Best Identity Management Software for GitHub

Find and compare the best Identity Management software for GitHub in 2024

Use the comparison tool below to compare the top Identity Management software for GitHub on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    JumpCloud Reviews
    Small and medium-sized enterprises (SMEs) around the world can realize true freedom of choice by partnering with JumpCloud. JumpCloud centralizes the management and security of identities, access, and devices through its cloud-based open directory platform, enabling IT teams and managed service providers (MSPs) to remotely support Windows, Mac, Linux, and Android devices, manage identities natively or from their preferred HRIS or productivity suite, and provide access to hundreds of on-prem and cloud-based apps with a single, secure set of credentials. Start a 30 Day Trial of JumpCloud today to take advantage of the entire platform for free.
  • 2
    LastPass Reviews
    Top Pick

    LastPass

    LastPass

    $4 per user per month
    32 Ratings
    LastPass is the leader in password and identity management solutions, trusted by individuals and organizations of all sizes worldwide. Millions rely on LastPass daily to create, store, manage, and protect their most important credentials, keeping them secure, private and always within reach. With LastPass, anyone can effortlessly log in to life or work anytime, anywhere.
  • 3
    Foxpass Reviews
    Top Pick

    Foxpass

    Foxpass

    $3/User/Month
    7 Ratings
    Foxpass provides access control and infrastructure identity for companies of all sizes. Our cloud-hosted and on-premise LDAP and RADIUS and SSH key management solutions ensure employees have only the networks, servers, and VPNs that they need, and only for the period requested. Foxpass can be integrated with existing products such as Office365, Okta and Bitium to provide seamless access.
  • 4
    Rippling Reviews
    Rippling streamlines HR, payroll, IT, and spend management for global businesses. Effortlessly manage the entire employee lifecycle, from hiring to benefits administration to performance. Automate HR tasks, simplify approvals, and ensure compliance. Manage devices, software access, and compliance monitoring all from one dashboard. Enjoy timely payroll, expense management, and dynamic financial policies, empowering you to save time, reduce costs, and enhance efficiency in your business. Experience the power of unified management with Rippling today.
  • 5
    Ping Identity Reviews

    Ping Identity

    Ping Identity

    $5 per user per month
    Ping Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow.
  • 6
    PortalGuard Reviews

    PortalGuard

    BIO-key International

    BIO-key PortalGuard IDaaS, a cloud-based IAM platform, offers the most flexible options for multi-factor authentication and biometrics. It also allows customers to reset their passwords and provides a user-friendly interface. All this at a reasonable price. PortalGuard has been trusted by many industries, including education, finance, healthcare, and government, for over 20 years. It can be used to secure access for employees and customers, regardless of whether they are on-premises or remote. PortalGuard's MFA is unique because it offers Identity-Bound Biometrics with the highest levels of integrity and security. They are also more accessible than traditional authentication methods.
  • 7
    Teleport Reviews
    The Teleport Access Platform delivers on-demand, least privileged access to infrastructure on a foundation of cryptographic identity and zero trust. It eliminates credentials and standing privileges, hardens infrastructure with identity governance and security, and unifies the management of access policies across your infrastructure.
  • 8
    Authress Reviews

    Authress

    Rhosys

    $1.10 per month
    Authress, Authorization API to your application. Authorization can be complicated quickly. Even though it seems simple, there are many hidden complications involved in authorization. It is not something you want to do on your own. It takes time to get authorization right. In simple cases, it takes an average of 840 hours to implement authorization logic. This number increases rapidly as you add more features to your app. Your application is your biggest security vulnerability. If you don't have the right skills, your doors are open to malicious attacks. You run the risk of compromising user data, non-compliance to local regulations, and major business losses. Features: Secure authorization API. Instead of creating your own authorization logic, call our API. Written by developers for developers. Granular permissions. Define multiple levels and group them by user role. You can be as specific as you like; Identity provider integrations; Simply call an API to connect any ID provider.
  • 9
    Teamstack Reviews

    Teamstack

    Teamstack

    $3 per user per month
    Do not compromise security for convenience. Automate identity management for legacy, mobile, and web apps to grow your team seamlessly. Integrate your day-to-day apps with our identity management platform to increase efficiency and allow employees, contractors, and customers to work seamlessly together. You can use pre-built integrations, Single-Sign-On and one click user provisioning to allow your team to sign in to any application passwordless using multi-factor authentication. Your workforce deserves easy access, regardless of whether your applications are cloud-based or custom-built. The Fortune 500s should not have high standards in identity management. They can access best-in-class accessibility and security features that will protect their business, increase efficiency, and save valuable time. Our access policies are now in place for employees who attempt to access cloud apps.
  • 10
    Zluri Reviews
    Zluri is a SaaS Operations Management Platform for IT Teams. It allows IT teams to manage, secure, and comply with multiple SaaS applications from one dashboard. Zluri helps bring shadow IT to light, monitor and manage SaaS spend, and automates end to end application renewal management. Zluri is data-driven. It helps IT teams plan, organize, secure, and get more out of their SaaS app portfolio.
  • 11
    Access Auditor Reviews

    Access Auditor

    Security Compliance Corp

    Access Auditor automates user access reviews and user entitlement reviews. Access Auditor alerts you to any changes in user access rights and monitors for violations of separation of duties. It also shows who has what access. Any AD/LDAP, Database or REST API can be used to import users. Enterprise roles (RBACs) can be modelled and defined, which allows for full RBAC reviews and provisioning. Access Manager uses the same ease-of use to automate provisioning and managing user access rights. Role-based access controls can be used to manage any system that has a database, REST API, or LDAP. SCC's simple and powerful approach to Identity Management allows for rapid success at a low cost. Access Auditor has a 100% customer success rate and can automate user access reviews in less than a week.
  • 12
    ZITADEL Reviews

    ZITADEL

    ZITADEL

    $100 per month
    ZITADEL, an open-source platform for identity and access management, simplifies authentication and authorization of applications. It has a wide range of features including customizable hosted logins pages, support for authentication methods like Single Sign-On (SSO), social logins and multifactor authentication. Developers can integrate authentication into their applications directly using ZITADEL APIs or create dedicated login interfaces. The platform is multi-tenant and supports role-based control. This allows for precise permissions based on roles. ZITADEL’s extensibility allows for seamless adaptation to workflows, user-management processes, and brand guidelines. Features like ZITADEL Actions execute workflows based on predefined events, without the need for extra code deployment.
  • 13
    DoubleClue Reviews
    DoubleClue, an Identity and Access Management Platform from HWS Group in Bavaria, allows you to manage access rights and identities. It protects company networks from cyberattacks that target digital identities/the "human factor" by using modern multi-factor authentication. The platform also offers integrated password management and secure cloud storage to protect confidential data. Identity security, password management and secure cloud storage protected by adaptive multi-factor-authentication (MFA). On-premises or in the cloud. DoubleClue protects any part of your business that isn't covered by firewalls or virus scanners. This includes the human factor, which is the most vulnerable component in any IT security. A strong, all-in-one platform protects all digital accesses, applications, passwords, and confidential data. Employees expect maximum flexibility in the digital workplace. Allow them to work anywhere, on any device, without compromising their IT security.
  • 14
    Asgardeo Reviews
    Asgardeo makes it easy for developers to implement secure authentication flows to their applications in just a few steps. Integrate single page, regular, and mobile applications easily. SDKs that allow you to work with different technology stacks. Pre-defined templates are available to enable social sign-in via Google, Facebook, or GitHub. More templates will be added soon. External identity providers can be configured to connect with your application using open standards like OpenID Connect or SAML. You can manage your customers, employees, partners, and partners using (default) supported onboarding, management, and reporting workflows. You can either use the Asgardeo directory or add your LDAP or Active Directory through an agent. You can choose from various methods, including SMS OTP, Email OTP, or TOTP for 2FA. You can define multiple steps and configure options according the user's requirements. Focus on the business logic to unlock the full application experience and allow login and secure access for end-users.
  • 15
    Stack Identity Reviews
    We identify, eliminate, and govern shadow access, unauthorized, unmonitored, and invisible access to cloud applications, data, and infrastructure, before an attacker can exploit this. We transform cloud IAM with an automated, risk-driven approach for securing and managing cloud data. This allows cloud and security teams quickly identify data access patterns; who, what and when data is accessed, and its impact on cloud security. Stack Identity protects data in the cloud by prioritizing and visualizing the impact of identity, data and access vulnerabilities. We help you remediate both human and API-based access risks, guiding identity practitioners and governance and compliance teams, as well as data owners, to take definitive actions and provide SecOps, DevOps, and SecOps teams, with an honest view on cloud security risks.
  • 16
    Clutch Reviews
    Clutch addresses the growing challenge of non-human security in modern enterprises. As digital infrastructures grow and become more complex the management and security non-human identity, from API keys and secret to tokens and services accounts, has emerged as an important yet often overlooked aspect of cybersecurity. Clutch has developed an enterprise platform to manage and protect these identities. Our solution is designed for enterprises to strengthen their digital backbone, ensuring a safe, resilient and trustworthy environment. The number of digital identities is growing at an astonishing rate of 45 to 1 compared to human ones. Has extensive access and critical privileges, which are essential for mission-critical automated process. Lacks inherent security measures such as MFA or conditional access policies.
  • 17
    Entro Reviews

    Entro

    Entro Security

    Non-Human Identity & Secrets Security Platform. Entro is a pioneer in nonhuman identity management. It allows organizations to use nonhuman identities and secrets securely, while automating the lifecycle of their creation to rotation. Cyber attacks based on secrets are becoming more destructive as R&D teams create more secrets and spread them across different vaults and repositories without any real secret management, monitoring or security oversight. Streamline your non-human lifecycle management. Entro allows security teams to manage and protect non-human identities through automated lifecycle management, seamless integration and a unified interface.
  • 18
    Aembit Reviews
    Workload IAM replaces manual and insecure access of non-human identity with our automated and confidential Workload IAM platform. Manage your workload-toworkload access the same way you manage your users - with automated, identity-driven and policy-based controls. This will allow you to eliminate the risk associated with non-human identities. Aembit increases security by cryptographically validating workload identities in real-time, ensuring only trusted workloads can access your sensitive data. Aembit injects credentials that are only valid for a short time into requests, so you don't have to store or protect secret information. Dynamically enforce access controls based on real time evaluations of workload security postures, geography, and other key behavioral traits. Aembit secures workloads on-prem, in the cloud and in SaaS.
  • Previous
  • You're on page 1
  • Next