With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Cloud tools for web scraping and data extraction
Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
MACOW is a formal and scalable mandatory access implementation suitable on open worlds such as the provided on Semantic Web, Autonomic Computing and Coaltions and Federations scenarios. It is able to access control on distributed systems.
FOAFRealm (also called D-FOAF in version 2.0) is a distributed user profile management system based on FOAF. FOAFRealm is a set of tools that enables to manipulate FOAF (Friend-of-a-Friend) information within J2EE application and provides Realm implement
The Qualdev Security Server integrates the security services for the tools that support the Qualdev Group. It gives the necessary infrastructure to offer services that adjust to the necessities of Authentication, Authorization and Administration.
DREK stands for Directory REpliKator; replicates one LDAP (sub)tree into another. Replaces attributes (base DN) to match the destination tree. Generates LDIF file which can be reviewed and imported by other means, like ldapmodify.
Award-Winning Medical Office Software Designed for Your Specialty
Succeed and scale your practice with cloud-based, data-backed, AI-powered healthcare software.
RXNT is an ambulatory healthcare technology pioneer that empowers medical practices and healthcare organizations to succeed and scale through innovative, data-backed, AI-powered software.
The project consist in an open source implementation of the W3C Recommendation of the XML Key Management Specification 2.0 XKMS 2.0. It is compound of a XKMS Server and a Client API to access to the Server via Web Service.
This is a demonstration of integrating the CAPTCHA service from http://recaptcha.org with Oracle Single-Sign-On. It can be used in production OSSO deployments, and also as an example of integrating any 3rd party authentication system with OSSO.
openWallet is a single sign-on (SSO) solution for the internet. It differs from other SSO solutions (such as MS Passport) in that the user is in charge of their own data, rather that some centralized or third party repository.
Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight
Lock Down Any Resource, Anywhere, Anytime
CLEAR by Quantum Knight is a FIPS-140-3 validated encryption SDK engineered for enterprises requiring top-tier security. Offering robust post-quantum cryptography, CLEAR secures files, streaming media, databases, and networks with ease across over 30 modern platforms. Its compact design, smaller than a single smartphone image, ensures maximum efficiency and low energy consumption.
Kasai is a 100% Java based authentication and authorization framework. It allows you to integrate into your application a granular, complete and manageable permission scheme.
Lightweight Authentication Module (LAM) is a language-neutral API allowing single-sign-on to be easily implemented across diverse applications. Provides authentication via CAS or other engines, and manages sessions. Client bindings in C#, Perl, or Java.
InterStructures a Linux System Administration platform built using MMC familiar to systems administrators.It is a complete server administration platform integrating Linux and Windows servers and providing intuitive and easy point and click administratio
Heracles fought and defeated Kerberos (Greek mythology) The Heracles Framework offers an easy way to authenticate a user over Kerberos and to get user information’s from a LDAP directory.
Sigati is an web-based OpenLDAP management system. It allows to manage partitions, replicas, schemas and ACLs besides ordinary LDAP entries considering a distributed directory. The administrator need to know nothing about specific configuration files.
S/Key - OTP Generator for J2ME architecture. An RFC2289 compliant One-Time Password generator for mobile phone supporting Java language. It uses MD4 and MD5 hash algorithms.
An Eclipse plugin for browsing and editing LDAP directories. Includes: tree-based DIT-browser, entry editor, spreadsheet-like search result editor, schema browser, LDIF support and a rich LDIF editor.
OAproject implements a plataform to allow applications to interact. Apps using the platform send/receive messages through a message oriented middleware. Main features are a Single Sign On (SSO), Identity Management System (IMS) and a provisioning system
Open-VA is a project for delivering using a GPL license a fully compliant certificate and signature validation authority that can be used in a production environment to securelly validate signatures and policies.
A tool for generating objects that allow easy mapping from java to jndi/ldap data storage and integration of different data sources in a transparent data access layer.
LDAP WebService is a SOAP based layer for an LDAP server that supports the following operations:
(1) Create
(2) Update
(3) Rename
(4) Delete
(5) Move
(6) Search
A schema (DTD) has been published to define the communication (Request/Response) dialect.
InterLDAP is a middleware for identity management, completed with management tools. It is divided in subprojects, all designed for one objective: manage electronic identities, from their creation, trough their life in organization, until their deletion.
Odyssi PKI aims to be a complete PKI suite written in Java, and designed from the ground up with security in mind. When completed, it will be fully standards compliant with PKIX, XKMS, OCSP, and other PKI standards.