6 Integrations with LDAP Administrator

View a list of LDAP Administrator integrations and software that integrates with LDAP Administrator below. Compare the best LDAP Administrator integrations as well as features, ratings, user reviews, and pricing of software that integrates with LDAP Administrator. Here are the current LDAP Administrator integrations in 2026:

  • 1
    Netdata

    Netdata

    Netdata, Inc.

    The open-source observability platform everyone needs! Netdata collects metrics per second and presents them in beautiful low-latency dashboards. It is designed to run on all of your physical and virtual servers, cloud deployments, Kubernetes clusters, and edge/IoT devices, to monitor your systems, containers, and applications. It scales nicely from just a single server to thousands of servers, even in complex multi/mixed/hybrid cloud environments, and given enough disk space it can keep your metrics for years. KEY FEATURES: πŸ’₯ Collects metrics from 800+ integrations πŸ’ͺ Real-Time, Low-Latency, High-Resolution πŸ˜Άβ€πŸŒ«οΈ Unsupervised Anomaly Detection πŸ”₯ Powerful Visualization πŸ”” Out of box Alerts πŸ“– systemd Journal Logs Explorer 😎 Low Maintenance ⭐ Open and Extensible Try Netdata today and feel the pulse of your infrastructure, with high-resolution metrics, journal logs and real-time visualizations.
    Leader badge
    Starting Price: Free
  • 2
    EncryptRIGHT

    EncryptRIGHT

    Prime Factors

    EncryptRIGHT simplifies application-level data protection, delivering robust encryption, tokenization, dynamic data masking, and key management functionality, along with role-based data access controls and a data-centric security architecture, to secure sensitive data and enforce data privacy. EncryptRIGHT is architected to deploy quickly with very little integration effort and scale from a single application to thousands of applications and servers on premises or in the cloud. Our unique Data-Centric Security Architecture allows information security teams to comprehensively define an EncryptRIGHT Data Protection Policy (DPP) and to bind the policy to data itself, protecting it regardless of where the data is used, moved or stored. Programmers do not need to have cryptography expertise to protect data at the application layer – they simply configure authorized applications to call EncryptRIGHT and ask for data to be appropriately secured or unsecured in accordance with its policy.
    Starting Price: $0
  • 3
    Active Directory
    Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
    Starting Price: $1 per user per month
  • 4
    RadiantOne

    RadiantOne

    Radiant Logic

    Make identity a business enabler with a unified platform that transforms your existing infrastructure into a resource for the entire organization. RadiantOne is the cornerstone of complex identity infrastructures. Harness your identity data with intelligent integration to drive better business outcomes, improve security and compliance posture, increase speed-to-market, and more. Without RadiantOne, companies must rely on custom coding, rework, and ongoing maintenance to make new initiatives work with existing environments. Expensive solutions can’t be deployed on time or on budget, negatively impacting ROI and causing employee frustration. Identity frameworks that can’t scale waste time and resources, with employees struggling to deploy new solutions for users. Rigid, static systems can’t meet changing requirements, leading to duplicate efforts and repeated processes.
  • 5
    Xinix

    Xinix

    Xinix

    Our cloud-based hosted phone system is simple and flexible with powerful call-management features. Start a free 14-day trial today. No obligation with monthly rolling contracts. Future-proof your business. Technology has exceptionally simplified the way businesses are managed and run today. As we speak, businesses across the globe are data-driven. Most organizations can now come up with useful and effective strategies just by analyzing data on their relationship and interactions with potential and current customers. This is all possible thanks to Customer Relationship Management (CRM) tools. Manage your desk phone from anywhere remotely, be it function keys, speed dial, directory, busy lamps, etc. The best VoIP UK provider, provides you with a complete mobile device management suite, solving urgent and complex business tasks when you are away from the office. Xinix offers a comprehensive suite of unified communications (UC) services.
  • 6
    LDAP

    LDAP

    LDAP

    ​LDAP is a comprehensive resource dedicated to the Lightweight Directory Access Protocol (LDAP), a mature, flexible, and well-supported standards-based mechanism for interacting with directory servers. Often utilized for authentication and storing information about users, groups, and applications, an LDAP directory server serves as a general-purpose data store applicable in various scenarios. Provides basic information about directory services and the LDAP protocol.​ Assists in finding the appropriate directory server, client API, or LDAP-based tools suitable for different environments.​ Offers links to various standards documents and reference guides for in-depth exploration of the protocol.​ Features posts related to directory services, including software release news, new standards documents, specifications, and how-to articles.​
  • Previous
  • You're on page 1
  • Next