Secure everyone, wherever they are.
Cloud identity is great, but some organizations need to self-host a digital identity platform. This can be true for reasons of privacy, security or data sovereignty. Gluu Server 4.x. is a commercially-backed distribution of several open source identity and access management components, integrated and working together. You can choose which components you want to use, and how you want to deploy–on Linux VM’s or cloud native containers.
Self-hosting can also makes sense if you have performance or customization requirements that cloud hosted identity platforms can’t satisfy. Building your identity service takes work. But with a Gluu support subscription it’s a little easier–we’re here to make sure your deployment and operations are successful.
Empower your users with secure authentication
Scale
Privacy
Control
The Gluu Server consists of several components, which can be run as standalone services.

Auth Server
The core identity provider software that renders login pages, authenticates clients and issues tokens.
Based on the Linux Foundation Janssen Project, the Gluu Server is one of the most comprehensive OAuth and OpenID Connect Providers.

Casa
An extensible self-service web portal for end-users to view, add and enroll 2FA credentials
What happens when you lose your 2FA credential? With Casa, end-users have a website to remove lost credentials, and to enroll a replacement! FIDO, OTP, Super Gluu, SMS, smart card, and Duo are built in. You can add others via plugins.

Database
Choose LDAP for small deployments and Couchbase for mega-scale.
Choosing the right persistence mechanism is critical for the performance and availability of any identity platform. LDAP has fast performance and good replication. Couchbase offers sharded, multi-datacenter deployments. SQL is coming soon!

Passport
Federation broker for SAML IDPs and social login
If your partners or customers have their own SAML IDP, or you want to use a social identity provider, passport enables you to normalize authentication and to map user claims on a per IDP basis.

Shibboleth SAML IDP
SAML identity provider
Using the Shibboleth IDP, you can achieve SSO with SAML websites (SP's). With the Gluu Server, no need to hand edit confusing XML files--use the admin UI (or config API) to create trust relationships and release attributes to websites.

Admin UI
Easy to use web interface for configuration.
The Admin web UI is nice for ad hoc configuration. You can also use the config API to achieve more automation.
Linux Server
You can deploy the Gluu Server on VM’s or bare metal. Gluu has packages for Ubuntu, Red Hat, Debian and Centos. Cluster Manager is a deployment tool that helps you quickly setup a highly available topology of Linux Gluu Servers.
Cloud Native
Love K8S? The Gluu Cloud Native (“Gluu CN”) distribution is for you. It’s not just Kubernetes, but Helm and Kustomize too. Use Gluu CN when you need elasticity, zero downtime upgrades, and multi-cloud deployments.
Cluster Manager
Cluster Manager is a deployment tool that enables you to easily deploy a highly available topology of Gluu Servers on VM’s.
Directory Integration
Active Directory
Leverage an existing Microsoft Active Directory (AD) infrastructure as the authoritative source for identities and passwords for SSO using SAML and OpenID.
More than Active Directory
Sync user information and authenticate against any existing LDAP V3 directory server, including OpenLDAP, Oracle Directory Server (ODSEE), Novell Directory and more.
Multiple Directories
Gluu uses a virtual directory approach to consolidate identities from multiple backend Active Directory and/or LDAP servers. You can also transform user attribute names or values, or even connect to other resources to enrich the data during the synchronization process.
Use Existing Passwords
You can use a different LDAP server for identities and passwords. You can also choose to synchronize passwords (if they were hashed using a supported algorithm), or leave them where they are.
Connecting Identities

Leverage backend LDAP servers
Sync one or more backend directory servers, like Microsoft AD, to pull identity data into your Gluu Server identity store.

Integrate IDM tools
If you have an existing IDM tool (like Evolveum Midpoint, or Sailpoint), the preferred interface for user management is the Gluu Server SCIM API. You can also use the native database connector of the IDM platform (for example, LDAP).

Registration
You can implement user registration as a special type of authentication workflow. You can also use this approach to reset passwords. Another approach is to build an external registration process, and use the SCIM API to add the user once your done.

Local User Management
Want to use the Gluu Server as the authoritative source for identity? You can do this! Use the SCIM API to manage identities, and the admin web interface for ad hoc changes.
Access Management
Central Policy Management
Stepped-Up
Authentication
There are several ways in the Gluu Server to implement stepped-up authentication and trust elevation. OpenID Connect clients can force reauthentication if the user’s authentication level is insufficient. You can also use OAuth or UMA to mitigate risk by increasing the strength of the authentication before allowing a high-value transaction.
User Consent
Management
Sometimes you need to get a person’s consent for something after they have already been authenticated. One of the best ways to do this is with the UMA protocol. Using interception scripts, you have the flexibility to store user consent records in any application or security backend.
Single Sign-On

Features and Entitlements
Support and license entitlements for Gluu open source products and services.

Support Portal
The Gluu Support Portal (https://support.gluu.org) is the primary mechanism to triage support. It is available to the community, and to VIP customers. Community issues are all public, while VIP customers can open private issues. VIP customers have some additional features, like the ability to attach files and images to support requests.

Support SLAs
Gluu makes every possible effort to respond to support incidents to meet SLA obligations that support 99.999% up time. We offer up to 1 hour response and within 4 hour resolution for priority one system down events, and triage based on severity and risk to life and business impact. We do not offer different response times per contract ensuring all support staff respond appropriately the first time , every time.

Consultative Support
With a VIP support contract, you have an allocation of hours to schedule ad hoc Zoom calls with the Gluu engineering team. You can use these consultative sessions to review application design, to obtain training, or to dive deeper into a topic of your choice. Advance notice is required so Gluu can schedule the appropriate resources. The quarterly hours are “use-it-or-lose-it”, i.e. they don’t accumulate.

Functional and Devops Support
Application developers and deployers have different sets of challenges. The former frequently need to know how to use the Gluu server, the latter how to operate it. VIP Support covers both requirements. Functional support issues are more common at the start of access management projects. Devops support is critical for the production rollout and subsequent operation.

Prioritization Feature Requests
The requests of VIP Support customers for enhancements get special attention. Gluu cannot guarantee to add new features based on these requests. This decision is ultimately made by the product team, and in some cases, in collaboration with the open source community that leads development. But if possible, customer requests are accommodated.

Cluster Manager
Cluster Manager is a deployment tool that makes it easier to configure a cluster of Gluu Servers on virtual machines. It saves time by automating many manual tasks, and makes your cluster easier to upgrade. Cluster Manager is commercially licensed. Subscriptions give your organization the right to use software on an annual basis.