What Integrates with Bitwarden?
Find out what Bitwarden integrations exist in 2024. Learn what software and services currently integrate with Bitwarden, and sort them by reviews, cost, features, and more. Below is a list of products that Bitwarden currently integrates with:
-
1
Cisco Duo
Cisco
$3 per user per month 1,279 RatingsSecure your workforce with powerful, simple access security. We are Cisco Duo. Our modern access security system is designed to protect all users, devices, applications, so you can focus on what you do best. Secure access for all users and devices, in any environment, from any location. You will enjoy the peace of mind that only total device visibility and trust can provide. A SaaS solution that natively protects all applications and is easy to deploy, scaleable and quick to respond to threats. Duo's access security protects all applications from compromised credentials and devices. It also provides comprehensive coverage that helps you meet compliance requirements. Duo integrates natively with applications to provide flexible, user friendly security that is easy to implement and manage. It's a win-win-win for administrators, users, and IT staff. Multi-factor authentication, dynamic device trust and adaptive authentication are key components of your zero-trust journey. Secure SSO is also a part of the mix. -
2
Shift
Shift Technologies Inc.
Free 1,055 RatingsShift is your power browser. The only browser to merge all your applications into one beautiful window. Connect all of your email accounts and manage all your apps from one powerful window. Streamline everything you do online when you install Shift and access thousands of apps without leaving your browser. Tired of juggling apps, hundreds of tabs, and multiple accounts? Most browsers make that feel messy, Shift makes it simple. -
3
Opera
Opera Software
Free 426 RatingsOpera is a free internet browser that comes with enormous benefits and strong customization options. Built on Chromium it take advantage of most of Google Chrome's extension library, including the best VPN completely free for users. These are just a few of the essential features that Opera offers to make browsing easier, more enjoyable, and less distracting thanks to the Ad blocker built-in. Opera's integrated virtual privacy network protects your privacy and reduces tracking. Opera browser offers you to easily connect with your social life through the most famous social network integrated directly in the sidebar (Facebook, Instagram, Telegram, Whatsapp, Twitter, VKontakte) and listen your favourite music with the music players built-in (Spotify, Youtube and Apple Music). With Opera browser you can also: - Search with Google and use the auto-fill prediction function - Send encrypted content and links (articles, images, and videos) between devices using My Flow - Toggle the integrated ad blocker on and off. Opera browser is available for MacOS, Linux, and Windows devices. It works on desktop versions of MacOS X 10.11 and later, Ubuntu 16.04 and later, and Windows 7 and later. -
4
Google Workspace
Google
$6 per user per month 13 RatingsG Suite has just gotten better -- Google Workspace (previously G Suite) is now available. All the tools you need to accomplish anything, all in one place. Google Workspace is an integrated workspace that's easy to use. It allows you to spend less time managing your work, and more time actually doing it. Google Workspace helps you focus on what's most important and lets you let Google do the rest. It uses best-in-class search technology and AI to help you work smarter. You can work from anywhere and on any device, even offline, with tools that help you integrate, customize, extend, and adapt Google Workspace to your team's needs. All Google Workspace plans offer a customized email for your business, similar to G Suite. It also includes collaboration tools such as Gmail, Calendar and Meet, Chat. There are many plans available that can be tailored to your business's needs. Find the right plan for your business on our pricing and plans page. -
5
Small and medium-sized enterprises (SMEs) around the world can realize true freedom of choice by partnering with JumpCloud. JumpCloud centralizes the management and security of identities, access, and devices through its cloud-based open directory platform, enabling IT teams and managed service providers (MSPs) to remotely support Windows, Mac, Linux, and Android devices, manage identities natively or from their preferred HRIS or productivity suite, and provide access to hundreds of on-prem and cloud-based apps with a single, secure set of credentials. Start a 30 Day Trial of JumpCloud today to take advantage of the entire platform for free.
-
6
OneLogin, a trusted identity management (IAM), solution for modern enterprises, helps you secure company information and empower your employees. OneLogin is a great solution for companies that want to simplify business logins and strengthen enterprise security. OneLogin features include single sign-on (SS), user provisioning, unified directory, user provisioning and adaptive authentication. Compliance reporting is also available.
-
7
Docker eliminates repetitive, tedious configuration tasks and is used throughout development lifecycle for easy, portable, desktop, and cloud application development. Docker's complete end-to-end platform, which includes UIs CLIs, APIs, and security, is designed to work together throughout the entire application delivery cycle. Docker images can be used to quickly create your own applications on Windows or Mac. Create your multi-container application using Docker Compose. Docker can be integrated with your favorite tools in your development pipeline. Docker is compatible with all development tools, including GitHub, CircleCI, and VS Code. To run applications in any environment, package them as portable containers images. Use Docker Trusted Content to get Docker Official Images, images from Docker Verified Publishings, and more.
-
8
Desktop.com
Desktop.com
$5 per user per month 4 RatingsDesktop.com offers a complete solution that saves money and instantly provide you and your team with all key aspects for efficient online collaboration and organization. Stay on top of it all by creating one or several workspaces, connect them and organize tools and content into separated Desktops. Add app integrations, share and manage access or use the global search to instantly search across everything from a single location to find what you need. Working with a team, partners or other guest users? Enable the complete Desktop.com communication suite with chat, voice and video call functionality that seamlessly gets added to your workspace. - powerful search; search across ALL your content, apps, integrations and more! - integrated app store; instant access to all the best web apps - bookmark management and sharing - password manager & password sharing - browser extension with secure vault - import feature - app integrations - SSO - MFA Communication suite: - group chat, 1-on-1 chat, cross-app chat - voice and video call - meeting breakout rooms - schedule meetings And much more. Organize it all, with an online Desktop. -
9
Microsoft Entra ID
Microsoft
4 RatingsMicrosoft Entra ID, formerly known as Azure Active Directory, is a comprehensive cloud-based identity and access management solution that combines core directory service, application access management and advanced identity protection. Cloud identity and access management solutions connect employees, customers and partners with their apps, devices and data. Protect data and resources with adaptive access policies and strong authentication without compromising the user experience. Provide a quick, easy sign-in across your multicloud environment in order to keep your users productive and reduce time spent managing passwords. Manage all your identities, and access to your applications, in one central location, whether in the cloud, or on-premises. This will improve visibility and control. -
10
Google
Google
Free 23 RatingsOur mission is to organize all of the world's information so everyone can access it and use it. There are thousands, sometimes even millions, of websites that provide useful information every time you search. Google's search engine determines which results to show you before you type. It is guided by your commitment to provide the best information. Google organizes information about websites in its Search index even before you start searching. The index works in a similar way to a library but contains more information than all the libraries around the world. Google's Search algorithms scan through hundreds of millions of pages in our Search index in a fraction of seconds to find the most relevant and useful results for your search terms. Google offers many formats to help you quickly find what you are looking for. We are constantly improving the way we present information, whether it's in a map with directions or images and videos. -
11
One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
-
12
Authy
Twilio
20 RatingsAllow 2FA on your favorite sites. Protect yourself against hackers and account takeovers by going beyond the password. Simple to setup, secure cloud backup, multi device support. Protect your accounts from cyber criminals and avoid account takeovers by enabling 2FA. You can watch the video below to learn why 2FA should be enabled for your accounts. It is no longer safe to rely on usernames and passwords for online account security. Data breaches happen daily and hackers are constantly inventing new ways of taking over your accounts. Enable two-factor authentication (2FA) to protect yourself. This prevents anyone from using your stolen data. It verifies your identity via your device. To protect your online accounts, enable 2FA now -
13
Google Chrome
Google
60 RatingsGoogle's browser lets you connect to the rest of the world. Google has created powerful tools that allow you to connect, play and work, and help you get things done. All of this works with Chrome. Chrome is a great tool to stay productive and get the most out of your browser with Google apps like Gmail and Google Pay. - 14
-
15
Safari
Apple
25 RatingsSafari is the best way for you to access the internet on all of your Apple devices. It offers powerful privacy protections, robust customization options, and an industry-leading battery life, so you can browse as you please, whenever you like. It's also the fastest browser in terms of speed. Safari now offers new personalization options, including a customizable homepage and more third-party extensions. You can now customize your start page with a custom background image, fine-tune your browser window and use your favorite features such as Reading List, Favorites and Siri Suggestions. Safari Extensions are extensions that add functionality to your browser that allow you to explore the web in the way you want. You can find and add your favourite extensions in the Safari section of the App Store. Safari is the fastest browser in the world thanks to its JavaScript engine. -
16
Brave Browser
Brave Software
Free 43 RatingsBrave Browser is a super fast, safe, and private web browser with built-in ad blocker. Core features Private Browsing Enjoy fast, secure, private browsing. Get a free ad blocker, anonymous browsing history, personalized private search, and private tabs. Browse the internet without saving your history. Brave Search Brave Search is the world’s most complete, independent, private search engine. It doesn’t track you, your searches, or clicks. Brave Wallet Buy, store, send, receive, and swap crypto with Brave’s secure Web3 wallet, built right into the browser. Support for Ethereum, Solana, BNB Chain, and more. Brave Rewards With your old web browser, you paid to browse the internet by viewing ads. Now, Brave welcomes you to the new internet. One where your time is valued, your personal data is kept private, and you actually get paid for your attention. Brave Firewall and VPN Brave VPN blocks trackers and encrypts and protects every connection to the Web. Brave News Customized news feeds, from leading sources, delivered right to your browser. All 100% private Browse privately, search privately, and ditch Big Tech. With Brave. -
17
Microsoft Edge
Microsoft
36 RatingsThe browser for businesses is here. Built on Chromium open-source, and backed by Microsoft security innovation. Microsoft Edge is a fast and secure browser that protects your data and helps you save time and money. Microsoft Edge is compatible with Windows, macOS and iOS. Microsoft Edge is the best browser available for Windows. Microsoft Edge is the best browser for Windows. Sync your passwords and settings across multiple devices. Microsoft Edge was created to feel at home on a Mac. You can easily sync your passwords and settings across multiple devices. Microsoft Edge is your trusted web browser. Download it today. Microsoft Edge can be downloaded to your iOS device. You can sync your passwords, favorites, collections across all of your signed-in devices. To install the app, scan the QR code. Microsoft Edge can be downloaded to your Android device. Sync your passwords and favorite collections across all your signed-in devices. -
18
Tor Browser
The Tor Project
2 RatingsYou can protect yourself from surveillance, tracking, and censorship. If Tor is blocked in your country, you can configure Tor so that it connects to a bridge during setup. Select "Tor is blocked in my country." An incorrect system clock is one of the main reasons Tor doesn't connect if Tor isn't censored. It is important that it is correctly set. Tor Browser will block browser plug-ins like Flash, RealPlayer and QuickTime. They can be used to reveal your IP address. We do not recommend adding any additional plugins or add-ons to Tor Browser. Plugins and add-ons can bypass Tor and compromise your privacy. Tor Browser already includes HTTPS Everywhere, NoScript and other patches to protect and secure your privacy. Tor Browser uses Tor to protect anonymity and privacy. Tor Browser is designed to protect you from websites "fingerprinting" your browser configuration, or identifying you. -
19
Univention Corporate Server
Univention
€25.00 /net per user and year Univention Corporate Server UCS, our open integration platform, offers centralized Identity & Access Management with Nubus via a web portal. Portal with Single Sign-On -Integrated IAM -Packaged Integrations App Center with enterprise applications Active Directory Integration -Platform to manage your entire IT -On-premises, in the cloud or hybrid Nubus is the central IAM solution that manages identities, roles and groups. The integrated portal, with Single Sign-On (SSO) and self-service features, provides access to all applications and IT services. Apps can be quickly and easily implemented thanks to pre-built integration packages and software. UCS is the ideal solution for managing heterogeneous and distributed IT environments on Windows, Mac OS and Linux systems. Download the free UCS Core Edition from our website to learn more about UCS. -
20
SimpleLogin
Proton AG
$4 per monthEmail aliases allow you to remain anonymous online and protect your inbox from spam and phishing. Open-source. Made in Europe and hosted there. If a website asks you for your email address, use an alias to replace your real email. Emails sent to an address other than your real email address are forwarded to you without the sender even knowing. If you wish to reply to an email forwarded to you, just hit "reply" and your real email address will remain hidden. You can also send emails easily from your alias. You can quickly create an alias from anywhere. Register for the newsletter and create an online account in just a few clicks. All SimpleLogin components are open-source and based on open-source technology. An alias can not only receive emails but can also send them. An alias can be used to create a full-fledged email account. You can manage your aliases via the SimpleLogin website, Firefox, Chrome, and Safari extensions. Or on your phone using Android (Play Store or F-Droid) or iOS apps. -
21
n8n
n8n
$20 per monthBuild complex automations up to 10x faster without battling APIs. The days of slogging through a mess of scripts is over. JavaScript is the best choice when you want flexibility, and UI for all other tasks. n8n lets you build flexible workflows that are focused on deep data integration. With a user-friendly interface and templates that can be shared, even the less technically minded members of your team can work together on them. Contrary to other tools, complexity does not limit you. You can build anything you want, without worrying about budget. Connect APIs without code to automate basic functions. You can also use vanilla Javascript to manipulate complex data. You can implement more than one trigger. You can branch and merge your workflows. You can even pause flows while you wait for external events. Custom HTTP requests allow you to easily interface with any API or service. Separate dev and production environments with different sets of authentication data to avoid breaking live workflows. -
22
Pipedream
Pipedream
$0.0001 per invocationThe fastest way to integrate APIs, and run code. Pipedream is a serverless computing platform and integration platform that makes it easy for developers to create event-driven workflows and connect apps. Any API can be turned into an event stream by creating event sources. You can create event sources to listen for tweets, Github events or Airtable records. You can inspect events in a human-friendly manner, trigger Node.js workflows for every event, and consume events in your app via API. Node.js code steps are used to create workflows that run on every event. You can write your own Node.js and use any npm packages. Or you can reuse actions that scaffold popular APIs. You can trigger via sources, a custom URL, email address or SDK code, or a schedule. Connect to Auth apps once and they will continue to work in your workflow. Pipedream supports OAuth, key-based auth and handles token refresh and OAuth flow for you. Simply link accounts to steps, and include the appropriate auth information in code. -
23
Firefox Relay
Mozilla
$0.99 per monthFirefox Relay email aliases hide your real email address and forward emails to your inbox. You can now only receive the emails you wish to receive in your inbox. Register with Firefox to get started. To protect your email inbox and identity, you can use Share Relay email aliases to replace your real email address. Relay icons will appear on sites that ask for your email address as you browse the internet. Register to the Relay dashboard and keep track of all the aliases that you have created. Relay will forward all messages to your email address. You can block spam and unwelcome messages from an alias or delete it right from your dashboard. -
24
Jovu
Amplication
Amplication AI allows you to easily create new services and extend existing applications. From idea to production within four minutes. AI assistant that generates production ready code, ensuring consistency and predictability. With production-ready code built for scale, you can go from concept to deployment within minutes. Amplication's AI provides more than just prototypes. Get fully operational, robust services that are ready to go live. Streamline your development workflows to reduce time and optimize resources. With the power of AI, you can do more with your existing resources. Jovu will translate your requirements into code components that are ready to use. Data models, APIs and other components that are ready for production, including authentication, authorization and event-driven architecture. Add architecture components and integrations, and extend Amplication plugins. -
25
Yubico YubiKey
Yubico
YubiKey protects your digital world. Stop account takeovers, make your multifactor authentication passwordless, and modernize it. The world's best security key provides superior security, user experience, and a return on investment. The YubiKey is available in a variety shapes and features to suit your needs, both for personal and professional use. To find the right key, take our Product Finder Quiz. The YubiKey can be used with hundreds of software and services. We are here to help you get started, whether it's for personal or professional use. The industry's most trusted security key. It allows strong multi-factor, two-factor, and passwordless authentication. The multi-protocol YubiKey protects your access to computers, networks, online services, and other digital devices with a simple touch. No more reaching for your smartphone or retyping passcodes. Simply plug in your YubiKey and tap. It will do the rest. -
26
Blink
Blink Ops
Blink is a powerful ROI multiplier for business leaders and security teams who want to quickly and easily secure many different use cases. Get complete visibility and coverage across your organization's security stack. Automated flows can reduce false positives and noise in alerts. Scan for threats and vulnerabilities and identify them proactively. Automated workflows can be created to add context, streamline communication, and reduce the MTTR. Automate your workflows with no-code and generative AI to take action on alerts, and improve the security posture of your cloud. Keep your applications secure by allowing developers to access their applications, streamlining approvals processes, and shifting left the requests for access. Monitor your application continuously for SOC2, ISO or GDPR compliance checks, and enforce controls. -
27
Clarity Security
Clarity Security
Eliminate audit angst with 10-minute user access reviews, flexible provisioning/de-provisioning workflows, and audit-friendly reporting, all in one simple, scalable IGA platform. White-glove implementation takes the burden off team members, reducing the impact of other IT initiatives. Automated evidence gathering into a downloadable ledger reduces the need to waste time gathering spreadsheets and screenshots. Clarity Explorer and nested entitlements provide insights into what users are granted access to and why. Role-based access control and automated workflows aligned with your organization's structure and needs. Clarity is a powerful tool that allows you to upgrade your identity governance program quickly and adapt it seamlessly as your organization grows. Fast reviews to certify user access, entitlements and roles, application access and more. -
28
Keycloak
Red Hat
Keycloak is an open-source identity and access management system. Easily add authentication to secure services and applications. There is no need to store users or authenticate users. All of this is available right out of the box. Advanced features like User Federation, Identity Brokering, and Social Login are available. You can find more information at about and documentation. Don't forget Keycloak! It's simple by design. -
29
Stackreaction
Stackreaction
How to build a marketplace, online school, or membership site? You will find tools, integrations, workflows, and guides to help you jumpstart your idea. Browse tools and apps, compare features, and leave feedback. Automating routine tasks? All integrations from Zapier and Integromat, Automateio, and other automation platforms are available in one place. Compare features and prices. Find tutorials and guides from vendors and the community. Contribute your knowledge. Make use of the nocode community's openness. Create your profile, grab your favorite tools, and share your stack.
- Previous
- You're on page 1
- Next