Showing 327 open source projects for "identity"

View related business solutions
  • A Business Plan empowers your colleagues to celebrate each other. Try Elevate, by Kudoboard, today. Icon
    Whether for special occasions, company events, or shout outs - Kudoboard allows teammates to celebrate each other for the moments that matter.
  • The Game-Changing URL Builder For Your Marketing Campaigns Icon
    The Game-Changing URL Builder For Your Marketing Campaigns

    Saves time by automating campaign conventions and UTM Link creation

    CampaignTrackly is a SaaS-based platform that automates the process of adding tracking tags to digital links. The platform enables businesses to build a centralized, consistent and standardized link-tracking strategy in a simple and cost-effective way. It removes ambiguities, simplifies processes and empowers marketers to be in control of their campaign setup and reporting process without the need to use IT code or manual operations. Its ease of use promotes consistency and high adoption rates among platform users, resulting in enhanced insights into the customer journeys and marketing budget spend, which in turn, helps businesses optimize their promotions to increase revenue streams. The platform boasts over 45 automation features across standard Google Analytics, Adobe and Custom tags, as well as, extensive tag library management capabilities, friendly reporting functions, sophisticated team access level management and more.
  • 1
    AmazonMSK AWS Identity Access Management

    AmazonMSK AWS Identity Access Management

    Use AWS Identity and (IAM) to connect to Amazon Managed Streaming

    The Amazon MSK Library for AWS Identity and Access Management enables developers to use AWS Identity and Access Management (IAM) to connect to their Amazon Managed Streaming for Apache Kafka (Amazon MSK) clusters. It allows JVM-based Apache Kafka clients to use AWS IAM for authentication and authorization against Amazon MSK clusters that have AWS IAM enabled as an authentication mechanism. This library provides a new Simple Authentication and Security Layer (SASL) mechanism called AWS_MSK_IAM...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Amazon EKS Pod Identity Webhook

    Amazon EKS Pod Identity Webhook

    Amazon EKS Pod Identity Webhook

    This webhook is for mutating pods that will require AWS IAM access. After version v0.3.0, --in-cluster=true no longer works and is deprecated. Please use --in-cluster=false and manage the cluster certificate with a cert-manager or some other external certificate provisioning system. This is because certificates using the legacy-unknown signer are no longer signed when using the v1 certificates API. Create an OIDC provider in IAM for your cluster. You can find the OIDC discovery endpoint by...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Certbot

    Certbot

    Get free HTTPS certificates forever from Let's Encrypt

    Certbot is a fully-featured, easy-to-use, extensible client for the Let's Encrypt CA. It fetches a digital certificate from Let’s Encrypt, an open certificate authority launched by the EFF, Mozilla, and others. This certificate then lets browsers verify the identity of web servers and ensures secure communication over the Web. Obtaining and maintaining a certificate is usually such a hassle, but with Certbot and Let’s Encrypt it becomes automated and hassle-free. With just a few simple...
    Downloads: 408 This Week
    Last Update:
    See Project
  • 4
    Keycloak

    Keycloak

    Identity and access management for modern applications and services

    Add authentication to applications and secure services with minimum fuss. No need to deal with storing users or authenticating users. It's all available out of the box. You'll even get advanced features such as User Federation, Identity Brokering and Social Login. Keycloak is an open source Identity and Access Management solution aimed at modern applications and services. It makes it easy to secure applications and services with little to no code. Users authenticate with Keycloak rather than...
    Downloads: 24 This Week
    Last Update:
    See Project
  • Powerful, all-in-one identity verification, fraud prevention and compliance platform. Icon
    Powerful, all-in-one identity verification, fraud prevention and compliance platform.

    For businesses needing an automated identity verification to defeat fraud while processing customers' data quickly and securely

    iDenfy protects startups, financial institutions, gambling, streaming, ridesharing, and other digital services from identity fraud using a three-layer identity verification process. The process protects businesses from the most threatening forms of identity fraud.
  • 5
    Lantern

    Lantern

    Tool to access videos, messaging, and other popular apps

    Can't access your favorite apps? Download Lantern to easily access videos, messaging, and other popular apps while at school or work. Lantern is an application that allows you to bypass firewalls to use your favorite applications and access your favorite websites. Lantern does not cooperate with any law enforcement in any country. Lantern encrypts all of your traffic to blocked sites and services to protect your data and privacy. Lantern passed multiple third party white box security audits...
    Downloads: 46 This Week
    Last Update:
    See Project
  • 6
    Pomerium

    Pomerium

    Pomerium is an identity and context-aware access proxy

    Secure, context-aware access that just works. Access internal resources securely. Implement zero trust. Achieve compliance. All without the headache of a VPN. For teams that prefer a hosted solution while keeping data governance. For organizations that need advanced scaling, access control, and governance capabilities. IT and developers need a scalable access control solution to keep users productive, happy, and secure. Pomerium uses identity and context to ensure secure access to internal...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 7
    SagerNet

    SagerNet

    The universal proxy toolchain for Android

    The universal proxy toolchain for Android, written in Kotlin. To use hysteria plugin with version smaller than 1.2.1, the highest compatible version of SagerNet is 0.8.1-rc02. The new protocol is designed to improve UDP performance and provide full replay protection. Using an MTU larger than the upstream interface will only improve speed in some scenarios and may result in UDP packet loss. According to the gfw.report et al's research, when connecting to the impacted VPSs, GFW is likely to...
    Downloads: 13 This Week
    Last Update:
    See Project
  • 8
    Harbor

    Harbor

    An open source trusted cloud native registry project that stores

    Harbor is an open-source trusted cloud native registry project that stores, signs, and scans content. Harbor extends the open-source Docker Distribution by adding the functionalities usually required by users such as security, identity and management. Having a registry closer to the build-and-run environment can improve the image transfer efficiency. Harbor supports replication of images between registries, and also offers advanced security features such as user management, access control...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 9
    saml2aws

    saml2aws

    CLI tool which enables you to login and retrieve AWS credentials

    CLI tool which enables you to log in and retrieve AWS temporary credentials using ADFS or PingFederate Identity Providers. Aside from Okta, most of the providers in this project are using screen scraping to log users into SAML, this isn't ideal and hopefully, vendors make this easier in the future.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Winningbidder.com provides free online auction software for nonprofits. Icon
    Our software is simple to use, allowing organizers to launch an auction in minutes. That doesn't mean it lacks features. Bidders enjoy max bidding, outbid notifications, and popcorn bidding.
  • 10
    Vault

    Vault

    Tool for secrets management and encryption as a service

    ... by ephemeral applications and servers, trusted sources of user and application identity, and software-based encryption. Datacenters with inherently high-trust networks with clear network perimeters. Multiple clouds and private datacenters without a clear network perimeter. Use policy to codify, protect, and automate access to secrets. Seamlessly integrate any trusted identity provider.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 11
    ASP.NET Core IdentityServer4 Identity

    ASP.NET Core IdentityServer4 Identity

    An ASP.NET Core 6.0 IdentityServer4 Identity Bootstrap 4 template

    An ASP.NET Core IdentityServer4 Identity Template with Bootstrap 4 and localization.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Google Auth Library

    Google Auth Library

    Google Auth Library for Node.js

    This is Google's officially supported node.js client library for using OAuth 2.0 authorization and authentication with Google APIs. Use Application Default Credentials when you use a single identity for all users in your application. Especially useful for applications running on Google Cloud. Application Default Credentials also support workload identity federation to access Google Cloud resources from non-Google Cloud platforms. Use JWT when you are using a single identity for all users...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    WeIdentity
    WeIdentity is a set of distributed multi-center technical solutions that can carry the credible mapping of the actual identity and chain identity of the entity object (person or thing), as well as the realization of safe access authorization and data exchange between the entity objects. WeIdentity is independently developed and fully open source by the Microbank. It adheres to the concept of public alliance chains integrating resources, exchanging value, and serving the public. It is committed...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    dex

    dex

    OpenID Connect (OIDC) identity and OAuth 2.0 provider

    Dex is an identity service that uses OpenID Connect to drive authentication for other apps. Dex acts as a portal to other identity providers through “connectors.” This lets Dex defer authentication to LDAP servers, SAML providers, or established identity providers like GitHub, Google, and Active Directory. Clients write their authentication logic once to talk to Dex, then Dex handles the protocols for a given backend. Dex acts as a portal to other identity providers through "connectors...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Prowler

    Prowler

    An open source security tool to perform AWS security assessment

    Prowler is an Open Source security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening, and forensics readiness. It contains more than 200 controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks. Prowler is a command-line tool that helps you with AWS security assessment, auditing, hardening, and incident response. It follows guidelines of the CIS Amazon Web Services...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 16
    Universal Windows Platform app samples

    Universal Windows Platform app samples

    API samples for the Universal Windows Platform.

    This repo contains the samples that demonstrate the API usage patterns for the Universal Windows Platform (UWP) in the Windows Software Development Kit (SDK) for Windows 10. These code samples were created with the Universal Windows Platform templates available in Visual Studio, and are designed to run on desktop, mobile, and future devices that support the Universal Windows Platform. If you are unfamiliar with Git and GitHub, you can download the entire collection as a ZIP file, but be sure...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 17
    Authelia

    Authelia

    The Single Sign-On Multi-Factor portal for web apps

    Authelia is an open-source authentication and authorization server and portal fulfilling the identity and access management (IAM) role of information security in providing multi-factor authentication and single sign-on (SSO) for your applications via a web portal. It acts as a companion for common reverse proxies. With a compressed container size smaller than 20 megabytes and observed memory usage normally under 30 megabytes, it's one of the most lightweight solutions available. Written in Go...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 18
    Terraform Provider for Azure

    Terraform Provider for Azure

    Terraform provider for Azure Resource Manager

    The AzureRM Terraform Provider allows managing resources within Azure Resource Manager. When using version 3.0 of the AzureRM Provider we recommend using Terraform 1.x. Whilst older versions of Terraform Core (0.12.x and later) remain compatible with v3.0 of the AzureRM Provider. The Azure Provider can be used to configure infrastructure in Microsoft Azure using the Azure Resource Manager API's. We recommend using either a Service Principal or Managed Service Identity when running Terraform non...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19
    FastTunnel

    FastTunnel

    Expose a local server to the internet

    FastTunnel is a high-performance cross-platform intranet penetration tool. With it, you can expose intranet services to the public network for yourself or anyone to access. Unlike other penetration tools, the FastTunnel project is committed to creating an easy-to-extensible and easy-to-maintain intranet penetration framework. You can build your own penetration application by referencing the nuget package of FastTunnel.Core, and target the business extension functions you need.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 20
    AspNetCore.Identity.Mongo

    AspNetCore.Identity.Mongo

    This is a MongoDB provider for the ASP.NET Core 2 Identity framework

    This is a MongoDB provider for the ASP.NET Core Identity framework. It is completely written from scratch and provides support for all Identity framework interfaces. Library supports .Net 5.0, .Net Core 3.1, .Net Core 2.1 simultaneously started from 8.3.0 nuget package.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    IAM

    IAM

    Enterprise-level Go language combat project

    IAM is an identity and access management system developed based on the Go language, which is used to authorize resource access. The latest stable version is v1.6.2, it is recommended to install and test based on the stable version. Cooperating with the geek time column " Go language project development practice ", explaining how to use Go to develop enterprise-level applications is the theoretical course of the project, including the explanation of various knowledge points and construction...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    JumpServer

    JumpServer

    Manage assets on different clouds at the same time

    The JumpServer bastion machine complies with the 4A specification of operation and maintenance security audit. Zero threshold, fast online acquisition and installation. Just a browser, the ultimate Web Terminal experience. Easily support massive concurrent access. One system manages assets on different clouds at the same time. Audit recordings are stored in the cloud and will never be lost. One system, is used by multiple subsidiaries and departments at the same time. Prevent identity fraud...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    SafeLine

    SafeLine

    Serve as a reverse proxy to protect your web services from attacks

    .... By deploying a WAF in front of a web application, a shield is placed between the web application and the Internet. While a proxy server protects a client machine’s identity by using an intermediary, a WAF is a type of reverse-proxy, protecting the server from exposure by having clients pass through the WAF before reaching the server. A WAF protects your web apps by filtering, monitoring, and blocking any malicious HTTP/S traffic traveling to the web application.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 24
    Latte

    Latte

    The safest & truly intuitive templates for PHP

    The first truly secure and intuitive templates for PHP. The most common critical vulnerability in websites is Cross-Site Scripting (XSS). It allows an attacker to insert a malicious script into a page that executes in the browser of an unsuspecting user. It can modify the page, obtain sensitive information or even steal the user's identity. Templating systems fail to defend against XSS. Latte is the only system with an effective defense, thanks to context-sensitive escaping. Latte is based...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 25
    Entity Framework 6

    Entity Framework 6

    This is the codebase for Entity Framework 6

    Entity Framework 6 (EF6) is a proven object-relational (O/RM) mapper for .NET with many years of feature development and stabilization. Like O/RM, EF6 reduces the impedance mismatch between the relational and object-oriented worlds, allowing developers to write applications that interact with data stored in relational databases with strongly typed .NET objects that represent the domain of the database. application, and eliminate the need for much of the data access "mechanical" code that you...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next