Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Cluster.dev serves as the ultimate management solution for cloud-native infrastructures, seamlessly integrating the diverse capabilities of your existing infrastructure tools. It empowers teams to develop platform-as-a-service environments tailored to their specific needs, while providing the ability to customize both projects and infrastructures. By consolidating all changes and the overall status of your infrastructure in one location—your Git repository—you can monitor everything effortlessly. This platform eliminates the need for tedious manual runbooks and complex CI/CD processes, ensuring that you maintain a clear overview of your infrastructure. With Cluster.dev, you can confidently implement infrastructure changes, knowing that your tools will function as anticipated. Every element within Cluster.dev, from scripts to Kubernetes manifests, is tracked and maintained with precision. The platform ensures security and independence from external vendors, allowing you to transmit secrets to third-party applications even when they do not support your secret storage solution. Additionally, the remarkable template engine of Cluster.dev offers unparalleled customization options for all aspects of your infrastructure, enabling you to tailor configurations, scripts, manifests, and Terraform code to meet your unique requirements. In an ever-evolving technological landscape, having such a versatile tool is invaluable for maintaining control and flexibility.
Description
Authentik serves as an open-source identity provider that consolidates all your identity management needs into a singular platform, effectively replacing solutions like Okta, Active Directory, and Auth0. Authentik Security operates as a public benefit company focused on enhancing the open-source initiative. By utilizing a self-hosted, open-source identity provider, you are able to emphasize security and maintain control over your most confidential information. With authentik, the reliance on third-party services for your identity management is eliminated, offering greater peace of mind. You can seamlessly integrate authentik into your existing environment, tailoring it to meet diverse requirements. Our APIs and fully customizable policies empower you to automate workflows effectively. Deployment and scaling are made easier with our prebuilt templates and compatibility with Kubernetes, Terraform, and Docker Compose. You can avoid depending on external services for essential infrastructure and safeguard your sensitive data from the public internet. Take advantage of our pre-built workflows, or opt to modify every stage of authentication through flexible templates, infrastructure as code, and extensive APIs, ensuring a personalized experience. This flexibility allows you to adapt authentik to suit your unique organizational needs while enhancing security measures.
API Access
Has API
API Access
Has API
Integrations
Kubernetes
Terraform
AWS Secrets Manager
Active Directory
Amazon Web Services (AWS)
Docker
FreeIPA
GitHub
GitLab
Google Cloud Platform
Integrations
Kubernetes
Terraform
AWS Secrets Manager
Active Directory
Amazon Web Services (AWS)
Docker
FreeIPA
GitHub
GitLab
Google Cloud Platform
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$0.02 per month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Cluster.dev
Website
cluster.dev/
Vendor Details
Company Name
authentik
Country
United States
Website
goauthentik.io
Product Features
Product Features
Single Sign On
Biometric
Credential Management
Identity Federation
Multifactor Authentication
Password Management
Policy Management
Social Sign On
User Management