+
+

Related Products

  • Auth0
    1,003 Ratings
    Visit Website
  • Keeper Security
    1,751 Ratings
    Visit Website
  • Frontegg
    378 Ratings
    Visit Website
  • 1Password
    16,511 Ratings
    Visit Website
  • Securden Password Vault for Enterprises
    40 Ratings
    Visit Website
  • Securden Unified PAM
    12 Ratings
    Visit Website
  • Chainguard
    49 Ratings
    Visit Website
  • Uniqkey
    181 Ratings
    Visit Website
  • StrongDM
    99 Ratings
    Visit Website
  • ThreatLocker
    501 Ratings
    Visit Website

About

A seamless open source interface to securely authenticate, control and audit non-human access across tools, applications, containers and cloud environments via robust secrets management. Secrets grant access to applications, tools, critical infrastructure and other sensitive data. Conjur secures this access by tightly controlling secrets with granular Role-Based Access Control (RBAC). When an application requests access to a resource, Conjur authenticates the application, performs an authorization check against the security policy and then securely distributes the secret. Security policy as code is the foundation of Conjur. Security rules are written in .yml files, checked into source control, and loaded onto the Conjur server. Security policy is treated like any other source control asset, adding transparency and collaboration to the organization’s security requirements.

About

Permify is an authorization service designed to help developers build and manage fine-grained, scalable access control systems within their applications. Inspired by Google's Zanzibar, Permify enables the structuring of authorization models, storage of authorization data in preferred databases, and interaction with its API to handle authorization queries across various applications and services. It supports multiple access control models, including Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC), allowing for the creation of granular permissions and policies. Permify centralized authorization logic, abstracting it from the codebase to facilitate easier reasoning, testing, and debugging. It offers flexible policy storage options and provides a role manager to handle RBAC role hierarchies. The platform also supports filtered policy management for efficient enforcement in large, multi-tenant environments.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations searching for an automated directory and authorization platform

Audience

Engineering teams in search of a tool to implement and manage their access control operations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

Free
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CyberArk
Founded: 2013
United States
conjur.org

Company Information

Permify
Founded: 2022
United States
permify.co

Alternatives

HashiCorp Vault

HashiCorp Vault

HashiCorp

Alternatives

RadiantOne

RadiantOne

Radiant Logic
OpenFGA

OpenFGA

The Linux Foundation
Identity Confluence

Identity Confluence

Tech Prescient

Categories

Categories

Integrations

Amazon Web Services (AWS)
1Kosmos
AuthPoint
Check Point IPS
Check Point Infinity
Cloud Foundry
Entrust Certificate Hub
Entrust Identity Essentials
Google Cloud Platform
Jenkins
OfficeSpace Software
PangaeAPI
Pentera
RadiantOne
Red Hat OpenShift
SQLXPress
Tenable One
ThreatAware
ThreatSync
Trustwave DbProtect

Integrations

Amazon Web Services (AWS)
1Kosmos
AuthPoint
Check Point IPS
Check Point Infinity
Cloud Foundry
Entrust Certificate Hub
Entrust Identity Essentials
Google Cloud Platform
Jenkins
OfficeSpace Software
PangaeAPI
Pentera
RadiantOne
Red Hat OpenShift
SQLXPress
Tenable One
ThreatAware
ThreatSync
Trustwave DbProtect
Claim CyberArk Conjur and update features and information
Claim CyberArk Conjur and update features and information
Claim Permify and update features and information
Claim Permify and update features and information