Authress

Authress

Rhosys
+
+

Related Products

  • Auth0
    991 Ratings
    Visit Website
  • Frontegg
    378 Ratings
    Visit Website
  • FusionAuth
    173 Ratings
    Visit Website
  • ManageEngine ADManager Plus
    587 Ratings
    Visit Website
  • Uniqkey
    181 Ratings
    Visit Website
  • Keeper Security
    1,748 Ratings
    Visit Website
  • Graylog
    385 Ratings
    Visit Website
  • StrongDM
    96 Ratings
    Visit Website
  • Orca Security
    493 Ratings
    Visit Website
  • Paligo
    99 Ratings
    Visit Website

About

Authress, Complete Auth API for B2B. Authentication & Authorization gets complicated quickly, even if it appears easy, there is a lot of hidden complexity in authorization, you don’t want to do it on your own. It takes time to get authorization right In simple cases, it takes an average software team 840 hours to implement authorization logic. As you add features to your application, this number grows rapidly. Without expertise, you leave your door wide open to malicious attacks. You risk compromising your user data, non-compliance with local regulations, and massive business losses. * Secure authorization API--Instead of building your own authorization logic, call our API * Granular permissions--Define multiple levels of access and group them by user roles. As granular as you want * Identity Provider integrations--Plug in any of your preferred ID providers with a simple API call. * SSO and full user management

About

In today's heterogeneous IT infrastructure of companies, the most demanding task is the management of data, accounts and access authorizations of employees. The question always arises: Who is allowed to do what, when and where? Every person within a company or even external support requires selected authorizations, depending on their position or task. These should not only be available when an employee joins the company, but preferably also automatically withdrawn when an employee leaves the company. A very good IAM system ( Identity Access Management System) ensures the distribution of authorizations on the basis of conscientious role modeling and distribution, can be easily integrated into existing systems, is traceable and verifiable in terms of IT security and reduces IT expenses, for example with the help of automation of the Active Directory.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises looking for an authorization API for applications

Audience

Companies that need an identity access management solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

No images available

Pricing

$1.10 per month
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Rhosys
Founded: 2018
Switzerland
authress.io

Company Information

OEDIV SecuSys
Founded: 1998
Germany
www.secusys.de/

Alternatives

Auth0

Auth0

Okta

Alternatives

Auth0

Auth0

Okta
NdSecure

NdSecure

Ndende Technologies

Categories

Categories

Identity Management Features

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Customer Identity and Access Management (CIAM) Features

Access Certification
Access Management
Analytics / Reporting
Automatic User/Device Recognition
Behavioral Analytics
Credential Management
Data Security
Multi-Factor Authentication (MFA)
Privacy / Consent Management
Real Time Notifications
Self-Service Portal
Single Sign On
User Provisioning

Identity Management Features

Access Certification
Compliance Management
Multifactor Authentication
Password Management
Privileged Account Management
Self-Service Access Request
Single Sign On
User Activity Monitoring
User Provisioning

Integrations

AWS Amplify
Amazon EventBridge
Auth0
Facebook
GitHub
GitLab
Google
Keycloak
Okta
Ping Identity
Pulumi
Skycloak
Terraform

Integrations

AWS Amplify
Amazon EventBridge
Auth0
Facebook
GitHub
GitLab
Google
Keycloak
Okta
Ping Identity
Pulumi
Skycloak
Terraform
Claim Authress and update features and information
Claim Authress and update features and information
Claim bi-Cube Identity Access Management and update features and information
Claim bi-Cube Identity Access Management and update features and information