
Custom extensions, API integrations, and seamless embedding into your system landscape.
Standard software often covers 90% – we close the last gap. We develop Policies & Stages, connect Authentik with your tools, and automate workflows.
From API integration to complete custom solutions – we cover the entire spectrum.
We make your systems talk to each other. Whether REST, GraphQL, or webhooks – we connect software with your CRM, ERP, or identity provider.
Often data formats from System A don't match System B. We develop middleware that sits in between, transforms data, and controls processes.
Want to use software features in your own intranet or customer portal? We embed software headlessly and build custom UIs around it.
Save manual work through intelligent automation. We develop bots and scripts that handle tasks automatically.
Authentik is extremely flexible because every authentication step is a 'stage' in a 'flow'. We use Python to inject logic directly into these flows.
Instead of rigid rules, we write Python code for policies. Access only if user is in office (IP range) AND shift plan API reports 'active'? No problem. We integrate external APIs directly into the auth decision.
When standard stages (MFA, password) aren't enough, we develop custom stages. For example, querying a proprietary hardware token database or legal disclaimer confirmation with versioning.
We don't configure Authentik manually. We define your complete IAM logic as code (Blueprints). This allows reproducible setups for Dev/Staging/Prod and disaster recovery.
How we implement Authentik development in practice.
User passwords are in an old Oracle DB with proprietary hash algorithm. Resetting all passwords is not an option.
A custom password stage checks login attempts against the old database. Upon success, Authentik transparently migrates the user and re-hashes the password to modern standards.
Group membership alone is insufficient. Permissions depend on project status or certifications stored in third-party systems.
A policy queries your HR API or project software upon login and dynamically injects permissions as claims into the OIDC/SAML token.
TOTP or WebAuthn aren't possible (e.g., in high-security areas without smartphones), smartcards or matrix cards are used instead.
Implementation of a custom MFA stage mapping the challenge-response logic of your physical tokens.
Update-safe, scalable, and secure – why you should trust us with your development.
We don't modify the open-source software's source code. Instead, we use official APIs and plugin architectures. Your installation remains updatable and maintainable.
We understand not just the code, but the infrastructure beneath it. Our developers know how queries affect database performance and how to build scalable APIs.
We use modern, type-safe technologies: React, TypeScript, Node.js, Python, Go. Plus PostgreSQL, Redis, and Docker/Kubernetes for infrastructure.
Every line of code is written with security in mind. Input sanitization, secure authentication (OAuth2/OIDC), and compliance with data protection regulations are standard.
Our Tech Stack
From requirements to go-live – transparent and structured.
We review API documentation, analyze your requirements, and identify optimal integration points.
We design the solution: middleware, plugin, or script. Data flows, interfaces, and security concept are defined.
Agile implementation with code reviews, automated tests, and continuous coordination. You see progress in real-time.
Integration into your CI/CD pipeline or hosting on our infrastructure. Documentation and training included.
Let's get technical. We'll assess feasibility and effort.
Discover all Authentik services from WZ-IT.
Whether a specific IT challenge or just an idea – we look forward to the exchange. In a brief conversation, we'll evaluate together if and how your project fits with WZ-IT.
Timo Wevelsiep & Robin Zins
CEOs of WZ-IT

