authsec-frontend
GitHubAdmin dashboard with RBAC, OAuth flows, voice authentication UI, and MFA management. Built for teams deploying AuthSec on-premises.
Star on GitHubSelf-host and extend the full AuthSec stack — authentication, authorization, and vault for AI agents and autonomous workloads with real-time policy enforcement.
The full AuthSec stack — dashboard, API server, and mobile authenticator — is open source. Self-host, audit, fork, and contribute.
MIT licensed. Production-ready. Community-driven.
Admin dashboard with RBAC, OAuth flows, voice authentication UI, and MFA management. Built for teams deploying AuthSec on-premises.
Star on GitHubMonolithic API server powering OAuth 2.1, CIBA, SPIFFE workload identity, secret vault, and adaptive MFA with Prometheus observability.
Star on GitHubOpen-source mobile authenticator with TOTP, CIBA push approval, biometrics, and OIDC/SAML login. Reference client for the AuthSec SDK.
Star on GitHubAll repositories are MIT licensed and open for contributions.
View all reposGet started in minutes with our SDK, scale to enterprise needs seamlessly.
SDK quickstarts, policy controls, and runtime identity.
# Initialize Client & Check Permission# Initializeclient = AuthSecClient( base_url='https://dev.api.authsec.dev', token=os.getenv('AUTHSEC_TOKEN'))# Check single permission (resource:action)# List all user permissionspermissions = client.list_permissions()Connect with enterprise identity providers
Delegate to enterprise directories
Immutable audit trails for compliance
Fine-grained permission control
Authentication and authorization for users and AI agents with modern identity primitives.
Voice, agent, and workload trust under one policy graph.
Authenticate users via voice, CLI, or agents without browser redirects using secure token flows.
Users grant scoped, expiring permissions so agents can safely act on their behalf.
Use SPIFFE, mTLS, and rotation to secure machine-to-machine communication.
Secure users and autonomous workloads with the same policy engine, observability, and controls. No more parallel auth stacks.
OAuth, workload trust, vault controls, and adaptive MFA.
Native OAuth2.1 support with Authorization Code + PKCE. Issue short-lived, user-bound tokens without building custom auth flows.
AuthSec assigns AI agents and MCP servers cryptographically verifiable identities using X.509 certificates, exchanged for short-lived, call-specific JWTs to minimize blast radius.
SVID issuance, policy checks, and mTLS handshakes in one flow.
Each agent is issued a unique X.509 workload identity (SPIFFE SVID) at startup.
Autonomous workloads authenticate using short-lived X.509 certificates.
Agents authenticate using mTLS with automatically rotated certificates.
HashiCorp Vault backs PKI issuance and rotation from a trusted Root CA.
A unified authentication and authorization platform for MCP Servers and AI Agents
Connect your identity provider (Google, GitHub, Microsoft) via OAuth 2.1 or SAML 2.0 SSO. MFA with WebAuthn/FIDO2 works out of the box. Users download and install the AuthSec app and configure single sign-on.

Install the AuthSec SDK to secure your MCP servers, AI agents, and voice agents. Use lightweight SDKs to give each agent a verifiable identity with just a few lines of code.
# Create Your Secure MCP Server (server.py)# Tool: Accessible to authenticated users 'type': 'text', 'text': f"Hello, {arguments['_user_info']['email']}!" }]# Start the server run_mcp_server_with_oauth( client_id='your-client-id-here', app_name='My Secure MCP Server' )Implement the SDK in your codebase to enable authentication and authorization. Secure communication and policy enforcement without static API keys.

Preview voice authentication and agent auth in action. See how AuthSec protects your AI infrastructure with real-time demonstrations.

AuthSec provides enterprise-grade security with OAuth 2.1, AI agent authentication, and zero-trust architecture.
No infrastructure setup required
No spam. Security updates only.
Learn about authentication patterns, security best practices, and AI agent identity from our engineering team.