With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Free and Open Source HR Software
OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.
Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
An open source implementation of the FIDO2 protocol to support passwordless strong authentication using public-key cryptography. Supports registration, authentication (all platforms), and transaction authorization (for native Android apps).
EJBCA is an enterprise class PKI Certificate Authority built on JEE technology. It is a robust, high performance, platform independent, flexible, and component based CA to be used standalone or integrated in other JEE applications.
HTMF is a Java Hard Token Management Framework used to manage the complete livecycle of an organizations Smartcards and/or USB dongles. It communicates with the tokens through a PKCS11 interface.
The PHP Web Toolkit enables the rapid development of multi-layered web applications and is designed to be easy to use, extensible, reliable, reusable, scalable and secure. It integrates with ADOdb, FCKeditor, kses, Libmcrypt, Libmhash and Smarty.
Bidtracer has been built specifically for the MEP/BAC industry for both construction and service side
Bidtracer has been built specifically for the MEP/BAC industry for both construction and service side including but not limited to CRM, Bid Management, Invitation to Bid, BAC Estimating, BAC Engineering, Project Management, Service Agreement, Service Work Orders, Service Repair, Service Projects all built natively in the cloud. Estimating/Engineering are connected with live pricing to many manufacturers such as JCI, Distech Controls, ABB, Carrier, ALC and many peripheral distributors such as Kele, Alps, Belimo, Siral, Bray. If we don’t have it already, we will import it as many times throughout the year. Whether you're 2 users or 1000s our system works for all levels of business and all types of users: estimators, engineers, PMs, sales, executive, and field workers with built in rich reporting, customizable reporting, charts and graphs to help companies analyze their data in real time.
TACACS+ protocol client library and PAM module in C. This PAM module support authentication, authorization (account management) and accounting (session management)performed using TACACS+ protocol designed by Cisco.
Barada (Barada Aint Respecting Any Deceptive Adversaries) is a PAM module designed to provide two-factor authentication support. There is companion software called Gort which runs on Android devices, essentially turning your phone into a SecureID token.
The PAM module is available in the repositories for Debian based distributions.
Gort, the Android client, is available from the android market (https://play.google.com/store/apps/details?id=net.sf.crypt.gort)
This java tools design to decrypt and obtain the MS Windows Admin password from encrypted password get from Amazon EC2. It can run as standalone application or embedded as Java applet in HTML.
Contractor Foreman is the most affordable all-in-one construction management software for contractors and is trusted by contractors in more than 75 countries.
For Residential, Commercial and Public Works Contractors
Starting at $49/m for the WHOLE company, Contractor Foreman is the most affordable all-in-one construction management system for contractors. Our customers in 75+ countries and industry awards back it up. And it's all backed by a 100 day guarantee.
Identityflow provides a framework for building protocol flows that perform distributed Identity operations. Examples of Identity Operations are Single Sign-On (SSO) and Attribute queries.
You could be doing a better job of website security... If only there was a simple way to implement SSL with signed keys? PHP-CA is an easy to use and easy to administer Certificate Authority that runs in PHP.
The Password Auditing Project will be a compilation of other, previously released password auditing programs, in such a fashion as to reap the best benefits of each portion. Pulling innovations from John the Ripper, Lepton, Rainbow Tables, and more.
Odyssi PKI aims to be a complete PKI suite written in Java, and designed from the ground up with security in mind. When completed, it will be fully standards compliant with PKIX, XKMS, OCSP, and other PKI standards.
Qryptix consists of a PAM object and utilities for session- and key-management for encrypted home directories using the International Kernel (CryptoAPI) patches for Linux. It simplifies login/logout, mounting/unmounting, and key generation and changing.
OpenPortalGuard is a flexible, extensible, and massively scalable access control system for portals. It provides single-sign-on features for username/pw and smartcards as well as declarative access control.
UnityCA is a Certificate Authority "front end" based on the Community-Oriented CA (COCA) model, which was primarily developed for non-profit "free CAs." Organizational and end-user interfaces provide trusted web management of the installed CA (eg ElyCA).
Implements a simple Kerberos v5 authentication system for Java program, using RMI and Java Cryptography API. This does not provide connection to any other Kerberos implementations (so that you can get user list), but only a self-contained system.
PKCS#11 libraries for Linux, Solaris, Mac OS X, HP-UX, and others built to be used with PCSC Lite and MuscleCard Framework located at:
http://www.musclecard.com
Full Netscape support with full support for x509 certificates on on-board key generation f
pam-openvpn is a Linux PAM-module which works together with OpenVPN. With this pam-module it is possible to establish vpn connections when a user logs into a system and tear down the connection when the user logs off. This is ideal for mobile systems.