With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
AI-First Supply Chain Management
Supply chain managers, executives, and businesses seeking AI-powered solutions to optimize planning, operations, and decision-making across the supply
Logility is a market-leading provider of AI-first supply chain management solutions engineered to help organizations build sustainable digital supply chains that improve people’s lives and the world we live in. The company’s approach is designed to reimagine supply chain planning by shifting away from traditional “what happened” processes to an AI-driven strategy that combines the power of humans and machines to predict and be ready for what’s coming. Logility’s fully integrated, end-to-end platform helps clients know faster, turn uncertainty into opportunity, and transform the supply chain from a cost center to an engine for growth.
The goal of the project is to develop Role Based Access Control software which can be used in any application. The software can be deployed as a server which can cater to multiple applications. Rules can be written for fine grained access control.
OpenIdM project will develop scalable, full-featured, commercial-grade Identity Management solution, based on open standards, such as SAML, XACML, SPML, DSML and SOAP.
JSDSI is a Java implementation of the Simple Public Key Infrastructure / Simple Distributed Security Infrastructure (SPKI/SDSI). JSDSI implements a Java Cryptographic Provider for SPKI/SDSI certificates and certificate chain discovery algorithms.
GUI written in java to make configuration files for ipsec (racoon and setkey) on linux. It is intended to be as simple and intuitive as possible, but with some advanced features.
Total Network Visibility for Network Engineers and IT Managers
Network monitoring and troubleshooting is hard. TotalView makes it easy.
This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
Generate and retrieve passwords for different websites that you may register. Web based (php) for easy retrieval. Customizable with favorite user id, password length and key! Simple and safe password retriever out there! Please CHECK the Project Website.
Project Identity aims to develop an Open source Biometric Solution i.e. complete set of tools and libraries for Biometric identifiction systems.
This project has intial code done by students as their summer project at Echo IT Labs Pvt. Ltd.
The aim of this project is to provide convenient ways for a rapid development of java enterprise applications.
To achieve this goal the project provides a collection of libraries which carry out commonly used tasks and/or ease technological implications
Companies searching for an Employer of Record solution to mitigate risk and manage compliance, taxes, benefits, and payroll anywhere in the world
With G-P's industry-leading Employer of Record (EOR) and Contractor solutions, you can hire, onboard and manage teams in 180+ countries — quickly and compliantly — without setting up entities.
JEraser is a very simple but extremely effective tool to erase a file or and entire directory so that no one could recover it.
It's written in Java so you can run it on every platform.
The J-WASTE project aims at the implementation of a platform independent client/server Java implementation of the WASTE protocol. This project started as a mandatory project course in networking at the Luleĺ University of Technology in Sweden.
x:einfach simplejava components is a library for java. it includes various things like a page cache for web-content, a virtual string table, an ip subnet checker, string and date handling utilities, a connection pool and other simple things.
SACRED (Securely Available Credentials) is an IETF framework and protocol for credential portability to allow secure, authenticated access to security credentials. This project provides SACRED client and server implementations.
The Nemesis Project is designed to be a command line based, portable human
IP stack for UNIX-like and Windows systems. The suite is broken down by
protocol, and should allow for useful scripting of injected packets from
simple shell scripts.
A plattform independent encryption-tool with a simple user interface (swing/java). It uses 'Password Based Encryption' (PBE) to encrypt and/or decrpyt files on the filesystem. Encryted files will also be compressed using the zip-format.
JJPasswordSafe is a project that aims to be an open-source java password safe application to securely store many passwords on a user's computer with a single password to unlock them all. Bruce Schneier's PasswordSafe is the inspiration for JJPasswordSafe.
The goal of this project is to design and write comercial quality software and aplications with fully respect to free software (like in "free speach"). The software designed by us will target various fields: from scientific applications to multimedia an
The Aegis VM Project is an on-going effort to implement a lightweight,
secure virtual machine for executing Java bytecode. It will eventually feature a
modular architecture, Proof Linking, that supports pluggable
verification modules.
RemoteWAP gives you the ability to take control of a Linux Operating System from anywhere with a WAP enabled mobile phone. This project is being developed in Java. There is plans to support other Operating Systems such as Windows, Solaris, *BSD
Please note: not having time to complete jSai myself; I came across the ACEGI project which I now recommend instead.
jSai; a Servlet Authentication Implementation. jSai aims to allow easier to use, more powerful authentication for Java Servlets.
JSecureTunneling is a Java SSH client that is entirely oriented in the management of SSH tunnels, offering the ability to establish secure and permanent tunnels to a remote SSH server, transparently just like a simple network connection.