TE
TechEcho
AccueilTop 24hRécentsMeilleursQuestionsPrésentationsEmplois
GitHubTwitter
Accueil

TechEcho

Une plateforme d'actualités technologiques construite avec Next.js, fournissant des nouvelles et discussions technologiques mondiales.

GitHubTwitter

Accueil

AccueilRécentsMeilleursQuestionsPrésentationsEmplois

Ressources

HackerNews APIHackerNews OriginalNext.js

© 2025 TechEcho. Tous droits réservés.

Show HN: Tesseral – Open-Source Auth

193 pointspar ucarionil y a 5 jours
Hi folks! I&#x27;m Ulysse, and Tesseral (<a href="https:&#x2F;&#x2F;github.com&#x2F;tesseral-labs&#x2F;tesseral">https:&#x2F;&#x2F;github.com&#x2F;tesseral-labs&#x2F;tesseral</a>) is open-source auth for B2B SaaS.<p>Early in my career, I worked on enterprise auth and security features at Segment. I&#x27;ve been obsessed with the subtle details of enterprise software ever since. For example, I wrote an implementation of SAML in the early days of the COVID pandemic because I thought it was fun.<p>Over the years, I&#x27;ve felt frustrated that too few people have seemed interested in making auth obvious for developers of business software. Auth really doesn&#x27;t need to be so confusing.<p>We made Tesseral to help software engineers get B2B auth exactly right – and focus their energy on building the features that users want.<p>You can use Tesseral to stand up a login page, authenticate your users, and manage their access to resources. Think of it like Auth0 or Clerk, but open source and built specifically for B2B apps. Among other things, that means that it’s designed for B2B multi-tenancy and includes enterprise-ready features like single sign-on (SAML SSO), multi-factor authentication (MFA), SCIM provisioning, and role-based access control (RBAC).<p>For those who expose public APIs, you can use Tesseral to manage API keys for your customers. You can even limit the scope of API keys to specific actions by using our RBAC feature.<p>We&#x27;ve taken care to make Tesseral powerful and secure enough to power real enterprise software but still leave it simple enough for any software developer to use. You don&#x27;t have to be a security expert to implement Tesseral. (By default, therefore, Tesseral imposes a few opinions. Let us know if you have a good reason to do something unusual, and we&#x27;ll work something out.)<p>If you want to experiment with Tesseral, you can host it yourself or use our hosted service. The hosted service lives at <a href="https:&#x2F;&#x2F;console.tesseral.com">https:&#x2F;&#x2F;console.tesseral.com</a>. You can find documentation here: <a href="https:&#x2F;&#x2F;tesseral.com&#x2F;docs">https:&#x2F;&#x2F;tesseral.com&#x2F;docs</a>.<p>Here are a few simple demos:<p><a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=IhYPzz3vB54" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=IhYPzz3vB54</a><p><a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=t-JJ8TNjqNU" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=t-JJ8TNjqNU</a><p><a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=mwthBIRZO8k" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=mwthBIRZO8k</a><p>We&#x27;re in the early stages of the project, so we still have some gaps. We have more features, bug fixes, SDKs, and documentation on the way.<p>What have we missed? What can we do better? We&#x27;re eager to hear from the community!

21 comments

satyrneinil y a 4 jours
From the docs:<p><i>Users exclusively belong to Organizations; every User belongs to exactly one Organization.</i><p>But I also see a screenshot where, after login, the User has to choose an organization or to create a new one. It <i>seems</i> to me that you support Users and Organizations in a many-to-many relationship, is that correct?<p>At my work, we landed on the terminology of Users, Memberships, and Accounts to describe this (a User can have Memberships to multiple Accounts, an Account can have multiple Members, etc). As a result, you don&#x27;t &quot;delete a user&quot;, you &quot;revoke a membership&quot;.
评论 #44119090 未加载
评论 #44122679 未加载
nodesocketil y a 4 jours
I went back and forth deciding if I should use a service like auth0 &#x2F; Clerk &#x2F; Stack Auth for my Flask based app. Ultimately I decided on doing it myself. Storing users and organization in the SQLite db and using a Flask package like Flask-Login. I didn’t want to have to migrate to an ORM (SQLAlchemy) and needed a few basic constraints:<p>- Users can optionally be assigned to an organization but not required.<p>- Email address is globally unique.<p>- A user can only be associated to a single organization.<p>- 2FA support.<p>- Single-Sign-On support with Google, Facebook, and GitHub.<p>I have a feeling not using a framework or auth service is going to bite me in the butt down the line, but it just felt easier to roll my own implementation to start.
tjkoil y a 4 jours
Great demo videos -- looks like lots of strong design decisions! Will definitely try this in a future project.<p>... actually, given you already have a Golang SDK, I may try this very soon!
grahamgoochil y a 3 jours
This is a very timely for us. We are close to pulling the trigger on KeyCloak.<p>We also looked at Auth0 and Fusionauth - KeyCloak won.<p>We did not check Teseral - could you help me understand why I would choose Tesseral over the other 3?
评论 #44131671 未加载
评论 #44136124 未加载
评论 #44131095 未加载
cyberaxil y a 4 jours
So you&#x27;re competing with Auth0, Clerk and others. You really need some differentiator. For me that would be:<p>- Service-to-service authentication.<p>- User impersonation in S2S calls (&quot;I&#x27;m a service SERVICE1 making a call on behalf of USER_JOE&quot;), including for offline flows.<p>- A way to view and manage the offline grants for S2S impersonation.<p>- All of the above must be resilient.<p>I don&#x27;t think any authentication solution actually tackles this.
评论 #44122744 未加载
d0100il y a 4 jours
When Ory came out I was excited because they have a solid product that is made in Go, however their lack of multi-tenancy that didn&#x27;t require setting up servers for each tenant made them a non-starter<p>I just had to implement 2FA on our homegrown auth, and I can&#x27;t wait to replace it with Tesseral
评论 #44123942 未加载
评论 #44136139 未加载
评论 #44122711 未加载
chpatrickil y a 5 jours
How does it compare to Keycloak?
评论 #44117910 未加载
aeneas_oryil y a 4 jours
Congrats on the launch Ulysse - impressive what you have been able to spin up with limited resources! Greetings from Ory :)
评论 #44126754 未加载
mooredsil y a 3 jours
Congrats on the launch! (From a FusionAuth employee!)<p>Also, I interviewed Ned, the CEO of Tesseral, on my newsletter. You can read his thoughts about the future of CIAM here: <a href="https:&#x2F;&#x2F;ciamweekly.substack.com&#x2F;p&#x2F;an-interview-with-ned-oleary" rel="nofollow">https:&#x2F;&#x2F;ciamweekly.substack.com&#x2F;p&#x2F;an-interview-with-ned-olea...</a>
danenaniail y a 4 jours
Congrats guys—looking good!<p>For the managed service, how do you think about the N+1 request&#x2F;query issue and latency with things like org membership checks and authz checks? This always pushes me to want this stuff in my db or at least on my side of the network line. Seems that tesseral is self-hostable which is awesome and could be a solution, but I’d probably rather just use the managed service if it wasn’t for this issue.
评论 #44126891 未加载
warthogil y a 4 jours
Seems python support is there. Would appreciate a Django walkthrough as well. Clerk, Betterauth and others mostly skip Django for some reason
评论 #44127115 未加载
ljmil y a 4 jours
It&#x27;s a nice project but I don&#x27;t think any venture needs a separate service for user accounts right off the bat. And I level that same criticism at Clerk, Auth0, Cognito which are all stand-ins for a lack of BE engineering.<p>Rails + Devise + OmniAuth + Doorkeeper has kept me going for yeeeeeaaaaaarrrrrrs.
评论 #44120643 未加载
评论 #44120491 未加载
评论 #44119199 未加载
评论 #44126176 未加载
评论 #44126252 未加载
评论 #44119841 未加载
diqiil y a 4 jours
What&#x27;s so different about auth for B2B?
评论 #44119300 未加载
评论 #44120579 未加载
KaoruAoiShihoil y a 4 jours
How does it compare to the other recent YC company Stack Auth?
评论 #44119504 未加载
hooverdil y a 4 jours
Does this compete with IDMs with Sailpoint?
评论 #44119334 未加载
philboil y a 4 jours
Have you had a pen test yet?
评论 #44132172 未加载
vivzkestrelil y a 4 jours
keycloak, better-auth, supertokens and now this, i would love to know how it compares to the rest
vanschelvenil y a 4 jours
In the Django world I just ran into this project with similar goals:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;leukeleu&#x2F;django-hidp">https:&#x2F;&#x2F;github.com&#x2F;leukeleu&#x2F;django-hidp</a>
评论 #44119293 未加载
_joelil y a 5 jours
Looks nice, we&#x27;ve been using <a href="https:&#x2F;&#x2F;zitadel.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;zitadel.com&#x2F;</a> and the journey to mutli-tennancy was fairly straight forward.
评论 #44119002 未加载
macmacil y a 5 jours
This looks neat, unfortunately the dependency on AWS is a show stopper for many European companies these days.
评论 #44119202 未加载
评论 #44118129 未加载
评论 #44120553 未加载
评论 #44117526 未加载
welderil y a 5 jours
I rolled my own auth [0] and it works just fine. Why do I need another service for Auth, it&#x27;s simple enough already. I guess B2B products need more auth features so it&#x27;s worth using a library?<p>[0] <a href="https:&#x2F;&#x2F;github.com&#x2F;wakatime&#x2F;crackboard.dev&#x2F;blob&#x2F;main&#x2F;packages&#x2F;core&#x2F;src&#x2F;backend&#x2F;auth.ts">https:&#x2F;&#x2F;github.com&#x2F;wakatime&#x2F;crackboard.dev&#x2F;blob&#x2F;main&#x2F;package...</a>
评论 #44118154 未加载