Alternatives to FreeIPA
Compare FreeIPA alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to FreeIPA in 2026. Compare features, ratings, user reviews, pricing, and more from FreeIPA competitors and alternatives in order to make an informed decision for your business.
-
1
SecurEnds
SecurEnds
SecurEnds cloud software enables the world’s most forward-thinking companies to automate: User Access Reviews, Access Certifications, Entitlement Audits, Access Requests, and Identity Analytics. Load employee data from a Human Resources Management System (e.g., ADP, Workday, Ultipro, Paycom) using built-in SecurEnds connectors or files. Use built-in connectors and flex connectors to pull identities across enterprise applications (e.g., Active Directory, Salesforce, Oracle), databases (e.g., SQL Server, MySQL, PostreSQL), and cloud applications (e.g., AWS, Azure, Jira). Perform user access reviews by role or attribute as frequently as needed. Application owners can use delta campaigns to track any changes since the last campaign. Send remediation tickets directly to application owners to perform access updates. Auditors can also be granted access to review dashboards and remediations. -
2
CPTRAX for Windows
Visual Click Software
Server File Activity Tracking - Audit who is creating, accessing, moving, and deleting your files and folders. Track file permission changes. Real-time alerts about critical file activities. Malicious activity containment (Ransomware, mass file deletes, etc.) Workstation File Activity Tracking - Audit who is copying files to USB or other removable drives. Track who is uploading files from a browser or via FTP. Block files from being created on USB/removable device. Email alerts when a removable device is connected. Active Directory Auditing - Keep audit logs and get real-time alerts of important Active Directory changes without dealing with SACLs or Windows Event Logs. Server Authentication Auditing - Track authentications into Windows Servers and Citrix sessions. Review all failed logon attempts. Workstation Logon/Logoff Tracking - Get visibility on workstation logons/logoffs, including locks, unlocks and password changes. Review all failed logon attempts. -
3
JumpCloud
JumpCloud
JumpCloud® delivers a unified open directory platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform. Everything in One Platform Grant users Secure, Frictionless Access™ to everything they need to do their work however they choose. Manage it all in one unified view. Cross-OS Device Management Manage Windows, macOS, Linux, iOS, iPad, and Android devices. One Identity for Everything Connect users to thousands of resources with one set of secure credentials. Comprehensive Security Enforce device policies, patches, MFA, and other security and compliance measures. Automated Workflows Connect to whatever resources you need, including Microsoft Active Directory, Google Workspace, HRIS platforms, and more.Starting Price: $9/user -
4
Microsoft Entra ID
Microsoft
Microsoft Entra ID (formerly known as Azure Active Directory) is a comprehensive identity and access management cloud solution that combines core directory services, application access management, and advanced identity protection. Safeguard your organization with a cloud identity and access management solution that connects employees, customers, and partners to their apps, devices, and data. Protect access to resources and data using strong authentication and risk-based adaptive access policies without compromising user experience. Provide a fast, easy sign-in experience across your multicloud environment to keep your users productive, reduce time managing passwords, and increase productivity. Manage all your identities and access to all your applications in a central location, whether they’re in the cloud or on-premises, to improve visibility and control. -
5
Ping Identity
Ping Identity
Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.Starting Price: $5 per user per month -
6
Zentyal
Zentyal
Join Windows® clients to the domain and manage them transparently. No disruption to your users, no user or device CALs. Comes with industry-standard SMTP and POP3/IMAP mail server built upon the most established technologies and protocols. Guarantees reliable and secure Internet access and helps to manage all the basic network infrastructure services. Receive software updates until the EOL-date of each version and get support when needed. Zentyal offers an easy to use Windows Server® alternative. It comes with native compatibility with Microsoft Active Directory® allowing you to join Windows® clients to the domain and manage them easily, causing no disruption to your users. Zentyal includes the industry-standard SMTP and POP3/IMAP mail servers built upon the most established technologies and protocols. Gives you the opportunity to deploy Zentyal as a mail server, domain & directory server with mail or all-in one server.Starting Price: €195 per server -
7
authentik
authentik
authentik is an open source identity provider that unifies your identity needs into a single platform, replacing Okta, Active Directory, and Auth0. Authentik Security is a public benefit company that is building on top of the open-source project. Using a self-hosted, open-source identity provider means prioritizing security and taking control of your most sensitive data. With authentik, you no longer need to continually place your trust in a third-party service. Adopt authentik to your environment, regardless of your requirements. Use our APIs and fully customizable policies to automate any workflow. Simplify deployment and scaling with prebuilt templates and support for Kubernetes, Terraform, and Docker Compose. No need to rely on a third-party service for critical infrastructure or expose your sensitive data to the public internet. Use our pre-built workflows, or customize every step of authentication through configurable templates, infrastructure as code, and comprehensive APIs.Starting Price: $0.02 per month -
8
Authelia
Authelia
Authelia is an open source authentication and authorization server and portal fulfilling the identity and access management role of information security in providing multi-factor authentication and single sign-on for your applications via a web portal. It acts as a companion for common reverse proxies. With a compressed container size smaller than 20 megabytes and observed memory usage normally under 30 megabytes, it's one of the most lightweight solutions available. Written in Go and React, authorization policies and many other backend tasks are completed in mere milliseconds, and login portal loading times of 100 milliseconds make it one of the fastest solutions available. Processors can use a lot of electricity, but when idle, usage is basically so low that you can't measure it, and active usage in a small business environment being under 1% allows you to rest easy (with the exclusion of password hashing). Security is heavily considered as part of our design process.Starting Price: Free -
9
AD Bridge
BeyondTrust
Extend Microsoft® Active Directory authentication, single sign-on capabilities, and group policy configuration management to Unix & Linux systems with AD Bridge. Consistent tools across the enterprise. Provide a single familiar toolset to manage both Windows and Unix/Linux systems. Streamline compliance processes. Provide thorough audit details to audit and compliance teams and manage group policies centrally. Extend security policies. Expand single sign-on (SSO) and file sharing, and control access to non-Windows systems. BeyondTrust AD Bridge centralizes authentication for Unix and Linux environments by extending Active Directory’s Kerberos authentication and single sign-on capabilities to these platforms. By extending group policy to non-Windows platforms, BeyondTrust provides centralized configuration management, reducing the risk and complexity of managing a heterogeneous environment. Extend native group policy management tools to include settings for Unix and Linux. -
10
Hypergate Authenticator
Hypergate
Hypergate Authenticator delivers a seamless and secure Single Sign On solution integrating directly with Active Directory. Hypergate Authenticator is a managed application on the mobile device that delivers a seamless and secure Single Sign-On solution integrating directly with your Active Directory. The solution leverages the industry standard Kerberos to provide the best possible user experience without compromising on security. Enable SSO specifically with Android Enterprise which is otherwise not available. Hypergate is fast, not only when interacting with the User, also when implementing it. Enable your Users with Kerberos authentication by simply pushing Hypergate on their device. If there is an issue with the password of the user, this can be varied and changed by them directly on their device, without contacting IT staff for help (SSPR). No dependence on having to use a computer to reset the password. With Hypergate, you can allow staff to become truly mobile. -
11
WinSCP
WinSCP
WinSCP is a popular SFTP client and FTP client for Microsoft Windows! Copy files between a local computer and remote servers using FTP, FTPS, SCP, SFTP, WebDAV, or S3 file transfer protocols. WinSCP is an open source free SFTP client, FTP client, WebDAV client, S3 client and SCP client for Windows. Its main function is file transfer between a local and a remote computer. Beyond this, WinSCP offers scripting and basic file manager functionality. Graphical user interface, translated into many languages. Integration with Windows (drag & drop, URL, shortcut icons). All common operations with files, and support for SFTP and SCP protocols over SSH and FTP and WebDAV and S3 protocols. Batch file scripting and command-line interface and .NET assembly for advanced programming tasks. Directory synchronization in several semi or fully-automatic ways. Integrated text editor, shares site settings with PuTTY, and supports password, keyboard-interactive, public key, and Kerberos authentication.Starting Price: Free -
12
Time Machine
Solution-Soft
Time Machine® provides software virtual clocks that enable you to time travel your applications into the future or the past, facilitating time shift testing on your date and time-sensitive application logic, such as month-end, quarter-end, year-end processing, billing cycle, workflow, regulatory go live and policy life cycle. Time Machine is transparent to applications and databases so no code modification is required to do time shift testing and the system clock is never modified. Time Machine eliminates the need to reset the system clock, which is time-consuming, error-prone, and not possible under Active Directory or in a Kerberos secured environment. Mitigate risks for mission-critical application failures. Ensure large-scale software projects finish on time and under budget. Windows, Linux, Unix, Mainframe zLinux, Dockerized, Virtualized, On-Iron, or in the Cloud. Time Machine runs everywhere you need it. -
13
IBM RACF for z/OS enables the protection of your mainframe resources by making access control decisions through resource managers. Granting access to only authorized users keeps your data safe and secure. RACF authenticates users with a password, password phrase, digital certificate, Kerberos ticket, or a PassTicket. Protect your mainframe resources with tools that manage and control access to valuable z/OS data. RACF retains information about your users, resources, and access authorities in its database. This database determines access to protected mainframe system resources based on your security policy. RACF has logging and reporting functions that identify users who attempt to access the resource, either successfully or unsuccessfully. Detection of security exposures or threats is made possible by this feature. Through the RRSF, you have the capability to run most RACF commands on a node and a user ID different from the one you are logged on to.
-
14
PowerTerm WebConnect HostView
Ericom Software
In today's economy, one of the best ways for an organization to emerge as productive and agile is to optimize their IT resources. Ericom helps organization achieve this with PowerTerm® WebConnect HostView web-to-host emulation. Leverage the benefits of PC-client access software and server-based computing to take legacy assets to a new level. Centrally manage configuration and software updates - save on time and administrative resources. Increase productivity; enable anytime, anywhere access to business-critical applications using a standard web browser, regardless of the user's physical location. Reduce costs associated with individual licensing, maintenance, support and updates. SSL, SSH, SFTP, Active Directory and LDAP integration, Single Sign-On, authentication (including Kerberos), RADIUS, RSA® SecurID® and SecurEnvoy® SecureAccess and SecurICE two-factor authentication support, and more. -
15
YNQ
Visuality Systems
YNQ is a portable SMB server and client stack developed by Visuality Systems, written in ANSI C and designed to run on embedded, IoT, or non-Windows systems while ensuring full interoperability with Windows-based machines. It enables remote file operations (write, edit, copy, delete, update) over a network without needing to transfer entire files locally, while maintaining a small resource footprint ideal for constrained environments. YNQ supports full compatibility across all SMB dialects (from NTLM 0.12 through SMB 3.1.1), including backward compatibility, making it broadly applicable across SMB ecosystems. It offers security features such as Kerberos (domain-join, delegation), NTLM/NTLMv2, message signing, SMB encryption, and pre-authentication integrity. YNQ is modular and comprises four product components; Standalone Client, Corporate Client (with Active Directory registration capability), Standalone Server, and Corporate Server. -
16
Specops Password Sync
Specops Software
Streamline passwords for users with just one password across multiple business systems. Specops Password Sync instantly synchronizes Active Directory passwords to domains, or other systems. This includes domains in the same forest/other forests, on-premises systems (e.g. Kerberos), and SaaS targets (e.g. O365). The tool enhances security by ensuring that password complexity applies to all systems consistently. Specops Password Sync effectively extends Active Directory password security to other business systems, including external SaaS resources. When combined with a strong password policy, the product ensures that the same level of password complexity applies to all connected systems. Built on Active Directory, the tool captures and synchronizes all changes to a user’s password in accordance with the synchronization rules defined in Group Policy. The solution can be setup in just a few hours by configuring the local Active Directory. -
17
Altered Security
Altered Security
Altered Security offers a hands-on cybersecurity education platform featuring Red Team labs, cyber ranges, bootcamps, and certifications designed for Active Directory, Azure, and enterprise security. Through self-paced on-demand labs and in-person sessions, participants gain access to realistic, fully patched environments along with preconfigured VMs, detailed video courses (11–14+ hours), lab manuals, walk-through videos, and instructor support. Courses such as Certified Red Team Professional (CRTP), Certified Red Team Expert (CRTE), and AD CS Attacks cover topics including enumeration, privilege escalation, Kerberos, certificate-based attacks, lateral movement, hybrid Azure-PHF, and cloud persistence. Labs simulate enterprise networks with multiple domains and forests, guiding learners from non‑admin starts to enterprise admin compromise, and include exam attempts for industry-recognized certifications. -
18
ProMDM
ProMDM
ProMDM is a mobile device management solution that provides end-to-end control of all mobile devices across the IT infrastructure, using standard MDM specifications for iOS, Android and Windows devices. Features: Security Management Profile/Configuration Management Compliance Management Services Device Management Dynamic Group management based on AD/LDAP groups, device attributes or manual Device Reporting Health Check Services Lifecycle Management Services Mobile Certificate Mngmt Services Automation for administrative tasks with Health check service Role base administration SSO with Client Certificate Authentication for Exchange, Sharepoint, Web sites iOS SSO with Kerberos for Safari and native apps (integration with ADFS or websites directly) MAM - Mobile App Management Samsung KNOX support Document management – Managed media support Photo sync for Android GPS location and tracking Android for Work support (ProMDM is certified Google Partner) -
19
Active Directory
Microsoft
Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.Starting Price: $1 per user per month -
20
KMail
KDE
KMail is the email component of Kontact, the integrated personal information manager from KDE. Default settings rather compromise on features than security or privacy. End-to-end Encryption. Support for OpenPGP and S/MIME is built-in, and a setup and key generation wizard aids users in getting started with this. Transport encryption, SSL/TLS encrypted communication is of course supported, as are a number of authentication methods such as GSSAPI (Kerberos) or OAuth2. Strong isolation of HTML content. If HTML emails can’t be avoided, KMail ensures no external references can be hidden in there to leak information or compromise your privacy. Additionally KMail’s phising protections warns about suspicious links in such emails. Spam protection, so if your email server doesn’t take care of this already, KMail can integrate popular spam checkers such as SpamAssassin or Bogofilter locally. -
21
System On Grid
System On Grid
We are redefining internet by converging cloud infrastructure by merging Orbits (VPS – Virtual Private Servers) with Web Hosting which provides dedicated and scalable resources, security, isolation, and automation backed by very high reliability and 99.99% uptime guarantee. Our Orbits come with different specs and different flavors like CentOS, Ubuntu, Debian, Fedora, Free BSD, Net BSD etc. providing a lot of flexibility. The backend uses Intel E-5 processors, KVM hypervisor and Openstack. System On Grid Orbits are Virtual Instances (Virtual Private Servers/Machines) run by KVM hypervisor. The Orbits come with multiple Operating System Flavors including different Linux Distros like Centos, Ubuntu, Debian, Fedora etc. Orbits also have an option of Unix flavors viz Free BSD and Net BSD. Orbits take full advantage of Intel CPUs VTX features and hardware abstraction. We also have tweaked the Host kernel to provide strong and robust performance.Starting Price: $8 per month -
22
Kata Containers
Kata Containers
Kata Containers is Apache 2 licensed software consisting of two main components: the Kata agent, and the Kata Containerd shim v2 runtime. It also packages a Linux kernel and versions of QEMU, Cloud Hypervisor and Firecracker hypervisors. Kata Containers are as light and fast as containers and integrate with the container management layers—including popular orchestration tools such as Docker and Kubernetes (k8s)—while also delivering the security advantages of VMs. Kata Containers supports Linux (host and guest) for now. On the host side, we have installation instructions for several popular distributions. We also have out-of-the-box support for Clear Linux, Fedora, and CentOS 7 rootfs images through the OSBuilder which can also be used to roll your own guest images. -
23
SOAPSonar
Crosscheck Networks
Validate the functional behavior of APIs with client input simulations. Success criteria rules provide validation and regression testing of API behavior. Tests can be run on-demand or automated. Supports latest OpenAPI standards for automatically parsing OpenAPI documents and building test cases for all of the defined operations. Test authentication schemes including OAuth, SAML, PKI, Basic Auth, Amazon Auth, and Kerberos. Verify SSO tokens and cookies. Create behavior baselines and run regression tests to determine if any breakage or change of behavior occurs. Includes JSON and XML Diff capability. Test encryption and decryption of JSON, XML, REST, and SOAP message patterns. Simulate load from multiple virtual clients to measure and validate the performance criteria of the target APIs. Dynamic security and identity provide real world simulated inputs. Built-in support for AWSv4 signatures to authenticate to and test Amazon AWS APIs.Starting Price: $80/month -
24
Apache Impala
Apache
Impala provides low latency and high concurrency for BI/analytic queries on the Hadoop ecosystem, including Iceberg, open data formats, and most cloud storage options. Impala also scales linearly, even in multitenant environments. Impala is integrated with native Hadoop security and Kerberos for authentication, and via the Ranger module, you can ensure that the right users and applications are authorized for the right data. Utilize the same file and data formats and metadata, security, and resource management frameworks as your Hadoop deployment, with no redundant infrastructure or data conversion/duplication. For Apache Hive users, Impala utilizes the same metadata and ODBC driver. Like Hive, Impala supports SQL, so you don't have to worry about reinventing the implementation wheel. With Impala, more users, whether using SQL queries or BI applications, can interact with more data through a single repository and metadata stored from source through analysis.Starting Price: Free -
25
Synology Virtual Machine Manager
Synology
Virtual Machine Manager opens up abundant possibilities. You can set up and run various virtual machines, including Windows, Linux (Ubuntu, Red Hat, CentOS, Fedora, Debian, Oracle) or Virtual DSM all on one Synology NAS. You can also test a new software version in a sandbox environment, isolate your customers' machines or increase the flexibility of your server. Synology VMM lets you build a cost-effective and easily managed virtualization environment by combining computing, storage and networking resources on a single hardware platform. VMM provides an equally intuitive experience as DiskStation Manager, offering a reliable storage solution with robust features. You can run multiple virtual machines on your Synology NAS with operating systems including Windows, Linux and Virtual DSM. -
26
Seqrite Linux AntiVirus
Seqrite
Linux AntiVirus by Seqrite shields your Linux systems against malware. It offers real-time, on-demand and scheduled scanning, Samba Share protection, and complete web security. The software’s Advanced Device Control feature enforces complete governance over the use of removable storage devices, which helps to keep your system safe and secure. Our Linux antivirus features a user-friendly interface with comprehensive support for both 32-bit and 64-bit Linux distributions. Additionally, Seqrite Linux AntiVirus is one of the best antiviruses in the market today that offer comprehensive support to a range of Linux versions including Red Hat, Fedora, Ubuntu, Linux Mint, SUSE, CentOS, and BOSS. Our antivirus for Linux blocks phishing websites and other malicious online elements as well as restricts access to gaming and social networking websites. The Linux antivirus creates a safe ecosystem by controlling wireless and storage devices. -
27
Microsoft Identity Manager
Microsoft
Microsoft Identity Manager (MIM) builds on the identity and access management capabilities of Forefront Identity Manager and predecessor technologies. MIM provides integration with heterogeneous platforms across the datacenter, including on-premises HR systems, directories, and databases. MIM augments Azure AD cloud-hosted services by enabling the organization to have the right users in Active Directory for on-premises apps. Azure AD Connect can then make available in Azure AD for Microsoft 365 and cloud-hosted apps. Automatic identity and group provisioning based on business policy and workflow-driven provisioning. Integration of the contents of directories with HR systems and other sources of authority. Synchronizing identities between directories, databases, and on-premises applications through common APIs and protocols, Microsoft-delivered connectors, and partner-delivered connectors. -
28
SarvHost
SarvHost
SarvHost offers premium cloud virtual private server (VPS) hosting built on high-performance NVMe SSD storage with enterprise-grade DDoS protection and a 99.99% uptime guarantee, letting users deploy servers in strategic global locations including Germany, France, the Netherlands, and the USA. It gives full control with comprehensive root access so customers can choose operating systems, database versions, and software packages tailored to their needs. Servers are provisioned quickly, typically within about a minute, and support a range of OS options like Ubuntu, Debian, CentOS, AlmaLinux, Rocky Linux, Fedora, and Windows Server, with custom ISO uploads supported. It emphasizes speed, reliability, and security with redundant systems and built-in mitigation against volumetric and application-layer attacks, plus enterprise-grade hardware on all plans. Users can scale resources easily, manage backups, and rely on 24/7 expert support for deployment and maintenance.Starting Price: $5.99 per month -
29
Curity
Curity
The Curity identity server is a standards-based identity and API security platform designed to provide robust authentication and authorization for digital services. It combines identity and API security, enabling scalable customer identity and access management to accelerate digital transformation, growth, and customer loyalty. It offers a range of features, including multi-factor authentication, user journey orchestration, decentralized identity, and secure access management. It supports various identity-related standards such as OAuth, OpenID Connect, and SCIM, ensuring interoperability and compliance with industry protocols. Curity's architecture is built on the principle of separation of concerns, enhancing security, flexibility, and scalability. It provides advanced configuration management with transaction-based changes, rollbacks, and backups, accessible through a web UI, CLI, RESTCONF API, and XML config files. -
30
Visual Guard
Novalys
Visual Guard is an advanced identity and access management (IAM) tool offering a complete solution for securing sensitive applications and data. With centralized management of users and permissions, Visual Guard facilitates the implementation of robust, standards-compliant security policies. User management : Create, modify & delete user accounts Integration with LDAP or Active Directory directories Automatic synchronization of user information Access control : Precise definition of access rights to features and resources Role and Permission Management Multi-factor authentication (MFA) Single Sign-On (SSO) Security Audit and Monitoring : Permission Matrix Detailed Event log Real-time and Historical Graphs Integration & compatibility : Compatibility with major development platforms, frameworks, and protocols. .NET API Benefits : Simplified access management Enhanced data security Improved regulatory compliance Reduce identity management costStarting Price: 1.55/month/user -
31
Alibaba Cloud IDaaS
Alibaba Cloud
Alibaba Cloud Identity as a Service (IDaaS) is a cloud-based identity and access management service (IAM) covering comprehensive functions that enable user portal, user directory, flexible authentication, single sign-on, centralized authorization, and audit reporting. IDaaS plays a central role in enterprise identity management by removing ID silos and enabling one account-access-all function. IDaaS incorporates advanced security technologies that will facilitate identity management and enable enterprises to enhance their identity security to improve management efficiency. IDaaS supports all standard SSO protocols, which allows enterprises to connect to all mature enterprise services. Passwords are eliminated and security risks are reduced significantly. Users can painlessly and securely store dozens of passwords. IDaaS may serve as a bridge for other cloud platform identities to be connected to Alibaba Cloud. -
32
fpm
fpm
fpm is a tool that lets you easily create packages for Debian, Ubuntu, Fedora, CentOS, RHEL, Arch Linux, FreeBSD, macOS, and more! fpm isn’t a new packaging system, it’s a tool to help you make packages for existing systems with less effort. It does this by offering a command-line interface to allow you to create packages easily. FPM is written in ruby and can be installed using gem. For some package formats (like rpm and snap), you will need certain packages installed to build them. Some package formats require other tools to be installed on your machine to be built; especially if you are building a package for another operating system/distribution. FPM takes your program and builds packages that can be installed easily on various operating systems. It can take any nodejs package, ruby gem, or even a python package and turn it into a deb, rpm, pacman, etc. package.Starting Price: Free -
33
PrinterTux
HE Soluções
The PrinterTux is a software and management, control and ticketing of print. Compatible with the platforms Windows, Mac and Linux. Through printing reports by users, groups and printers, it is possible to raise the quantity and cost of all prints made in the company. The software allows you to implement quota control, thus reducing waste, in addition to expenses with ink, toner, paper and printer maintenance. In many companies, paper is the biggest source of waste, with the implementation of the PrinterTux Software, the reduction in paper consumption will be noticeable. Thus, your business will contribute to the environment. With Printertux, it is possible to generate print reports by users, groups, printers, to survey the quantity and cost of all prints made in the company. Reduce your printing costs, save and contribute to the environment! The Printertux print server, is a customized Linux distribution, based on Fedora. -
34
Fedora CoreOS
Fedora Project
Fedora CoreOS is an automatically-updating, minimal operating system for running containerized workloads securely and at scale. It is currently available on multiple platforms, with more coming soon. There are three Fedora CoreOS (FCOS) update streams available: stable, testing, and next. In general, you will want to use stable, but it is recommended to run some machines on testing and next as well and provide feedback. For automating Fedora CoreOS installations, it is expected that you will interact with stream metadata. While Fedora CoreOS does automatic in-place updates, it is generally a good practice to start provisioning new machines from the latest images. Fedora CoreOS does not have a separate install disk. Instead, every instance starts from a generic disk image which is customized on first boot via Ignition. Everything included is open source and free software, not only is it available at no cost to you, but you can share, remix, and modify. -
35
FortiAuthenticator
Fortinet
FortiAuthenticator provides Identity Access Management and Single Sign-On. FortiAuthenticator provides identity and access management (IAM) services to prevent breaches resulting from unauthorized users gaining access to a network or inappropriate levels of access granted to valid users. FortiAuthenticator ensures only the right person can access your sensitive resources and data at the right time. User identity information from FortiAuthenticator combined with authentication information from FortiToken and/or FIDO2 authentication ensures that only authorized individuals are granted access to your sensitive information. This additional layer of security greatly reduces the possibility of data leaks while helping companies meet audit requirements associated with government and business privacy regulations. -
36
Delinea Server Suite
Delinea
Easily consolidate complex and disparate identities for Linux and Unix within Microsoft Active Directory. Minimize the risk of a breach and reduce lateral movement with a flexible, just-in-time privilege elevation model. Advanced session recording, auditing, and compliance reporting aid forensic analysis into abuse of privilege. Centralize discovery, management, and user administration for Linux and UNIX systems to enable rapid identity consolidation into Active Directory. Privileged Access Management best practices are easy to follow with the Server Suite. The results are higher levels of identity assurance and a significantly reduced attack surface with fewer identity silos, redundant identities, and local accounts. Manage privileged user and service accounts from Windows and Linux in Active Directory. Just-in-time, fine-grained access control with RBAC and our patented Zones technology. Complete audit trail for security review, corrective action, and compliance reporting. -
37
DNF
DOCS
DNF is a software package manager that installs, updates, and removes packages on Fedora and is the successor to YUM (Yellow-Dog Updater Modified). DNF makes it easy to maintain packages by automatically checking for dependencies and determining the actions required to install packages. This method eliminates the need to manually install or update the package, and its dependencies, using the rpm command. DNF is now the default software package management tool in Fedora. Removes packages installed as dependencies that are no longer required by currently installed programs. Checks for updates, but does not download or install the packages. Provides basic information about the package including name, version, release, and description.Starting Price: Free -
38
Silverfort
Silverfort
Silverfort’s Unified Identity Protection Platform is the first to consolidate security controls across corporate networks and cloud environments to block identity-based attacks. Using innovative agentless and proxyless technology, Silverfort seamlessly integrates with all existing IAM solutions (e.g., AD, RADIUS, Azure AD, Okta, Ping, AWS IAM), extending coverage to assets that could not previously have been protected, such as legacy applications, IT infrastructure, file systems, command-line tools, and machine-to-machine access. Our platform continuously monitors all access of users and service accounts across both cloud and on-premise environments, analyzes risk in real time, and enforces adaptive authentication and access policies. -
39
Microsoft Entra Verified ID
Microsoft
Start your decentralized identity journey with Microsoft Entra Verified ID—included free with any Azure Active Directory (Azure AD) subscription. Microsoft Entra Verified ID is a managed verifiable credentials service based on open standards. Digitally validate identity information to ensure trustworthy self-service enrollment and faster onboarding. Quickly verify an individual’s credentials and status to grant least-privilege access with confidence. Replace support calls and security questions with a streamlined self-service process to verify identities. Ensure that credentials are interoperable and reusable with a solution that supports open standards. Confidently issue and verify workplace credentials, citizenship, education status, certifications, or any unique identity attributes in a global ecosystem designed for more secure interaction between people, organizations, and things. -
40
IAM Cloud
IAM Cloud
IAM Cloud’s world-leading drive management tool for cloud storage. It provides secure direct access (no sync) to OneDrive for Business, MS Teams and SharePoint Online. Great for desktop and VDI environments alike. Our simple & secure sign-on platform. Provides single sign-on (SSO), multi-factor authentication (MFA), Surp4ss! password management, and basic identity sync & provisioning from Active Directory. Everything you need from an SSO solution without the premium price. IAM Cloud is an identity company at heart. With IDx you can connect & sync identities across all kinds of systems, allowing the full automation of the Joiner, Mover and Leaver process. IDx integrates with on-prem, cloud and custom-built HR, ERP, CRM, MIS & Directory systems. Cloud-based data migrator. Supports to-the-cloud and from-cloud-to-cloud migrations for Office 365. Merge multiple Office 365 tenancies into one tenant. Split tenancies.Starting Price: $2.40 per month -
41
OneLogin
OneLogin
Secure critical company information and empower employees with OneLogin, a trusted identity and access management (IAM) solution for the modern enterprise. Designed to strengthen enterprise security while simplifying business logins, OneLogin is an excellent solution for companies looking to enforce security policies with ease. OneLogin includes top-rated features such as single sign-on (SS), unified directory, user provisioning, adaptive authentication, mobile identitiy, compliance reporting, and more. -
42
BAAR-IGA
BAAR Technologies Inc.
BAARIGA automates identity, governance, and administration for your environment. Legacy applications, mainframes, and new-age applications. BAARIGA will action new users, terminated users as well as a change to a user (e.g. designation change) in a fully automated way. This extends to the creation of an ID, and email ID as well as buying licenses. Access provisioning to applications that use the Active Directory for authentication and authorization, as well as applications that self-authenticate users. Legacy as well as new age apps. Automated user access review. BAARIGA has data collection nodes that collect access info directly from applications. Access is revoked automatically if needed. Single sign-on for legacy as well as single sign-on compliant applications. The SSO component of BAARIGA provides a secure way to ensure a user needs to have access to just one password. BAARIGA will check to see if there are users who have conflicting roles in applications. -
43
Google Cloud Identity
Google
A unified identity, access, app, and endpoint management (IAM/EMM) platform that helps IT and security teams maximize end-user efficiency, protect company data, and transition to a digital workspace. Defend your organization with the BeyondCorp security model and Google’s threat intelligence signals. Control access to SaaS apps, enforce strong multi-factor authentication (MFA) to protect user accounts, manage endpoints, and investigate threats with Security Center. Maximize efficiency by enabling intuitive user experiences on endpoint devices, and unify user, access, app, and endpoint management with a single console. Enable users to access thousands of apps with single sign-on (SSO) and manage their company accounts using the same process as their personal Google accounts. Transition to digital by integrating your existing systems on a reliable, trusted platform. Extend your on-premises directory to the cloud with Directory Sync.Starting Price: $6 per user per month -
44
Jamf Connect
Jamf
In an increasingly mobile workforce, with employees working from different locations on different devices, organizations need to be able to manage and secure those devices and their company information without the challenges of binding to on-premises Active Directory. With Jamf Connect, a user can unbox their Mac, power it on and access all of their corporate applications after signing on with a single set of cloud-identity credentials. See how cloud identity is changing Mac security and discover the vital role of Jamf Connect to facilitate the process. Download this overview to learn how Jamf Connect allows for simple provisioning of users from a cloud identity service during an Apple provisioning workflow, complete with multi-factor authentication. See the cost, time and resource savings of an identity management solution. As security and deployment needs evolve, businesses must adopt a new approach to identity as part of their enterprise strategy.Starting Price: $2 per user per month -
45
Azure-AD-External-Identities
Microsoft
Azure Active Directory External Identities, part of Microsoft Entra, provides highly secure digital experiences for partners, customers, citizens, patients, or any users outside your organization with customization controls. Combine external identities and user directories in one portal to seamlessly manage access across the organization. Give both onsite and remote employees seamless access to all their apps so they can stay productive anywhere. Automate workflows for easy user lifecycle management and provisioning. Save admin time and resources with self-service identity management for external users. Simplify access to thousands of pre-integrated software as a service (SaaS) applications with single sign-on from any location, on any device.Starting Price: $0.00325 per month -
46
CoffeeBean Identity and Access Management
CoffeeBean Technology
CoffeeBean Identity and Access Management is a comprehensive solution in the areas of IAM (Identity and Access Management) and CIAM (Customer Identity and Access Management). The different modules of this platform include Single Sign-On (SSO), Multi-Factor Authentication (MFA or 2FA), Adaptive Authentication, Directory Services, Lifecycle Management. Ask, capture and safely store information about the user’s consent during their registration process. Manage terms of the service lifecycle, prompting the user to accept new terms when necessary. Track all changes for consents, permissions and terms of service. This feature helps your business comply with regulations such as GDPR. Set up forms to gradually capture data from users in different moments of their journey (on first contact, after the nth login, coupon redeeming). With this technique, you avoid overwhelming customers with long forms during their registration process but still get the chance to progressively build their profile. -
47
Hexnode IdP
Hexnode
Hexnode IdP is an identity provider designed to help organizations manage authentication, access control, and identity governance from a centralized platform. It enables IT and security teams to verify user identities and enforce secure access to enterprise applications, devices, and resources. By combining identity verification with real-time device posture evaluation, Hexnode IdP supports a Zero Trust approach to access management. The platform includes capabilities such as single sign-on (SSO), multi-factor authentication (MFA), role-based access control (RBAC), and conditional access policies. These controls allow organizations to ensure that only authorized users on compliant devices can access sensitive systems and data. By centralizing authentication and access policies in a single console, organizations can simplify identity management while improving overall security visibility and control. -
48
ManageEngine AD360
Zoho
AD360 is an integrated identity and access management (IAM) solution for managing user identities, governing access to resources, enforcing security, and ensuring compliance. From user provisioning, self-service password management, and Active Directory change monitoring, to single sign-on (SSO) for enterprise applications, AD360 helps you perform all your IAM tasks with a simple, easy-to-use interface. AD360 provides all these functionalities for Windows Active Directory, Exchange Servers, and Office 365. With AD360, you can just choose the modules you need and start addressing IAM challenges across on-premises, cloud, and hybrid environments from within a single console. Easily provision, modify, and deprovision accounts and mailboxes for multiple users at once across AD, Exchange servers, Office 365 services, and G Suite from a single console. Use customizable user creation templates and import data from CSV to bulk provision user accounts.Starting Price: $595.00 / year -
49
OpenText Open Enterprise Server
OpenText
OpenText™ Open Enterprise Server (OES) securely delivers file, print, network, and storage management services. It combines the power of Linux for enterprise workloads with workgroup specialization to save money and enhance productivity. Manage your data on premises or in the cloud without breaking access and rights control. Manage rights and provide access to users in any of the eDirectory, Active Directory, or Azure Active Directory systems. Enhance remote worker experience with SMB2 File and Directory Leases. Access data anywhere on any device for secure file sharing with OpenText™ Filr. -
50
Fedora
Fedora
Fedora Workstation is a reliable, powerful, and easy-to-use operating system for desktop and laptop computers. It is functional for a wide range of developers, from hobbyists and students to professionals in business environments. Focus on your code with the GNOME 3 desktop environment. GNOME is developed with the needs of developers in mind and is free from unnecessary distractions, so you can focus on what really matters. Avoid the hassle of trying to find or compile the tools you need. With Fedora's comprehensive collection of open source languages, tools, and utilities, it's just a click or command away. There are even hosting projects and repositories like COPR to share your code and make builds available to the entire community.