Open auth construction kit

Auth Fly

SSO. SDKs. Adapters. Take off.

2 protocols 5 repos 1 IdP session 0 tracking

Replace slide decks with logs, signed assertions, and a pre-flight checklist. The story is in the protocol.

Auth Fly logo

Trajectory

From hypothesis to MVP

Hypothesis

Idea

Self-hosted alternative to hosted auth platforms — without telemetry, without third-party update calls

Architecture

2025 Q3

core / authkit / authkit-hanko split — provider-agnostic contracts before code

PoC live

2025 Q4

SAML 2.0 + OIDC sharing one signed IdP session, Hanko as credential backend

MVP in flight

2026 Q1+

Pre-flight security checklist, Supabase / custom Postgres backend, Console scaffolding

Roadmap

Next

SCIM, Audit logs, Organizations, MFA, Webhooks — staged in the open

2

Protocols live (SAML, OIDC)

5

Modules in the org

0

External telemetry calls

MIT

License everywhere

Capabilities

What Auth Fly ships

Security first

No telemetry, no third-party update calls. Hardening tracked publicly via a pre-flight checklist.

IdP core

SAML 2.0 IdP and OIDC Provider sharing one signed session cookie, Hanko-backed for the PoC.

Hosted UI

UI8Kit-based login, logout and error pages with embedded i18n and dark theme — served from your own origin.

Adaptive SDKs

One TypeScript core; thin adapters per provider and per language — start with Hanko today.

Modules

Open building blocks

All projects →
Active

AuthKit TS

TypeScript core for browser auth flows, with thin per-provider adapters.

Browser SDK core
Active

OIDC Hanko

Hanko packaged as the PoC credential backend for Auth Fly.

Credential backend
Active

UI8Kit

Component library that fully replaces Hanko Elements across the hosted UI.

UI library

Replace slide decks with logs, signed assertions, and a pre-flight checklist. The story is in the protocol.

— Auth Fly engineering principle