Best Authentication Software in China - Page 4

Find and compare the best Authentication software in China in 2025

Use the comparison tool below to compare the top Authentication software in China on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Google Cloud Identity Reviews

    Google Cloud Identity

    Google

    $6 per user per month
    An integrated platform for identity, access, application, and endpoint management (IAM/EMM) that empowers IT and security teams to enhance end-user productivity, safeguard organizational data, and embrace a digital workspace transformation. Strengthen your organization's defenses using the BeyondCorp security framework along with Google's threat intelligence capabilities. Regulate access to SaaS applications, implement robust multi-factor authentication (MFA) to secure user accounts, oversee endpoints, and conduct threat investigations through the Security Center. Boost operational efficiency by providing seamless user experiences on endpoint devices, while consolidating user, access, application, and endpoint management into one unified console. Allow users to seamlessly access thousands of applications via single sign-on (SSO), managing their corporate accounts in a manner similar to their personal Google accounts. Facilitate your digital transition by integrating your existing infrastructure into a dependable and trusted platform, while also extending your on-premises directory into the cloud through Directory Sync, thereby enhancing accessibility and management. This comprehensive solution not only streamlines operations but also fortifies security across the board.
  • 2
    VerifyKit Reviews

    VerifyKit

    VerifyKit

    $7.90 per month
    VerifyKit offers a user-friendly verification solution that enables seamless app sign-ups without requiring a phone number or one-time password for authentication. In addition to its reliability and customization options, it provides users with the flexibility to select their preferred verification platform, such as WhatsApp, Telegram, or SMS, enhancing their overall experience. This adaptability ensures that users can engage with the app in a way that suits them best.
  • 3
    Super Gluu Reviews
    Super Gluu is a mobile application designed for push-notification two-factor authentication (2FA) that seamlessly integrates with the Gluu Server. It employs public-key encryption in accordance with the FIDO U2F authentication standard. During the device enrollment process, Super Gluu registers its public key with the FIDO U2F endpoint of the Gluu Server. Authentication involves a challenge-response mechanism to verify that the device possesses the corresponding private key. This solution enhances identity and access management for customers, citizens, and remote employees alike. Super Gluu is readily compatible with the Gluu Server, requiring just a simple activation for use. Strong access security can be achieved with minimal effort, as easy as approving a push notification. The Gluu Server and Super Gluu can function effectively within the same network, without needing a DNS hostname or relying on a standard certificate. However, it is essential that both components remain within the same network for optimal performance. This streamlined approach facilitates secure access while minimizing complexity for users.
  • 4
    Regula Reviews
    Regula is a global manufacturer of forensic devices as well as identity verification solutions. Regula has over 30 years of experience in forensic investigation and the largest collection of document templates anywhere in the world. This allows Regula to create breakthrough technologies in document verification and biometric verification. Regula software and hardware solutions enable over 1,000 organizations and 80 border control authorities worldwide to provide top-notch customer service without compromising safety security and speed.
  • 5
    aPersona Reviews
    aPersona ASM employs advanced technologies such as machine learning, artificial intelligence, and cognitive behavioral analytics to seamlessly safeguard online accounts, web service portals, and transactions from potential fraud. Its adaptive Multi-Factor authentication enhances security during the login process for any web service, and the system was meticulously crafted to fulfill a comprehensive set of requirements, including compliance with GDPR Risk Evaluation Guidelines. Moreover, it is cost-effective and designed to be unobtrusive, ensuring minimal disruption to the user experience during login. With a tokenless approach, users are not required to download or carry any additional items, while its adaptive intelligence facilitates precise forensic analysis in response to evolving environments. aPersona features dynamic identities that evolve over time, negating the need for static solutions, and incorporates Learning Modes to simplify user engagement with the service. Additionally, aPersona's patent-pending technology offers a multitude of features that significantly bolster login security, effectively addressing the concerns of organizations regarding unauthorized access. This innovative approach positions aPersona as a leader in the field of online security solutions.
  • 6
    Loginizer Reviews

    Loginizer

    Loginizer

    $24 per year
    Loginizer is dedicated to enhancing the security of your WordPress websites against various forms of attacks. We understand that safeguarding a website is crucial, and it should be straightforward for any owner to implement, which is why we tirelessly develop features that allow you to secure your site effortlessly without the need for constant vigilance. Our team is continuously innovating to introduce additional functionalities and devise strategies to defend against brute-force attacks. Any discrepancies with the WordPress Core will be communicated to the Admin through email, including a temporary login URL for easy access. Users can also create secondary challenge questions to fortify their accounts, and implement two-factor authentication via services like Google Authenticator or Authy. Furthermore, Loginizer allows you to disable XML-RPC, review logs of failed login attempts, and block specific IPs or ranges from accessing your site. Integrated seamlessly as a WordPress plugin, you can easily install it from your dashboard and begin enhancing your website's security right away. With our commitment to ongoing improvement, you can trust that Loginizer will keep evolving to meet your security needs.
  • 7
    Asgardeo Reviews
    Asgardeo simplifies the process of incorporating secure authentication flows into applications through a few straightforward steps. It allows for seamless integration with single-page applications, traditional web applications, and mobile platforms. The solution includes SDKs that support a variety of technology stacks, making it versatile for developers. Users can implement social sign-ins with major platforms like Google, Facebook, and GitHub using ready-made templates, with plans for additional options in the future. The system allows for the configuration of external identity providers that connect via established protocols such as OpenID Connect and SAML. Administrators can efficiently manage their customers, employees, and partners using the default onboarding and management workflows provided. Asgardeo also gives the choice to utilize its own directory service or connect to existing LDAP or Active Directory systems through an agent. For two-factor authentication, developers can select from multiple methods, including Email OTP, SMS OTP, and TOTP, ensuring a high level of security. Users can define intricate multi-step processes and tailor configurations to meet specific user needs. By leveraging Asgardeo, developers can enhance the overall user experience by concentrating on business logic while ensuring that login and secure access are reliably maintained for end-users. This comprehensive approach not only streamlines the authentication process but also fortifies the security framework within applications.
  • 8
    Incode Omni Reviews

    Incode Omni

    Incode Technologies

    varies
    Our flagship identity solution, Incode Omni introduces a new generation of authentication and verification systems that automate the management of transactions. We use advanced Artificial Intelligence (AI) and Machine Learning (ML), along with User-centric design principles, to create a user-centric experience by enabling personalized interactions in multiple domains. An advanced Identity Management System allows banks to increase their revenue while reducing fraud, while providing convenience and outstanding experiences for users.
  • 9
    Oloid Reviews
    Upgrade your workplace with contemporary access control solutions tailored to your needs. You can select from a variety of options, including facial recognition, Bluetooth, or QR codes. The retrofit process is straightforward and can easily integrate with your current badge readers and access control systems. Enhance the security of your assets through contactless biometrics and effective tailgating detection. Transform iPhones, iPads, Android devices, or tablets into intelligent access readers. Oloid effectively blocks unauthorized access while minimizing reliance on manual entry methods. We ensure compatibility with your current IT infrastructure for a seamless transition. Employees have the freedom to use either contactless biometrics or mobile credentials for physical access. This modernization aims to create a frictionless and secure environment for both smartphone and non-smartphone users. By employing computer vision technology, Oloid accurately tracks the number of individuals entering and exiting, enforcing occupancy limits at entry points through rule-based access control. You can utilize existing security cameras or opt for readily available IP cameras to enhance your system further. This innovative approach not only boosts security but also improves the overall efficiency of workplace access management.
  • 10
    Studid Reviews
    Studid allows students, researchers, and educators to authenticate natively using the SSO (Single Log-on) Service at their institution.
  • 11
    Dynamic Reviews
    After configuring Dynamic, you gain the ability to effortlessly add or remove chains, enable data collection, set up gates and access lists, and much more, all without needing to edit any code. Dynamic is compatible with EVM chains, Solana, and Flow, with additional chains on the horizon. Activating these features is as simple as flipping a switch. The SDK provided by Dynamic is entirely customizable, allowing you to adjust aspects such as colors, corners, and overall user experience. You can automatically prevent transactions from risky wallets by cross-referencing all wallets with Chainalysis’ US OFAC sanctions list. To enhance your security measures further, you have the option to upgrade to a comprehensive suite of monitoring and compliance tools from Chainalysis. Configuration of gating can be done easily through your developer interface. Establish an allow list specifically for your developers and alpha customers, and if there are wallets you wish to block, you can create a block list with just a single click. This level of flexibility ensures that you maintain control over your platform’s security and access.
  • 12
    BoxyHQ Reviews
    Security Building Blocks for Developers. BoxyHQ offers a suite of APIs for enterprise compliance, security and privacy. It helps engineering teams to reduce Time to Market without sacrificing their security posture. They can implement the following features with just a few lines of code. SaaS or Self-hosted. 1. Enterprise Single Sign On (SAML/OIDC SSO) 2. Directory Sync 3. Audit Logs 4. Data Privacy Vault (PII, PCI, PHI compliant)
  • 13
    IDmelon Authenticator Reviews

    IDmelon Authenticator

    IDmelon Technologies

    $5.99/user/year
    IDmelon Authenticator, a mobile app that is available on Google Play or App Store, allows you to turn your smartphone into a FIDO-certified security key that allows you to securely log in to websites, online accounts, apps, and other sites. This means that instead of using the traditional method of presenting your username or password to log in to accounts like Microsoft or GitHub, you can use your username and security keys to add an extra layer of security. Organizations can use IDmelon Admin Panel to login to manage users, security keys, and to deploy passwordless authentication within their organizations overnight to protect their data, employees, and assets.
  • 14
    Ory Reviews

    Ory

    Ory

    $29 per month
    The missing web-scale identity and access control API. Today, 10x your security and user experience. Build secure apps over the Ory Network to reach new customers in any region of the globe with the best login experiences ever. Login is much more than just a username and a password. It is dangerous and time-consuming to build it from scratch. Ory's API first microservice architecture allows projects to be integrated at any stage. Pay for usage and not features. Ory subscription plans include advanced multi-factor authentication. Plus, advanced permissions, SSO OAuth2, OIDC multi-tenancy and more. Ory is designed for high-performance and high-scale applications on any cloud. Ory is designed with developers in mind. It allows you to quickly create your own user experience, and integrate it within your software stack. Ory's focus is on open standards, and its automated data import capabilities make migrating to legacy systems simple.
  • 15
    AuthZed Reviews
    Unlock the potential of your business by utilizing an authorization framework inspired by Google's Zanzibar white paper. The AuthZed team, creators of SpiceDB, offers a robust, enterprise-ready permissions system that is designed to scale efficiently while ensuring security. This solution stands as the most advanced open-source implementation of Zanzibar, crafted for optimal consistency and performance even in large-scale applications. You can define granular access controls for any object within your application or across your entire product suite, all while managing permissions through a unified schema. With the ability to specify consistency requirements for each authorization check, tunable consistency features allow for a balance between performance and accuracy tailored to your specific needs. SpiceDB provides lists of authorized subjects and accessible resources, which can be particularly useful for pre-filtering permission-based outcomes. Equipped with observability tools, a powerful Kubernetes operator, and load-testing functionalities, SpiceDB ensures an emphasis on both developer and platform engineering experiences, facilitating seamless integration and operational efficiency. This comprehensive approach makes it easier for businesses to adapt to changing security requirements while maintaining a focus on user access management.
  • 16
    Axiad Cloud Reviews
    Implement a comprehensive authentication system that verifies all users, devices, and interactions through a versatile, cloud-based platform designed for complete security. Axiad supports organizations in transitioning to a passwordless environment, mitigating the challenges and dangers associated with disjointed solutions, thereby enhancing their cybersecurity framework and empowering users effectively. By establishing robust security practices, breaking down silos, and adhering to compliance standards, enterprises can adopt advanced passwordless multi-factor authentication (MFA) solutions. In addition, organizations can fortify their defenses with government-grade phishing-resistant authentication methods. Move beyond traditional identity and access management (IAM) systems to establish secure user practices while ensuring compliance through passwordless and phishing-resistant MFA techniques. Furthermore, bolster machine identity verification and elevate overall security measures with an integrated, customizable public key infrastructure (PKI) solution that meets diverse organizational needs. This holistic approach not only simplifies security management but also provides a scalable foundation for future growth.
  • 17
    AgentAuth Reviews

    AgentAuth

    Composio

    $99 per month
    AgentAuth stands out as a dedicated authentication solution that streamlines secure and efficient access for AI agents across more than 250 external applications and services. The platform supports an array of authentication protocols, ensuring dependable connections alongside features like automatic token refresh. Additionally, it integrates effortlessly with top agent frameworks such as LangChain, CrewAI, and LlamaIndex, thereby amplifying the operational capabilities of AI agents. With a centralized dashboard, AgentAuth grants users complete visibility into their connected accounts, which aids in effective monitoring and rapid issue resolution. The platform also provides options for white-labeling, enabling businesses to tailor the authentication experience to fit their branding and OAuth developer applications. Upholding stringent security protocols, AgentAuth adheres to SOC 2 Type II and GDPR requirements, implementing robust encryption methods to safeguard data integrity. Moreover, its continuous updates and enhancements ensure that it remains at the forefront of authentication technology, adapting to the evolving needs and challenges of the digital landscape.
  • 18
    IBM Application Gateway Reviews
    As companies update their identity and access management systems, they frequently leave behind outdated applications due to insufficient funding, time constraints, or challenges in altering existing authentication processes. By utilizing no-code integrations, organizations can extend modern advanced authentication features, like passkeys, to these legacy applications. This approach ensures a uniform user experience across all platforms, enhancing usability. Additionally, it establishes a unified perspective of user interactions, which aids in minimizing risks and bolstering regulatory compliance. The solution is versatile and can be configured in just minutes, integrating effortlessly with leading identity providers. It also boasts inherent Kubernetes support for optimal performance, scalability, and configuration, without requiring extra dependencies. With these no-code integrations, Application Gateway allows users to access legacy applications through the same authentication methods employed for contemporary applications, streamlining the overall login experience. This capability not only improves efficiency but also promotes a smoother transition for enterprises seeking to modernize their systems.
  • 19
    Curity Reviews
    Curity's identity server serves as a comprehensive platform for identity and API security that adheres to established standards, aimed at delivering strong authentication and authorization for various digital services. By integrating identity security with API security, it facilitates efficient customer identity and access management, thereby promoting digital transformation, fostering growth, and enhancing customer loyalty. The platform boasts an array of features, such as multi-factor authentication, user journey orchestration, decentralized identity, and secure access management. It is compatible with several identity-related standards, including OAuth, OpenID Connect, and SCIM, which helps ensure both interoperability and adherence to industry norms. The architecture of Curity is grounded in the principle of separating concerns, which significantly improves security, flexibility, and scalability. Additionally, it offers sophisticated configuration management capabilities, allowing for transaction-based changes, rollbacks, and backups, all of which can be managed through a user-friendly web interface, command-line interface, RESTCONF API, and XML configuration files. With these diverse tools and features, the Curity identity server stands out as a vital solution for organizations looking to enhance their digital security landscape.
  • 20
    Pirean Access: One Reviews
    We offer comprehensive authentication and authorization solutions tailored for both web and mobile environments. Our Access: One platform safeguards valuable data, intellectual property, and equity across essential sectors. Collaborating with some of the largest enterprises globally, we ensure the protection of their services on an international scale. Utilizing our private cloud identity platform, we empower clients to swiftly implement identity services that create a centralized control point for identity and entitlement management. Our offerings include adaptable access management features that support single sign-on alongside strong user authentication. Additionally, we provide a flexible and powerful IAM API that extends the capabilities of your identity infrastructure. We pride ourselves on being recognized for our innovative approaches, versatility, and a consistent focus on enhancing the user experience. Our commitment to excellence helps us stay at the forefront of the industry.
  • 21
    IceWarp Reviews

    IceWarp

    IceWarp

    $312.00/year/user
    There is no office. That is the only rule. TeamChat for project teamwork, business email, TeamChat to collaborate on office documents, and online meetings. All this and more in our secure cloud at half the cost. Chat in groups organized around projects, upload files and mention coworkers. Comment on emails posted by others. Pin important posts. Integration with email allows you to share received messages directly into TeamChat room to catch the attention of colleagues. Desktop Client and Desktop Office documents for Windows and Linux will help you increase your office productivity. You can choose to purchase the entire Suite or just the apps you need.
  • 22
    Stytch Reviews
    An innovative authentication platform designed specifically for developers, Stytch allows you to efficiently onboard, authenticate, and engage your users through its robust APIs. Enhance both security and user satisfaction by utilizing flexible solutions that eliminate the need for passwords. We handle the backend infrastructure, enabling you to concentrate on enhancing your product offerings. Our SDKs come equipped with customizable templates that can be adjusted to match your branding elements, such as colors, fonts, and logos, ensuring that you can provide smooth onboarding and authentication experiences that please users while aligning with your brand identity—without the complexity of designing user interfaces from scratch. For those seeking greater customization, our direct API integration offers a balance between developer needs and user experience, facilitating swift, secure, and user-friendly passwordless authentication processes. With our straightforward and detailed documentation, the integration process becomes not only efficient but also hassle-free, allowing you to focus on what truly matters in your project. As you embark on this journey, you'll find that our platform is designed to support your growth and success effectively.
  • 23
    Teleport Reviews
    The Teleport Infrastructure Identity Platform is a modernization of identity, access and policy for infrastructure for both human and not-human identities. It improves engineering velocity and resilience of critical infrastructure to human factors or compromise. Teleport is designed for infrastructure use cases. It implements trusted computing with unified cryptographic identity for humans, machines, and workloads. Endpoints, infrastructure assets and AI agents can all be identified. Our identity-everywhere solution vertically integrates identity governance, zero trust networking and access management into a single platform. This eliminates overhead and operational silos.
  • 24
    OAuth Reviews

    OAuth

    OAuth.io

    $19 per month
    Concentrate on your primary application and accelerate your market entry. OAuth.io takes care of your identity infrastructure, ongoing maintenance, and security concerns, freeing your team from these challenges. While managing identity can be complex, OAuth.io simplifies the process significantly. You can select your preferred identity providers, incorporate custom attributes, personalize your login page or utilize our widget, and seamlessly integrate with your application—identity management completed in just a few minutes. Our user-friendly dashboard allows you to oversee your users effortlessly—search for and manage user accounts, reset passwords, implement two-factor authentication, and set up memberships and permissions with OAuth.io's intuitive User Management system. Experience comprehensive, highly secure user authentication options, whether using passwords or tokens. OAuth.io accommodates everything from multi-tenant setups to intricate permission structures, ensuring robust user authorization modeling. Additionally, enhance your user authentication experience by implementing a second factor with our widely used integrations. This enables you to maintain a high level of security while keeping user management simple and efficient.
  • 25
    NCP Reviews

    NCP

    NCP engineering

    NCP Entry Clients are great for freelancers, small businesses, and individuals who need a VPN. The Solution Finder will help find the right NCP product to fit your needs. We can help you find the right product for you, no matter what hardware you have. NCP has 30 years of experience in remote access environments and is an excellent choice for a complete VPN system that meets the needs IT administrators, users, and management. NCP's remote access solutions offer important benefits, including high security and cost efficiency.