Search Results for "identity and access management (iam)"

Showing 48 open source projects for "identity and access management (iam)"

View related business solutions
  • Red Hat Ansible Automation Platform on Microsoft Azure Icon
    Red Hat Ansible Automation Platform on Microsoft Azure

    Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.

    Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
  • Free and Open Source HR Software Icon
    Free and Open Source HR Software

    OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.

    Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
  • 1
    IAM

    IAM

    Enterprise-level Go language combat project

    IAM is an identity and access management system developed based on the Go language, which is used to authorize resource access. The latest stable version is v1.6.2, it is recommended to install and test based on the stable version. Cooperating with the geek time column " Go language project development practice ", explaining how to use Go to develop enterprise-level applications is the theoretical course of the project, including the explanation of various knowledge points and construction...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    AmazonMSK AWS Identity Access Management

    AmazonMSK AWS Identity Access Management

    Use AWS Identity and (IAM) to connect to Amazon Managed Streaming

    The Amazon MSK Library for AWS Identity and Access Management enables developers to use AWS Identity and Access Management (IAM) to connect to their Amazon Managed Streaming for Apache Kafka (Amazon MSK) clusters. It allows JVM-based Apache Kafka clients to use AWS IAM for authentication and authorization against Amazon MSK clusters that have AWS IAM enabled as an authentication mechanism. This library provides a new Simple Authentication and Security Layer (SASL) mechanism called AWS_MSK_IAM...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Amazon EKS Pod Identity Webhook

    Amazon EKS Pod Identity Webhook

    Amazon EKS Pod Identity Webhook

    This webhook is for mutating pods that will require AWS IAM access. After version v0.3.0, --in-cluster=true no longer works and is deprecated. Please use --in-cluster=false and manage the cluster certificate with a cert-manager or some other external certificate provisioning system. This is because certificates using the legacy-unknown signer are no longer signed when using the v1 certificates API. Create an OIDC provider in IAM for your cluster. You can find the OIDC discovery endpoint...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Amazon Neptune SigV4 Signer

    Amazon Neptune SigV4 Signer

    A library for Amazon Neptune that enables AWS Signature Version

    A library for sending AWS Signature Version 4 signed requests over HTTP to Amazon Neptune. This package provides signers that can be used with various implementations of HttpRequests. AWS Identity and Access Management (IAM) is an AWS service that helps an administrator securely control access to AWS resources. IAM administrators control who can be authenticated (signed in) and authorized (have permissions) to use Neptune resources. IAM is an AWS service that you can use with no additional...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Field Service Management Software | BlueFolder Icon
    Field Service Management Software | BlueFolder

    Maximize technician productivity with intuitive field service software

    Track all your service data in one easy-to-use system, enabling your team to move faster and generate more revenue for your bottom line.
  • 5
    Keycloak

    Keycloak

    Identity and access management for modern applications and services

    Add authentication to applications and secure services with minimum fuss. No need to deal with storing users or authenticating users. It's all available out of the box. You'll even get advanced features such as User Federation, Identity Brokering and Social Login. Keycloak is an open source Identity and Access Management solution aimed at modern applications and services. It makes it easy to secure applications and services with little to no code. Users authenticate with Keycloak rather than...
    Downloads: 21 This Week
    Last Update:
    See Project
  • 6
    Casdoor

    Casdoor

    An open-source Identity and Access Management (IAM)

    A UI-first Identity Access Management (IAM) / Single-Sign-On (SSO) platform supporting OAuth 2.0, OIDC, SAML and CAS, integrated with Casbin RBAC and ABAC permission management. Within a few steps, we can setup a Casdoor app and realize our authorization management. Casdoor has a front-end back-end separation architecture, with maneuverable web UI and supporting high concurrency. Casdoor is supporting multi-languages, using i18n to support multi-languages UI. For more languages support, welcome...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Pomerium

    Pomerium

    Pomerium is an identity and context-aware access proxy

    Secure, context-aware access that just works. Access internal resources securely. Implement zero trust. Achieve compliance. All without the headache of a VPN. For teams that prefer a hosted solution while keeping data governance. For organizations that need advanced scaling, access control, and governance capabilities. IT and developers need a scalable access control solution to keep users productive, happy, and secure. Pomerium uses identity and context to ensure secure access to internal...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 8
    AWS IoT Device SDK for Python

    AWS IoT Device SDK for Python

    SDK for connecting to AWS IoT from a device using Python

    ..., performance, and security. We invite your feedback! The SDK is built on top of a modified Paho MQTT Python client library. Developers can choose from two types of connections to connect to AWS IoT. For MQTT over TLS (port 8883 and port 443), a valid certificate and a private key are required for authentication. For MQTT over the WebSocket protocol (port 443), a valid AWS Identity and Access Management (IAM) access key ID and secret access key pair are required for authentication.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    kube2iam

    kube2iam

    Provides different AWS IAM roles for pods running on Kubernetes

    ... is that in a multi-tenanted containers based world, multiple containers will be sharing the underlying nodes. Given containers will share the same underlying nodes, providing access to AWS resources via IAM roles would mean that one needs to create an IAM role which is a union of all IAM roles. This is not acceptable from a security perspective.
    Downloads: 0 This Week
    Last Update:
    See Project
  • An All-in-One EMR Exclusively for Therapy and Rehab. Icon
    An All-in-One EMR Exclusively for Therapy and Rehab.

    Electronic Medical Records Software

    Managing your therapy and rehab practice is a time-consuming process. You spend hours on paperwork, billing, scheduling, and more. Raintree’s Therapy & Rehab EHR is here to help you manage your practice more efficiently. With our all-in-one solution, you’ll get the tools you need to streamline your therapy and rehab practice, improve patient care, and get back to doing what you love.
  • 10
    AWS IoT Device SDK for Java

    AWS IoT Device SDK for Java

    Java SDK for connecting to AWS IoT from a device

    The AWS IoT Device SDK for Java enables Java developers to access the AWS IoT Platform through MQTT or MQTT over the WebSocket protocol. The SDK is built with AWS IoT device shadow support, providing access to thing shadows (sometimes referred to as device shadows) using shadow methods, including GET, UPDATE, and DELETE. It also supports a simplified shadow access model, which allows developers to exchange data with their shadows by just using getter and setter methods without having...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Vault

    Vault

    Tool for secrets management and encryption as a service

    ... by ephemeral applications and servers, trusted sources of user and application identity, and software-based encryption. Datacenters with inherently high-trust networks with clear network perimeters. Multiple clouds and private datacenters without a clear network perimeter. Use policy to codify, protect, and automate access to secrets. Seamlessly integrate any trusted identity provider.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    Prowler

    Prowler

    An open source security tool to perform AWS security assessment

    Prowler is an Open Source security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening, and forensics readiness. It contains more than 200 controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks. Prowler is a command-line tool that helps you with AWS security assessment, auditing, hardening, and incident response. It follows guidelines of the CIS Amazon Web Services...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 13
    Authelia

    Authelia

    The Single Sign-On Multi-Factor portal for web apps

    Authelia is an open-source authentication and authorization server and portal fulfilling the identity and access management (IAM) role of information security in providing multi-factor authentication and single sign-on (SSO) for your applications via a web portal. It acts as a companion for common reverse proxies. With a compressed container size smaller than 20 megabytes and observed memory usage normally under 30 megabytes, it's one of the most lightweight solutions available. Written in Go...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Harbor

    Harbor

    An open source trusted cloud native registry project that stores

    Harbor is an open-source trusted cloud native registry project that stores, signs, and scans content. Harbor extends the open-source Docker Distribution by adding the functionalities usually required by users such as security, identity and management. Having a registry closer to the build-and-run environment can improve the image transfer efficiency. Harbor supports replication of images between registries, and also offers advanced security features such as user management, access control...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 15
    ConsoleMe

    ConsoleMe

    A central control plane for AWS permissions and access

    ConsoleMe is a web service that makes AWS IAM permissions and credential management easier for end-users and cloud administrators. ConsoleMe provides numerous ways to log in to the AWS Console. An IAM Self-Service Wizard lets users request IAM permissions in plain English. Cross-account resource policies will be automatically generated and can be applied with a single click for certain resource types. Weep (ConsoleMe’s CLI) supports 5 different ways of serving AWS credentials locally. Cloud...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    WeIdentity
    WeIdentity is a set of distributed multi-center technical solutions that can carry the credible mapping of the actual identity and chain identity of the entity object (person or thing), as well as the realization of safe access authorization and data exchange between the entity objects. WeIdentity is independently developed and fully open source by the Microbank. It adheres to the concept of public alliance chains integrating resources, exchanging value, and serving the public. It is committed...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    CloudQuery

    CloudQuery

    The open-source cloud asset inventory powered by SQL

    CloudQuery extracts, transforms and loads your cloud assets into normalized PostgreSQL tables. CloudQuery enables you to assess, audit, and monitor the configurations of your cloud assets. Use standard SQL to find any asset based on any configuration or relation to other assets. Connect CloudQuery standard PostgreSQL database to your favorite BI/Visualization tool such as Grafana, QuickSight, etc. Codify your security & compliance rules with SQL as the query engine. Integrate CloudQuery with...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    JumpServer

    JumpServer

    Manage assets on different clouds at the same time

    The JumpServer bastion machine complies with the 4A specification of operation and maintenance security audit. Zero threshold, fast online acquisition and installation. Just a browser, the ultimate Web Terminal experience. Easily support massive concurrent access. One system manages assets on different clouds at the same time. Audit recordings are stored in the cloud and will never be lost. One system, is used by multiple subsidiaries and departments at the same time. Prevent identity fraud...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    Leapp

    Leapp

    Leapp is the DevTool to access your cloud

    Let Leapp manage your Cloud credentials locally. Improve your workflow with the only open-source desktop app and CLI you’ll ever need. Your all-in-one solution to assign IAM Cloud access across teams. Cloud credentials are available with a click. Data stored locally encrypted in your System Vault. Work with your Cloud Identities from a single place. Automatic temporary Cloud credentials generation and rotation. Pick your Cloud Provider to add a Leapp Session. Choose from supported access...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Infra

    Infra

    Infra provides authentication and access management to servers

    Infra provides authentication and access management to servers and Kubernetes clusters. Infra generates short-lived credentials based on identity, replacing the need for passwords and other shared secrets. Infra brings authentication and access control to servers, clusters, and databases. All credentials are created dynamically after verifying a user or machine's identity. No more shared access. Unique credentials are created for each device, user or application. Credentials generated by Infra...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    EasyAuth

    EasyAuth

    Create a centralized Authentication and Authorization token server

    Create a centralized Authentication and Authorization token server. Easily secure FastAPI endpoints based on Users, Groups, Roles or Permissions with very little database usage. Centralized Auth - Single location for Users & Permissions to share across apps. Granular Endpoint Security - Verify user identity, and define explicitly who and what each user or group of users may access. Admin GUI - easy management of users, permissions, tokens, OAuth, and more! Advanced JWT - Token Based Client...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    SigV4

    SigV4

    A SigV4 authentication plugin for the open-source DataStax Java Driver

    This package implements an authentication plugin for the open-source Datastax Java Driver for Apache Cassandra. The driver enables you to add authentication information to your API requests using the AWS Signature Version 4 Process (SigV4). Using the plugin, you can provide users and applications short-term credentials to access Amazon Keyspaces (for Apache Cassandra) using AWS Identity and Access Management (IAM) users and roles. The plugin depends on the AWS SDK for Java. It uses...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Wesh Network Toolkit

    Wesh Network Toolkit

    Async Mesh Network Protocol for Extreme Communication

    .... Efficient end-to-end encryption and perfect forward secrecy to prevent eavesdropping and provide reliable identity access management. Distributed authentication and authorization. Multiple devices per identity. Resilient p2p transmissions between groups of mutually-authorized users. Improved performance and availability with decentralized rendez-vous servers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    CloudFoundry UAA

    CloudFoundry UAA

    CloudFoundry User Account and Authentication (UAA) Server

    The UAA is a multi tenant identity management service, used in Cloud Foundry, but also available as a stand alone OAuth2 server. Its primary role is as an OAuth2 provider, issuing tokens for client applications to use when they act on behalf of Cloud Foundry users. It can also authenticate users with their Cloud Foundry credentials, and can act as an SSO service using those credentials (or others). It has endpoints for managing user accounts and for registering OAuth2 clients, as well...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    ODD SDK

    ODD SDK

    An SDK for building apps with decentralized identity and storage

    Give your users modern, passwordless accounts, without a complex and costly cloud-native back-end. Our SDK includes everything you need to enable auth through either browser standards or Ethereum wallets. WebAuthn and passkey support coming soon. Your users’ data is kept secure by default by the ODD SDK's encrypted-at-rest file storage protocol. Users have control over who has access to their private data thanks to the Privacy and Encryption features of the ODD Filesystem. ODD apps are local...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next