Showing 213 open source projects for "identity-v"

View related business solutions
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • 1
    Project V

    Project V

    A platform for building proxies to bypass network restrictions

    Project V is a set of network tools that helps you to build your own computer network. It secures your network connections and thus protects your privacy. Help you build an exclusive basic communication network. A V2Ray process can concurrently support multiple inbound and outbound protocols, and each protocol can work independently. Inbound traffic can be sent from different outlets according to the configuration. Easily implement distribution by region or domain name to achieve optimal...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 2
    NetBox

    NetBox

    The premiere source of truth powering network automation

    NetBox is the leading solution for modeling and documenting modern networks. By combining the traditional disciplines of IP address management (IPAM) and datacenter infrastructure management (DCIM) with powerful APIs and extensions, NetBox provides the ideal "source of truth" to power network automation. Available as open source software under the Apache 2.0 license, NetBox is employed by thousands of organizations around the world. Netbox is written in Python and uses the Django web...
    Downloads: 18 This Week
    Last Update:
    See Project
  • 3
    stress-ng

    stress-ng

    This is the stress-ng upstream project git repository.

    This is the stress-ng upstream project git repository. stress-ng will stress test a computer system in various selectable ways. It was designed to exercise various physical subsystems of a computer as well as the various operating system kernel interfaces. stress-ng was originally intended to make a machine work hard and trip hardware issues such as thermal overruns as well as operating system bugs that only occur when a system is being thrashed hard. Use stress-ng with caution as some of...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 4
    mailcow

    mailcow

    mailcow: dockerized

    With the Nightly Branch, it is now possible to use an external Identity Provider as an additional authentication source. mailcow utilizes the OIDC (OpenID Connect) protocol to authenticate only mailbox users. You can also get a SAL which is a one-time payment with no liabilities or returning fees. mailcow makes use of various open-source software. Please assure you agree with their license before using mailcow. Any part of mailcow itself is released under GNU General Public License, Version 3.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Translate docs, audio, and videos in real time with Google AI Icon
    Translate docs, audio, and videos in real time with Google AI

    Make your content and apps multilingual with fast, dynamic machine translation available in thousands of language pairs.

    Google Cloud’s AI-powered APIs help you translate documents, websites, apps, audio files, videos, and more at scale with best-in-class quality and enterprise-grade control and security.
  • 5
    bash-completion

    bash-completion

    Programmable completion functions for bash

    ... it from either /etc/bashrc or ~/.bashrc (or any other file sourcing those). If you don't have the package readily available for your distribution, or you simply don't want to use one, you can install bash-completion using the standard commands for GNU Autotools packages. If you find that a given function is producing errors or does not work as it should under certain circumstances when you attempt completion, try running set -x or set -v prior to attempting the completion again.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 6
    ORY Oathkeeper

    ORY Oathkeeper

    A cloud native Identity & Access Proxy / API (IAP)

    ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. The BeyondCorp Model is designed by Google and secures applications in Zero-Trust networks. An Identity & Access Proxy is typically deployed in front of (think API Gateway) web-facing applications and is capable of authenticating and optionally authorizing access requests. The Access Control Decision API can be deployed alongside an existing API Gateway...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    box86

    box86

    Linux Userspace x86 Emulator targeted at ARM Linux devices

    ... fine. (There’s a long list, among them are Undertale, A Risk of Rain, or Cook Serve Delicious.) Box64 is the 64-bit version of Box86. It is used to run x86_64 binaries on ARM64 (i.e. aarch64) Linux. It can also run on RiSC-V and Loongarch machines.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8
    Unicorn Engine

    Unicorn Engine

    Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc

    Unicorn is a lightweight multi-platform, multi-architecture CPU emulator framework. Highlight features. Multi-architectures: ARM, ARM64 (ARMv8), m68k, MIPS, PowerPC, RISC-V, S390x (SystemZ), SPARC, TriCore & x86 (include x86_64). Clean/simple/lightweight/intuitive architecture-neutral API. Implemented in pure C language, with bindings for Pharo, Crystal, Clojure, Visual Basic, Perl, Rust, Haskell, Ruby, Python, Java, Go, D, Lua, JavaScript, .NET, Delphi/Pascal & MSVC available. Native support...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    Google Auth Library

    Google Auth Library

    Google Auth Library for Node.js

    This is Google's officially supported node.js client library for using OAuth 2.0 authorization and authentication with Google APIs. Use Application Default Credentials when you use a single identity for all users in your application. Especially useful for applications running on Google Cloud. Application Default Credentials also support workload identity federation to access Google Cloud resources from non-Google Cloud platforms. Use JWT when you are using a single identity for all users...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Tigerpaw One | Business Automation Software for SMBs Icon
    Tigerpaw One | Business Automation Software for SMBs

    Fed up with not having the time, money and resources to grow your business?

    The only software you need to increase cash flow, optimize resource utilization, and take control of your assets and inventory.
  • 10
    NanoKVM

    NanoKVM

    Affordable, Multifunctional, Nano RISC-V IP-KVM

    Lichee NanoKVM is an IP-KVM product based on LicheeRV Nano, inheriting the extreme size and powerful features of LicheeRV Nano. The Lichee NanoKVM is available in two versions: NanoKVM Lite is a basic configuration that is suitable for individual users with certain DIY capabilities and enterprise users with bulk requirements. The NanoKVM Full is a full version with a sophisticated case and complete accessories, as well as a built-in system mirror card that is ready to use at boot, and is...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    VVV

    VVV

    An open source Vagrant configuration for developing with WordPress

    ... for building and distributing development environments”. It works with virtualization software such as VirtualBox to provide a virtual machine sandboxed from your local environment. In addition to VirtualBox, provider support is also included for Parallels, Hyper-V, VMWare Fusion, and VMWare Workstation.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    authentik

    authentik

    The authentication glue you need

    authentik is an open-source Identity Provider that emphasizes flexibility and versatility. It can be seamlessly integrated into existing environments to support new protocols. authentik is also a great solution for implementing sign-up, recovery, and other similar features in your application, saving you the hassle of dealing with them. authentik is an open-source Identity Provider focused on flexibility and versatility. You can use authentik in an existing environment to add support for new...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Infra

    Infra

    Infra provides authentication and access management to servers

    Infra provides authentication and access management to servers and Kubernetes clusters. Infra generates short-lived credentials based on identity, replacing the need for passwords and other shared secrets. Infra brings authentication and access control to servers, clusters, and databases. All credentials are created dynamically after verifying a user or machine's identity. No more shared access. Unique credentials are created for each device, user or application. Credentials generated by Infra...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Authelia

    Authelia

    The Single Sign-On Multi-Factor portal for web apps

    Authelia is an open-source authentication and authorization server and portal fulfilling the identity and access management (IAM) role of information security in providing multi-factor authentication and single sign-on (SSO) for your applications via a web portal. It acts as a companion for common reverse proxies. With a compressed container size smaller than 20 megabytes and observed memory usage normally under 30 megabytes, it's one of the most lightweight solutions available. Written in Go...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Amazon Neptune SigV4 Signer

    Amazon Neptune SigV4 Signer

    A library for Amazon Neptune that enables AWS Signature Version

    A library for sending AWS Signature Version 4 signed requests over HTTP to Amazon Neptune. This package provides signers that can be used with various implementations of HttpRequests. AWS Identity and Access Management (IAM) is an AWS service that helps an administrator securely control access to AWS resources. IAM administrators control who can be authenticated (signed in) and authorized (have permissions) to use Neptune resources. IAM is an AWS service that you can use with no additional...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Cilium

    Cilium

    eBPF-based networking, security, and observability

    Cilium is open-source software for providing, securing and observing network connectivity between container workloads, cloud-native, and fueled by the revolutionary Kernel technology eBPF. Kubernetes doesn't come with an implementation of Load Balancing. This is usually left as an exercise for your cloud provider or in private cloud environments an exercise for your networking team. Cilium can attract this traffic with BGP and accelerate leveraging XDP and eBPF. Together these technologies...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    SafeLine

    SafeLine

    Serve as a reverse proxy to protect your web services from attacks

    .... By deploying a WAF in front of a web application, a shield is placed between the web application and the Internet. While a proxy server protects a client machine’s identity by using an intermediary, a WAF is a type of reverse-proxy, protecting the server from exposure by having clients pass through the WAF before reaching the server. A WAF protects your web apps by filtering, monitoring, and blocking any malicious HTTP/S traffic traveling to the web application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Deckhouse

    Deckhouse

    Kubernetes platform from Flant

    ... component privileges, pre-configured role model, end-to-end object identity in the audit system, and integration with external directory services. Built-in implementation of Pod Security Standards and a ready-to-use, extensible set of recommended policies. Deckhouse automates many routine deployment, scaling, and infrastructure management operations out of the box. It manages system software on the nodes (kernel, CRI, kubelet), basic Kubernetes components (control plane, etc, certificates, etc.).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    AWS IoT Device SDK for Java

    AWS IoT Device SDK for Java

    Java SDK for connecting to AWS IoT from a device

    The AWS IoT Device SDK for Java enables Java developers to access the AWS IoT Platform through MQTT or MQTT over the WebSocket protocol. The SDK is built with AWS IoT device shadow support, providing access to thing shadows (sometimes referred to as device shadows) using shadow methods, including GET, UPDATE, and DELETE. It also supports a simplified shadow access model, which allows developers to exchange data with their shadows by just using getter and setter methods without having to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    AWS IoT Device SDK for Python

    AWS IoT Device SDK for Python

    SDK for connecting to AWS IoT from a device using Python

    ..., performance, and security. We invite your feedback! The SDK is built on top of a modified Paho MQTT Python client library. Developers can choose from two types of connections to connect to AWS IoT. For MQTT over TLS (port 8883 and port 443), a valid certificate and a private key are required for authentication. For MQTT over the WebSocket protocol (port 443), a valid AWS Identity and Access Management (IAM) access key ID and secret access key pair are required for authentication.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Kubernetes Dashboard

    Kubernetes Dashboard

    General-purpose web UI for Kubernetes clusters

    Kubernetes Dashboard is a general purpose, web-based UI for Kubernetes clusters. It allows users to manage applications running in the cluster and troubleshoot them, as well as manage the cluster itself. To access Dashboard from your local workstation you must create a secure channel to your Kubernetes cluster. Kubeconfig Authentication method does not support external identity providers or certificate-based authentication. Metrics-Server has to be running in the cluster for the metrics...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Go Micro

    Go Micro

    A framework for distributed systems development

    Go Micro is a framework for distributed systems development. Go Micro provides the core requirements for distributed systems development including RPC and Event driven communication. The Micro philosophy is sane defaults with a pluggable architecture. We provide defaults to get you started quickly but everything can be easily swapped out. Auth is built in as a first class citizen. Authentication and authorization enable secure zero trust networking by providing every service an identity...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    OpenPrinting cups-browsed

    OpenPrinting cups-browsed

    CUPS is a standards-based, open-source printing system

    CUPS is a standards-based, open-source printing system used by Apple's Mac OS® and other UNIX®-like operating systems, especially also Linux. CUPS uses the Internet Printing Protocol ("IPP") and provides System V and Berkeley command-line interfaces, a web interface, and a C API to manage printers and print jobs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    SigV4

    SigV4

    A SigV4 authentication plugin for the open-source DataStax Java Driver

    This package implements an authentication plugin for the open-source Datastax Java Driver for Apache Cassandra. The driver enables you to add authentication information to your API requests using the AWS Signature Version 4 Process (SigV4). Using the plugin, you can provide users and applications short-term credentials to access Amazon Keyspaces (for Apache Cassandra) using AWS Identity and Access Management (IAM) users and roles. The plugin depends on the AWS SDK for Java. It uses...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    GTA V PVP MACRO

    GTA V PVP MACRO

    You will be invincible in PVPs. Free GTA V PVP macro.

    If you want to be invincible in GTA PVPs this program is for you. Free forever, no need to optimize. Just open the program click 1 from numpad and start beating your enemies. This program made by: HorizonPublish
    Downloads: 4 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next