WZ-IT Logo
{}
</>
Authentik

Authentik Development & Integration

Custom extensions, API integrations, and seamless embedding into your system landscape.

Standard software often covers 90% – we close the last gap. We develop Policies & Stages, connect Authentik with your tools, and automate workflows.

API IntegrationCustom MiddlewareAutomationUpdate-safe
Development Services

Our Development Services

From API integration to complete custom solutions – we cover the entire spectrum.

API & Interface Integration

We make your systems talk to each other. Whether REST, GraphQL, or webhooks – we connect software with your CRM, ERP, or identity provider.

  • Bidirectional data synchronization
  • Third-party system connections
  • Custom webhooks & event handlers
  • Legacy system integrations

Custom Middleware & Logic

Often data formats from System A don't match System B. We develop middleware that sits in between, transforms data, and controls processes.

  • Transformation layer (ETL)
  • Data stream validation
  • Caching layer for performance
  • Microservices architecture

Embeddings & Custom Apps

Want to use software features in your own intranet or customer portal? We embed software headlessly and build custom UIs around it.

  • White-label integration
  • Custom dashboards (React/Vue)
  • UI extension via plugins
  • Mobile app customizations

Automation & Bots

Save manual work through intelligent automation. We develop bots and scripts that handle tasks automatically.

  • ChatOps & slash commands
  • Automated reporting
  • Workflow orchestration
  • Trigger-based actions
Architecture & Interfaces

Flow-Based Authentication & Python Policies

Authentik is extremely flexible because every authentication step is a 'stage' in a 'flow'. We use Python to inject logic directly into these flows.

Expression Policies (Python)

Instead of rigid rules, we write Python code for policies. Access only if user is in office (IP range) AND shift plan API reports 'active'? No problem. We integrate external APIs directly into the auth decision.

Custom Flow Stages

When standard stages (MFA, password) aren't enough, we develop custom stages. For example, querying a proprietary hardware token database or legal disclaimer confirmation with versioning.

Blueprints & IaC

We don't configure Authentik manually. We define your complete IAM logic as code (Blueprints). This allows reproducible setups for Dev/Staging/Prod and disaster recovery.

Practical Examples

Concrete Use Cases

How we implement Authentik development in practice.

Legacy System Migration

Problem

User passwords are in an old Oracle DB with proprietary hash algorithm. Resetting all passwords is not an option.

Solution

A custom password stage checks login attempts against the old database. Upon success, Authentik transparently migrates the user and re-hashes the password to modern standards.

Dynamic Permissions

Problem

Group membership alone is insufficient. Permissions depend on project status or certifications stored in third-party systems.

Solution

A policy queries your HR API or project software upon login and dynamically injects permissions as claims into the OIDC/SAML token.

Specialized MFA Methods

Problem

TOTP or WebAuthn aren't possible (e.g., in high-security areas without smartphones), smartcards or matrix cards are used instead.

Solution

Implementation of a custom MFA stage mapping the challenge-response logic of your physical tokens.

Why WZ-IT

Development with Foresight

Update-safe, scalable, and secure – why you should trust us with your development.

Update-safe (No Core Hacking)

We don't modify the open-source software's source code. Instead, we use official APIs and plugin architectures. Your installation remains updatable and maintainable.

Full-Stack Expertise

We understand not just the code, but the infrastructure beneath it. Our developers know how queries affect database performance and how to build scalable APIs.

Modern Tech Stack

We use modern, type-safe technologies: React, TypeScript, Node.js, Python, Go. Plus PostgreSQL, Redis, and Docker/Kubernetes for infrastructure.

Security by Design

Every line of code is written with security in mind. Input sanitization, secure authentication (OAuth2/OIDC), and compliance with data protection regulations are standard.

Our Tech Stack

ReactTypeScriptNode.jsPythonGoPostgreSQLRedisDockerKubernetes
Our Process

How We Work

From requirements to go-live – transparent and structured.

01

Analysis

We review API documentation, analyze your requirements, and identify optimal integration points.

02

Architecture

We design the solution: middleware, plugin, or script. Data flows, interfaces, and security concept are defined.

03

Development

Agile implementation with code reviews, automated tests, and continuous coordination. You see progress in real-time.

04

Deployment

Integration into your CI/CD pipeline or hosting on our infrastructure. Documentation and training included.

Planning a custom extension?

Let's get technical. We'll assess feasibility and effort.

1/2 – Interest50%

Response within 24h – no spam, no sales pressure.

Industry-leading companies rely on us

  • Rekorder
  • Keymate
  • Führerscheinmacher
  • SolidProof
  • ARGE
  • Boese VA
  • NextGym
  • Maho Management
  • Golem.de
  • Millenium
  • Paritel
  • Yonju
  • EVADXB
  • Mr. Clipart
  • Aphy
  • Negosh

What do our customers say?

Let's Talk About Your Idea

Whether a specific IT challenge or just an idea – we look forward to the exchange. In a brief conversation, we'll evaluate together if and how your project fits with WZ-IT.

E-Mail
[email protected]

Trusted by leading companies

  • Rekorder
  • Keymate
  • Führerscheinmacher
  • SolidProof
  • ARGE
  • Boese VA
  • NextGym
  • Maho Management
  • Golem.de
  • Millenium
  • Paritel
  • Yonju
  • EVADXB
  • Mr. Clipart
  • Aphy
  • Negosh
Timo Wevelsiep & Robin Zins - CEOs of WZ-IT

Timo Wevelsiep & Robin Zins

CEOs of WZ-IT

1/3 – Topic Selection33%

What is your inquiry about?

Select one or more areas where we can support you.