Showing 24 open source projects for "liblpsolve55.so"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Axe Credit Portal - ACP- is axefinance’s future-proof AI-driven solution to digitalize the loan process from KYC to servicing, available as a locally hosted or cloud-based software. Icon
    Axe Credit Portal - ACP- is axefinance’s future-proof AI-driven solution to digitalize the loan process from KYC to servicing, available as a locally hosted or cloud-based software.

    Banks, lending institutions

    Founded in 2004, axefinance is a global market-leading software provider focused on credit risk automation for lenders looking to provide an efficient, competitive, and seamless omnichannel financing journey for all client segments (FI, Retail, Commercial, and Corporate.)
    Learn More
  • 1
    truffleHog

    truffleHog

    Searches through git repositories for high entropy strings and secrets

    truffleHog searches through git repositories for high entropy strings and secrets, digging deep into commit history. TruffleHog runs behind the scenes to scan your environment for secrets like private keys and credentials, so you can protect your data before a breach occurs. Secrets can be found anywhere, so TruffleHog scans more than just code repositories, including SaaS and internally hosted software. With support for custom integrations and new integrations added all the time, you can secure your secrets across your entire environment. TruffleHog is developed by a team entirely comprised of career security experts. ...
    Downloads: 16 This Week
    Last Update:
    See Project
  • 2
    Gobuster

    Gobuster

    Directory/File, DNS and VHost busting tool written in Go

    Gobuster is a tool used to brute-force. This project is born out of the necessity to have something that didn't have a fat Java GUI (console FTW), something that did not do recursive brute force, something that allowed me to brute force folders and multiple extensions at once, something that compiled to native on multiple platforms, something that was faster than an interpreted script (such as Python), and something that didn't require a runtime. Provides several modes, like the classic...
    Downloads: 53 This Week
    Last Update:
    See Project
  • 3
    OpenAuth

    OpenAuth

    Universal, standards-based auth provider

    ...The goal is to remove boilerplate around sign-up/sign-in, user profiles, and authorization checks so teams can ship features faster.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Ember Simple Auth

    Ember Simple Auth

    A library for implementing authentication/authorization in Ember.js

    ...The session service is the main interface to the library. It provides methods for authenticating and invalidating the session as well as for setting and reading session data. The session store persists the session state so that it survives a page reload. It also synchronizes the session state across multiple tabs or windows of the application so that e.g. a logout in one tab or window also results in a logout in all other tabs or windows of the application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Leverage AI to Automate Medical Coding Icon
    Leverage AI to Automate Medical Coding

    Medical Coding Solution

    As a healthcare provider, you should be paid promptly for the services you provide to patients. Slow, inefficient, and error-prone manual coding keeps you from the financial peace you deserve. XpertDox’s autonomous coding solution accelerates the revenue cycle so you can focus on providing great healthcare.
    Learn More
  • 5
    Go Backend Clean Architecture

    Go Backend Clean Architecture

    A Go (Golang) Backend Clean Architecture project with Gin, MongoDB

    This repository is a production-minded Go backend starter that applies Clean Architecture to keep business logic independent from frameworks, databases, and delivery mechanisms. It organizes code into layers—domain, use cases, interfaces/adapters—so swapping an HTTP framework or database does not ripple through core logic. The template includes well-chosen scaffolding for configuration, logging, dependency injection, error handling, and request validation so teams can focus on business features. It demonstrates practical patterns for repository interfaces, DTOs, and consistent response envelopes that keep APIs predictable. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    authentik

    authentik

    The authentication glue you need

    ...It can be seamlessly integrated into existing environments to support new protocols. authentik is also a great solution for implementing sign-up, recovery, and other similar features in your application, saving you the hassle of dealing with them. authentik is an open-source Identity Provider focused on flexibility and versatility. You can use authentik in an existing environment to add support for new protocols, implement sign-up/recovery/etc. in your application so you don't have to deal with it, and many other things. You can adopt authentik to your environment, regardless of your requirements. Need an Active-Directory integrated SSO Provider? Do you want to implement a custom enrollment process for your customers? Are you developing an application and don't want to deal with User verification and recovery? ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 7
    jwt-auth

    jwt-auth

    JSON web token authentication for Laravel and Lumen

    ...You can also skip user authentication and just pass in a User object. Once a user has logged in with their credentials, then the next step would be to make a subsequent request, with the token, to retrieve the users' details, so you can show them as being logged in. To make authenticated requests via http using the built in methods, you will need to set an authorization header. If you don't like the idea of catching mulitple exceptions inline, then you are free to add a global exception handler with Laravel.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    MaxKey

    MaxKey

    MaxKey SSO ,Leading-Edge IAM-IDaas(Identity and Access Management)

    Maxkey Single Sign On System, which means the Maximum key, Leading-Edge IAM/IDaas Identity and Access Management product, supports OAuth 2.x/OpenID Connect, SAML 2.0, JWT, CAS, SCIM, and other standard protocols, and provide Secure, Standard and Open Identity management (IDM), Access management (AM), Single Sign On (SSO), RBAC permission management and Resource management. MaxKey focuses on performance, security, and ease of use in enterprise scenarios, is widely used in industries such as...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    Apache APISIX

    Apache APISIX

    The cloud-native API gateway

    Provides rich traffic management features such as load balancing, dynamic upstream, canary release, circuit breaking, authentication, observability, and more. Based on the Nginx library and etcd. Cloud-native microservices API gateway, delivering the ultimate performance, security, open source and scalable platform for all your APIs and microservices. Apache APISIX is based on Nginx and etcd. Compared with traditional API gateways, APISIX has dynamic routing and plug-in hot loading, which is...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Field Sales+ for MS Dynamics 365 and Salesforce Icon
    Field Sales+ for MS Dynamics 365 and Salesforce

    Maximize your sales performance on the go.

    Bring Dynamics 365 and Salesforce wherever you go with Resco’s solution. With powerful offline features and reliable data syncing, your team can access CRM data on mobile devices anytime, anywhere. This saves time, cuts errors, and speeds up customer visits.
    Learn More
  • 10
    2FAS Auth Browser Extension

    2FAS Auth Browser Extension

    Source code for 2FAS Auth Browser Extension

    ...Once installed in browsers like Chrome, Firefox, or others that support standard extension APIs, it can detect 2FA prompts on login forms and offer to fill or suggest one-time passwords generated by your 2FAS mobile clients or local vault, reducing friction and manual copy-paste steps. The extension communicates securely with companion mobile or desktop clients to fetch or synchronize token data, respecting encryption and privacy boundaries so that secrets are never exposed to the extension itself without user consent. It also lets users manage or view registered accounts, add new ones by scanning QR codes via companion apps, and handle token organization from within browser UI elements.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Comeonin

    Comeonin

    Password hashing specification for the Elixir programming language

    ...The library’s helpers make it straightforward to add registration and login flows that resist brute-force and side-channel attacks. Migration paths and checks are included so you can upgrade algorithms or work factors over time without breaking existing credentials. Its focus on practical ergonomics—clear APIs, sensible defaults, and good docs—has made it the de facto choice for password handling in Elixir. By centralizing hashing concerns, Comeonin helps teams avoid subtle security mistakes while keeping authentication code terse and testable.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Traefik Forward Auth

    Traefik Forward Auth

    Forward authentication service. Google/OpenID oauth based login

    ...Traefik prepends the namespace to the name of middleware defined via a Kubernetes resource. This is handled automatically when referencing the middleware from another resource in the same namespace (so the namespace does not need to be prepended when referenced). However, the full name, including the namespace, must be used when referenced from static configuration.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Authelia

    Authelia

    The Single Sign-On Multi-Factor portal for web apps

    ...Written in Go and React, authorization policies and many other backend tasks are completed in mere milliseconds and login portal loading times of 100 milliseconds makes it one of the fastest solutions available. Processors can use a lot of electricity, but when idle usage is basically so low that you can't measure it, and active usage in a small business environment being under 1% you can rest easy (with the exclusion of password hashing).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Pow

    Pow

    Robust, modular, and extendable user authentication system

    ...Pow is extremely modular and fully customizable. As your platform scales, each moving part can be modified or replaced ad-hoc. Several extensions are included in Pow so you with no effort can add secure features to your app.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Howdy For Linux

    Howdy For Linux

    Windows Hello style facial authentication for Linux

    Howdy provides Windows Hello™ style authentication for Linux. Use your built-in IR emitters and camera in combination with facial recognition to prove who you are. Using the central authentication system (PAM), works everywhere you would otherwise need your password: Login, lock screen, sudo, su, etc.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 16

    idcheck

    apache cookie SSO mechanism.

    Cookie based web authentication and single sign on system for largish intranets under a single domain where many, untrusted, people run their own web services. The server uses a private cookie scoped only for the client browser and the idcheck webserver which is always protected with SSL. In addition to the common practise of using SSL for everything (which idcheck supports). The idcheck system can also be used to provide authentication to websites where you merely want to hide content...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    passport-facebook

    passport-facebook

    Facebook authentication strategy for Passport and Node.js.

    ...It manages the redirection to Facebook’s login page, the authorization code exchange, and the retrieval of basic profile information, reducing the boilerplate developers would otherwise write to integrate with Facebook’s API manually. When used with Express and Passport, the strategy triggers redirects and callback handling automatically based on configured routes, so developers can focus on application logic like user onboarding and account linkage. The module normalizes the returned user profile into a consistent format so you can store or use profile data with minimal translation. It also handles secure token exchange and sanitization of inputs to protect against common OAuth attacks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    PLEASE GO TO https://github.com/deksai/pam_abl A PAM module that provides auto blacklisting of hosts and users responsible for repeated failed authentication attempts. Generally configured so that blacklisted users still see normal login prompts but are guaranteed to fail to authenticate.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    WPMU LDAP Plugin

    Deprecated project - see http://wordpress.org/extend/plugins/wpmuldap/

    A plugin to override the core Wordpress MU authentication method so as to use an LDAP server for authentication. This project is no longer maintained at this address. For current versions see: http://wordpress.org/extend/plugins/wpmuldap/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Event Manager for OpenLDAP is an internal LDAP event handler that can execute operations to automate tasks. It can be used as base for remote automation, Identity Management, and so on.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    JellyFish is a toolkit for persisting Java objects to LDAP. Its goals are similar to those of Java Data Objects(JDO), but it targets JNDI instead of JDBC. JellyFish has a built-in filesystem JNDI provider, so you do not need an LDAP server to try it.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Implements a simple Kerberos v5 authentication system for Java program, using RMI and Java Cryptography API. This does not provide connection to any other Kerberos implementations (so that you can get user list), but only a self-contained system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Database PAM is based on the pam_mysql project with several additional features. Features include arbitary query strings into which the username and passwords are substitued and encrypted passwords so that plain text isn't sent to the database. Currently
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    PADUA is a pure Perl based LDAP DUA. It allows you to browse and edit a LDAP directory. It\'s shell based, so you can use it remotelly via a ssh session, if needed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next