This repository contains all TypeScript and JavaScript packages and applications you need to create your own ZITADEL Login UI.
The scope of functionality of this repo and packages is under active development.
The @zitadel/client
and @zitadel/node
packages are using @connectrpc/connect and its 2.0.0-alpha release which might still change.
You can read the contribution guide on how to contribute. Questions can be raised in our Discord channel or as a GitHub issue.
We think the easiest path of getting up and running, is the following:
- Fork and clone this repository
- Run the ZITADEL Cloud login UI locally
- Make changes to the code and see the effects live on your local machine
- Study the rest of this README.md and get familiar and comfortable with how everything works.
- Decide on a way of how you want to build and run your login UI. You can reuse ZITADEL Clouds way. But if you need more freedom, you can also import the packages you need into your self built application.
login
: The login UI used by ZITADEL Cloud, powered by Next.js@zitadel/node
: core components for establishing node client connection@zitadel/client
: shared client utilities@zitadel/proto
: shared protobuf types@zitadel/tsconfig
: sharedtsconfig.json
s used throughout the monorepoeslint-config-zitadel
: ESLint preset
Each package and app is 100% TypeScript.
The login is currently in a work in progress state. The goal is to implement a login UI, using the session API of ZITADEL, which also implements the OIDC Standard and is ready to use for everyone.
In the first phase we want to have a MVP login ready with the OIDC Standard and a basic feature set. In a second step the features will be extended.
This list should show the current implementation state, and also what is missing. You can already use the current state, and extend it with your needs.
-
Local User Registration (with Password)
-
User Registration and Login with external Provider
- GitHub
- GitHub Enterprise
- GitLab
- GitLab Enterprise
- Azure
- Apple
- Generic OIDC
- Generic OAuth
- Generic JWT
- LDAP
- SAML SP
-
Multifactor Registration an Login
- Passkeys
- TOTP
- OTP: Email Code
- OTP: SMS Code
-
Password Change/Reset
-
Domain Discovery
-
Branding
-
OIDC Standard
- Authorization Code Flow with PKCE
- AuthRequest
hintUserId
- AuthRequest
loginHint
- AuthRequest
prompt
- Login
- Select Account
- Consent
- Create
- Scopes
- `openid email profile address``
-
offline access
-
urn:zitadel:iam:org:idp:id:{idp_id}
-
urn:zitadel:iam:org:project:id:zitadel:aud
-
urn:zitadel:iam:org:id:{orgid}
-
urn:zitadel:iam:org:domain:primary:{domain}
- AuthRequest UI locales
This diagram shows the available pages and flows.
Note that back navigation or retries are not displayed.
flowchart TD
A[Start] --> register
A[Start] --> accounts
A[Start] --> loginname
loginname -- signInWithIDP --> idp-success
loginname -- signInWithIDP --> idp-failure
idp-success --> B[signedin]
loginname --> password
loginname -- hasPasskey --> passkey
loginname -- allowRegister --> register
passkey-add --passwordAllowed --> password
passkey -- hasPassword --> password
passkey --> B[signedin]
password -- hasMFA --> mfa
password -- allowPasskeys --> passkey-add
password -- reset --> password-set
email -- reset --> password-set
password-set --> B[signedin]
password-change --> B[signedin]
password -- userstate=initial --> password-change
mfa --> otp
otp --> B[signedin]
mfa--> u2f
u2f -->B[signedin]
register -- password/passkey --> B[signedin]
password --> B[signedin]
password-- forceMFA -->mfaset
mfaset --> u2fset
mfaset --> otpset
u2fset --> B[signedin]
otpset --> B[signedin]
accounts--> loginname
password -- not verified yet -->verify
register-- withpassword -->verify
passkey-- notVerified --> verify
verify --> B[signedin]
You can find a more detailed documentation of the different pages here.
- TypeScript for static type checking
- ESLint for code linting
- Prettier for code formatting
pnpm generate
- Build proto stubs for server and client packagepnpm build
- Build all packages and the login apppnpm test
- Test all packages and the login apppnpm test:watch
- Rerun tests on file changepnpm dev
- Develop all packages and the login apppnpm lint
- Lint all packagespnpm changeset
- Generate a changesetpnpm clean
- Clean up allnode_modules
anddist
folders (runs each package's clean script)
Package publishing has been configured using Changesets. Here is their documentation for more information about the workflow.
The GitHub Action needs an NPM_TOKEN
and GITHUB_TOKEN
in the repository
settings. The Changesets bot should also be installed on the GitHub repository.
Read the changesets documentation for more information about this automation
To run the application make sure to install the dependencies with
pnpm install
then generate the GRPC stubs with
pnpm generate
To run the application against a local ZITADEL instance, run the following command:
pnpm run-zitadel
This sets up ZITADEL using docker compose and writes the configuration to the file apps/login/.env.local
.
Alternatively, use another environment
You can develop against any ZITADEL instance in which you have sufficient rights to execute the following steps. Just create or overwrite the file `apps/login/.env.local` yourself. Add your instances base URL to the file at the key `ZITADEL_API_URL`. Go to your instance and create a service user for the login application. The login application creates users on your primary organization and reads policy data. For the sake of simplicity, just make the service user an instance member with the role `IAM_OWNER`. Create a PAT and copy it to the file `apps/login/.env.local` using the key `ZITADEL_SERVICE_USER_TOKEN`. Also add the users ID to the file using the key `ZITADEL_SERVICE_USER_ID`.The file should look similar to this:
ZITADEL_API_URL=https://zitadel-tlx3du.us1.zitadel.cloud
ZITADEL_SERVICE_USER_ID=289106423158521850
ZITADEL_SERVICE_USER_TOKEN=1S6w48thfWFI2klgfwkCnhXJLf9FQ457E-_3H74ePQxfO3Af0Tm4V5Xi-ji7urIl_xbn-Rk
Start the login application in dev mode:
pnpm dev
Open the login application with your favorite browser at localhost:3000
.
Change the source code and see the changes live in your browser.
Make sure the application still behaves as expected by running all tests
pnpm test
To satisfy your unique workflow requirements, check out the package.json in the root directory for more detailed scripts.
To deploy your own version on Vercel, navigate to your instance and create a service user. Copy its id from the overview and set it as ZITADEL_SERVICE_USER_ID. Then create a personal access token (PAT), copy and set it as ZITADEL_SERVICE_USER_TOKEN, then navigate to your instance settings and make sure it gets IAM_OWNER permissions. Finally set your instance url as ZITADEL_API_URL. Make sure to set it without trailing slash.