Skip to content

OS2sandbox/os2adgang-planning

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

54 Commits
 
 
 
 
 
 
 
 

Repository files navigation

🪪 OS2Adgang

Identity management based on open standards

Status update 05 jan 2026:

  • v.0.8 using Authentik is running without federation on an beta/poc instance @ Digitalist Cloud.
  • 0.9 will see a shift towards the CNCF certified KeyCloak project, with a possible option of keeping Authentik as a "lite" "non-federated" solution .. but this is not decided yet. We need a maintainer/core team model for this approach - currently this work is sponsored by the os2ai community and work being done by @hypesystem / Deranged. Follow the progress in this issue: #89

Currently a deployment-blueprint is being buit here: https://github.com/OS2sandbox/os2adgang-blueprint/

🔀 Dataflow

graph TD

subgraph Hosting Provider
    OS2ID[["⚙️ os2adgang"]]-.-|"🆔"|Users["🛢 User cache"]
    Applikation1([OS2-Applikation1])
    Applikation2([OS2-Applikation2])
end

subgraph KK[Korsbæk Kommune]
UserStore[("Users")]
User
end

subgraph KOMBIT
fkadg[[" ⚙️Fælleskommunal Adgangsstyring"]]
end

KOMBIT-->|"🆔+🏷️ SAML"|OS2ID

User("user👩🏻‍💻")-->|"🆔 Single Sign On"|OS2ID-->|" 🎟️ Token"|Applikation2 & Applikation1
UserStore-.-|"🆔+🏷️"|fkadg

Loading

🗺️ Reference architecture proposal

C4 diagram illustrating os2adgang integrating with the danish municipal SAML Idp and organization SOAP/XML metadataprovider


🎁 How to contribute

⚖️ CODE OF CONDUCT (in danish for now)

About

Sandbox issuetracker and distribution repo for an OS2 configured IdP brooker and SSO provider.

Resources

License

Contributing

Stars

Watchers

Forks

Contributors