Thatβs a great idea!
I think we could adopt that as well
07.03.2026 01:55
π 0
π 0
π¬ 0
π 0
We also moved the Login App to structured JSON logging, automatically injecting trace IDs to correlate your logs. If you're running Jaeger or Honeycomb, your dashboards will actually map the full request lifecycle now.
06.03.2026 18:47
π 0
π 0
π¬ 1
π 0
Two unrelated traces. We built a custom gRPC interceptor to propagate W3C traceparent headers directly to the backend. One request = one trace.
06.03.2026 18:47
π 0
π 0
π¬ 1
π 0
Before this, the backend had OTel, but the Login UI was an observability black box. Your ingress would start a trace, the UI would drop the headers, and the backend would start a new one.
06.03.2026 18:47
π 0
π 0
π¬ 1
π 0
Disconnected traces make debugging auth latency impossible. We just merged PR #11429 to bring end-to-end distributed tracing to @zitadel.com (might land in v4.13.0). π§΅
06.03.2026 18:47
π 0
π 0
π¬ 2
π 0
GitHub - zitadel/zitadel: ZITADEL - Identity infrastructure, simplified forΒ you.
ZITADEL - Identity infrastructure, simplified forΒ you. - zitadel/zitadel
Building an open-source IdP means being buried in OIDC/SAML specs, dealing with multi-tenant data isolation, and optimizing for security, usability and reliability. It's plumbing that only gets noticed when it breaksπ
05.03.2026 17:50
π 2
π 0
π¬ 1
π 0
It has been a while since I checked the @github.com trending repos report, but out of sheer interest I took a look today and it brought me a lot of joy to see @zitadel.com back on the daily Go list.
05.03.2026 17:50
π 2
π 1
π¬ 1
π 0
Zitadel is a modern identity provider with OIDC, SAML, and passkey support. Built for developers who need more than basic auth but don't want Keycloak's complexity.
https://selfhosting.sh/apps/zitadel/
04.03.2026 22:58
π 1
π 1
π¬ 0
π 0
Set up ZITADEL with Docker Compose | ZITADEL Docs
Deploy ZITADEL with Docker Compose β from a 2-minute localhost quickstart to a hardened homelab setup with TLS, caching, and observability.
Auth is critical infrastructure, but setting it up locally shouldn't be a multi-day engineering ticket. It should be boring, predictable, and lightning-fast.
If you want to test this cold-start speed yourself, grab the compose file and time it -> zitadel.com/docs/self-ho...
04.03.2026 22:41
π 0
π 0
π¬ 0
π 0
No heavy runtime to boot. No undocumented config files to debug. No massive YAML mazes (no worries you can go there if you want).
Just a raw docker compose up -d. In under a minute, images are pulled, the DB is initialized, the Go API & Next.js UI are served, and I'm in.
04.03.2026 22:41
π 0
π 0
π¬ 1
π 0
A little while ago, I talked about our commitment to radically improve @zitadel.com's developer experience.
Today, Iβm just showing a first result -> 42 seconds. β±οΈ
That is the exact time it takes to go from an empty terminal to a fully operational identity stack. π§΅π
04.03.2026 22:41
π 0
π 0
π¬ 1
π 0
Thank you!
04.03.2026 01:46
π 0
π 0
π¬ 0
π 0
I think we are going to settle a debate soon... π
ZITADEL vs Zitadel
What do you prefer
04.03.2026 00:51
π 0
π 0
π¬ 0
π 0
I love to read this!
"Zitadel is the best modern alternative to Keycloak for self-hosted identity management..."
03.03.2026 22:09
π 1
π 0
π¬ 0
π 0
ZITADEL - Identity Infrastructure, Simplified
ZITADEL is the identity infrastructure platform that is built for developers and works for all users and applications.
We enable AI to understand our docs/data so it can handle the initial vetting, while we focus on the human parts: certified compliance, guaranteed SLAs, and CVE liability.
Feed the AI the code. Pay the humans for the trust. π§π‘οΈ zitadel.com/blog/open-so...
24.02.2026 19:10
π 0
π 0
π¬ 0
π 0
ZITADEL - Identity Infrastructure, Simplified
ZITADEL is the identity infrastructure platform that is built for developers and works for all users and applications.
At @zitadel.com , weβre focusing on "Risk Transfer" as the product. The "Code or Contribution" model we started a year ago has only been confirmed by the rise of AI.
24.02.2026 19:10
π 0
π 0
π¬ 1
π 0
ZITADEL - Identity Infrastructure, Simplified
ZITADEL is the identity infrastructure platform that is built for developers and works for all users and applications.
The OSS funnel is evolving. ποΈ
AI is making architectural mapping and syntax a commodity. For infrastructure software, the real product is shifting from "how it works" to "who is responsible when it breaks."
24.02.2026 19:10
π 1
π 0
π¬ 1
π 0
Identity infrastructure shouldn't be a black box. π
We're rolling out a new OpenTelemetry (OTel) configuration for the @zitadel.com API. The goal: cleaner traces, better propagation, and less friction for your collectors (Jaeger, Honeycomb, etc.).
16.02.2026 23:56
π 1
π 1
π¬ 1
π 0
We love to hear this! We made a conscious choice to give everyone the option to own their login UI and not hide something like this behind the pricing π
13.02.2026 15:21
π 0
π 0
π¬ 0
π 0
We now support 3 connectors for our Go-based API:
- Redis (K8s standard)
- Postgres (Simple & robust, 30k+ RPS)
- In-Memory (Fast, but beware of sticky sessions!)
Read the full blog: zitadel.com/blog/scaling...
#golang #systemdesign #opensource #auth
13.02.2026 00:38
π 2
π 0
π¬ 0
π 0
Identity in can be an "N-over-N" problem. Resolving Instance -> Org -> User for every request hits hard in B2B SaaS. π
We engineered a new caching strategy for @zitadel.com to flatten this hierarchy, decoupling read performance from DB complexity. β‘
13.02.2026 00:38
π 3
π 0
π¬ 1
π 0
CreateSession
Ah I see, we can not do that yet natively in the login UI, but you can add to your own UI a check for that by creating a session.
So in essence your UI can ask the user for a OTP prompt.
zitadel.com/docs/referen...
10.02.2026 00:48
π 1
π 0
π¬ 1
π 0
ZITADEL Default Settings
You can already configure a different lifetime for MFA if that helps zitadel.com/docs/guides/...
09.02.2026 23:45
π 0
π 0
π¬ 0
π 0