OSS identity stack: Hydra (OAuth2/OIDC server), Kratos (identity management), Keto (permissions, Zanzibar-inspired), Oathkeeper (zero-trust gateway). Apache-2.0 under Ory Corp. Cloud-native modular alternative to Keycloak.
Ory is the OSS identity stack — Hydra (OAuth2/OIDC), Kratos (identity management), Keto (permissions), Oathkeeper (zero-trust gateway). Apache-2.0 license. Cloud-native modular alternative to Keycloak. Pick Ory for K8s-native identity stack with cleaner microservice boundaries than Keycloak's monolith.
Ory's modular architecture creates a more granular trust analysis than Keycloak's monolith: each component (Hydra, Kratos, Keto, Oathkeeper) has its own trust posture. From a Trust Before Intelligence lens, this enables fine-grained adoption — start with just Kratos for identity, add Hydra for OAuth, Keto for permissions. Trade-off: more components to operate.
Sub-100ms OAuth flows; Keto sub-10ms.
OIDC standards-based.
Native OIDC + Keto for ABAC/ReBAC.
Modular K8s-native multi-cloud.
Identity schema + consent records.
OpenTelemetry tracing.
RBAC + audit + compliance map. 3/6 -> 4.
OTel. 2/6 -> 4 lenient.
5/6 -> 4.
1/6 -> 3.
5/6 -> 4.
Best suited for
Compliance certifications
OSS Apache-2.0; Ory Network signs SOC 2.
Use with caution for
Keycloak for monolithic ergonomics. Ory for modular K8s-native.
View analysis →Role: L5 modular identity stack.
Upstream: OIDC/OAuth flows + identity events.
Downstream: Tokens + permissions + tracing.
Mitigation: Use Ory Network for managed simplification.
Ory's specialty.
Keycloak fits.
This analysis is AI-generated using the INPACT and GOALS frameworks from "Trust Before Intelligence." Scores and assessments are algorithmic and may not reflect the vendor's complete capabilities. Always validate with your own evaluation.