Logo

Authorizer

**Authorizer** is an open-source authentication and authorization solution for your applications. Bring your database and have complete control over the user information. You can self-host authorizer instances and connect to any database (Currently supports [Postgres](https://www.postgresql.org/), [MySQL](https://www.mysql.com/), [SQLite](https://www.sqlite.org/index.html), [SQLServer](https://www.microsoft.com/en-us/sql-server/), [MongoDB](https://mongodb.com/), [ArangoDB](https://www.arangodb.com/)). ## Table of contents - [Introduction](#introduction) - [Getting Started](#getting-started) - [Contributing](https://github.com/authorizerdev/authorizer/blob/main/.github/CONTRIBUTING.md) - [Docs](http://docs.authorizer.dev/) - [Join Community](https://discord.gg/Zv2D5h6kkK) # Introduction #### We offer the following functionality - ✅ Sign-in / Sign-up with email ID and password - ✅ Secure session management - ✅ Email verification - ✅ APIs to update profile securely - ✅ Forgot password flow using email - ✅ Social logins (Google, Github, Facebook, more coming soon) - ✅ Role-based access management - ✅ Password-less login with email and magic link ## Roadmap - Support more JWT encryption algorithms (Currently supporting HS256) - 2 Factor authentication - Back office (Admin dashboard to manage user) - Support more database - VueJS SDK - Svelte SDK - React Native SDK - Flutter SDK - Android Native SDK - iOS native SDK - Golang SDK - Python SDK - PHP SDK - WordPress plugin - Kubernetes Helm Chart - [Local Stack](https://github.com/localstack/localstack) - AMI - Digital Ocean Droplet - Azure - Render - Edge Deployment using Fly.io - Password-less login with mobile number and OTP SMS # Getting Started ## Trying out Authorizer This guide helps you practice using Authorizer to evaluate it before you use it in a production environment. It includes instructions for installing the Authorizer server in local or standalone mode. - [Install using source code](#install-using-source-code) - [Install using binaries](#install-using-binaries) - [Install instance on heroku](#install-instance-on-Heroku) - [Install instance on railway.app](#install-instance-on-railway) ## Install using source code ### Prerequisites - OS: Linux or macOS or windows - Go: (Golang)(https://golang.org/dl/) >= v1.15 ### Project Setup 1. Fork the [authorizer](https://github.com/authorizerdev/authorizer) repository (**Skip this step if you have access to repo**) 2. Clone repo: `git clone https://github.com/authorizerdev/authorizer.git` or use the forked url from step 1 3. Change directory to authorizer: `cd authorizer` 5. Create Env file `cp .env.sample .env`. Check all the supported env [here](https://docs.authorizer.dev/core/env/) 6. Build Dashboard `make build-dashboard` 7. Build App `make build-app` 8. Build Server `make clean && make` > Note: if you don't have [`make`](https://www.ibm.com/docs/en/aix/7.2?topic=concepts-make-command), you can `cd` into `server` dir and build using the `go build` command 9. Run binary `./build/server` ## Install using binaries Deploy / Try Authorizer using binaries. With each [Authorizer Release](https://github.com/authorizerdev/authorizer/releases) binaries are baked with required deployment files and bundled. You can download a specific version of it for the following operating systems: - Mac OSX - Linux ### Step 1: Download and unzip bundle - Download the Bundle for the specific OS from the [release page](https://github.com/authorizerdev/authorizer/releases) > Note: For windows, we recommend running using docker image to run authorizer. - Unzip using following command - Mac / Linux ```sh tar -zxf AUTHORIZER_VERSION -c authorizer ``` - Change directory to `authorizer` ```sh cd authorizer ``` ### Step 2: Configure environment variables Required environment variables are pre-configured in `.env` file. But based on the production requirements, please configure more environment variables. You can refer to [environment variables docs](/core/env) for more information. ### Step 3: Start Authorizer - Run following command to start authorizer - For Mac / Linux users ```sh ./build/server ``` > Note: For mac users, you might have to give binary the permission to execute. Here is the command you can use to grant permission `xattr -d com.apple.quarantine build/server` Deploy production ready Authorizer instance using one click deployment options available below | **Infra provider** | **One-click link** | **Additional information** | | :----------------: | :------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------: | :----------------------------------------------------: | | Railway.app | Deploy on Railway | [docs](https://docs.authorizer.dev/deployment/railway) | | Heroku | Deploy to Heroku | [docs](https://docs.authorizer.dev/deployment/heroku) | | Render | [![Deploy to Render](https://render.com/images/deploy-to-render-button.svg)](https://render.com/deploy?repo=https://github.com/authorizerdev/authorizer-render) | [docs](https://docs.authorizer.dev/deployment/render) | ### Things to consider - For social logins, you will need respective social platform key and secret - For having verified users, you will need an SMTP server with an email address and password using which system can send emails. The system will send a verification link to an email address. Once an email is verified then, only able to access it. > Note: One can always disable the email verification to allow open sign up, which is not recommended for production as anyone can use anyone's email address 😅 - For persisting user sessions, you will need Redis URL (not in case of railway.app). If you do not configure a Redis server, sessions will be persisted until the instance is up or not restarted. For better response time on authorization requests/middleware, we recommend deploying Redis on the same infra/network as your authorizer server. ## Testing - Check the testing instructions [here](https://github.com/authorizerdev/authorizer/blob/main/.github/CONTRIBUTING.md#testing) ## Integrating into your website This example demonstrates how you can use [`@authorizerdev/authorizer-js`](/authorizer-js/getting-started) CDN version and have login ready for your site in few seconds. You can also use the ES module version of [`@authorizerdev/authorizer-js`](/authorizer-js/getting-started) or framework-specific versions like [`@authorizerdev/authorizer-react`](/authorizer-react/getting-started) ### Copy the following code in `html` file > **Note:** Change AUTHORIZER_URL in the below code with your authorizer URL. Also, you can change the logout button component ```html ``` --- ### Support my work Buy Me A Coffee