With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
The complete IT asset and license management platform
Gain full visibility and control over your IT assets, licenses, usage and spend in one place with Setyl.
The platform seamlessly integrates with 100+ IT systems, including MDM, RMM, IDP, SSO, HR, finance, helpdesk tools, and more.
The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.
SAM Jr provides real-time analysis of Snort data. SAM Jr is written in Java and should run anywhere a modern JVM is available. SAM Jr will be extendable via plugins so that custom actions can be written easily.
This site is intended as a location containing a suite of tools to (1) Aid in the design of db APIs to be utilized in a J2EE environment and (2) generate stubs for the db API, Java classes and SQL DDL necessary to support the MVC pattern and the Data Own
As a healthcare provider, you should be paid promptly for the services you provide to patients. Slow, inefficient, and error-prone manual coding keeps you from the financial peace you deserve. XpertDox’s autonomous coding solution accelerates the revenue cycle so you can focus on providing great healthcare.
GridAuth is a user credential management system for distributed data and computational grids. GridAuth is configurable and extensible to just about any system requiring credential management, advanced authorization and secure authentication.
Being that Sun\'s Java Cryptography Extension (JCE) is not well-documented and has a steep learning curve, the vH Crypto API for Java is being created to abstract the procedures which are commonly used in cryptography.
Provides efficient, effective implementations of 32- and 64-bit hash functions based on Rabin fingerprints / irreducible polynomials, in Java. Also provides integration with java.security.MessageDigest API.
This library extends SUN's JavaMail API by an PGPMime framework. It acts as a middleware layer between a cryptography provider like GnuPG or Cryptix OpenPGP Provider and JavaMail.
Companies searching for an Employer of Record solution to mitigate risk and manage compliance, taxes, benefits, and payroll anywhere in the world
With G-P's industry-leading Employer of Record (EOR) and Contractor solutions, you can hire, onboard and manage teams in 180+ countries — quickly and compliantly — without setting up entities.
Development of an abstract API for easily building access control programs. The main program which will be built upon this API will serve as an access controller to the University of Brasilia InfoLab.
Distributed Syslog collector and viewer system with reliable Syslog msgs over tcp, and query with reg ex. using PERL. Supports IETF syslog and syslog relay, JAVA/JINI based, uses postgreSQL, JBOSS. Chain of custody raw to db data link. UTF8, D, F , UK
The purpose of SNX is to have a modular series of components that report back to a central repository and 'AI' for pattern recognition and anomoly detection. This is to help with IDS systems, and to move to the next generation of security.
The Filters project team are building API's which will filter malicious input to applications that is used to launch various attacks. The filters will sanitize input rendering it harmless and detect specific attacks. This project will develop imple
This project will convert the RSA Ace/Agent Authentication API 5.0.1 into JAVAAPI by using JNI Interface.
Currently RSA doesn\\\\\\\'t provide any JavaAPI.
Java Access control list library.
Pow2ACL is a package useful to keep track of application users roles and permissions.
User can be authenticated:
- directly using the package API;
- using custom JSP tag libraries;
An API and test suite, or possibly an application unto itself, to manage keys and allow mail user agents (such as pine or mutt) to use encryption and authentication systems (such as S/MIME) via the services of external encryption suites (such as OpenSSL)
Most of the projects needs data to be securely transfered across the network. Despite of lot of open source API, developer still feels that implementing PKI in the application is tough. This API helps to easily incorporate PKI for JAVA application
Aigebi Rbac a token driven role-based access control engine. It's pure java product. The core rbac engine is deployed as jar. It provides both javaAPI and custom jsp tags. Admin portal is provided to manage rbac data and showcase how to use rbac engine
One of the project groups in Intake 6 is planning on doing a IM client which is secure. This includes messenging, file sending, picture drawing, video transmissions by far.
Web-based IT-Security evaluation tool targeted at small- and medium-sized companies, based on the Austrian IT-Sicherheitshandbuch, ISO 27001, and other IT-security standards.