Skills2026年5月5日·1 分钟阅读

Pocket ID — Self-Hosted OIDC Provider with Passkey Authentication

A simple self-hosted OpenID Connect provider that lets users authenticate to services using passkeys and biometrics instead of passwords.

Agent 就绪

这个资产可以被 Agent 直接读取和安装

TokRepo 同时提供通用 CLI 命令、安装契约、metadata JSON、按适配器生成的安装计划和原始内容链接,方便 Agent 判断适配度、风险和下一步动作。

Native · 98/100策略:允许
Agent 入口
任意 MCP/CLI Agent
类型
Skill
安装
Single
信任
信任等级:Established
入口
Pocket ID
通用 CLI 安装命令
npx tokrepo install 6389c9e6-481a-11f1-9bc6-00163e2b0d79

Introduction

Pocket ID is a lightweight self-hosted OpenID Connect (OIDC) provider focused on simplicity and passwordless authentication. It allows users to log in to any OIDC-compatible service using passkeys (WebAuthn) and biometrics, eliminating passwords entirely while remaining easy to deploy and manage.

What Pocket ID Does

  • Acts as a standards-compliant OIDC identity provider for your self-hosted services
  • Authenticates users via passkeys (fingerprint, Face ID, hardware keys) with no passwords
  • Manages OIDC client registrations for applications needing SSO
  • Provides user and group management with custom claim mapping
  • Supports one-time login links as a fallback for devices without passkey support

Architecture Overview

Pocket ID is a Go application with a SvelteKit frontend, compiled into a single binary or Docker image. It stores user data and OIDC client configurations in SQLite. The WebAuthn flow handles passkey registration and verification via the FIDO2 standard. Token signing uses RSA keys generated and stored locally.

Self-Hosting & Configuration

  • Single Docker container with a SQLite database (no external DB required)
  • Configure application URL and admin credentials via environment variables
  • Register OIDC clients through the web admin panel
  • Supports custom branding with logo and color configuration
  • Reverse proxy compatible with standard X-Forwarded headers

Key Features

  • Passwordless-first: passkeys are the primary authentication method
  • Minimal footprint: single binary, SQLite storage, under 50 MB RAM
  • Standards-compliant: full OIDC and OAuth 2.0 support with PKCE
  • User groups: assign users to groups and map them to OIDC claims
  • Admin audit log: track login events and client access

Comparison with Similar Tools

  • Authelia — full-featured 2FA/SSO proxy; Pocket ID is simpler, passkey-focused
  • Authentik — enterprise identity platform; Pocket ID is lighter for small deployments
  • Keycloak — Java-based, heavy; Pocket ID is a single Go binary
  • Zitadel — cloud-native IAM; Pocket ID targets homelab simplicity
  • Kanidm — Rust identity server; Pocket ID has a simpler setup for OIDC-only use cases

FAQ

Q: What services can I connect to Pocket ID? A: Any application supporting OIDC/OAuth 2.0 login — including Portainer, Grafana, Nextcloud, Gitea, and most self-hosted apps with SSO support.

Q: What happens if I lose my passkey device? A: Admins can generate one-time login links, and users can register multiple passkeys for redundancy.

Q: Does Pocket ID support traditional username/password login? A: The focus is passkey-only, but one-time email links provide a fallback when passkeys are unavailable.

Q: Can I use hardware security keys like YubiKeys? A: Yes, any FIDO2/WebAuthn-compatible device works, including YubiKeys, Titan keys, and platform authenticators.

Sources

讨论

登录后参与讨论。
还没有评论,来写第一条吧。

相关资产