<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Oauth on Pi Stack</title><link>https://www.pistack.xyz/tags/oauth/</link><description>Recent content in Oauth on Pi Stack</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Tue, 21 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.pistack.xyz/tags/oauth/index.xml" rel="self" type="application/rss+xml"/><item><title>Casdoor vs Zitadel vs Authentik: Lightweight Self-Hosted SSO Guide 2026</title><link>https://www.pistack.xyz/posts/2026-04-21-casdoor-vs-zitadel-vs-authentik-lightweight-sso-guide-2026/</link><pubDate>Tue, 21 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/2026-04-21-casdoor-vs-zitadel-vs-authentik-lightweight-sso-guide-2026/</guid><description>&lt;h2 id="why-self-host-your-single-sign-on-provider">Why Self-Host Your Single Sign-On Provider?&lt;/h2>
&lt;p>Authentication is the foundation of every service you run. Whether you manage a homelab with a dozen applications or operate a multi-team infrastructure with hundreds of services, users need a reliable, secure way to log in once and access everything. Cloud-hosted SSO providers — Okta, Auth0, Microsoft Entra ID — charge per active user, impose rate limits, and store your user data on their servers. For organizations handling sensitive data or operating under data residency regulations (GDPR, HIPAA, SOC 2), handing authentication to a third party introduces compliance risk and ongoing cost.&lt;/p></description></item><item><title>OAuth2-Proxy vs Pomerium vs Traefik-Forward-Auth: Best Self-Hosted Auth Proxy 2026</title><link>https://www.pistack.xyz/posts/oauth2-proxy-vs-pomerium-vs-traefik-forward-auth-2026/</link><pubDate>Sat, 18 Apr 2026 00:00:00 +0000</pubDate><guid>https://www.pistack.xyz/posts/oauth2-proxy-vs-pomerium-vs-traefik-forward-auth-2026/</guid><description>&lt;p>If you self-host web applications — dashboards, admin panels, internal tools, or APIs — one of the first questions you face is: &lt;strong>how do I protect them from unauthorized access?&lt;/strong>&lt;/p></description></item></channel></rss>