5 Integrations with WhosOffice

View a list of WhosOffice integrations and software that integrates with WhosOffice below. Compare the best WhosOffice integrations as well as features, ratings, user reviews, and pricing of software that integrates with WhosOffice. Here are the current WhosOffice integrations in 2024:

  • 1
    Auth0

    Auth0

    Okta

    Auth0 by Okta takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO.
    Leader badge
    Starting Price: Free plan
    View Software
    Visit Website
  • 2
    Google

    Google

    Google

    Our mission is to organize the world's information so that everyone can access and use it. Every time you search, there are thousands, sometimes millions, of webpages with helpful information. How Google figures out which results to show starts long before you even type, and is guided by a commitment to you to provide the best information. Even before you search, Google organizes information about webpages in our Search index. The index is like a library, except it contains more info than in all the world’s libraries put together. In a fraction of a second, Google’s Search algorithms sort through hundreds of billions of webpages in our Search index to find the most relevant, useful results for what you’re looking for. To help you find what you’re looking for quickly, Google provides results in many useful formats. Whether presented as a map with directions, images, videos or stories, we’re constantly evolving with new ways to present information.
    Leader badge
    Starting Price: Free
  • 3
    Okta

    Okta

    Okta

    One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure and automate cloud journeys, with full support for hybrid environments along the way. Companies around the world trust Okta with their workforce identity.
  • 4
    OneLogin

    OneLogin

    OneLogin

    Secure critical company information and empower employees with OneLogin, a trusted identity and access management (IAM) solution for the modern enterprise. Designed to strengthen enterprise security while simplifying business logins, OneLogin is an excellent solution for companies looking to enforce security policies with ease. OneLogin includes top-rated features such as single sign-on (SS), unified directory, user provisioning, adaptive authentication, mobile identitiy, compliance reporting, and more.
  • 5
    Microsoft Entra Identity Protection
    Identity Protection uses the learnings Microsoft has acquired from their position in organizations with Microsoft Entra ID, the consumer space with Microsoft Accounts, and in gaming with Xbox to protect your users. Microsoft analyses trillions of signals per day to identify and protect customers from threats. The signals generated by and fed to identity protection can be further fed into tools like conditional access to make access decisions, or fed back to a security information and event management (SIEM) tool for further investigation. The risk signals can trigger remediation efforts such as requiring to perform multifactor authentication, reset their password using self-service password reset, or block access until an administrator takes action. Identity Protection allows organizations to accomplish three key tasks. Automate the detection and remediation of identity-based risks. Investigate risks using data in the portal. Export risk detection data to other tools.
  • Previous
  • You're on page 1
  • Next