Showing 11 open source projects for "endpoint security"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 1
    ASP.NET Minimal APIs Made Easy

    ASP.NET Minimal APIs Made Easy

    A light-weight REST API development framework for ASP.Net 6

    ...Supports policy/permission/role/claim based security. In-process pub/sub event notifications (with auto discovery). Declarative security policy building (within each endpoint). Easy Server-Sent-Events for real-time data streaming. Supports any IOC container compatible with ASP.NET. Convenient integration testing (route-less & strongly-typed). Constructor & property injection of endpoint dependencies.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    fosite

    fosite

    Extensible security first OAuth 2.0 and OpenID Connect SDK for Go

    The security first OAuth2 & OpenID Connect framework for Go. Built simple, powerful, and extensible. This library implements peer-reviewed IETF RFC6749, counterfeits weaknesses covered in peer-reviewed IETF RFC6819 and countermeasures various database attack scenarios, keeping your application safe when that hacker penetrates or leaks your database. OpenID Connect is implemented according to OpenID Connect Core 1.0 incorporating errata set 1 and includes all flows: code, implicit, and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    KrakenD

    KrakenD

    High-performance, stateless, declarative, API Gateway written in Go.

    KrakenD is more than a typical proxy that forwards clients to backend services, but a powerful engine that can transform, aggregate or remove data from your own or third party services. KrakenD also implements the Backend for Frontend and Micro-frontends patterns to eliminate the necessity of dealing with multiple REST services, isolating clients from the micro-service implementation details. KrakenD's stateless architecture and performance-first approach for every internal component beat...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    EKS Best Practices

    EKS Best Practices

    A best practices guide for day 2 operations

    The Amazon EKS Best Practices Guide is a public repository containing comprehensive documentation and guidance for operating production-grade Kubernetes clusters on AWS’s managed service, Amazon EKS. Rather than a code library, it serves as a reference catalogue of patterns, anti-patterns, checklists and architectures across domains such as security, reliability, scalability, networking, cost optimization and hybrid cloud deployments. The repository is maintained by AWS but open to contributions from the community, making it a living document that evolves as Kubernetes and AWS features evolve. Each section dives into operational details—for example, how to manage IAM roles for service accounts, secure the EKS endpoint, handle node auto-scaling, and design for multi-AZ resilience. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • 5
    DreamFactory

    DreamFactory

    DreamFactory API Management Platform

    DreamFactory can run on private, public, or hybrid cloud infrastructure. DreamFactory is easy to deploy with Docker, Kubernetes, or directly from GitHub using our automated installers. Eliminate the biggest bottleneck in modern IT. Launch your project in weeks rather than months. DreamFactory instantly creates a secure, standardized, reusable, fully documented, and live REST API. Connect Salesforce to SQL Server, or your ERP to AWS S3. Transform and mask data along the way. Create reports,...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Artillery

    Artillery

    Cloud-scale load testing. Fully serverless, test any stack

    Artillery is cloud-native, open source, and integrates with your favorite monitoring and CI/CD stack. Load test anything, at any scale. The most advanced load-testing platform in the world. Get started and run a test in minutes from your local machine. Then scale it out effortlessly. Free & open-source. Artillery scales like no other. Run your tests from your own AWS account with no infra to set up or manage. Use Playwright to load test with real browsers. Test HTTP, WebSocket, Socket.io,...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    Tyk API Gateway

    Tyk API Gateway

    Open Source API Gateway written in Go

    Tyk is an open source Enterprise API Gateway, supporting REST, GraphQL, TCP and gRPC protocols. Tyk Gateway is provided ‘Batteries-included’, with no feature lockout. Enabling your organization to control who accesses your APIs, when they access, and how they access it. Tyk Technologies uses the same API Gateway for all it’s applications. Protecting, securing, and processing APIs for thousands of organizations and businesses around the world. Ideal for Open Banking, building software...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    ESignPDF

    ESignPDF

    Sign PDF with Digital Signature Certificate

    Brought to you by parvesh88 System Requirements 1. A Computer running Windows 7 Service Pack 1 or higher 2. Java Runtime Environment (JRE) 8 or higher if JRE is not installed on your Computer, then download and install from here JRE 8 for Windows x86 -> https://www.azul.com/core-post-download/?endpoint=zulu&uuid=55abea0c-2aa5-4316-aafb-e90847f6ee21 JRE 8 for Windows x64 -> https://www.azul.com/core-post-download/?endpoint=zulu&uuid=5a34da4a-1821-4c79-a57c-7fce38d102c2 JRE 8...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 9
    EasyAuth

    EasyAuth

    Create a centralized Authentication and Authorization token server

    ...Easily secure FastAPI endpoints based on Users, Groups, Roles or Permissions with very little database usage. Centralized Auth - Single location for Users & Permissions to share across apps. Granular Endpoint Security - Verify user identity, and define explicitly who and what each user or group of users may access. Admin GUI - easy management of users, permissions, tokens, OAuth, and more! Advanced JWT - Token Based Client authorization with built-in invalidation capabilities. Google Oauth - Easy to configure google login. Integrated Login & Cookie Management - Users are not just authenticated and authorized, they are re-directed on token expiration to login pages via the cookie system and sent back to the last location afterward.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 10
    AWS Jupyter Proxy

    AWS Jupyter Proxy

    Jupyter server extension to proxy requests with AWS SigV4 authentican

    A Jupyter server extension to proxy requests with AWS SigV4 authentication. This server extension enables the usage of the AWS JavaScript/TypeScript SDK to write Jupyter frontend extensions without having to export AWS credentials to the browser. A single /awsproxy endpoint is added on the Jupyter server which receives incoming requests from the browser, uses the credentials on the server to add SigV4 authentication to the request, and then proxies the request to the actual AWS service...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    kiam

    kiam

    Integrate AWS IAM with Kubernetes

    kiam runs as an agent on each node in your Kubernetes cluster and allows cluster users to associate IAM roles with Pods. [a] role is similar to a user, in that it is an AWS identity with permission policies that determine what the identity can and cannot do in AWS. However, instead of being uniquely associated with one person, a role is intended to be assumed by anyone who needs it. Also, a role does not have any credentials (password or access keys) associated with it. Instead, if a user is...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next