Showing 5 open source projects for "authentication"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 1
    Pomerium

    Pomerium

    Pomerium is an identity and context-aware access proxy

    ...IT and developers need a scalable access control solution to keep users productive, happy, and secure. Pomerium uses identity and context to ensure secure access to internal applications, servers, and infrastructure even from untrusted networks. Pomerium adds authentication and authorization to any application or server, giving IT Management a centralized panel for organization-wide control. Assert compliance in your current architecture without giving up control over data tenancy. Pomerium supports your infrastructure and can be deployed in all environments: cloud, hybrid, or on-prem. From AWS to Kubernetes and more, your internal and 3rd-party apps are covered.
    Downloads: 45 This Week
    Last Update:
    See Project
  • 2
    OpenVPN

    OpenVPN

    Robust and flexible VPN network tunnelling

    OpenVPN is a robust and highly flexible tunneling application that uses all of the encryption, authentication, and certification features of the OpenSSL library to securely tunnel IP networks over a single TCP/UDP port. Discussion forums and project wiki can be found here: https://forums.openvpn.net/ http://community.openvpn.net/openvpn
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Trojan

    Trojan

    An unidentifiable mechanism that helps you bypass GFW

    Trojan is a lightweight C++ tool using the Trojan-GFW protocol, which masquerades proxy traffic as HTTPS to evade censorship. It supports forward and reverse proxy modes, password-based authentication, TLS encryption, IPv6, WebSocket transports, multiple connections, and DNS over HTTPS, and is compliant with RFC standards. Used primarily for bypassing network restrictions.
    Downloads: 37 This Week
    Last Update:
    See Project
  • 4
    VPN solution which is portable on all TCP/IP stacks with or without OS. VPN client's size starts from 16kb to 100 kb (depends on encryption size). Uses modified GSM authentication with arbitrary encryption (None, Blowfish 32, Blowfish 64, AES .).
    Downloads: 1 This Week
    Last Update:
    See Project
  • Train ML Models With SQL You Already Know Icon
    Train ML Models With SQL You Already Know

    BigQuery automates data prep, analysis, and predictions with built-in AI assistance.

    Build and deploy ML models using familiar SQL. Automate data prep with built-in Gemini. Query 1 TB and store 10 GB free monthly.
    Try Free
  • 5
    Extremely simple VPN designed to be used for 'pinch' situations requiring a VPN 'now', without fiddling with encryption keys, compression settings, and authentication. Not designed for permanent use.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB