Florian's Avatar

Florian

@rootd.ch

CEO & Co-Founder of @zitadel.com

26
Followers
9
Following
75
Posts
21.11.2023
Joined
Posts Following

Latest posts by Florian @rootd.ch

Preview
Supporting more identity providers on Ubuntu with the new Authd OIDC broker | Ubuntu Today we are announcing the general availability of the new generic OpenID Connect (OIDC) broker for Authd. With enterprises needing to centralise access management controls, the ability to choose you...

Ubuntu just added a generic OIDC broker to AuthD. We can finally stop fighting SSSD and LDAP bridges for Linux machine auth.

- Bypasses legacy PAM module complexity
- Authenticate Ubuntu desktops/servers directly against @zitadel.com via standard OIDC

ubuntu.com/blog/more-id...

09.03.2026 21:50 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

That’s a great idea!

I think we could adopt that as well

07.03.2026 01:55 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
feat(login): added support for otel push-based logs, metrics, and traces by mridang Β· Pull Request #11429 Β· zitadel/zitadel Closes #11471 Closes #11470 Which Problems Are Solved The login application lacked observability infrastructure. There was no distributed tracing, structured logging, or custom metrics, making it d...

Check the details here github.com/zitadel/zita...

#OpenTelemetry #Golang #Auth #Opensource #NextJs

06.03.2026 18:47 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

We also moved the Login App to structured JSON logging, automatically injecting trace IDs to correlate your logs. If you're running Jaeger or Honeycomb, your dashboards will actually map the full request lifecycle now.

06.03.2026 18:47 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Two unrelated traces. We built a custom gRPC interceptor to propagate W3C traceparent headers directly to the backend. One request = one trace.

06.03.2026 18:47 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Before this, the backend had OTel, but the Login UI was an observability black box. Your ingress would start a trace, the UI would drop the headers, and the backend would start a new one.

06.03.2026 18:47 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Disconnected traces make debugging auth latency impossible. We just merged PR #11429 to bring end-to-end distributed tracing to @zitadel.com (might land in v4.13.0). 🧡

06.03.2026 18:47 πŸ‘ 0 πŸ” 0 πŸ’¬ 2 πŸ“Œ 0
Preview
Build software better, together GitHub is where people build software. More than 150 million people use GitHub to discover, fork, and contribute to over 420 million projects.

github.com/trending/go?...

05.03.2026 17:53 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
GitHub - zitadel/zitadel: ZITADEL - Identity infrastructure, simplified forΒ you. ZITADEL - Identity infrastructure, simplified forΒ you. - zitadel/zitadel

Thanks to the community for all the help and input, this truly helps us grow.

github.com/zitadel/zita...

#go #golang #opensource #identity #iam

05.03.2026 17:50 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
GitHub - zitadel/zitadel: ZITADEL - Identity infrastructure, simplified forΒ you. ZITADEL - Identity infrastructure, simplified forΒ you. - zitadel/zitadel

Building an open-source IdP means being buried in OIDC/SAML specs, dealing with multi-tenant data isolation, and optimizing for security, usability and reliability. It's plumbing that only gets noticed when it breaksπŸ˜†

05.03.2026 17:50 πŸ‘ 2 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

It has been a while since I checked the @github.com trending repos report, but out of sheer interest I took a look today and it brought me a lot of joy to see @zitadel.com back on the daily Go list.

05.03.2026 17:50 πŸ‘ 2 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0

Zitadel is a modern identity provider with OIDC, SAML, and passkey support. Built for developers who need more than basic auth but don't want Keycloak's complexity.

https://selfhosting.sh/apps/zitadel/

04.03.2026 22:58 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Set up ZITADEL with Docker Compose | ZITADEL Docs Deploy ZITADEL with Docker Compose β€” from a 2-minute localhost quickstart to a hardened homelab setup with TLS, caching, and observability.

Auth is critical infrastructure, but setting it up locally shouldn't be a multi-day engineering ticket. It should be boring, predictable, and lightning-fast.

If you want to test this cold-start speed yourself, grab the compose file and time it -> zitadel.com/docs/self-ho...

04.03.2026 22:41 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

No heavy runtime to boot. No undocumented config files to debug. No massive YAML mazes (no worries you can go there if you want).

Just a raw docker compose up -d. In under a minute, images are pulled, the DB is initialized, the Go API & Next.js UI are served, and I'm in.

04.03.2026 22:41 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Video thumbnail

A little while ago, I talked about our commitment to radically improve @zitadel.com's developer experience.

Today, I’m just showing a first result -> 42 seconds. ⏱️

That is the exact time it takes to go from an empty terminal to a fully operational identity stack. πŸ§΅πŸ‘‡

04.03.2026 22:41 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Thank you!

04.03.2026 01:46 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

I think we are going to settle a debate soon... πŸ˜†

ZITADEL vs Zitadel

What do you prefer

04.03.2026 00:51 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Release v4.12.0 Β· zitadel/zitadel 4.12.0 (2026-03-02) Bug Fixes added login_hint to the idp intent (#11552) (273863f), closes #11392 allow creating new invite code before previous is invalid (#11649) (ec7f8da), closes #9962 #9962 ...

@zitadel.com v4.12.0 got published recently and my small, but favorit change is that we now also support end to end TLS for the new Login UI!

github.com/zitadel/zita...

04.03.2026 00:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Set up ZITADEL with Docker Compose | ZITADEL Docs Deploy ZITADEL with Docker Compose β€” from a 2-minute localhost quickstart to a hardened homelab setup with TLS, caching, and observability.

Great write up! Btw. we just improved our docker compose example to also include a traefik by default

zitadel.com/docs/self-ho...

03.03.2026 22:40 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

I love to read this!

"Zitadel is the best modern alternative to Keycloak for self-hosted identity management..."

03.03.2026 22:09 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
ZITADEL - Identity Infrastructure, Simplified ZITADEL is the identity infrastructure platform that is built for developers and works for all users and applications.

We enable AI to understand our docs/data so it can handle the initial vetting, while we focus on the human parts: certified compliance, guaranteed SLAs, and CVE liability.

Feed the AI the code. Pay the humans for the trust. πŸ§πŸ›‘οΈ zitadel.com/blog/open-so...

24.02.2026 19:10 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
ZITADEL - Identity Infrastructure, Simplified ZITADEL is the identity infrastructure platform that is built for developers and works for all users and applications.

At @zitadel.com , we’re focusing on "Risk Transfer" as the product. The "Code or Contribution" model we started a year ago has only been confirmed by the rise of AI.

24.02.2026 19:10 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
ZITADEL - Identity Infrastructure, Simplified ZITADEL is the identity infrastructure platform that is built for developers and works for all users and applications.

The OSS funnel is evolving. πŸ—οΈ

AI is making architectural mapping and syntax a commodity. For infrastructure software, the real product is shifting from "how it works" to "who is responsible when it breaks."

24.02.2026 19:10 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
πŸ›  Beta: Better Error Logging & GCP Support Β· zitadel zitadel Β· Discussion #11598 We’ve all been there, debugging a generic 500 error is a nightmare. To fix this, we’ve updated how ZITADEL handles logging so you actually have the context to resolve the issue the moment it appear...

We need eyes on the spec. If you run a distributed setup, does this syntax make sense to you?

github.com/zitadel/zita...

#OpenTelemetry #DevOps #Golang #OpenSource

16.02.2026 23:56 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Identity infrastructure shouldn't be a black box. πŸ”­

We're rolling out a new OpenTelemetry (OTel) configuration for the @zitadel.com API. The goal: cleaner traces, better propagation, and less friction for your collectors (Jaeger, Honeycomb, etc.).

16.02.2026 23:56 πŸ‘ 1 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0

We love to hear this! We made a conscious choice to give everyone the option to own their login UI and not hide something like this behind the pricing 😎

13.02.2026 15:21 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

We now support 3 connectors for our Go-based API:

- Redis (K8s standard)
- Postgres (Simple & robust, 30k+ RPS)
- In-Memory (Fast, but beware of sticky sessions!)

Read the full blog: zitadel.com/blog/scaling...

#golang #systemdesign #opensource #auth

13.02.2026 00:38 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Identity in can be an "N-over-N" problem. Resolving Instance -> Org -> User for every request hits hard in B2B SaaS. πŸ“‰

We engineered a new caching strategy for @zitadel.com to flatten this hierarchy, decoupling read performance from DB complexity. ⚑

13.02.2026 00:38 πŸ‘ 3 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
CreateSession

Ah I see, we can not do that yet natively in the login UI, but you can add to your own UI a check for that by creating a session.

So in essence your UI can ask the user for a OTP prompt.

zitadel.com/docs/referen...

10.02.2026 00:48 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
ZITADEL Default Settings

You can already configure a different lifetime for MFA if that helps zitadel.com/docs/guides/...

09.02.2026 23:45 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0