Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.
Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
Sign Up Free
Build Securely on Azure with Proven Frameworks
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Bringer Task Record log is a task-time tracking tool.
Bringer Task Record Log is a multi-platform application that can helps you to keep a record of time spent on each task that you do.
It can runs on major Operating Systems like Windows 2000 / XP / 7 / 2003/ 2008, in MacOS Systems 10.6 / 10.7 /10.8 and on every Linux distributions supporting some graphical engine like gnome, xfce, lxde and others.
You need the Java Virtual Machine in version 1.7.0 or above. Last version of JVM is recommended.
OpenVPM is a Virtual Project Manager providing next features:
- Organizations
- Departaments
- Groups of people
- People
- Double account budget
- Project Portfolios
- Agile management (scrum, kaban, mixed)
- Personal management & Get Things Done
- Tree typed task definition
- Dynamic definition workflows
- and lots of more usable stuff
Express is an Agile project management tool. The web application is written using Flex while server-side component is a Spring based Java EE application.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.