Showing 23 open source projects for "using"

View related business solutions
  • Vibes don’t ship, Retool does Icon
    Vibes don’t ship, Retool does

    Start from a prompt and build production-ready apps on your data—with security, permissions, and compliance built in.

    Vibe coding tools create cool demos, but Retool helps you build software your company can actually use. Generate internal apps that connect directly to your data—deployed in your cloud with enterprise security from day one. Build dashboards, admin panels, and workflows with granular permissions already in place. Stop prototyping and ship on a platform that actually passes security review.
    Build apps that ship
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 1
    Middleware for Existing SSH Hosts (Mesh)

    Middleware for Existing SSH Hosts (Mesh)

    Fine-grained authorizations and single sign-on for SSH remote commands

    Mesh is a secure, lightweight grid middleware that is based on the addition of a single sign-on capability to the built-in public key authentication mechanism of SSH using system call interposition.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    The LDAP proxy is designed to be the part of the email encryption infrastructure which would simplify finding and using public encryption keys contained in X.509 public certificates.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    idcheck

    apache cookie SSO mechanism.

    ...The server uses a private cookie scoped only for the client browser and the idcheck webserver which is always protected with SSL. In addition to the common practise of using SSL for everything (which idcheck supports). The idcheck system can also be used to provide authentication to websites where you merely want to hide content from various people. For example, an intranet whose contents are available to thousands of people. This is, in fact, its main advantage and feature. Please check the wiki pages for more info (link above). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    TACACS+ protocol client library and PAM module in C. This PAM module support authentication, authorization (account management) and accounting (session management)performed using TACACS+ protocol designed by Cisco.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5

    mysql-auth_ldap

    Add LDAP user authentication in MySQL

    mysql auth_ldap is an authentication plugin for the MySQL server. It allows you to create SQL users that are going to be authenticated using a LDAP server. This allows to minimize administrative duties, since your users will be able to reuse their existing account to access the database. The plugin requires MySQL 5.5.7 and up. It is compiled as an add on and does not require you to alter MySQL source code, or recompile the entire server. The plugin add support for LDAP using the openLDAP library.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    nss_db

    Berkeley DB NSS module

    ...The Berkeley DB NSS module provides an alternative means for storing configuration information traditionally kept in several plain-text files in /etc (e.g. /etc/passwd). The module uses the Berkeley DB Library to store this information in several database files in /var/db (e.g. /var/db/passwd.db). Using these databases can lead to a considerable speed-up if the files in /etc are large (e.g. on a system with a lot of accounts). The databases may also be used as a local cache for network accounts, or as a means to supplement or override UIDs, GIDs, home directories etc. provided by network accounts.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Unlike most LDAP authentication solutions this module integrates into Jabberd14 server using its module API (JSM). It consists of two parts - module itself and XDB helper. This module supports versions 1.4 and 1.6 of jabberd.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    WebToken is a cryptographic system to authenticate users through a 2FA (Two-Factor Authentication) using OTP (One Time Password).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A configurable system for synchronising multiple passwords of different types. Password quality can be imposed by using histories, cracklib based tests, and forcing certain passwords to be distinct. CGI and PAM modules exist for tight integration.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Dun and Bradstreet Risk Analytics - Supplier Intelligence Icon
    Dun and Bradstreet Risk Analytics - Supplier Intelligence

    Use an AI-powered solution for supply and compliance teams who want to mitigate costly supplier risks intelligently.

    Risk, procurement, and compliance teams across the globe are under pressure to deal with geopolitical and business risks. Third-party risk exposure is impacted by rapidly scaling complexity in domestic and cross-border businesses, along with complicated and diverse regulations. It is extremely important for companies to proactively manage their third-party relationships. An AI-powered solution to mitigate and monitor counterparty risks on a continuous basis, this cutting-edge platform is powered by D&B’s Data Cloud with 520M+ Global Business Records and 2B+ yearly updates for third-party risk insights. With high-risk procurement alerts and multibillion match points, D&B Risk Analytics leverages best-in-class risk data to help drive informed decisions. Perform quick and comprehensive screening, using intelligent workflows. Receive ongoing alerts of key business indicators and disruptions.
    Learn More
  • 10
    The Authen::Krb5::Simple Perl module provides a means to authenticate a user/password using Kerberose 5.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    InterStructures a Linux System Administration platform built using MMC familiar to systems administrators.It is a complete server administration platform integrating Linux and Windows servers and providing intuitive and easy point and click administratio
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    PAM module to authenticate using a SQLite database. This module lets you authenticate users against a table in a SQLite database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Java bridge (bindings, interface) to PAM. JAAS login module using PAM for authentication.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    An OpenVPN plugin to do authentication using the local shadow or passwd files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    This module is aimed at environments with SMB (Samba or Windows NT) or NCP (Netware or Mars-NWE) servers that Unix users wish to access transparently. The module also supports mounting home directories using loopback encrypted filesystems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    XAD is a Linux-PAM module used for authentication. The great thing about this module is that is very easy to configure using a simple language.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Qryptix consists of a PAM object and utilities for session- and key-management for encrypted home directories using the International Kernel (CryptoAPI) patches for Linux. It simplifies login/logout, mounting/unmounting, and key generation and changing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    PAM module that spawns a ssh-agent and adds identities using the password supplied at login.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    CPU is meant to be a swiss army knife for administrators who are currently using or wanting to use an LDAP backend for user authentication. This project allows for easy user administration of LDAP users and allows for user and group mods, deletes and add
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    pam_krb5 is designed to allow smooth integration of Kerberos 5 passwordchecking with applications built using PAM. It also supports session-specific ticket files (which are neater), Kerberos IV ticket file grabbing, and AFS token-grabbing.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21
    mod_auth_ibmdb2 is an Apache module written in C. It provides authentication and group authorization using data stored in an IBM DB2 database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    PDApass is a one time password authentication system, designed using a Palm Pilot as a password generator, with a PAM module to allow there server to perform the authentication.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Secure local and Network based authentication using pluggable backends which provide authentication and user/groupnames, uidmappings, tokensupport and the lot.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next