code-compareChoosing a Provider

GL IAM supports multiple identity providers through a unified interface. This guide helps you choose the right provider for your use case.

circle-info

Provider-agnostic by design: Your application code remains the same regardless of which provider you choose. Only the configuration changes. See Provider-Agnostic Code for details.

Quick Decision Guide

If you need...
Choose

Fastest setup, no external services

Modern managed auth with user-friendly UI

Enterprise SSO, SAML, federation

Feature Comparison

Feature
PostgreSQL
Stack Auth
Keycloak

Setup complexity

Low

Low

Medium

External dependencies

Database only

Cloud or self-hosted

Self-hosted

User registration

Built-in

Built-in UI

Admin console

Password management

Built-in

Managed

Managed

SSO (OIDC/SAML)

No

OIDC

OIDC + SAML

MFA

No

Yes

Yes

User federation

No

No

Yes

Social login

No

Yes

Yes

Best for

Prototypes, internal apps

SaaS products

Enterprise apps

Provider Overview

PostgreSQL Provider

The PostgreSQL provider gives you full control over user data storage. GL IAM handles password hashing, token generation, and session management.

Best for:

  • Rapid prototyping and development

  • Internal tools and admin dashboards

  • Applications requiring full data ownership

  • Scenarios where external auth services aren't desired

Get started with PostgreSQL →


Stack Auth Provider

Stack Auth is a modern authentication platform with a developer-friendly API and pre-built UI components.

Best for:

  • SaaS applications needing quick auth setup

  • Teams wanting managed authentication

  • Applications requiring modern auth features (social login, MFA)

  • Projects with frontend integration needs

Get started with Stack Auth →


Keycloak Provider

Keycloak is an enterprise-grade identity solution with comprehensive features for complex authentication scenarios.

Best for:

  • Enterprise environments with existing Keycloak infrastructure

  • Applications requiring SAML support

  • Multi-application SSO requirements

  • User federation with LDAP/Active Directory

Get started with Keycloak →

The Power of Provider-Agnostic Code

Regardless of which provider you choose, your application endpoints look identical:

This code works with PostgreSQL, Stack Auth, and Keycloak without modification. Learn more about this pattern in Provider-Agnostic Code.


circle-info

Found an issue on this page? Report it on our feedback formarrow-up-right.

Last updated

Was this helpful?