Showing 205 open source projects for "security"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 1
    Spring Security

    Spring Security

    Authentication and access-control framework

    Spring Security is a powerful and highly customizable authentication and access-control framework. It is the de-facto standard for securing Spring-based applications. Spring Security is a framework that focuses on providing both authentication and authorization to Java applications. Like all Spring projects, the real power of Spring Security is found in how easily it can be extended to meet custom requirements.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Gobuster

    Gobuster

    Directory/File, DNS and VHost busting tool written in Go

    Gobuster is a tool used to brute-force. This project is born out of the necessity to have something that didn't have a fat Java GUI (console FTW), something that did not do recursive brute force, something that allowed me to brute force folders and multiple extensions at once, something that compiled to native on multiple platforms, something that was faster than an interpreted script (such as Python), and something that didn't require a runtime. Provides several modes, like the classic...
    Downloads: 60 This Week
    Last Update:
    See Project
  • 3
    truffleHog

    truffleHog

    Searches through git repositories for high entropy strings and secrets

    ...With support for custom integrations and new integrations added all the time, you can secure your secrets across your entire environment. TruffleHog is developed by a team entirely comprised of career security experts. Security is our passion and primary concern, and all features are developed with best practices in mind. TruffleHog enables you to track and manage secrets within our intuitive management interface, including links to exactly where secrets have been found. TruffleHog runs quietly in the background, continuously scanning your environment for secrets.
    Downloads: 23 This Week
    Last Update:
    See Project
  • 4
    Authelia

    Authelia

    The Single Sign-On Multi-Factor portal for web apps

    Authelia is an open-source authentication and authorization server and portal fulfilling the identity and access management (IAM) role of information security in providing multi-factor authentication and single sign-on (SSO) for your applications via a web portal. It acts as a companion for common reverse proxies. With a compressed container size smaller than 20 megabytes and observed memory usage normally under 30 megabytes, it's one of the most lightweight solutions available. Written in Go and React, authorization policies and many other backend tasks are completed in mere milliseconds and login portal loading times of 100 milliseconds makes it one of the fastest solutions available. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • North One Connected Banking Icon
    North One Connected Banking

    North One is a business banking app that integrates cash flow, payments, and budgeting to turn your North One Account into one 'Connected Bank Account

    Connect every part of your business to one bank account
    Learn More
  • 5
    ZITADEL

    ZITADEL

    Identity infrastructure, simplified for you

    ...Designed for all user types, be it consumers, businesses, or employees. Offload complex tasks by using our API as solid abstractions. Benefit from an adaptable identity infrastructure with custom code extensions and robust security defaults.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Casdoor

    Casdoor

    An open-source Identity and Access Management (IAM)

    A UI-first Identity Access Management (IAM) / Single-Sign-On (SSO) platform supporting OAuth 2.0, OIDC, SAML and CAS, integrated with Casbin RBAC and ABAC permission management. Within a few steps, we can setup a Casdoor app and realize our authorization management. Casdoor has a front-end back-end separation architecture, with maneuverable web UI and supporting high concurrency. Casdoor is supporting multi-languages, using i18n to support multi-languages UI. For more languages support,...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 7
    Keycloak

    Keycloak

    Identity and access management for modern applications and services

    Add authentication to applications and secure services with minimum fuss. No need to deal with storing users or authenticating users. It's all available out of the box. You'll even get advanced features such as User Federation, Identity Brokering and Social Login. Keycloak is an open source Identity and Access Management solution aimed at modern applications and services. It makes it easy to secure applications and services with little to no code. Users authenticate with Keycloak rather than...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 8
    Doorkeeper

    Doorkeeper

    Doorkeeper is an OAuth 2 provider for Ruby on Rails / Grape

    Doorkeeper is a gem (Rails engine) that makes it easy to introduce OAuth 2 provider functionality to your Ruby on Rails or Grape application. Doorkeeper is an oAuth2 provider built in Ruby. It integrates with Ruby on Rails and Grape frameworks. The installation process depends on the framework you're using. Doorkeeper follows Rails maintenance policy and supports only supported versions of the framework. Currently, we support Ruby on Rails 5 and higher. Extensions that are not included by...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 9
    Leapp

    Leapp

    Leapp is the DevTool to access your cloud

    ...Start your Session, and Leapp will automatically generate secure short-lived credentials for you. All sensitive data are stored in your local System Vault and used only when needed to provide best-in-class security.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Taking the Paper Out of Work Icon
    Taking the Paper Out of Work

    For organizations that need powerful ECM and document automation software

    The Square 9 AI-powered intelligent document processing platform takes the paper out of work and makes it easier to get things done with digital workflows.
    Learn More
  • 10
    MaxKey

    MaxKey

    MaxKey SSO ,Leading-Edge IAM-IDaas(Identity and Access Management)

    Maxkey Single Sign On System, which means the Maximum key, Leading-Edge IAM/IDaas Identity and Access Management product, supports OAuth 2.x/OpenID Connect, SAML 2.0, JWT, CAS, SCIM, and other standard protocols, and provide Secure, Standard and Open Identity management (IDM), Access management (AM), Single Sign On (SSO), RBAC permission management and Resource management. MaxKey focuses on performance, security, and ease of use in enterprise scenarios, is widely used in industries such as healthcare, finance, government, and manufacturing.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Step Certificates

    Step Certificates

    A private certificate authority (X.509 & SSH) & ACME server

    Open Source step-ca provides the infrastructure, automations, and workflows to securely create and operate a private certificate authority. step-ca makes it easy for developers, operators and security teams to manage certificates for production workloads. Get a public key infrastructure and certificate authority running in minutes. Automate enrollment using ACME, OIDC, one-time tokens, cloud APIs and more. Use systemD timers, daemon mode, cron jobs, CI/CD, and more to automate certificate management. Build and operate systems using secure open standards (e.g. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    Lexik JWT Authentication Bundle

    Lexik JWT Authentication Bundle

    JWT authentication for your Symfony API

    LexikJWTAuthenticationBundle is a Symfony bundle that provides JWT (JSON Web Token) authentication for RESTful APIs. It simplifies the process of generating and validating JWTs for secure user authentication. The bundle integrates seamlessly with Symfony’s security system, allowing developers to implement token-based authentication efficiently while maintaining flexibility in user management.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Kanidm

    Kanidm

    Kanidm: A simple, secure, and fast identity management platform

    Kanidm is a simple and secure identity management platform, allowing other applications and services to offload the challenge of authenticating and storing identities to Kanidm. The goal of this project is to be a complete identity provider, covering the broadest possible set of requirements and integrations. You should not need any other components (like Keycloak) when you use Kanidm - we already have everything you need. To achieve this we rely heavily on strict defaults, simple...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Central Authentication Service (CAS)

    Central Authentication Service (CAS)

    Identity & Single Sign On for all earthlings and beyond

    Welcome to the home of the Apereo Central Authentication Service project, more commonly referred to as CAS. CAS is an enterprise multilingual single sign-on solution and identity provider for the web and attempts to be a comprehensive platform for your authentication and authorization needs. CAS is an open and well-documented authentication protocol. The primary implementation of the protocol is an open-source Java server component by the same name hosted here, with support for a plethora of...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15
    CloudFoundry UAA

    CloudFoundry UAA

    CloudFoundry User Account and Authentication (UAA) Server

    The UAA is a multi tenant identity management service, used in Cloud Foundry, but also available as a stand alone OAuth2 server. Its primary role is as an OAuth2 provider, issuing tokens for client applications to use when they act on behalf of Cloud Foundry users. It can also authenticate users with their Cloud Foundry credentials, and can act as an SSO service using those credentials (or others). It has endpoints for managing user accounts and for registering OAuth2 clients, as well as...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Ockam

    Ockam

    Orchestrate end-to-end encryption, mutual authentication

    Ockam is a suite of open source tools, programming libraries, and managed cloud services to orchestrate end-to-end encryption, mutual authentication, key management, credential management, and authorization policy enforcement – at massive scale. Modern applications are distributed and have an unwieldy number of interconnections that must trustfully exchange data. To build trust for data-in-motion, applications need end-to-end guarantees of data authenticity, integrity, and confidentiality....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Traefik Forward Auth

    Traefik Forward Auth

    Forward authentication service. Google/OpenID oauth based login

    A minimal forward authentication service that provides OAuth/SSO login and authentication for the traefik reverse proxy/load balancer. Traefik prepends the namespace to the name of middleware defined via a Kubernetes resource. This is handled automatically when referencing the middleware from another resource in the same namespace (so the namespace does not need to be prepended when referenced). However, the full name, including the namespace, must be used when referenced from static...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    authentik

    authentik

    The authentication glue you need

    authentik is an open-source Identity Provider that emphasizes flexibility and versatility. It can be seamlessly integrated into existing environments to support new protocols. authentik is also a great solution for implementing sign-up, recovery, and other similar features in your application, saving you the hassle of dealing with them. authentik is an open-source Identity Provider focused on flexibility and versatility. You can use authentik in an existing environment to add support for new...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    PHP OAuth 2.0 Server

    PHP OAuth 2.0 Server

    A spec compliant, secure by default

    league/oauth2-server is a standards compliant implementation of an OAuth 2.0 authorization server written in PHP which makes working with OAuth 2.0 trivial. You can easily configure an OAuth 2.0 server to protect your API with access tokens, or allow clients to request new access tokens and refresh them. The latest version of this package supports PHP 7.2, PHP 7.3, PHP 7.4, PHP 8.0. The openssl and json extensions are also required. All HTTP messages passed to the server should be PSR-7...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    Comeonin

    Comeonin

    Password hashing specification for the Elixir programming language

    ...Its focus on practical ergonomics—clear APIs, sensible defaults, and good docs—has made it the de facto choice for password handling in Elixir. By centralizing hashing concerns, Comeonin helps teams avoid subtle security mistakes while keeping authentication code terse and testable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Guardian

    Guardian

    Elixir Authentication

    Guardian is a token based authentication library for use with Elixir applications. Guardian remains a functional system. It integrates with Plug but can be used outside of it. If you're implementing a TCP/UDP protocol directly or want to utilize your authentication via channels in Phoenix, Guardian can work for you. The core currency of authentication in Guardian is the token. By default JSON Web Tokens are supported out of the box but you can use any token that Has the concept of a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Proton Authenticator for iPhone

    Proton Authenticator for iPhone

    iOS client for Proton Authenticator

    ...The application encrypts secrets on the device and uses Proton’s encrypted sync service if enabled so that users can recover or replicate their authentication tokens across devices without compromising security. It integrates with iOS features like Face ID and Touch ID to protect access to the app and tokens, ensuring only authorized users can view or generate verification codes. The repository’s open-source nature helps security professionals and auditors inspect core logic related to cryptography and token workflow.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Proton Authenticator for Android

    Proton Authenticator for Android

    Official Android implementation of a modern two-factor authentication

    Proton Authenticator for Android is Proton’s official Android implementation of a modern two-factor authentication (2FA) app, designed to generate secure, time-based one-time passwords (TOTPs) and support multi-account authentication workflows with strong privacy and encryption features. The app enables users to link 2FA tokens for their online accounts, scan QR codes, and generate rotating verification codes that enhance login security across services that support TOTP standards. Built with native Android tooling and following modern design conventions, it integrates with Android’s notifications and system UI while maintaining local encryption of stored secrets so that authentication tokens are never exposed in plaintext outside the device. It also supports backup and encrypted sync with the associated Proton account, helping users recover 2FA codes across devices — a feature that many standalone token generators lack without risking security trade-offs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Authenticator Pro

    Authenticator Pro

    Two-Factor Authentication (2FA) client for Android + Wear OS

    ...Unlike some alternative apps, Authenticator Pro gives you control over your data. You can import from other apps and export at any time. Authenticator Pro is a community-backed open-source project which aims to provide privacy and security to users. The source-code is auditable by anyone on GitHub and released under the GPL 3.0 license. The project has no corporate ties or interests but, rather has the purpose of providing a secure and private two-factor authentication solution to the privacy-conscious. Unlike alternative user-hostile applications, Authenticator Pro does not lock-in your data or communicate with distant servers. ...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 25
    magiclinksdev

    magiclinksdev

    Transactional email magic link and One-Time Password (OTP)

    The magiclinksdev project is an authentication service for magic link and One-Time Password (OTP) use cases. There is built-in email support through Amazon SES and SendGrid.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next