Alternatives to Keycard

Compare Keycard alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Keycard in 2026. Compare features, ratings, user reviews, pricing, and more from Keycard competitors and alternatives in order to make an informed decision for your business.

  • 1
    Frontegg

    Frontegg

    Frontegg

    Frontegg is a Customer Identity and Access Management (CIAM) platform that simplifies authentication, authorization, and user management for SaaS companies. It enables developers to implement advanced identity features quickly, then shift ongoing administration to other teams. With Frontegg, Product, Infosec, and Customer Success teams can take control of key identity tasks like managing user roles, enforcing security policies, and handling customer requests, all without engineering support. Developers reduce toil and regain focus on core product work, while stakeholders move faster without bottlenecks. Frontegg supports modern identity features including SSO, MFA, role-based access control, entitlements, multi-tenancy, and audit logs. Its low-code platform integrates in days and provides a user-friendly admin portal that bridges technical and non-technical teams. Frontegg increases operational efficiency, improves security posture, and enhances the customer experience.
    Leader badge
    Compare vs. Keycard View Software
    Visit Website
  • 2
    Auth0

    Auth0

    Okta

    Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO.
    Leader badge
    Compare vs. Keycard View Software
    Visit Website
  • 3
    Cisco Duo
    Cisco Duo is a cloud-based identity security solution that protects organizations from identity-based threats and boosts workforce productivity. Trusted by over 40,000 organizations worldwide, Duo delivers an exceptional access management experience across all users, devices, and applications, making access to resources secure, seamless, and easy. Duo with Cisco Identity Intelligence provides deep visibility across your identity ecosystem, adding a powerful security layer to any identity infrastructure. Offer users a world-class access experience through Duo Passport to eliminate MFA friction and fatigue without sacrificing security. To stop threats, Duo verifies user identities with strong authenticators including Duo passwordless, Verified Duo Push with number matching, and phishing-resistant factors like biometrics and FIDO2 security keys. Paired with deep insights into users’ devices, Duo gives you the control to adaptively limit access based on device health or user risk.
    Leader badge
    Starting Price: $3 per user per month
  • 4
    SailPoint

    SailPoint

    SailPoint Technologies

    You can’t do business without technology and you can’t securely access technology without identity security. In today’s era of “work from anywhere”, managing and governing access for every digital identity is critical to the protection of your business and the data that it runs on. Only SailPoint Identity Security can help you enable your business and manage the cyber risk associated with the explosion of technology access in the cloud enterprise – ensuring each worker has the right access to do their job – no more, no less. Gain unmatched visibility and intelligence while automating and accelerating the management of all user identities, entitlements, systems, data and cloud services. Automate, manage and govern access in real-time, with AI-enhanced visibility and controls. Enable business to run with speed, security and scale in a cloud-critical, threat-intensive world.
  • 5
    Microsoft Entra ID
    Microsoft Entra ID (formerly known as Azure Active Directory) is a comprehensive identity and access management cloud solution that combines core directory services, application access management, and advanced identity protection. Safeguard your organization with a cloud identity and access management solution that connects employees, customers, and partners to their apps, devices, and data. Protect access to resources and data using strong authentication and risk-based adaptive access policies without compromising user experience. Provide a fast, easy sign-in experience across your multicloud environment to keep your users productive, reduce time managing passwords, and increase productivity. Manage all your identities and access to all your applications in a central location, whether they’re in the cloud or on-premises, to improve visibility and control.
  • 6
    JumpCloud

    JumpCloud

    JumpCloud

    JumpCloud® delivers a unified open directory platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform. Everything in One Platform Grant users Secure, Frictionless Access™ to everything they need to do their work however they choose. Manage it all in one unified view. Cross-OS Device Management Manage Windows, macOS, Linux, iOS, iPad, and Android devices. One Identity for Everything Connect users to thousands of resources with one set of secure credentials. Comprehensive Security Enforce device policies, patches, MFA, and other security and compliance measures. Automated Workflows Connect to whatever resources you need, including Microsoft Active Directory, Google Workspace, HRIS platforms, and more.
  • 7
    Token Security

    Token Security

    Token Security

    Token Security accelerates secure enterprise adoption of Agentic AI by discovering, managing, and governing every AI agent and non-human identity across the organization. From continuous visibility to least-privilege enforcement and lifecycle management, Token Security provides complete control over AI and machine identities, eliminating blind spots, reducing risk, and ensuring compliance at scale.
  • 8
    Defakto

    Defakto

    Defakto

    Defakto secures every automated interaction by issuing short-lived, verifiable identities to non-human actors such as services, pipelines, AI agents, and machines, eliminating static credentials, API keys, and standing privileges. Their unified non-human identity and access management solution enables discovery of unmanaged identities across cloud, on-premises, and hybrid environments, issu­ance of dynamic identities at runtime tied to policy, enforcement of least-privilege access, and full audit-ready logging. The product consists of modules; Ledger for continuous discovery and governance of non-human identities; Mint for automated issuance of purpose-bound, ephemeral identities; Ship for secretless CI/CD workflows where hard-coded credentials are removed; Trim for automatic right-sizing of access and removal of over-privileged service accounts; and Mind for securing AI agents and large-language models with the same identity model used for workloads.
  • 9
    Aembit

    Aembit

    Aembit

    Replace manual and insecure access to non-human identities with our automated and secretless Workload IAM platform. Manage your workload-to-workload access like you do your users: with automated, policy-based and identity-driven controls, so you can proactively eliminate the risk of non-human identities. Aembit boosts security by cryptographically verifying workload identities, in real time, ensuring that only trusted workloads have access to your sensitive data. Aembit injects short-lived credentials into requests just-in-time so you never have to store or protect secrets. Dynamically enforce access rights based on real-time evaluations of workload security posture, geography and other key behavioral characteristics. Aembit secures access amongst workloads in the cloud on-prem and in SaaS.
  • 10
    SlashID

    SlashID

    SlashID

    Identity is the most common vector for lateral movement and data breaches. SlashID helps you build a secure, compliant, and scalable identity infrastructure. Manage the creation, rotation and deletion of identities and secrets in a single place. Complete inventory of all your identities and secrets, multi-cloud. Detect initial access, privilege escalation, and lateral movement across your IdPs and cloud environments. Add authentication, authorization, conditional access, and tokenization to your services. Detect leaked key materials in real-time and prevent data breaches by rotating them. Automatically block, suspend, rotate or enforce MFA on a detection to reduce the impact of an attack. Add MFA and conditional access to your applications. Add authentication, authorization, credential tokenization, and conditional access to your APIs and workloads.
  • 11
    Veza

    Veza

    Veza

    Data is being reconstructed for the cloud. Identity has taken a new definition beyond just humans, extending to service accounts and principals. Authorization is the truest form of identity. The multi-cloud world requires a novel, dynamic approach to secure enterprise data. Only Veza can give you a comprehensive view of authorization across your identity-to-data relationships. Veza is a cloud-native, agentless platform, and introduces no risk to your data or its availability. We make it easy for you to manage authorization across your entire cloud ecosystem so you can empower your users to share data securely. Veza supports the most common critical systems from day one — unstructured data systems, structured data systems, data lakes, cloud IAM, and apps — and makes it possible for you to bring your own custom apps by leveraging Veza’s Open Authorization API.
  • 12
    Allthenticator

    Allthenticator

    Allthenticate

    Allthenticator is a passwordless authentication platform designed to unify digital and physical access through a single smartphone-based identity. It enables proximity-based login to computers, websites, and servers, while also unlocking physical doors with the same device—eliminating passwords, tokens, and keycards. The platform supports SSH key signing, passkey logins, OTP management, and native integrations with identity providers like Azure AD and Okta. Admins manage everything from a centralized dashboard with role-based access and audit logs. Allthenticator also offers a decentralized credential recovery system, allowing users to back up identities with trusted peers instead of the cloud. Organizations using Allthenticator have reported 94% fewer password resets, 76% less time spent on access management, and up to 96% employee satisfaction
    Starting Price: $12/month/user
  • 13
    e-Liberty

    e-Liberty

    e-Liberty

    Stream the customer journey, boost your sales, assert your brand image, and meet the requirements of modern online sales. Our search engine offers the best deal directly to the user. The amount of the discount compared to the public price is clearly comprehensible. If the user changes the criteria, the prices are recalculated in real-time. Whatever situation ever(purchase that requires delivery, collection of a keycard, or direct and instant reloading of their media), your customer can easily complete their package purchase via a tunnel specially designed to facilitate the transformation rate. We have developed several solutions to allow your customers to order until D-0 without having keycards. A perfect level for satisfaction and growth, an application allowing your customers to associate a blank card with an order already placed online, collection from kiosks using QR codes, and collection from cash registers according to opening hours.
    Starting Price: Free
  • 14
    Teleport

    Teleport

    Teleport

    The Teleport Infrastructure Identity Platform modernizes identity, access, and policy for infrastructure, for both human and non-human identities, improving engineering velocity and resiliency of critical infrastructure against human factors and/or compromise. Teleport is purpose-built for infrastructure use cases and implements trusted computing at scale, with unified cryptographic identities for humans, machines and workloads, endpoints, infrastructure assets, and AI agents. Our identity-everywhere approach vertically integrates access management, zero trust networking, identity governance, and identity security into a single platform, eliminating overhead and operational silos.
  • 15
    BeyondTrust Pathfinder
    BeyondTrust Pathfinder offers a comprehensive identity-centric security platform designed to protect enterprises from privilege-based attacks by delivering visibility, control, and governance across human and non-human identities, credentials, and access paths. At the core is the Pathfinder Platform, which dynamically maps paths to privilege across endpoints, servers, clouds, IdPs, SaaS, and databases, exposing hidden over-privileged accounts, orphaned identities, and attack vectors. Other key components include Identity Security Insights for unified detection and risk-based prioritization of identity threats, Password Safe to discover, vault, manage and audit privileged credentials and session activity, Privileged Remote Access for secure, rule-based access with full session monitoring, Entitle for automating cloud permissions and just-in-time access, Endpoint Privilege Management for enforcing least-privilege on endpoints with application control and file-integrity monitoring.
  • 16
    Tesseral

    Tesseral

    Tesseral

    Tesseral is the open source platform for managing identity and access in business software. It provides enterprise-grade capabilities, including SAML single sign-on, SCIM provisioning, role-based access control, managed API keys, and audit logs, implemented in just a few lines of code. Tesseral unifies access management for employees, customers, services, and AI agents, giving organizations the flexibility to adapt to any deployment model and the authority to enforce security policies with precision. You can learn more by reading our docs or by checking out our GitHub.
  • 17
    Britive

    Britive

    Britive

    Permanent elevated privileges leave you open to increased data loss & account damage due to insider threats & hackers 24/7. Temporarily granting & expiring Just In Time Privileges with Britive instead minimizes the potential blast radius of your privileged human and machine identities. Maintain zero standing privileges (ZSP) across your cloud services, without the hassle of building a DIY cloud PAM solution. Hardcoded API keys and credentials, typically with elevated privileges, are sitting targets for exploits, and there are 20x more machine IDs using them than there are human users. Granting & revoking Just-in-Time (JIT) secrets with Britive can significantly reduce your credential exposure. Eliminate static secrets & maintain zero standing privileges (ZSP) for machine IDs. Most cloud accounts become over-privileged over time. Contractors & employees often maintain access after they leave.
  • 18
    AgentShield

    AgentShield

    AgentShield

    AgentShield is a next-generation identity platform built to verify both human users and AI agents acting on their behalf. It enables organizations to confirm who an agent is, whether the person behind the agent has provided explicit authority, and that the agent is trustworthy, all through APIs and JavaScript integrations. The product includes tools that detect agentic sessions on a website. and enforces identity and permission checks for agent-to-agent or agent-to-service interactions under the open Model Context Protocol Identity (MCP-I) specification. With KYA, businesses can securely manage agent identities and permissions, institute audit-trails, automation workflows, and finely-tuned access control for autonomous systems, thereby protecting themselves from misuse of digital identities and ensuring transparency when AI systems act on behalf of users.
  • 19
    Visual Guard
    Visual Guard is an advanced identity and access management (IAM) tool offering a complete solution for securing sensitive applications and data. With centralized management of users and permissions, Visual Guard facilitates the implementation of robust, standards-compliant security policies. User management : Create, modify & delete user accounts Integration with LDAP or Active Directory directories Automatic synchronization of user information Access control : Precise definition of access rights to features and resources Role and Permission Management Multi-factor authentication (MFA) Single Sign-On (SSO) Security Audit and Monitoring : Permission Matrix Detailed Event log Real-time and Historical Graphs Integration & compatibility : Compatibility with major development platforms, frameworks, and protocols. .NET API Benefits : Simplified access management Enhanced data security Improved regulatory compliance Reduce identity management cost
    Starting Price: 1.55/month/user
  • 20
    CyberArk Workforce Identity
    Empower your workforce with simple and secure access to business resources with CyberArk Workforce Identity. Your users need quick access to a variety of business resources. You need confidence it’s them knocking – not an attacker. With CyberArk Workforce Identity, you can empower your workforce while keeping threats out. Clear the path for your team to propel your business to new heights. Validate identities with strong AI-powered, risk aware and password-free authentication. Streamline management of application access requests, creation of app accounts, and termination of access. Keep workers working, not logging in and out. Make intelligent access decisions based on AI-powered analytics. Enable access across any device, anywhere at just the right time.
  • 21
    RadiantOne

    RadiantOne

    Radiant Logic

    Make identity a business enabler with a unified platform that transforms your existing infrastructure into a resource for the entire organization. RadiantOne is the cornerstone of complex identity infrastructures. Harness your identity data with intelligent integration to drive better business outcomes, improve security and compliance posture, increase speed-to-market, and more. Without RadiantOne, companies must rely on custom coding, rework, and ongoing maintenance to make new initiatives work with existing environments. Expensive solutions can’t be deployed on time or on budget, negatively impacting ROI and causing employee frustration. Identity frameworks that can’t scale waste time and resources, with employees struggling to deploy new solutions for users. Rigid, static systems can’t meet changing requirements, leading to duplicate efforts and repeated processes.
  • 22
    Huawei IAM

    Huawei IAM

    Huawei Cloud

    Create IAM users and groups and grant them permissions by using policies and roles, allowing or denying access to specific services and resources. Delegate a trusted HUAWEI CLOUD account or a cloud service to access your HUAWEI CLOUD resources based on assigned permissions. Establish a trust relationship between your existing identity system and HUAWEI CLOUD by creating a SAML-based or OpenID Connect–based identity provider or a custom identity broker. In this way, users in your enterprise can log in to HUAWEI CLOUD through single sign-on (SSO). You can require IAM users to complete identity authentication each time they log in or perform a critical operation. IAM allows you to create IAM users and authorize them to securely access your resources using their own username and password. IAM allows you to authorize another HUAWEI CLOUD account or a cloud service to access your resources based on assigned permissions.
  • 23
    FortiTrust Identity
    FortiTrust Identity is a cloud-based subscription that simplifies identity and access management across enterprise hybrid environments. FortiTrust Identity (FTI) is cloud-based and natively integrated with the Fortinet Security Fabric to deliver a rich set of security controls and centralized management of user authentications, including multi-factor authentication. FTI enables you to begin your zero-trust journey with reliable user verification and strong authentication, plus ease of use for the end user. Adaptive, multi-factor, or passwordless authentication and identity federation for SSO across the enterprise hybrid environment are all included via user-based licensing. Ensure the right people get appropriate access to your data, resources, and applications across the enterprise. Increase certainty of user identity with the verification of another factor and adaptive authentication technique.
  • 24
    Microsoft Agent 365
    Microsoft Agent 365 introduces a unified control plane that allows organizations to deploy, manage, and secure AI agents with the same confidence they apply to user management. It gives enterprises full visibility into all agents, including Entra-verified agents, self-registered agents, and shadow agents running across the environment. Built on Microsoft’s trusted ecosystem, Agent 365 extends familiar tools like Entra, Defender, Purview, Power Apps, and Microsoft 365 to support identity, security, governance, and productivity for agents. With Work IQ, organizations can connect agents directly to their unique company data and workflows, enabling smarter, more context-aware automation. IT admins can access Agent 365 early via Frontier, Microsoft’s early access program, and activate it at the tenant or user level. Designed to scale with modern AI adoption, Agent 365 ensures that enterprise agentic systems remain secure, compliant, and manageable from day one.
  • 25
    Smallstep

    Smallstep

    Smallstep

    Smallstep is the world’s first Device Identity Platform™, built to ensure that only company-owned devices can access sensitive enterprise resources. It secures Wi-Fi, VPNs, ZTNA, SaaS applications, cloud APIs, and developer infrastructure using hardware-bound credentials. At its core is ACME Device Attestation, a modern standard co-developed with Google that binds identity directly to device hardware. This approach prevents credential theft, phishing, and impersonation by making credentials non-exportable. Smallstep extends Zero Trust beyond users by verifying devices with cryptographic assurance at the silicon level. The platform supports all major operating systems, enabling consistent security across modern, distributed workforces.
  • 26
    Check Point Identity Awareness

    Check Point Identity Awareness

    Check Point Software Technologies

    Check Point Identity Awareness offers granular visibility of users, groups, and machines, providing unmatched application and access control through the creation of accurate, identity-based policies. Centralized management and monitoring allows for policies to be managed from a single, unified console. It is clear that username and passwords no longer prove the identity of a user. Access control to your valuable assets must be strengthened. Check Point Identity Awareness ensures access to your data is granted only to authorized users, and only after their identities have been strictly authenticated; using Single Sign-On, Multi-Factor Authentication, Context-aware policies and anomaly detection.
  • 27
    Akeyless Identity Security Platform
    Akeyless delivers identity security for an era shaped by automation and AI. The cloud-native platform secures machines, AI agents, and human access across hybrid, multi-cloud, and on-prem environments. It provides a practical path to secretless, identity-based access through secrets management, certificate lifecycle management and PKI, PAM, and unified governance. Akeyless is built on a cryptography foundation that combines encryption, key management, and Distributed Fragments Cryptography to keep sensitive material under customer control and protected from post-quantum threats. With integrations for cloud IAM, Kubernetes, CI/CD, and MCP-based AI agent workflows, teams can adopt and scale AI agents securely without expanding risk. Akeyless Jarvis™ delivers identity intelligence to surface risky access and strengthen oversight.
  • 28
    Passly

    Passly

    IDAgent

    Growing numbers of remote workers, increased dependency on cloud applications, and explosive increases in cyber theft should require every organization of every size to consider Secure Identity & Access Management. With Passly™ from ID Agent (a Kaseya company), IT teams can easily, simply, and affordably enable the right people to have the right access to the right resources – all from the right devices and locations. Secure Password Management, Single Sign-On, Multi-Factor Authentication and more. In a time when the threat of cyberattack has never been greater, and with nearly 80% percent of all data breaches due to lost, weak or stolen passwords, it’s critical to select the right secure identity & access management platform. Passly provides the most comprehensive and cost-effective solution to enable security, compliance, and efficiency. Shared Password Vaults allow techs to manage and store passwords for business, personal or shared accounts. Centralized and easy to use.
  • 29
    Soffid IAM
    Soffid provides full Single Sign On experience and full identity and access management features by policy-based centralized orchestration of user identities. Everything delivered by a full open source solution. Improve user productivity with Soffid IAM. Soffid provides a single configuration tool for the administrator and provides an easy to use self service portal for the end users. One single tool for everyone to enhance user productivity! Increase IT internal and external security. Soffid uses state of the art security standards. Identity and Access Management provides a new vision on security, no longer based in the old school firewall vision, but centered in who, when and how is the user accessing specific resources to improve external and internal security. Increase IT flexibility. Soffid enables the option of managing all the IT assets not based on their location but based on who is accessing them.
  • 30
    Accops HyID

    Accops HyID

    Accops Systems

    Accops HyID is a futuristic identity and access management solution that safeguards critical business applications and data from misuse by internal as well as external users, by managing user identities and monitoring user access. HyID provides enterprises with strong control over endpoints, enabling contextual access, device entry control and flexible policy framework. The out-of-the-box MFA is compatible with all modern and legacy apps, cloud and on-prem apps. It enables strong authentication based on OTP delivered via SMS, email and app, biometrics, and device hardware ID & PKI. Single sign-on (SSO) feature provides better security and convenience. Organizations can monitor security posture of the endpoints, including BYOD devices, and grant or deny access based on real-time risk assessment.
  • 31
    UAParser.js

    UAParser.js

    UAParser.js

    UAParser.js simplifies user-agent detection by providing a structured approach, offering a clean alternative to the unstructured mess of real-world user-agent strings.
    Starting Price: $12
  • 32
    Oracle Identity Management
    Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud. The Oracle Identity Management platform delivers scalable solutions for identity governance, access management and directory services. This modern platform helps organizations strengthen security, simplify compliance and capture business opportunities around mobile and social access. Oracle Identity Management is a member of the Oracle Fusion Middleware family of products, which brings greater agility, better decision-making, and reduced cost and risk to diverse IT environments today. In addition, we now offer an innovative, fully integrated service that delivers all the core identity and access management capabilities through a multi-tenant Cloud platform, Oracle Identity Cloud Service.
  • 33
    One Identity

    One Identity

    Quest Software

    Take the risk out of enterprise identity and access management. Mitigate risk, secure data, meet uptime requirements, and satisfy compliance by giving your users access to data and applications they need and nothing more. Now, identity and access management (IAM) can be driven by business needs, not IT capabilities. With Identity Manager, you can unify information security policies and meet governance needs, today and in the future. Finally! Identity management software that is driven by business needs, not IT capabilities. Identity Manager governs and secures your organization’s data and users, meets uptime requirements, reduces risk, and satisfies compliance by giving users access to data and applications they need - and only what they need - whether on-premises, hybrid or in the cloud. Satisfy compliance and audit requirements.
  • 34
    NdSecure

    NdSecure

    Ndende Technologies

    NdSecure is a Single Sign-On (SSO) and Identity and Access Management (IAM) solution. Ndsecure offers a user-friendly, flexible, and customizable identity and access management solution capable of operating within a diverse industry-centric architecture. The role played by NdSecure is to provide a robust and secure logical access control environment, incorporating strong authentication methods. The objective is to prevent unauthorized access to the corporate management system, thereby reducing frauds arising from insider threats. NdSecure’s API management platform provides more advanced ways for the workforce to control access to various applications. By leveraging existing request content and identity stores, NdSecure can provide: • Policy-based authentication • Coarse and fine-grained authorization • Single sign-on (using SAML, OpenId Connect, social log-in or OAuth-based federation) • Support for Common Criteria • Uses FIDO 2.0 and W3C WebAuthn
    Starting Price: $8/month/user
  • 35
    WSO2 Identity Server
    WSO2 Identity Server is API-driven, is based on open standards with the deployment options of on-premise, cloud or hybrid. It supports complex IAM requirements given its high extensibility. WSO2 Identity Server helps you do single sign-on and identity federation backed by strong and adaptive authentication, securely expose APIs, and manage identities by connecting to heterogeneous user stores. Leverage the power of open-source IAM in your enterprise to innovate fast and build secure Customer IAM (CIAM) solutions to provide an experience your users will love
  • 36
    Infisign

    Infisign

    Infisign

    Infisign is a cutting-edge Identity and Access Management (IAM) platform that revolutionizes digital security by leveraging decentralized identity, passwordless authentication, federation, and privileged access management capabilities. The solution empowers organizations to streamline user authentication, manage access efficiently, and ensure compliance across diverse environments. With its unique approach, Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.
    Starting Price: $4/user/month
  • 37
    Akku

    Akku

    CloudNow Technologies

    The corporate user lifecycle, streamlined. Akku is a robust, flexible identity and access management solution created to help you manage every stage of the user lifecycle more effectively. With its range of versatile features, Akku helps improve data security, standards compliance, efficiency and productivity. Akku delivers a powerful cloud SSO solution that can be integrated easily with almost any cloud or in-house application, and packages a range of security and access control features that make user provisioning, management, access control and deprovisioning seamless. Unlike many other IAM solutions, Akku is built on an agentless architecture, without the need for a user agent to be installed on your infrastructure. So you know exactly what parts of your sensitive user information Akku can access, ensuring transparency and control.
    Starting Price: $5.00/year/user
  • 38
    Clovatel

    Clovatel

    Ionesoft Solutions Pte Ltd

    Clovatel is a cloud-based hotel management system that is designed to fulfill the needs of the modern hospitality industry with all the necessary modules. It is a fully integrated product suite with Self-Service KIOSK, Housekeeping Mobile App, Room Service Mobile App, and more. The Self-Service Kiosk includes facial recognition, Passport or NRIC scanning, cash collector, online payment gateway, credit card payment, QR code payment, and room key-card encoder. Guest can use the self-service Kiosk for most common self-services like check-in, checkout. It also has more advanced functions like Extend Reservation, Upgrade Rooms, etc. Clovatel Housekeeping App is designed to manage the cleaning process easily and effectively. It sends notifications automatically to housekeepers about guest check-ins, check-outs, and dirty rooms. It also allows for housekeepers to update rooms status once finished their job.
  • 39
    Amazon Bedrock AgentCore
    Amazon Bedrock AgentCore enables you to deploy and operate highly capable AI agents securely at scale, offering infrastructure purpose‑built for dynamic agent workloads, powerful tools to enhance agents, and essential controls for real‑world deployment. It works with any framework and any foundation model in or outside of Amazon Bedrock, eliminating the undifferentiated heavy lifting of specialized infrastructure. AgentCore provides complete session isolation and industry‑leading support for long‑running workloads up to eight hours, with native integration to existing identity providers for seamless authentication and permission delegation. A gateway transforms APIs into agent‑ready tools with minimal code, and built‑in memory maintains context across interactions. Agents gain a secure browser runtime for complex web‑based workflows and a sandboxed code interpreter for tasks like generating visualizations.
    Starting Price: $0.0895 per vCPU-hour
  • 40
    Microsoft Identity Manager
    Microsoft Identity Manager (MIM) builds on the identity and access management capabilities of Forefront Identity Manager and predecessor technologies. MIM provides integration with heterogeneous platforms across the datacenter, including on-premises HR systems, directories, and databases. MIM augments Azure AD cloud-hosted services by enabling the organization to have the right users in Active Directory for on-premises apps. Azure AD Connect can then make available in Azure AD for Microsoft 365 and cloud-hosted apps. Automatic identity and group provisioning based on business policy and workflow-driven provisioning. Integration of the contents of directories with HR systems and other sources of authority. Synchronizing identities between directories, databases, and on-premises applications through common APIs and protocols, Microsoft-delivered connectors, and partner-delivered connectors.
  • 41
    Strata Maverics Platform
    Identity integrations across all your clouds on one powerful platform. Strata’s Maverics Identity Orchestration Platform is the first distributed, multi-cloud identity solution. Maverics is an abstraction layer that integrates heterogeneous identity management systems to make many policies, APIs, and sessions work as one. Enterprise identity management is hard. Making identity work for multi-cloud doesn’t have to be. Enterprises are rapidly moving to distributed architectures. Whether a hybrid of on-premises and cloud, or several clouds, running distributed systems creates identity silos. Applications live on different clouds, like Microsoft Azure, AWS, and Google Cloud, and each cloud comes with its own identity system. Add the challenge of on-premises legacy apps, and you’ve got a distributed identity management problem. Maverics is a new approach to identity management for multi-cloud environments.
  • 42
    Fischer Identity

    Fischer Identity

    Fischer International Identity

    Fischer empowers organizations to build an effective, predictable and secure Global Identity® Architecture. Securing an Identity Program is the #1 priority now. Fischer Identity provides hardware and software solutions as well as Global Identity® Services to secure and control information technology resources. Leverage our plug & play automation to create predictable, secure provisioning to enable your identities with the access they need on day one as well as deprovision access on-demand. Eliminate the reliance on professional services by automating the Fischer way. Our governance model provides you the control you need to enforce compliance throughout your business. Always know who has access to what, how they obtained the access they have, and remediation when something is not right. Accelerate your digital transformation with Fischer Identity lifecycle management.
  • 43
    Userparser

    Userparser

    Userparser

    Userparser is a user-agent parser & IP-address lookup API that transforms user agent strings into rich metadata and usage analytics. Sign up and start receiving parsed user-agent & ip-address data instantly to detect country, browser, OS, device, and crawler in real-time with our secure user-agent string & IP-address Lookup API. This free user-agent parser and IP-address lookup tool enables developers to determine what type of device a user is using and where he is making the request. To assist them in creating more engaging user experiences. With this tool, you can easily parse user agents and extract information such as device type, device name, device brand, device viewport width, device viewport height, operating system name, operating system version, browser name, browser version, crawler name, crawler category, crawler owner, crawler URL, and so on. You can easily perform an IP-address lookup with this tool and extract information such as country name, country code, etc.
    Starting Price: $4.85/month
  • 44
    AuthStack

    AuthStack

    Buckhill

    AuthStack is a host anywhere, Enterprise-grade, Single Sign-On (SSO) and Identity Access Management (IAM) System. It assumes responsibility for logging in users to your own, and optionally third-party websites and applications. Rather than managing multiple different logins for each website and application, AuthStack centralizes your user identity management so the user only has to login once and maintain one password and profile. Integration with AuthStack requires no custom coding if your website or application already supports SAML. If SAML is not supported we provide a Connector Framework, free of charge. We can also help you integrate the Connector if required. There is also no need to migrate your existing user database(s). AuthStack bundles with a Connector Framework which can communicate with any data source, whether that's LDAP, MySQL, SOAP, REST API, etc, to check credentials from existing user databases.
    Starting Price: €41.25 per month
  • 45
    Descope

    Descope

    Descope

    Descope is a drag-and-drop customer authentication and identity management platform. Our no / low code CIAM solution enables developers to easily create and customize their entire user journey using visual workflows – from authentication and authorization to MFA and federation. Descope also provides a connectors ecosystem with dozens of third-party services for use cases such as identity verification, fraud prevention, risk-based authentication, and identity orchestration. Descope is built on a scalable multi-tenant architecture with high availability that can support advanced enterprise requirements. Customers use Descope to improve their user onboarding with passwordless authentication, enhance security with MFA and step-up controls, and unify customer identities across business properties. Founded in 2022, Descope is backed by Lightspeed and GGV and is a member of the FIDO Alliance.
    Starting Price: $0.05 per user per month
  • 46
    Keycloak

    Keycloak

    Red Hat

    Keycloak is an open source identity and access management solution. Add authentication to applications and secure services with minimum fuss. No need to deal with storing users or authenticating users. It's all available out of the box. You'll even get advanced features such as User Federation, Identity Brokering and Social Login. For more details go to about and documentation, and don't forget to try Keycloak. It's easy by design.
  • 47
    Microsoft Entra
    Confidently enable smarter, real-time access decisions for all identities across hybrid, multicloud, and beyond. Safeguard your organization by protecting access to every app and every resource for every user. Effectively secure every identity including employees, customers, partners, apps, devices, and workloads across every environment. Discover and right-size permissions, manage access lifecycles, and ensure least privilege access for any identity. Keep your users productive with simple sign-in experiences, intelligent security, and unified administration. Safeguard your organization with the identity and access management solution that connects people to their apps, devices, and data. Discover, remediate, and monitor permission risks across your multicloud infrastructure with a cloud infrastructure entitlement management (CIEM) solution. Create, issue, and verify privacy-respecting decentralized identity credentials with an identity verification solution.
  • 48
    Aerobase

    Aerobase

    Aerobase

    Aerobase is an open-source Identity and access management (IAM) platform that specializes in identity federation, SSO, strong & adaptive authentication, access control, account management & identity provisioning, API & microservices security and privacy regulation. This guide helps you get started with Aerobase. It covers server configuration and use of the default database. Advanced deployment options are not covered. For a deeper description of features or configuration options, consult the other reference guides.
    Starting Price: $690 per month
  • 49
    Entrust Identity Enterprise
    The world's most proven on-prem identity & access management (IAM) solution for strong digital security. Identity Enterprise is an integrated IAM platform that supports a full suite of workforce, consumer, and citizen use cases. Ideally suited for high-assurance applications that require a Zero Trust approach for thousands or millions of users, Identity Enterprise can be deployed on-premises or as a virtual appliance. Never trust, always verify. Protect your organization and user communities both inside and outside the perimeter. Secure workforce, consumer, and citizen identities with high assurance use case coverage including credential-based access, smart card issuance, and best-in-class MFA. Limit user friction with adaptive risk-based authentication, passwordless login, and cloud app federation. Option to use digital certificates (PKI) for a higher level of security when and where warranted, either with a physical smart card or a virtual smart card.
  • 50
    Authelia

    Authelia

    Authelia

    Authelia is an open source authentication and authorization server and portal fulfilling the identity and access management role of information security in providing multi-factor authentication and single sign-on for your applications via a web portal. It acts as a companion for common reverse proxies. With a compressed container size smaller than 20 megabytes and observed memory usage normally under 30 megabytes, it's one of the most lightweight solutions available. Written in Go and React, authorization policies and many other backend tasks are completed in mere milliseconds, and login portal loading times of 100 milliseconds make it one of the fastest solutions available. Processors can use a lot of electricity, but when idle, usage is basically so low that you can't measure it, and active usage in a small business environment being under 1% allows you to rest easy (with the exclusion of password hashing). Security is heavily considered as part of our design process.
    Starting Price: Free