Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
Try Auth0 for Free
Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure
Native application identity and user-based security for your Azure cloud
Gain integrated visibility across all traffic in a single pass. Deploy Palo Alto Networks VM-Series to determine application identity and content while automating security policy updates via rich APIs.
Rel is a database management system (DBMS) that implements Tutorial D.
Rel is a DBMS primarily intended for educational purposes, but also suitable as a desktop DBMS or lightweight server, that implements Date and Darwen's "Tutorial D" true relational database language.
Source code is available at https://github.com/DaveVoorhis/Rel
Avicenna is an application for visualizing location data stored in excel or .csv table files on a map or in a table view. It provides several export functions (such as single pictures, database dumps and even a HTML-export that enables you to use Avicenna on your website).
It was developed as part of the course "Techniken der Projektentwicklung" in summer semester 2012 at the University of Bielefeld by Team 2 and is licensed under the GNU Affero General Public License version 3.
This...
MighTyD is a prototype for demo puposes & the first implementation of the temporal database model devised by Nikos Lorentzos, Hugh Darwen & CJ Date. It uses Tutorial D as its language & PostgreSQL for storage & is compliant with the The Third Manifesto.
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
Tk Tutorial: programs and (terse) notes on the Tk GUI toolkit, using Perl/Tk. Learn about references and anonymous arrays by using them. Use templates to build GUIs with menus, buttons, etc. Includes tips on tools, development.