
Authentik is a modern, flexible identity provider solution designed for self-hosting. With complete control over your identity data, Authentik offers comprehensive Identity & Access Management capabilities for organizations of any size.

Authentik is a modern, flexible identity provider solution designed for self-hosting. With complete control over your identity data, Authentik offers comprehensive Identity & Access Management capabilities for organizations of any size.
As a Zero Trust Gateway, Authentik implements granular access control based on user identity, device, location, and behavior. The solution supports modern standards like OAuth2, OpenID Connect, SAML2 and provides seamless integration into existing infrastructures.
We install, host and operate Authentik for your company - either on our secure, GDPR-compliant infrastructure in Germany or other locations, as well as on-premise in your own environment.
With 24/7 monitoring, enterprise support, backups and professional maintenance, we ensure maximum availability and reliable operation of your Authentik instance.
Run Authentik on your own infrastructure (Docker, Kubernetes, etc.) for complete control over your identity data.
Unified login processes across all applications with support for industry-standard protocols.
Comprehensive MFA support with TOTP, WebAuthn/Passkeys in hardware or software for maximum security.
Granular policies based on user attributes, time, location, and more for precise access control.
Passwordless authentication using FIDO2 standards for a secure, phishing-resistant login experience.
Implementation of Zero Trust principles with fine-grained access controls and continuous verification.
Detection of suspicious login attempts based on GeoIP location and travel patterns to prevent unauthorized access.
Track changes with field-level details for comprehensive security monitoring and compliance.
OAuth2/OpenID Connect, SAML2, LDAP, RADIUS, and SCIM for seamless integration into existing systems.

See how simple and efficient Authentik works in practice. From installation to productive use.
Professional installation on your infrastructure – on-premise, cloud or hybrid
In your data center
AWS, Azure, Hetzner & more
High-availability setup with comprehensive security and compliance features
Single Sign-On for all your enterprise applications with centralized authentication and authorization
Conditional access and risk-based authentication for modern security architectures
FIDO2, WebAuthn and Passkey support for secure and user-friendly login without passwords
Centralized user management with LDAP and Directory Sync for seamless integration
OAuth2, SAML, LDAP and SCIM in one solution for maximum compatibility
Complete audit logs and compliance reports for regulated industries
Secure access and access control for your installation
WireGuard, NetBird or Tailscale
Keycloak, Authentik, Azure AD
TOTP, WebAuthn, YubiKey
Fail2Ban, Rate Limiting, IP Whitelisting
We set up secure VPN access to your installation – ideal for remote work and external employees.
Full-service installation with no hidden costs
Authentik is extremely flexible because every authentication step is a 'stage' in a 'flow'. We use Python to inject logic directly into these flows.
Instead of rigid rules, we write Python code for policies. Access only if user is in office (IP range) AND shift plan API reports 'active'? No problem. We integrate external APIs directly into the auth decision.
When standard stages (MFA, password) aren't enough, we develop custom stages. For example, querying a proprietary hardware token database or legal disclaimer confirmation with versioning.
We don't configure Authentik manually. We define your complete IAM logic as code (Blueprints). This allows reproducible setups for Dev/Staging/Prod and disaster recovery.
How we implement Authentik development in practice.
User passwords are in an old Oracle DB with proprietary hash algorithm. Resetting all passwords is not an option.
A custom password stage checks login attempts against the old database. Upon success, Authentik transparently migrates the user and re-hashes the password to modern standards.
Group membership alone is insufficient. Permissions depend on project status or certifications stored in third-party systems.
A policy queries your HR API or project software upon login and dynamically injects permissions as claims into the OIDC/SAML token.
TOTP or WebAuthn aren't possible (e.g., in high-security areas without smartphones), smartcards or matrix cards are used instead.
Implementation of a custom MFA stage mapping the challenge-response logic of your physical tokens.
Open source enterprise-ready for productive workloads - we run your applications with highest security standards and enterprise support
Open source software for business-critical processes requires professional maintenance, continuous updates, and enterprise-grade support. With our Authentik Enterprise Managed Hosting, you get the necessary infrastructure and support to reliably operate open source in production environments. Backups, SLAs, telephone support, and personal contact - so you can focus on your core business.
We also offer customized Authentik Enterprise solutions for your specific requirements. Contact us for an individual quote.
Good choice – we'll help you get started or with operations.
As a Managed Service customer at WZ-IT, you have access to our exclusive portal: Monitor your infrastructure in real-time, schedule maintenance, request quotes, and get direct support – all in one central location.

These solutions are often used together with Authentik
These solutions offer similar functionalities and can be evaluated together
These solutions are direct alternatives with similar use cases
Whether a specific IT challenge or just an idea – we look forward to the exchange. In a brief conversation, we'll evaluate together if and how your project fits with WZ-IT.
Timo Wevelsiep & Robin Zins
CEOs of WZ-IT

