, AD, SCIM
FreeIPA◐ AD trust
OpenLDAP◐ syncrepl
Okta● AD, LDAP, HR systems
Microsoft Entra ID● AD Connect
Auth0◐ custom connections
JumpCloud● AD, Google, HR systems

Assessment notes:

  • Auth0 user directory is optimised for customer identity (B2C); less suited for workforce directory
  • authentik introduced lifecycle workflows in 2025.4 with pre-defined permission bundles
  • FreeIPA provides AD trust relationships rather than sync; requires specific configuration
  • OpenLDAP syncrepl provides replication, not heterogeneous directory sync

Deployment and operations

SolutionSelf-hostedContainersHA supportMulti-regionIaC support
Keycloak● Quarkus● Terraform
authentik● Docker, K8s● Terraform
FreeIPA◐ Ansible
OpenLDAP
Okta● Terraform
Microsoft Entra ID● Terraform
Auth0○ Private Cloud● Terraform
JumpCloud

Assessment notes:

  • Keycloak 26.x is Quarkus-based with official container images and Kubernetes operator
  • authentik removed Redis dependency in 2025.10, simplifying deployment
  • Auth0 Private Cloud requires enterprise agreement and dedicated infrastructure
  • FreeIPA containerisation is community-supported; production deployments typically use RPM

Security and compliance

SolutionEncryption at restAudit loggingSOC 2ISO 27001GDPR tools
Keycloak● configurableN/AN/A
authentikN/AN/A
FreeIPAN/AN/A
OpenLDAPN/AN/A
Okta
Microsoft Entra ID
Auth0
JumpCloud

Assessment notes:

  • Self-hosted solutions (Keycloak, authentik, FreeIPA, OpenLDAP) inherit certifications from infrastructure provider
  • Commercial solutions provide compliance attestations for their platform
  • authentik introduced PII masking in log streaming in 2025.7

Individual tool assessments

Keycloak

AttributeValue
TypeFOSS Identity Provider
LicenceApache 2.0
Current version26.4.7 (December 2025)
StewardshipCloud Native Computing Foundation (CNCF) incubating project
Primary deploymentSelf-hosted (containers, Kubernetes, bare metal)
Documentationhttps://www.keycloak.org/documentation
Source repositoryhttps://github.com/keycloak/keycloak

Keycloak is a comprehensive identity and access management solution providing SSO, identity brokering, user federation, and fine-grained authorisation. Red Hat donated the project to CNCF in April 2023, establishing vendor-neutral governance. The platform serves as the upstream project for Red Hat Build of Keycloak.

The 26.x series introduced Quarkus-based architecture replacing WildFly, delivering reduced memory footprint (approximately 50% reduction), faster startup times, and cloud-native deployment patterns. The architecture supports horizontal scaling with external database backends (PostgreSQL, MySQL, MariaDB, Oracle, Microsoft SQL Server).

Key strengths:

Comprehensive protocol coverage: Keycloak implements OIDC, OAuth 2.0, SAML 2.0, and LDAP with extensive configuration options. The OIDC implementation passes FAPI 2.0 conformance testing. Token exchange, device authorisation flow, and CIBA (Client Initiated Backchannel Authentication) are supported.

User federation architecture: LDAP and Active Directory federation supports read-only, read-write, and synchronisation modes. Custom federation providers enable integration with proprietary directories. Federation mappers transform attributes between source and Keycloak representations.

Identity brokering: Keycloak brokers authentication to external identity providers including OIDC, SAML, and social providers. First-login flows handle account linking, attribute import, and required actions.

Fine-grained authorisation services: Policy-based authorisation with permission evaluation supporting JavaScript, time-based, role-based, and user-based policies. Resource servers can delegate authorisation decisions to Keycloak.

Key limitations:

Operational complexity: Production deployment requires understanding of clustering, database configuration, cache tuning, and reverse proxy integration. Organisations without Kubernetes expertise face steeper learning curves.

No native RADIUS: RADIUS protocol requires third-party extensions. Organisations using RADIUS for VPN or WiFi authentication need additional components.

Theme customisation: Login page customisation uses FreeMarker templates requiring development expertise. The JavaScript SDK for client-side customisation adds complexity.

No managed service: Unlike commercial alternatives, Keycloak requires self-hosting. Organisations must provision infrastructure, handle upgrades, and maintain security patches.

Deployment and operations:

Self-hosted requirements vary by scale:

ScaleUsersvCPUMemoryStorageDatabase
SmallUnder 1,00022 GB10 GBPostgreSQL (single)
Medium1,000-50,00044 GB50 GBPostgreSQL (HA)
LargeOver 50,0008+8 GB+100 GB+PostgreSQL (clustered)

Container deployment uses official images from quay.io/keycloak/keycloak. Kubernetes deployment leverages the Keycloak Operator for automated configuration management.

Upgrade path from 26.x to 27.x (planned Fall 2025) includes database migration tooling. The project maintains backwards compatibility within major versions.

Integration capabilities:

Integration typeCapability
Admin APIComprehensive REST API covering all functionality
EventsEvent listeners for authentication, admin actions, user operations
SPIsService Provider Interfaces for custom authentication, federation, storage
ThemesCustom login, account, admin console themes
ExtensionsJava-based extensions for custom functionality

Cost model:

Keycloak is free to use under Apache 2.0. Costs derive from infrastructure and operations:

Cost componentTypical range
InfrastructureCloud VM or container costs; budget 2-4 vCPU, 4-8 GB RAM for medium deployments
DatabasePostgreSQL hosting; managed database for HA
OperationsStaff time for deployment, upgrades, monitoring
SupportOptional commercial support from Red Hat (subscription required) or consultancies

Organisational fit:

Best suited for:

  • Organisations requiring complete control over identity infrastructure
  • Deployments with data sovereignty requirements precluding SaaS
  • Teams with Kubernetes/container operations expertise
  • Use cases requiring extensive customisation

Less suitable for:

  • Organisations without infrastructure operations capacity
  • Deployments where managed service reduces total cost of ownership
  • Use cases prioritising time-to-value over control

authentik

AttributeValue
TypeFOSS Identity Provider
LicenceMIT (core), commercial features available
Current version2025.12 (December 2025)
VendorAuthentik Security GmbH (Germany)
Primary deploymentSelf-hosted (Docker, Kubernetes)
Documentationhttps://docs.goauthentik.io
Source repositoryhttps://github.com/goauthentik/authentik

authentik is a modern identity provider emphasising flexibility and developer experience. The platform provides authentication, authorisation, and user management with a Python/Django backend and React frontend. Authentik Security GmbH, based in Germany, provides commercial support and enterprise features.

The 2025.10 release removed Redis dependency entirely, simplifying deployment to PostgreSQL only. The platform uses PostgreSQL for task queuing, caching, and WebSocket connections. This architectural change reduced operational complexity while increasing PostgreSQL connection requirements by approximately 50%.

Key strengths:

Flow-based authentication: Authentication flows are constructed from discrete stages (identification, password, MFA, consent) with conditional logic. This enables complex authentication scenarios without custom code. Flows are version-controlled and can be imported/exported.

Application proxy: Built-in reverse proxy (outpost) provides authentication for applications lacking native SSO support. Forward authentication headers or proxy with session validation work with legacy applications.

Modern UI/UX: The administration interface provides clear navigation with responsive design. User-facing interfaces (login, self-service) are customisable through theming. The 2025.10 release improved mobile viewport support.

Extensive integration support: Over 130 documented integration guides cover common applications. SCIM provisioning (enterprise feature) enables automated user lifecycle management.

Key limitations:

Enterprise feature gating: RADIUS EAP-TLS, SCIM OAuth authentication, and some advanced features require enterprise licence. Organisations needing these capabilities face licensing costs.

Single-database dependency: PostgreSQL-only architecture limits database choice. Organisations standardised on MySQL or other databases cannot use their existing infrastructure.

Smaller community: Compared to Keycloak, authentik has a smaller user community and fewer third-party resources. Troubleshooting may require vendor support.

Resource requirements: Full-featured deployment with proxy outposts requires more infrastructure than minimal Keycloak installations.

Deployment and operations:

Deployment options:

  • Docker Compose for development and small production
  • Kubernetes with Helm chart for production scale
  • Gateway API support added in 2025.4

Resource requirements:

ComponentvCPUMemoryNotes
Core server22 GBPostgreSQL connection pool
Worker11 GBBackground tasks
Outpost (proxy)1512 MBPer outpost instance
PostgreSQL22 GBSingle instance minimum

The 2025.12 release introduced desktop credential provider integrations (Windows, macOS, Linux) in alpha, enabling platform SSO scenarios.

Integration capabilities:

Integration typeCapability
Admin APIREST API with OpenAPI specification
EventsEvent streams to webhooks, AWS EventBridge (2025.2+)
ExpressionsPython expressions for policy evaluation, flow logic
BlueprintsDeclarative configuration in YAML
OutpostsProxy, LDAP, RADIUS outposts for protocol translation

Cost model:

Core platform is MIT-licensed. Enterprise features require subscription:

ComponentLicenceCost
Core platformMITFree
Enterprise featuresCommercialContact vendor
SupportCommercialContact vendor
InfrastructureSelf-hostedCloud/on-premises costs

Enterprise features include: RADIUS EAP-TLS, SCIM OAuth, event maps, access certification campaigns, advanced reporting.

Organisational fit:

Best suited for:

  • Organisations preferring modern Python/Django stack
  • Deployments requiring application proxy for legacy applications
  • Teams valuing EU-based vendor for GDPR alignment
  • Use cases benefiting from flow-based authentication design

Less suitable for:

  • Organisations requiring MySQL/MariaDB backend
  • Deployments needing RADIUS with EAP-TLS without enterprise licence
  • Teams requiring maximum community resources

FreeIPA

AttributeValue
TypeFOSS Identity Management
LicenceGPL v3
Current version4.12.5 (2025)
StewardshipRed Hat (upstream for Red Hat Identity Management)
Primary deploymentSelf-hosted (RHEL, Fedora, CentOS Stream)
Documentationhttps://www.freeipa.org/page/Documentation
Source repositoryhttps://pagure.io/freeipa

FreeIPA provides centralised identity, policy, and audit (IPA) for Linux and POSIX environments. The platform integrates 389 Directory Server, MIT Kerberos, NTP, DNS, Dogtag certificate system, and SSSD into a unified management framework. Red Hat Identity Management is the downstream commercial product.

FreeIPA excels at Linux infrastructure authentication where Kerberos and LDAP are primary protocols. The platform provides certificate authority services, DNS management, and host-based access control. Active Directory trust relationships enable cross-forest authentication.

Key strengths:

Integrated Linux identity stack: Single solution for user/group management, Kerberos authentication, host management, sudo rules, SELinux user mapping, and certificate services. Reduces component sprawl for Linux-centric environments.

Active Directory trust: Establishes trust relationships with AD forests enabling AD users to access Linux resources with existing credentials. Does not require directory synchronisation.

Host-based access control: Centralised sudo rules, SELinux mappings, and host-based access policies apply across enrolled hosts. Management through CLI, web UI, or API.

Certificate authority: Integrated Dogtag CA issues certificates for hosts, services, and users. Automatic certificate renewal through certmonger.

Key limitations:

Limited modern protocol support: No native OIDC or OAuth 2.0 implementation. Web application SSO requires additional components (e.g., mod_auth_openidc, Keycloak integration). SAML support is basic.

Platform restriction: Officially supports RHEL, Fedora, and derivatives. Debian/Ubuntu packages exist but receive less testing. Windows clients require AD trust rather than native enrollment.

Monolithic architecture: All components deploy together; selective deployment is limited. Scaling requires replica servers rather than horizontal scaling of individual components.

Complex initial setup: First server installation configures DNS, Kerberos, LDAP, and CA simultaneously. DNS integration particularly requires careful planning.

Deployment and operations:

Minimum requirements for single server:

ComponentRequirement
OSRHEL 9, Fedora 39+, CentOS Stream 9
vCPU2
Memory4 GB (8 GB recommended)
Storage20 GB (scales with user count)

Replica servers provide high availability. Recommended topology: 2 servers minimum for production, geographically distributed for multi-site.

The 4.12.5 release addressed security vulnerabilities including CVE-2025-7493 (identity spoofing through Kerberos). Organisations should enable SID generation and PAC validation.

Integration capabilities:

Integration typeCapability
CLIipa command with comprehensive subcommands
APIJSON-RPC and XML-RPC APIs
LDAPStandard LDAP access to directory
KerberosMIT Kerberos KDC with PKINIT
Ansibleansible-freeipa collection for automation

Cost model:

ComponentLicenceCost
FreeIPAGPL v3Free
InfrastructureSelf-hostedRHEL subscription or free OS
SupportRed Hat IdMIncluded with RHEL

RHEL subscription includes Red Hat Identity Management with commercial support. FreeIPA on Fedora or CentOS Stream operates without subscription cost.

Organisational fit:

Best suited for:

  • Linux-centric infrastructure requiring centralised identity
  • Organisations using RHEL with existing subscriptions
  • Environments requiring integrated certificate services
  • Use cases with Active Directory trust requirements

Less suitable for:

  • Web application SSO as primary use case
  • Cloud-native or SaaS-first architectures
  • Organisations without Linux operations expertise
  • Multi-platform environments prioritising modern protocols

OpenLDAP

AttributeValue
TypeFOSS Directory Server
LicenceOpenLDAP Public Licence
Current version2.6.10 LTS (May 2025)
StewardshipOpenLDAP Foundation
Primary deploymentSelf-hosted
Documentationhttps://www.openldap.org/doc/
Source repositoryhttps://git.openldap.org/openldap/openldap

OpenLDAP is a mature, high-performance LDAP directory server providing the foundational directory services layer for identity infrastructure. The project originated in 1998 as a continuation of University of Michigan LDAP development. OpenLDAP 2.6 became the Long Term Support (LTS) release in January 2025 with projected five-year support.

OpenLDAP functions as a directory service, not a complete identity provider. Authentication protocols (OIDC, SAML), MFA, and user self-service require additional components. Organisations use OpenLDAP as the directory backend for Keycloak, application authentication, or network device AAA.

Key strengths:

Performance and scalability: LMDB backend (Lightning Memory-Mapped Database, developed by OpenLDAP project) provides high-performance storage. Tested deployments support millions of entries with appropriate hardware.

Replication flexibility: Multi-provider (N-way multimaster) replication enables geographically distributed, fault-tolerant deployments. Sync replication (syncrepl) and delta-syncrepl minimise replication traffic.

Standards compliance: Full LDAPv3 implementation with extensive schema support. Overlay architecture enables modular functionality (password policy, referential integrity, access logging).

Operational maturity: Decades of production deployment have resolved edge cases. Extensive documentation and community knowledge exist for complex scenarios.

Key limitations:

Directory only: No authentication UI, no SSO protocols, no MFA, no user self-service. These require additional components or integration with identity providers.

Administrative complexity: Configuration (cn=config) uses LDAP itself, requiring LDAP expertise for administration. No web UI provided; ldap-utils or third-party tools required.

Deprecated backends: back-bdb and back-hdb removed in favour of back-mdb. Migrations from legacy installations require planning.

Limited modern protocol support: REST API requires overlays or external proxies. GraphQL, gRPC, or WebSocket access not native.

Deployment and operations:

Resource requirements scale with directory size:

ScaleEntriesvCPUMemoryStorage
SmallUnder 10,00011 GB1 GB
Medium10,000-100,00024 GB10 GB
LargeOver 100,0004+8 GB+Proportional

OpenLDAP 2.7 is planned for Fall 2025 with native RADIUS server implementation and scoped password policies.

Integration capabilities:

Integration typeCapability
ProtocolLDAPv3, LDAPS, StartTLS
BackendsLMDB (primary), ldif, relay, meta, sql
Overlaysppolicy, syncrepl, accesslog, memberof, refint, unique, auditlog
Toolsslapd, slapcat, slapadd, ldapsearch, ldapmodify

Cost model:

ComponentLicenceCost
OpenLDAPOpenLDAP Public LicenceFree
InfrastructureSelf-hostedServer/VM costs
SupportCommunity, third-party, or SymasVaries

Symas Corporation provides commercial OpenLDAP support. No vendor nonprofit programmes identified.

Organisational fit:

Best suited for:

  • Directory service layer for identity provider integration
  • Legacy application authentication (LDAP bind)
  • Network device AAA backends
  • Organisations with LDAP operations expertise

Less suitable for:

  • Standalone identity provider requirements
  • Modern web application SSO
  • Organisations requiring managed solutions
  • Teams without LDAP expertise

Okta

AttributeValue
TypeCommercial Identity Provider
LicenceProprietary SaaS
VendorOkta, Inc. (United States)
Primary deploymentCloud (multi-tenant SaaS)
Documentationhttps://developer.okta.com
Admin documentationhttps://help.okta.com

Okta is a market-leading cloud identity platform serving enterprise workforce identity (Okta Workforce Identity) and customer identity (Okta Customer Identity, formerly Auth0 branded). This assessment focuses on Okta Workforce Identity for employee/contractor authentication.

Okta provides identity infrastructure as a service, eliminating self-hosting requirements. The platform integrates with thousands of applications through pre-built connectors, SCIM provisioning, and SSO protocols.

Key strengths:

Integration breadth: Over 7,000 pre-built application integrations in the Okta Integration Network (OIN). SCIM provisioning, SSO, and workflow automation available for major SaaS applications.

Universal Directory: Aggregates identities from multiple sources (AD, LDAP, HR systems) into unified directory. Profile mastering controls authoritative source per attribute.

Lifecycle automation: Workflows enable code-free automation of identity lifecycle events. Integration with HR systems triggers provisioning and deprovisioning.

Compliance and security: SOC 2 Type II, ISO 27001, FedRAMP High (OWA), and HIPAA compliance. Threat insight integration with Okta ThreatInsight for credential stuffing protection.

Key limitations:

SaaS only: No self-hosted deployment option. All data processed in Okta cloud (US, EU, AU regions available). CLOUD Act applies to US-headquartered vendor.

Cost at scale: Per-user pricing with feature tiers creates significant cost for large user counts. Enterprise features require higher tiers.

Complexity accumulation: Extensive configuration options across authentication policies, application assignments, and workflows require ongoing governance.

Auth0 integration: Okta’s acquisition of Auth0 created two platforms with different architectures. Migration paths between platforms are incomplete.

Deployment and operations:

Okta requires no infrastructure deployment. Implementation focuses on configuration:

PhaseTypical durationActivities
Directory integration1-2 weeksAD/LDAP agent deployment, sync configuration
Application SSO1-4 weeksPer-application SSO configuration
Provisioning2-4 weeksSCIM configuration, attribute mapping
MFA rollout2-4 weeksPolicy configuration, user enrollment

Okta agents (AD, LDAP, RADIUS) deploy on-premises for directory integration. Agents require outbound HTTPS; no inbound firewall rules needed.

Integration capabilities:

Integration typeCapability
APIsManagement API, Authentication API, OAuth 2.0/OIDC
WebhooksEvent hooks for inline customisation
WorkflowsNo-code automation platform
SDKJava, .NET, Python, Node.js, Go
TerraformOfficial provider for IaC

Cost model:

Okta uses per-user-per-month pricing with feature tiers:

TierFeaturesRelative cost
SSOBasic SSO, MFABase
Adaptive SSOAdaptive authentication, device trust+50%
EnterpriseLifecycle management, API access management+100%

Okta for Good programme provides discounted or donated licences for qualifying nonprofits. Eligibility varies by region and organisation type. Application required.

Jurisdictional considerations:

FactorAssessment
HeadquartersUnited States
CLOUD Act exposureSubject to US government data requests
Data residencyUS, EU (Frankfurt), AU (Sydney) options
SubprocessorsPublished list, primarily US-based

Organisational fit:

Best suited for:

  • Organisations prioritising managed identity service
  • Deployments requiring extensive SaaS integration
  • Microsoft 365 or Google Workspace environments needing additional IdP
  • Teams without identity infrastructure expertise

Less suitable for:

  • Organisations requiring self-hosted deployment
  • Data sovereignty requirements precluding US vendors
  • Cost-sensitive deployments with large user counts
  • Use cases where open source meets requirements

Microsoft Entra ID

AttributeValue
TypeCommercial Identity Provider
LicenceProprietary SaaS
VendorMicrosoft Corporation (United States)
Primary deploymentCloud (Azure)
Documentationhttps://learn.microsoft.com/entra

Microsoft Entra ID (formerly Azure Active Directory) is Microsoft’s cloud identity service, foundational to Microsoft 365, Azure, and Dynamics 365. The platform serves as both workforce and customer identity provider with extensive integration into Microsoft ecosystem.

Entra ID is included with Microsoft 365 subscriptions, making it the de facto identity provider for organisations using Microsoft cloud services. Standalone or enhanced capabilities require additional licensing.

Key strengths:

Microsoft ecosystem integration: Native SSO for Microsoft 365, Azure, and 3,500+ SaaS applications. Entra ID synchronises with on-premises Active Directory through Entra Connect.

Conditional access: Comprehensive policy engine combining user, device, location, and application context. Risk-based policies integrate with Entra ID Protection threat detection.

Device identity: Entra join and hybrid join provide device identity alongside user identity. Integration with Intune enables device compliance requirements in access policies.

Scale and availability: Microsoft operates one of the largest identity platforms globally. Published SLA of 99.99% uptime for authentication.

Key limitations:

Microsoft-centric: Deepest integration with Microsoft ecosystem; third-party integration varies. Organisations not using Microsoft 365 gain less value.

Complexity: Feature scope creates configuration complexity. Premium P2 licence required for comprehensive identity governance (access reviews, PIM).

LDAP limitations: No native LDAP interface. Entra Domain Services (additional service) provides LDAP for legacy applications requiring it.

Pricing structure: Feature fragmentation across Free, P1, P2, and Governance tiers complicates cost estimation. Enterprise features require Premium licensing.

Deployment and operations:

Entra ID is SaaS; deployment involves configuration rather than infrastructure:

ComponentPurposeRequirements
Entra ConnectAD synchronisationOn-premises Windows server
Application ProxyOn-premises app accessConnector agent, outbound HTTPS
Provisioning agentCloud provisioningFor cloud-to-AD provisioning

The November 2025 release introduced Entra Agent ID for AI agent identity management, expanding identity scope beyond human users.

Integration capabilities:

Integration typeCapability
Microsoft GraphComprehensive API for identity operations
SCIMProvisioning to integrated applications
TerraformAzureRM and AzureAD providers
PowerShellMicrosoft.Graph PowerShell module (MSOnline deprecated)
SIEMStreaming to Sentinel, Splunk, other SIEM

Cost model:

Entra ID licensing:

TierIncluded withAdditional cost
FreeAzure subscription-
P1Microsoft 365 E3/A3, EMS E3Or standalone
P2Microsoft 365 E5/A5, EMS E5Or standalone
GovernanceAdd-onAdditional per-user

Microsoft nonprofit programmes provide donated or discounted Microsoft 365, including Entra ID P1. Microsoft 365 Business Premium (donated) includes P1. E3/E5 grants available for qualifying organisations.

Jurisdictional considerations:

FactorAssessment
HeadquartersUnited States
CLOUD Act exposureSubject to US government data requests
Data residencyCore directory data in region; some services process in US
EU Data BoundaryAvailable for EU customers, with limitations

Organisational fit:

Best suited for:

  • Organisations using Microsoft 365 as primary productivity suite
  • Windows/Intune device management environments
  • Deployments requiring AD synchronisation
  • Teams with existing Microsoft expertise

Less suitable for:

  • Non-Microsoft-centric environments
  • Organisations avoiding US cloud providers
  • Use cases requiring self-hosted identity
  • Linux-centric infrastructure

Auth0

AttributeValue
TypeCommercial Identity Provider
LicenceProprietary SaaS
VendorOkta, Inc. (United States)
Primary deploymentCloud (multi-tenant), Private Cloud (enterprise)
Documentationhttps://auth0.com/docs

Auth0 provides developer-centric identity services for application authentication. Acquired by Okta in 2021, Auth0 continues operating as a distinct platform optimised for customer identity (CIAM) and application-embedded authentication.

Auth0 emphasises developer experience with extensive SDKs, quickstarts, and customisation options. The platform excels at embedding authentication into applications rather than serving as enterprise directory service.

Key strengths:

Developer experience: SDKs for 30+ languages/frameworks, comprehensive documentation, and sample applications. Universal Login provides customisable hosted authentication pages.

Extensibility: Actions (JavaScript functions) execute during authentication flows. Rules and hooks enable complex authentication logic without platform modification.

Customer identity focus: Social login, passwordless, and progressive profiling features suit customer-facing applications. Breached password detection integrates with authentication flows.

Auth for GenAI: April 2025 introduced Auth for GenAI with Token Vault for third-party API tokens, async authorisation for AI agent workflows, and fine-grained authorisation for RAG applications.

Key limitations:

Not a directory service: Auth0 user database is designed for customer accounts, not employee directory. No LDAP interface; limited HR system integration compared to workforce identity platforms.

Platform overlap with Okta: Okta and Auth0 have overlapping capabilities with unclear product boundary. Migration between platforms is non-trivial.

Enterprise pricing: Consumption-based pricing with MAU tiers. Enterprise features (private cloud, advanced customisation) require enterprise agreements.

Limited SCIM: SCIM support is outbound only (Auth0 provisioning to applications), not inbound (applications provisioning to Auth0).

Deployment and operations:

Auth0 SaaS requires no infrastructure. Private Cloud deployment (enterprise tier) provides dedicated infrastructure:

DeploymentAvailabilityRequirements
Public cloudAll plansNone
Private cloudEnterpriseDedicated contract, managed by Auth0

Auth0 operates regions in US, EU, AU, and JP. Data residency corresponds to tenant region selection.

Integration capabilities:

Integration typeCapability
Management APIComprehensive API for tenant management
Authentication APIOAuth 2.0, OIDC, passwordless endpoints
ActionsJavaScript code execution in authentication flows
SDKExtensive language/framework coverage
MarketplacePre-built integrations and extensions

Cost model:

Auth0 uses monthly active user (MAU) pricing:

TierMAU includedFeatures
Free25,000Basic authentication
Essentials10,000SSO, custom domains, MFA
Professional10,000Actions, external databases
EnterpriseCustomPrivate cloud, advanced features

Auth0 for Startups and Auth0 for Social Impact programmes provide credits for qualifying organisations.

Jurisdictional considerations:

FactorAssessment
HeadquartersUnited States (Okta subsidiary)
CLOUD Act exposureSubject to US government data requests
Data residencyUS, EU, AU, JP regions
Private cloudEnterprise option for dedicated infrastructure

Organisational fit:

Best suited for:

  • Customer-facing application authentication
  • Developer teams building custom applications
  • B2C or B2B SaaS applications
  • Use cases requiring extensive customisation

Less suitable for:

  • Enterprise workforce identity (use Okta Workforce instead)
  • Legacy application SSO requiring LDAP
  • Organisations needing comprehensive directory services
  • Cost-sensitive high-MAU deployments

JumpCloud

AttributeValue
TypeCommercial Directory Platform
LicenceProprietary SaaS
VendorJumpCloud Inc. (United States)
Primary deploymentCloud with device agents
Documentationhttps://jumpcloud.com/support

JumpCloud provides cloud directory services unifying user management across identity, device, and access. The platform positions as a cloud alternative to on-premises Active Directory, managing authentication for macOS, Windows, and Linux workstations alongside SSO and RADIUS services.

JumpCloud differentiates through cross-platform device management. The JumpCloud agent authenticates users against the cloud directory while providing device policy enforcement.

Key strengths:

Cross-platform directory: Single directory for macOS, Windows, and Linux. Agent-based authentication eliminates need for on-premises domain controllers.

Device management integration: Device policies (disk encryption, screen lock, patch management) enforce alongside identity policies. MDM capabilities included without separate product.

Cloud RADIUS: Cloud-hosted RADIUS service for WiFi and VPN authentication. RADIUS configuration without on-premises RADIUS server.

Cloud LDAP: LDAP interface for applications requiring LDAP bind authentication. Eliminates need for separate LDAP infrastructure.

Key limitations:

Agent dependency: Full functionality requires JumpCloud agent on managed devices. BYOD or unmanaged devices have limited policy enforcement.

Enterprise feature pricing: Advanced features (conditional access, identity governance) require higher tiers. Feature packaging complexity.

US-centric infrastructure: Primary infrastructure in US. International organisations may experience latency.

Smaller ecosystem: Fewer pre-built integrations than Okta or Microsoft Entra ID. Custom integrations may require additional effort.

Deployment and operations:

JumpCloud deployment centres on agent installation:

ComponentPurposeInstallation
Windows agentDevice auth, policyMSI installer
macOS agentDevice auth, policyPKG installer
Linux agentDevice auth, policyDEB/RPM packages
AD integrationDirectory syncOn-premises connector
LDAP integrationExternal LDAP syncConfiguration

Agent deployment can use software distribution or group policy for bulk rollout.

Integration capabilities:

Integration typeCapability
APIv1 and v2 REST APIs
SCIMInbound and outbound provisioning
TerraformCommunity provider available
WebhooksEvent notifications
PowerShellJumpCloud PowerShell module

Cost model:

JumpCloud uses per-user pricing:

TierFeaturesRelative cost
Free10 users, basic features-
CoreDirectory, SSO, MFABase
Device management+ device policies+ device cost
PlatformFull platformCombined

JumpCloud for Good programme provides discounts for qualifying nonprofits. Application required.

Jurisdictional considerations:

FactorAssessment
HeadquartersUnited States
CLOUD Act exposureSubject to US government data requests
Data residencyPrimary US, additional regions

Organisational fit:

Best suited for:

  • Organisations replacing on-premises AD with cloud directory
  • Multi-platform (Windows/macOS/Linux) device environments
  • Deployments requiring integrated device management
  • IT teams seeking unified platform

Less suitable for:

  • Pure SaaS environments without managed devices
  • Organisations with existing robust MDM
  • Large enterprises with complex directory requirements
  • Data sovereignty requirements excluding US vendors

Selection guidance

Decision framework

+------------------------------------------------------------------+
| IAM PLATFORM SELECTION |
+------------------------------------------------------------------+
|
+----------v-----------+
| Self-hosted required?|
+----------+-----------+
|
+---------------+--------------------+
| |
Yes | No |
v v
+---------+---------+ +---------+---------+
| Data sovereignty | | Microsoft 365 |
| or compliance | | primary platform? |
| requirement? | +---------+---------+
+---------+---------+ |
| +----------+------------+
+-------+-------+ | |
| | Yes | No |
Yes | No | v v
v v +-------+-------+ +---------+----------+
+-----+-----+ +------+-----+ | Microsoft | | Customer or |
| Keycloak | | Keycloak | | Entra ID | | workforce identity?|
| (full IAM)| | or | +---------------+ +---------+----------+
+-----+-----+ | authentik | |
| +------+-----+ +----------+-----------+
| | | |
v v Customer | Workforce |
+-----+-----+ +------+-----+ v v
| Consider | | FreeIPA | +-------+-------+ +-------+-------+
| FreeIPA | | (Linux- | | Auth0 | | Okta or |
| for Linux | | centric) | | (CIAM focus) | | JumpCloud |
| infra | +------------+ +---------------+ +---------------+
+-----------+

Recommendations by organisational context

Minimal IT capacity

Organisations without dedicated IT staff benefit from managed platforms eliminating infrastructure operations:

ScenarioRecommendationRationale
Microsoft 365 userMicrosoft Entra ID (included)No additional cost, integrated experience
Google Workspace userJumpCloud or OktaCross-platform directory service
SaaS-first, limited budgetJumpCloud Free tier10 users included, device management

Avoid: Self-hosted solutions (Keycloak, authentik, FreeIPA, OpenLDAP) without operations capacity.

Established IT function

Organisations with IT teams can evaluate trade-offs between managed services and self-hosting:

ScenarioRecommendationRationale
Data sovereignty requirementKeycloak or authentikSelf-hosted, EU vendor option (authentik)
Enterprise SaaS integrationOktaBroadest integration catalogue
Microsoft-centricMicrosoft Entra IDDeepest Microsoft integration
Linux infrastructureFreeIPAIntegrated Kerberos, LDAP, CA
Custom application authenticationAuth0Developer-centric, extensible

Consider: Operational overhead of self-hosted vs subscription cost of managed services.

Specific constraints

ConstraintRecommendationNotes
EU data residencyauthentik (self-hosted, EU vendor) or Keycloak (self-hosted)Commercial options offer EU regions but remain US-headquartered
CLOUD Act avoidanceSelf-hosted FOSS onlyAll US-headquartered commercial options subject to CLOUD Act
Limited budgetKeycloak, authentik, or included Entra IDFOSS eliminates licence cost; Entra ID included with M365
Field deployment, offline operationKeycloak or FreeIPASelf-hosted with local authentication capability

Migration paths

FromToComplexityApproach
On-premises ADEntra IDMediumEntra Connect sync, staged migration
On-premises ADJumpCloudMediumAD integration, gradual agent rollout
On-premises ADKeycloakHighLDAP federation, protocol migration
OktaAuth0HighAPI migration, feature mapping differences
Auth0OktaHighUser migration, integration reconfiguration
AnyKeycloakMedium-HighProtocol-based integration, user import

Resources and references

Official documentation

SolutionDocumentation URLAPI reference
Keycloakhttps://www.keycloak.org/documentationhttps://www.keycloak.org/docs-api/latest/rest-api/
authentikhttps://docs.goauthentik.iohttps://docs.goauthentik.io/developer-docs/api/
FreeIPAhttps://www.freeipa.org/page/Documentationhttps://freeipa.readthedocs.io/en/latest/
OpenLDAPhttps://www.openldap.org/doc/Man pages (slapd.conf, slapd-config)
Oktahttps://developer.okta.comhttps://developer.okta.com/docs/api/
Microsoft Entra IDhttps://learn.microsoft.com/entrahttps://learn.microsoft.com/graph/api/resources/identity
Auth0https://auth0.com/docshttps://auth0.com/docs/api
JumpCloudhttps://docs.jumpcloud.comhttps://docs.jumpcloud.com/api/

Relevant standards

StandardDescriptionRelevance
RFC 6749OAuth 2.0 Authorization FrameworkAPI authorisation
OpenID Connect Core 1.0OIDC specificationModern SSO
SAML 2.0OASIS SAML specificationEnterprise SSO
RFC 4510-4519LDAP Technical SpecificationDirectory services
SCIM 2.0System for Cross-domain Identity ManagementUser provisioning
FIDO2/WebAuthnW3C Web AuthenticationPasswordless authentication
ResourcePurposeLocation
NIST SP 800-63Digital identity guidelineshttps://pages.nist.gov/800-63-3/
CISA Zero Trust Maturity ModelIdentity pillar assessmenthttps://www.cisa.gov/zero-trust-maturity-model
ISO/IEC 24760Identity management frameworkISO catalogue

See also