No description
This repository has been archived on 2022-08-17. You can view files and clone it, but cannot push or open issues or pull requests.
Find a file
2016-12-08 16:42:18 -08:00
api api: adding a gRPC call for listing passwords. 2016-11-17 16:56:54 -08:00
cmd cmd/example-app: use a non-empty state 2016-12-01 09:05:56 -08:00
connector *: switch oidc client to github.com/coreos/go-oidc 2016-11-22 13:29:17 -08:00
Documentation Documentation: add document on managing dependencies 2016-12-07 13:23:19 -08:00
examples *: add theme based frontend configuration 2016-11-30 17:20:21 -08:00
scripts *: update travis to use Go 1.7.4. 2016-12-01 20:28:21 -08:00
server *: add theme based frontend configuration 2016-11-30 17:20:21 -08:00
storage storage/kubernetes: remove unused method 2016-12-08 16:42:18 -08:00
vendor vendor: revendor using glide-vc 2016-12-07 13:23:19 -08:00
version *: determine version from git 2016-08-09 14:38:09 -07:00
web Address PR comments 2016-12-01 14:06:08 -08:00
.gitignore *: prepare build scripts for a release 2016-10-05 23:43:44 -07:00
.travis.yml *: update travis to use Go 1.7.4. 2016-12-01 20:28:21 -08:00
DCO *: add DCO and LICENSE 2016-10-13 11:33:32 -07:00
Dockerfile *: add theme based frontend configuration 2016-11-30 17:20:21 -08:00
glide.lock vendor: revendor using glide-vc 2016-12-07 13:23:19 -08:00
glide.yaml glide.yaml: update inline comments 2016-12-07 13:23:19 -08:00
glide_test.go initial commit 2016-07-26 15:51:24 -07:00
LICENSE *: add DCO and LICENSE 2016-10-13 11:33:32 -07:00
Makefile *: add theme based frontend configuration 2016-11-30 17:20:21 -08:00
README.md *: add Travis build status to README 2016-12-07 10:22:33 -08:00

dex - A federated OpenID Connect provider

Travis GoDoc

logo

Dex is an OpenID Connect server that allows users to login through upstream identity providers. Clients use a standards-based OAuth2 flow to login users, while the actual authentication is performed by established user management systems such as Google, GitHub, FreeIPA, etc.

OpenID Connect is a flavor of OAuth that builds on top of OAuth2 using the JOSE standards. This allows dex to provide:

  • Short-lived, signed tokens with standard fields (such as email) issued on behalf of users.
  • "well-known" discovery of OAuth2 endpoints.
  • OAuth2 mechanisms such as refresh tokens and revocation for long term access.
  • Automatic signing key rotation.

Standards-based token responses allows applications to interact with any OpenID Connect server instead of writing backend specific "access_token" dances. Systems that can already consume ID Tokens issued by dex include:

Documentation

Getting help

  • For bugs and feature requests (including documentation!), file an issue.
  • For general discussion about both using and developing dex, join the dex-dev mailing list.
  • For more details on dex development plans, check out the GitHub milestones.