Kanidm: A simple, secure, and fast identity management platform https://kanidm.com
Find a file
2025-12-09 04:37:26 +00:00
.cargo Prevent memory exhaustion on freebsd builds (#3818) 2025-08-24 00:28:49 +10:00
.devcontainer Devcontainertainertainer (#3251) 2024-12-02 11:02:56 +00:00
.github Bump actions/checkout from 5 to 6 in the all group (#3979) 2025-11-24 07:56:38 +00:00
artwork Remove white background from square logo (#3087) 2024-10-04 00:23:40 +00:00
book Allow disabling OAuth2 consent prompt (#3972) 2025-11-28 01:57:22 +00:00
examples fix: correcting parsing of backup compression input (#3995) 2025-12-02 05:52:38 +00:00
libs Allow disabling OAuth2 consent prompt (#3972) 2025-11-28 01:57:22 +00:00
platform Prevent replication certificate renewal deadlock 2025-11-04 01:53:35 +00:00
proto fix: correcting parsing of backup compression input (#3995) 2025-12-02 05:52:38 +00:00
pykanidm updating packages (#3774) 2025-08-07 04:38:23 +00:00
rlm_python updating packages (#3774) 2025-08-07 04:38:23 +00:00
scripts Fix some CLI things (#3870) 2025-09-30 14:37:22 +10:00
server fix: correcting parsing of backup compression input (#3995) 2025-12-02 05:52:38 +00:00
tools Resolve infinite reauth loop (#3992) 2025-11-28 15:55:36 +10:00
unix_integration Handle concurrent pam sessions. (#4001) 2025-12-09 04:37:26 +00:00
.codespell_dictionary Unixd build/debugging updates (#2350) 2023-12-03 06:34:02 +00:00
.codespell_ignore Splitting the SPAs (#2219) 2023-10-27 06:03:58 +00:00
.dockerignore build: Create daemon image from scratch (#3452) 2025-02-25 14:16:08 +10:00
.editorconfig Javascript linting (#3329) 2025-01-04 15:25:46 +10:00
.gitignore Schema again (#3706) 2025-07-02 13:13:58 +10:00
.gitmodules Improve deb packaging, add aarch64 (#3083) 2024-10-15 02:27:48 +00:00
.rustfmt.toml Rework deps (#1079) 2022-10-01 16:08:51 +10:00
.yamllint headless webdriver testing, starting on brotli feature (#1844) 2023-07-10 16:49:09 +10:00
Cargo.lock Handle concurrent pam sessions. (#4001) 2025-12-09 04:37:26 +00:00
Cargo.toml Bump the all group with 5 updates (#4005) 2025-12-08 10:04:34 +10:00
clippy.toml enforcen den clippen (#2990) 2024-08-21 00:32:56 +00:00
CODE_OF_CONDUCT.md Update docs, doc fmt (#3710) 2025-07-04 05:33:14 +00:00
CODEOWNERS Added shell.nix to create dev environment (#3362) 2025-01-21 09:26:43 +00:00
CONTRIBUTORS.md Basic interface to get and regenerate the RADIUS password (#3728) 2025-07-11 02:41:46 +00:00
deno.json updating docs around packages (#3695) 2025-06-21 01:44:43 +00:00
LICENSE.md Update docs, doc fmt (#3710) 2025-07-04 05:33:14 +00:00
Makefile Updates to makefile (#3736) 2025-07-16 01:41:23 +00:00
README.md Add reference to the Kanidm anthem (#3987) 2025-11-27 16:11:43 +10:00
RELEASE_NOTES.md Release Prep (#3938) 2025-11-07 07:28:43 +00:00
rust-toolchain.toml Added shell.nix to create dev environment (#3362) 2025-01-21 09:26:43 +00:00
SECURITY.md Add user facing SCIM pagination / sorting (#3725) 2025-07-10 15:54:25 +10:00
shell.nix Update shell.nix to work with stable nixpkgs (#3514) 2025-03-20 13:06:51 +10:00

Kanidm - Simple and Secure Identity Management

Kanidm Logo

About

Kanidm is a simple and secure identity management platform, allowing other applications and services to offload the challenge of authenticating and storing identities to Kanidm.

The goal of this project is to be a complete identity provider, covering the broadest possible set of requirements and integrations. You should not need any other components (like Keycloak) when you use Kanidm - we already have everything you need!

To achieve this we rely heavily on strict defaults, simple configuration, and self-healing components. This allows Kanidm to support small home labs, families, small businesses, and all the way to the largest enterprise needs.

If you want to host your own authentication service, then Kanidm is for you!

Supported Features

Kanidm supports:

  • Passkeys (WebAuthn) for secure cryptographic authentication
    • Attested passkeys for high security environments
  • OAuth2/OIDC authentication provider for SSO
  • Application Portal allowing easy access to linked applications
  • Linux/Unix integration with TPM protected offline authentication
  • SSH key distribution to Linux/Unix systems
  • RADIUS for network and VPN authentication
  • Read-only LDAPs gateway for Legacy Systems
  • Complete CLI tooling for Administration
  • Two node high availability using database replication
  • A WebUI for user self-service

Documentation / Getting Started / Install

If you want to read more about what Kanidm can do, you should read our documentation.

We also have a set of support guidelines for what the project team will support.

Code of Conduct / Ethics

All interactions with the project are covered by our code of conduct.

When we develop features, we follow our project's guidelines on rights and ethics.

Getting in Contact / Questions

We have a Matrix-powered gitter community channel where project members are always happy to chat and answer questions. Alternately you can open a new GitHub discussion.

What does Kanidm mean?

Kanidm is a portmanteau of 'kani' and 'idm'. Kani is Japanese for crab, related to Rust's mascot Ferris the crab. Identity management is often abbreviated to 'idm', and is a common industry term for authentication providers.

Kanidm is pronounced as "kar - nee - dee - em".

Kanidm Anthem

An anthem is a popular song, especially a rock song felt to sum up the attitudes or feelings associated with a period or social group.

The Kanidm anthem is Crab Rave - Noisestorm

Comparison with other services

LLDAP

LLDAP is a similar project focused on providing a small, easy-to-administer LDAP server with a web administration portal. Both LLDAP and Kanidm use the Kanidm LDAP bindings and share many common design ideas.

The primary advantage of Kanidm over LLDAP is its broader built-in feature set, including native support for OAuth2 and OIDC. In contrast, LLDAP requires integration with an external portal like Keycloak to provide these features. However, LLDAP’s simplicity — offering fewer features — can make it easier to deploy and manage for certain use cases.

While LLDAP provides a simple Web UI as the main user management interface, Kanidm currently offers administrative functionality primarily via its CLI, with its Web UI designed more for user interactions than for administration.

If Kanidm feels too complex for your needs, LLDAP is a smaller and simpler alternative. But if you want a more feature-rich solution out of the box, Kanidm will likely be a better fit.

389-ds / OpenLDAP

Both 389 Directory Server (389-ds) and OpenLDAP are general-purpose LDAP servers. They provide LDAP functionality only, so you must supply your own Identity Management (IDM) components—such as an OIDC portal, self-service web UI, command-line tools for administration, and more.

If you require maximum customization of your LDAP deployment, 389-ds or OpenLDAP may be better choices. However, if you prefer an easy-to-set-up service focused specifically on IDM, Kanidm is a superior option.

Kanidm draws inspiration from both 389-ds and OpenLDAP and already matches or exceeds 389-ds in directory service performance and scalability, while offering a richer feature set.

FreeIPA

FreeIPA is a comprehensive identity management system for Linux/Unix, bundling many services including LDAP, Kerberos, DNS, and a Certificate Authority.

However, FreeIPA is complex, consisting of numerous components and configurations, which leads to higher resource usage and administrative overhead during setup and upgrades.

Kanidm aims to offer the feature richness of FreeIPA but with a lighter resource footprint and simpler management. In benchmarks with 3,000 users and 1,500 groups, Kanidm demonstrated approximately three times faster search operations and five times faster modifications and additions (results may vary, but Kanidm generally outperforms FreeIPA in speed).

If you want a full IDM solution that’s easier to manage and more efficient, Kanidm is worth considering.

Keycloak

Keycloak is an OIDC/OAuth2/SAML provider that can layer WebAuthn authentication on top of existing IDM systems. Although it can operate as a stand-alone IDM solution, it is commonly used alongside an LDAP server or similar backend.

Deploying Keycloak requires significant configuration and expertise. Its extensive customization options for authentication workflows can make initial setup challenging.

Kanidm does not require Keycloak to provide OAuth2 and other services. It integrates many of these capabilities in a simpler, more streamlined way right out of the box.

Rauthy

Rauthy is a minimal OIDC provider supporting WebAuthn—using some of the same libraries as Kanidm.

However, Rauthy focuses exclusively on OIDC and does not support additional use cases such as RADIUS or Unix authentication.

If you need a minimal OIDC-only provider, Rauthy is an excellent choice. But if you require a broader feature set, Kanidm is the better option.

Authentik / Authelia / Zitadel

Authentik (written in Python), Authelia, and Zitadel (both written in Go) are IDM providers similar to Kanidm in many respects. However, all three have weaker support for Unix authentication and do not provide the advanced authentication policies or WebAuthn Attestation capabilities that Kanidm offers.

Additionally, these projects rely on external SQL databases such as PostgreSQL, which can introduce potential single points of failure and performance bottlenecks. In contrast, Kanidm uses its own high-performance database and replication system, developed based on enterprise LDAP server experience.

Developer Getting Started

If you want to contribute to Kanidm there is a getting started guide for developers. IDM is a diverse topic and we encourage contributions of many kinds in the project, from people of all backgrounds.

When developing the server you should refer to the latest commit documentation instead.