Search Results for "identity access management"

Showing 2146 open source projects for "identity access management"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    AmazonMSK AWS Identity Access Management

    AmazonMSK AWS Identity Access Management

    Use AWS Identity and (IAM) to connect to Amazon Managed Streaming

    The Amazon MSK Library for AWS Identity and Access Management enables developers to use AWS Identity and Access Management (IAM) to connect to their Amazon Managed Streaming for Apache Kafka (Amazon MSK) clusters. It allows JVM-based Apache Kafka clients to use AWS IAM for authentication and authorization against Amazon MSK clusters that have AWS IAM enabled as an authentication mechanism.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Pomerium

    Pomerium

    Pomerium is an identity and context-aware access proxy

    ...Pomerium uses identity and context to ensure secure access to internal applications, servers, and infrastructure even from untrusted networks. Pomerium adds authentication and authorization to any application or server, giving IT Management a centralized panel for organization-wide control. Assert compliance in your current architecture without giving up control over data tenancy.
    Downloads: 18 This Week
    Last Update:
    See Project
  • 3
    MaxKey

    MaxKey

    MaxKey SSO ,Leading-Edge IAM-IDaas(Identity and Access Management)

    Maxkey Single Sign On System, which means the Maximum key, Leading-Edge IAM/IDaas Identity and Access Management product, supports OAuth 2.x/OpenID Connect, SAML 2.0, JWT, CAS, SCIM, and other standard protocols, and provide Secure, Standard and Open Identity management (IDM), Access management (AM), Single Sign On (SSO), RBAC permission management and Resource management. MaxKey focuses on performance, security, and ease of use in enterprise scenarios, is widely used in industries such as healthcare, finance, government, and manufacturing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Paralus

    Paralus

    All-in-one Kubernetes access manager

    Paralus is an open-source, zero-trust access management solution for Kubernetes. It provides secure access to Kubernetes clusters without the need for VPNs, streamlining operations and enhancing security. Paralus can be easily integrated with your pre-existing RBAC configuration and your SSO providers, or Identity Providers (IdP) that support OIDC (OpenID Connect). Through just-in-time service account creation and fine-grained user credential management, Paralus provides teams with an adaptable system for guaranteeing secure access to resources when necessary, along with the ability to rapidly identify and respond to threats through dynamic permission revocation and real-time audit logs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    Keycloak

    Keycloak

    Identity and access management for modern applications and services

    Add authentication to applications and secure services with minimum fuss. No need to deal with storing users or authenticating users. It's all available out of the box. You'll even get advanced features such as User Federation, Identity Brokering and Social Login. Keycloak is an open source Identity and Access Management solution aimed at modern applications and services. It makes it easy to secure applications and services with little to no code. Users authenticate with Keycloak rather than individual applications. This means that your applications don't have to deal with login forms, authenticating users, and storing users. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    Shield

    Shield

    The easiest and most intuitive way to add access management

    The easiest and most intuitive way to add access management to your Filament Admin Resources, Pages & Widgets is through Spatie/Laravel Permission.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 7
    Ory Kratos

    Ory Kratos

    Next-gen identity server with Ory-hardened authentication

    ...Configurable login and registration flows, multi-factor authentication, custom identity models, and bring your own UI. Ory Kratos is open-source and grows more powerful with every pull-request. Ory Kratos is written in Go and we provide SDKs for every language. Customizable login, registration, and profile management without complexity. Users create and sign in to accounts using username/email and password combinations, Social Login, passwordless flows, TOTP and more.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8
    ZITADEL

    ZITADEL

    Identity infrastructure, simplified for you

    Secure authentication management for your application. Customize as you grow, with easy APIs and programmable workflows. Focus on growing, your login is in good hands. Streamline your application development with our all-in-one identity suite. Designed for all user types, be it consumers, businesses, or employees. Offload complex tasks by using our API as solid abstractions.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    Casdoor

    Casdoor

    An open-source Identity and Access Management (IAM)

    A UI-first Identity Access Management (IAM) / Single-Sign-On (SSO) platform supporting OAuth 2.0, OIDC, SAML and CAS, integrated with Casbin RBAC and ABAC permission management. Within a few steps, we can setup a Casdoor app and realize our authorization management. Casdoor has a front-end back-end separation architecture, with maneuverable web UI and supporting high concurrency.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 10
    Vault

    Vault

    Tool for secrets management and encryption as a service

    ...Security in dynamic infrastructure is defined by ephemeral applications and servers, trusted sources of user and application identity, and software-based encryption. Datacenters with inherently high-trust networks with clear network perimeters. Multiple clouds and private datacenters without a clear network perimeter. Use policy to codify, protect, and automate access to secrets. Seamlessly integrate any trusted identity provider.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    Kanidm

    Kanidm

    Kanidm: A simple, secure, and fast identity management platform

    Kanidm is a simple and secure identity management platform, allowing other applications and services to offload the challenge of authenticating and storing identities to Kanidm. The goal of this project is to be a complete identity provider, covering the broadest possible set of requirements and integrations. You should not need any other components (like Keycloak) when you use Kanidm - we already have everything you need.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The Bastion

    The Bastion

    Authentication, authorization, traceability and auditability for SSH

    The Bastion is a hardened, audited, and production-grade bastion host developed by OVHcloud. It facilitates secure, controlled, and traceable SSH access to remote systems. The system is designed to be tamper-proof, with a strict access control system and logging for all user actions. It is widely used in enterprise environments to enforce secure and auditable infrastructure access policies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    authentik

    authentik

    The authentication glue you need

    authentik is an open-source Identity Provider that emphasizes flexibility and versatility. It can be seamlessly integrated into existing environments to support new protocols. authentik is also a great solution for implementing sign-up, recovery, and other similar features in your application, saving you the hassle of dealing with them. authentik is an open-source Identity Provider focused on flexibility and versatility. You can use authentik in an existing environment to add support for new...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Authelia

    Authelia

    The Single Sign-On Multi-Factor portal for web apps

    Authelia is an open-source authentication and authorization server and portal fulfilling the identity and access management (IAM) role of information security in providing multi-factor authentication and single sign-on (SSO) for your applications via a web portal. It acts as a companion for common reverse proxies. With a compressed container size smaller than 20 megabytes and observed memory usage normally under 30 megabytes, it's one of the most lightweight solutions available. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 15
    hydra

    hydra

    Cloud native, security-first, API security for your infrastructure

    Secure access to your applications and APIs, and authenticate third party users. Ory / Hydra is Open Source and OpenID Connect Certified® technology that integrates with any login system. Get started in minutes, and provide secure access to your application and API endpoints. Ory / Hydra works with any login system and only a few lines of code are required. Ory / Hydra is written in Go and we provide SDKs for every language. We work with any login system and it is easy to customize the login...
    Downloads: 45 This Week
    Last Update:
    See Project
  • 16
    Sign-In with Ethereum

    Sign-In with Ethereum

    Sign-In with Ethereum library

    ...The goals of this specification are to provide a self-custodied alternative to centralized identity providers, improve interoperability across off-chain services for Ethereum-based authentication, and provide wallet vendors a consistent machine-readable message format to achieve improved user experiences and consent management.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    CloudFoundry UAA

    CloudFoundry UAA

    CloudFoundry User Account and Authentication (UAA) Server

    The UAA is a multi tenant identity management service, used in Cloud Foundry, but also available as a stand alone OAuth2 server. Its primary role is as an OAuth2 provider, issuing tokens for client applications to use when they act on behalf of Cloud Foundry users. It can also authenticate users with their Cloud Foundry credentials, and can act as an SSO service using those credentials (or others).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    ORY Oathkeeper

    ORY Oathkeeper

    A cloud native Identity & Access Proxy / API (IAP)

    ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. The BeyondCorp Model is designed by Google and secures applications in Zero-Trust networks. An Identity & Access Proxy is typically deployed in front of (think API Gateway) web-facing applications and is capable of authenticating and optionally authorizing access requests.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    Google Auth Library

    Google Auth Library

    Google Auth Library for Node.js

    ...Use workload identity federation to access Google Cloud resources from Amazon Web Services (AWS), Microsoft Azure or any identity provider that supports OpenID Connect (OIDC). Use workforce identity federation to access Google Cloud resources using an external identity provider (IdP) to authenticate and authorize a workforce—a group of users, such as employees, partners, and contractors.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Leapp

    Leapp

    Leapp is the DevTool to access your cloud

    Let Leapp manage your Cloud credentials locally. Improve your workflow with the only open-source desktop app and CLI you’ll ever need. Your all-in-one solution to assign IAM Cloud access across teams. Cloud credentials are available with a click. Data stored locally encrypted in your System Vault. Work with your Cloud Identities from a single place. Automatic temporary Cloud credentials generation and rotation. Pick your Cloud Provider to add a Leapp Session. Choose from supported access methods or leverage your federated identity with SAML 2.0 compliant identity providers. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    React Native Auth0

    React Native Auth0

    React Native toolkit for Auth0 API

    With a few lines of code, you can have Auth0 integrated into any app written in any language, and any framework. We provide 30+ SDKs & Quickstarts to help you succeed in your implementation. Enable user collaboration and granular access control in your applications with easy-to-use APIs. From improving customer experience through seamless sign-on to making MFA as easy as a click of a button, your login box must find the right balance between user convenience, privacy and security. That’s why Okta and Auth0 have joined forces. Because we know together we can help you build a better solution for Customer Identity (CIAM) that will reduce security and compliance risks, improve your UX, and help your developers maximize their time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    firezone

    firezone

    Enterprise-ready zero-trust access platform built on WireGuard

    Firezone is a modern, self-hosted VPN solution built on WireGuard, designed to provide secure remote access for teams and infrastructure. It offers a sleek web interface, automatic configuration management, and strong encryption. Unlike traditional VPNs, Firezone focuses on ease of deployment, scalability, and integration with identity providers, making it ideal for developers and teams needing secure networking without relying on third-party services.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Ockam

    Ockam

    Orchestrate end-to-end encryption, mutual authentication

    Ockam is a suite of open source tools, programming libraries, and managed cloud services to orchestrate end-to-end encryption, mutual authentication, key management, credential management, and authorization policy enforcement – at massive scale. Modern applications are distributed and have an unwieldy number of interconnections that must trustfully exchange data. To build trust for data-in-motion, applications need end-to-end guarantees of data authenticity, integrity, and confidentiality. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Amazon EKS Pod Identity Webhook

    Amazon EKS Pod Identity Webhook

    Amazon EKS Pod Identity Webhook

    This webhook is for mutating pods that will require AWS IAM access. After version v0.3.0, --in-cluster=true no longer works and is deprecated. Please use --in-cluster=false and manage the cluster certificate with a cert-manager or some other external certificate provisioning system. This is because certificates using the legacy-unknown signer are no longer signed when using the v1 certificates API. Create an OIDC provider in IAM for your cluster. You can find the OIDC discovery endpoint by...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    IdentityServer

    IdentityServer

    The most flexible and standards-compliant OpenID Connect and OAuth 2

    The most flexible and standards-compliant OpenID Connect and OAuth 2.0 framework for ASP.NET Core. IdentityServer gives you full control over your UI, UX, business logic, and data. In IdentityServer, customizing your workflows is not an afterthought. Our APIs and extensibility points allow adapting to your workflows and business rules without having to find complicated workarounds. You can choose whichever UI framework or technology suits you best to integrate with our token engine. We...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB