Best OAuth Alternatives in 2025
Find the top alternatives to OAuth currently available. Compare ratings, reviews, pricing, and features of OAuth alternatives in 2025. Slashdot lists the best OAuth alternatives on the market that offer competing products that are similar to OAuth. Sort through OAuth alternatives below to make the best choice for your needs
-
1
1Password
1Password
16,089 Ratings1Password is a password manager that's secure, scalable, easy-to-use, and trusted by some of the most prestigious companies in the world. 1Password makes it easy to keep your employees safe online with its simple interface. Good security habits will become second nature once 1Password is a part of your employees' workflow. 1Password Advanced Protection now available with 1Password Business You can set Master Password policies, enforce two factor authentication across the entire team, limit access with firewall rules, review sign in attempts, and require that your team use the latest version 1Password. Our award-winning apps can be downloaded for Mac, iOS and Linux as well as Windows, Android, and Windows. 1Password syncs seamlessly between devices so that your employees have access to their passwords at all times. Your risk is reduced and your productivity increases when everyone uses 1Password. -
2
Cisco Duo
Cisco
1,290 RatingsSecure your workforce with powerful, simple access security. We are Cisco Duo. Our modern access security system is designed to protect all users, devices, applications, so you can focus on what you do best. Secure access for all users and devices, in any environment, from any location. You will enjoy the peace of mind that only total device visibility and trust can provide. A SaaS solution that natively protects all applications and is easy to deploy, scaleable and quick to respond to threats. Duo's access security protects all applications from compromised credentials and devices. It also provides comprehensive coverage that helps you meet compliance requirements. Duo integrates natively with applications to provide flexible, user friendly security that is easy to implement and manage. It's a win-win-win for administrators, users, and IT staff. Multi-factor authentication, dynamic device trust and adaptive authentication are key components of your zero-trust journey. Secure SSO is also a part of the mix. -
3
Auth0
Okta
817 RatingsAuth0 takes a modern approach to Identity and enables organizations to provide secure access to any application, for any user. Auth0 is highly customizable, and simple yet flexible. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. With Auth0, you can rapidly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. -
4
ManageEngine ADSelfService Plus
ManageEngine
108 RatingsBoth IT teams and end users are afflicted by password reset tickets. IT teams will often push more urgent issues down the queue to ensure that users don't have their work put on hold while their passwords reset. Password reset tickets can be costly if they aren't addressed promptly. Nearly 30 percent of all help desk tickets were caused by forgotten passwords. It is not surprising that large companies have spent more than $1 million to resolve password-related help desk requests. It is a good habit to change passwords regularly, as it helps prevent cyberattacks caused by stolen credentials. Security experts recommend that administrators ensure that users change their passwords regularly and have password expiration policies in place. -
5
miniOrange
miniOrange
122 RatingsminiOrange offers a range of IAM products and solutions to secure both Identity anywhere and everywhere! Here are some of the major solutions from miniOrange: Single Sign-On (SSO): Enable SSO for web, mobile, and legacy apps with this robust solution which supports all IDPs and Authentication protocols. Multi-Factor Authentication (MFA): The only MFA solution in the market offering 15+ MFA methods including Push Notification, OTP verification, Hardware Token, Authenticator Apps, and many more. Customer Identity & Access Management (CIAM): Secure your customer identity and provide a seamless customer experience. CIAM enables you to safeguard customer privacy while providing them convenient access to your digital resources. User Provisioning: Sync all users automatically from your local directory to miniOrange. Effectively manage User Lifecycle for employees & customers. Adaptive Authentication: Tackle high-risk scenarios with ease with a solution that analyzes risk based on contextual factors and applies appropriate security measures. Universal Directory: A secure directory service that safeguards your sensitive information. It also allows you to integrate your existing directory into miniOrange. -
6
JumpCloud
JumpCloud
3,325 RatingsSmall and medium-sized enterprises (SMEs) around the world can realize true freedom of choice by partnering with JumpCloud. JumpCloud centralizes the management and security of identities, access, and devices through its cloud-based open directory platform, enabling IT teams and managed service providers (MSPs) to remotely support Windows, Mac, Linux, and Android devices, manage identities natively or from their preferred HRIS or productivity suite, and provide access to hundreds of on-prem and cloud-based apps with a single, secure set of credentials. Start a 30 Day Trial of JumpCloud today to take advantage of the entire platform for free. -
7
MIRACL
17 RatingsProtect your users. Make their journey easier. MIRACL Trust provides a safer and smoother authentication experience. Only one step. No passwords. No problem. Multi-factor authentication is slow and cumbersome. MIRACL is a safer and more efficient alternative to traditional MFA. Logging in takes only 2 seconds and error rates as low at 1/10th of passwords. No passwords necessary. All you need is a PIN and you are in. Our cryptographic technology ensures that users' information is always safe. MIRACL Trust provides a simple login experience that puts users first and makes it easy to roll out your data quickly. -
8
Nevis Authentication Cloud
Nevis
$500 per month 5 RatingsAuthentication Cloud is faster, easier, & more user-friendly. Customers can access your online services without the need for passwords or expensive SMS fees. The Nevis Authentication Cloud will allow you to provide maximum security and a seamless user experience for your customers in no time. Authentication as a service is faster, easier, and more user-friendly. Customers can access your online services without the need for passwords or expensive SMS fees. The Nevis Authentication Cloud will allow you to offer maximum security and a seamless user experience to your customers in no time. The Authentication Cloud from Nevis will allow you to offer maximum security and a seamless user experience to your customers in no time. In today's mobile world, remembering complex passwords for individual accounts is no longer an option. New password-free authentication options such as fingerprint and face ID are faster, more convenient, and significantly safer for all parties. -
9
Securden Password Vault
Securden
2 RatingsSecurden Password Vault is an enterprise-grade password management solution that allows you to securely store, organize, share, manage, and keep track of all human and machine identities. With a sleek access management system, Securden lets your IT teams share administrator credentials and effectively automate the management of privileged accounts in your organization. Securden seamlessly integrates with industry solutions like SIEM, SAML-based SSO, AD, and Azure AD among others to provide a smooth deployment in any organization. With Securden, organizations can rest easy as all their sensitive data is protected with strong encryption methods and supported by a robust high availability setup. Securden offers drilled-down granular access controls that allow users to grant access to accounts without revealing the underlying credentials in a just-in-time fashion. Securden Password Vault can be deployed both on-premise for self-hosting and on the cloud (SaaS). -
10
FusionAuth
FusionAuth
$0 22 RatingsFusionAuth was built from the ground up to integrate with any app or language. Each feature (yes, every one) is exposed via an API which gives you total flexibility to handle any use cases. Every feature and acronym you need is included: registration & log-in, passwordless, MFA, SAML and OIDC. In seconds, you can comply with GDPR, HIPAA and COPPA requirements. FusionAuth can be installed on any platform, on any computer, and anywhere. FusionAuth Cloud, our fully managed SaaS hosting solution, allows you to host it yourself. -
11
Microsoft Entra ID
Microsoft
4 RatingsMicrosoft Entra ID, formerly known as Azure Active Directory, is a comprehensive cloud-based identity and access management solution that combines core directory service, application access management and advanced identity protection. Cloud identity and access management solutions connect employees, customers and partners with their apps, devices and data. Protect data and resources with adaptive access policies and strong authentication without compromising the user experience. Provide a quick, easy sign-in across your multicloud environment in order to keep your users productive and reduce time spent managing passwords. Manage all your identities, and access to your applications, in one central location, whether in the cloud, or on-premises. This will improve visibility and control. -
12
Frontegg is a developer platform that enables self-service, security and enterprise-capabilities through a rich user-management interface, freeing up creativity and differentiation. Frontegg's platform provides more than just authentication and SSO via an embedded login-box. It also offers an Admin Portal that serves as the Settings area for your users. The Admin Portal lets your users manage all aspects of their accounts. Users can assign roles and permissions to users and teams, create and assign roles and permissions, view audit logs, subscribe for webhooks, and more. Frontegg interfaces can be embedded within your app as a UI layer and become a customer-facing management interface. This interface is available for both personal and workspace level. Frontegg can also power-up your backend with rich SDKs that are available in various languages and frameworks.
-
13
Pomerium
Pomerium
$7 per monthPomerium is an easy-to-use, clientless solution for seamless access to web services and applications without the need of a corporate VPN. It is designed to improve developer productivity by eliminating complex user access flows which can hinder workflow. Pomerium, unlike traditional client-based solutions, offers lightning-fast connections and minimal latency. This ensures security and privacy without compromise. It uses contextual data to make access control decisions. Continuous verification is used, which is a zero-trust concept that verifies contextual factors for every action before accepting or denying it. This is in contrast to NextGen VPNs which only verify authorization and authentication at the beginning of a session. Pomerium provides secure access to web applications, databases, Kubernetes Clusters, internal tools and legacy apps. It is suitable for individuals and groups of all sizes. Pomerium replaces VPNs by providing secure remote access that is clientless. -
14
Ping Identity
Ping Identity
$5 per user per monthPing Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow. -
15
SecureAuth
SecureAuth
$1 per monthSecureAuth makes it easy and seamless to create digital experiences that support Zero Trust initiatives. SecureAuth provides a frictionless user experience that protects employees, contractors, and partners. This helps to reduce business risk and increase productivity. Secure, secure, and unified customer experiences will enable you to support your digital business initiatives. SecureAuth uses adaptive risk analytics to analyze hundreds of variables such as human patterns, device fingerprinting and geolocation to create each user’s digital DNA. This allows for continuous authentication in real-time, ensuring the highest level security possible throughout the digital journey. -
16
Microsoft Graph
Microsoft
Microsoft Graph is a gateway to data and intelligence within Microsoft 365. It provides a unified programmability that you can use in order to access the enormous amount of data within Microsoft 365, Windows and Enterprise Mobility + Security. Microsoft Graph lets you build apps that interact with millions users. What is Microsoft Graph? Microsoft Graph exposes RESTful APIs and client libraries that allow you to access data from the following Microsoft cloud services. - Microsoft 365 core service: Bookings (contacts), Planner (sharepoint), Teams, To Do and Viva Insights. - Enterprise Mobility + security services: Advanced Threat Analysis, Advanced Threat Protection and Azure Active Directory. - Windows services: activities, devices, notifications, Universal Print - Dynamics 365 Business Central -
17
Symantec SiteMinder
Broadcom
No matter how the user accesses an app, authentication is the first step. This allows the user to identify themselves. Modern access management technology must be able support all types of authentication and, more importantly, be able manage when each one is used. The next critical capability is to protect and manage the user's session once they have been authenticated. This capability unifies user experience across multiple apps while simultaneously delivering single-sign-on. It also protects the user's session from hijacking. Access management technology must also be capable of performing authorization checks when a user requests access to an application. These capabilities are provided by modern access management technology. -
18
NextAuth.js
NextAuth.js
FreeNextAuth.js, an open-source authentication solution, is tailored for Next.js apps, offering seamless integration with services like Google, Facebook Auth0 and Apple. It supports a variety of authentication methods including OAuth 1.0 &2.0, email/passwordless logins, and custom username/password system. NextAuth.js is designed for flexibility. It works in serverless environments, and supports multiple databases, including MySQL, PostgreSQL and MSSQL. Developers can choose between JSON Web Tokens or database sessions. Security features include HTTP POST validation of CSRF tokens, signed, prefixed server-only cookies and encrypted JWTs based on JWS/JWE/JWK. The platform is easy to set up, allowing developers to add authentication within minutes with minimal configuration. A comprehensive documentation and a supportive developer community make it more accessible to developers looking for a robust authentication system. -
19
Passwordless, proximity login to desktop applications, Macs, PCs, Macs, websites and Macs. Active proximity-detection allows hands-free wireless 2FA and password management. IT administrators can allow users to log into their computers and websites dynamically using a physical key. This can be done either automatically, manually, by touch, pressing Enter, or with an PIN. You can easily log in, switch users, change computers, and log out without any passwords, touch, trouble, or hassle - all you need is a key. The computer locks automatically when a user leaves, preventing access to the computer or web passwords. Continuous authentication ensures that users are constantly being checked to make sure they have access. No more typing passwords. Administrators and compliance can now automate password protection from a central admin console. This allows them to enforce stronger passwords and 2FA and gives employees the ability to log in without having to interrupt their workflow. Helpdesk tickets for forgotten passwords/password resets will be reduced. Login and autolock with proximity
-
20
Amazon Cognito
Amazon
1 RatingAmazon Cognito allows you to quickly add user signup, sign in, and control access to your web and mobile applications. Amazon Cognito supports millions of users. It also supports sign-in with social identity providers such as Amazon, Google, and Amazon. Enterprise identity providers via SAML 2.0 are supported. Amazon Cognito User Pools offer a secure user directory that can scale to hundreds of millions. User Pools can be set up quickly and easily without the need to worry about setting up server infrastructure. Amazon Cognito allows users to sign in via social identity providers like Amazon, Facebook, and Amazon. Enterprise identity providers like Microsoft Active Directory via SAML are also possible. Amazon Cognito User Pools, a standards-based Identity Provider, supports identity and access management standard, such as Oauth 2.0 and SAML 2.0. HIPAA compliant and eligible for PCI DSS, SOC and ISO/IEC 27017. ISO/IEC 27018 and ISO 9001. -
21
Ory
Ory
$29 per monthThe missing web-scale identity and access control API. Today, 10x your security and user experience. Build secure apps over the Ory Network to reach new customers in any region of the globe with the best login experiences ever. Login is much more than just a username and a password. It is dangerous and time-consuming to build it from scratch. Ory's API first microservice architecture allows projects to be integrated at any stage. Pay for usage and not features. Ory subscription plans include advanced multi-factor authentication. Plus, advanced permissions, SSO OAuth2, OIDC multi-tenancy and more. Ory is designed for high-performance and high-scale applications on any cloud. Ory is designed with developers in mind. It allows you to quickly create your own user experience, and integrate it within your software stack. Ory's focus is on open standards, and its automated data import capabilities make migrating to legacy systems simple. -
22
Avatier Identity Anywhere
Avatier
$5.00/one-time/ user Identity Anywhere is the first identity management solution that uses Docker containers. It is the most portable, scalable, and secure on the market. Identity Anywhere can run on any cloud, on-premise, or private cloud instance hosted at Avatier using Docker container technology. Avatier Identity Management products bring together separate back office applications and assets to manage them all in one system. With a single digital dashboard, executives at all levels can achieve measurable business growth and higher profits. With military-grade self-service password reset, you can eliminate the #1 Help Desk request. Reduce costs Only pay for what you use. A great shopping cart experience will maximize company utilization. Non-compliance can result in fines, lawsuits and even jail time. -
23
Intercede MyID
Intercede
MyID®, credential management software, allows governments and large corporations to issue and manage digital identity using the most secure method for multi-factor authentication to citizens and large workforces. MyID allows millions of people to securely authenticate themselves to the data, systems, and networks they need. MyID makes it easy for those responsible for information security to integrate and manage digital identity management and issuance. MyID allows seamless, secure access to company networks, systems, and resources for citizens and employees using multi-factor authentication via a variety devices. MyID®, a cyber secure credential management solution, is able to address the ever-growing threats of cyber terrorism and identity fraud. MyID is the best choice for data management. MyID software is distinguished by its reliability, security, and interoperability. -
24
ZITADEL
ZITADEL
$100 per monthZITADEL, an open-source platform for identity and access management, simplifies authentication and authorization of applications. It has a wide range of features including customizable hosted logins pages, support for authentication methods like Single Sign-On (SSO), social logins and multifactor authentication. Developers can integrate authentication into their applications directly using ZITADEL APIs or create dedicated login interfaces. The platform is multi-tenant and supports role-based control. This allows for precise permissions based on roles. ZITADEL’s extensibility allows for seamless adaptation to workflows, user-management processes, and brand guidelines. Features like ZITADEL Actions execute workflows based on predefined events, without the need for extra code deployment. -
25
Zoho Directory
Zoho
$1.70/user/ month Zoho Directory, a cloud-based platform for identity and access management, is designed to streamline authentication and authorization. It also simplifies user management. Single Sign-On (SSO), which allows employees to access multiple apps with a single set credentials, enhances security and user convenience. Multi-Factor Authentication is supported by the platform, adding an additional layer of protection from unauthorized access. Device authentication provides secure access to applications and devices. Employees can use the same credentials on all platforms. Zoho Directory offers robust provisioning capabilities, which allow IT administrators to create user profiles for various applications from the platform. This reduces the time spent on repetitive work. Directory stores facilitate integration with existing directories such as Microsoft Active Directory or Azure AD. -
26
OmniDefend
Softex
OmniDefend protects your employees, contractors, and vendors using universal single sign-on and strong authentication to secure business applications and processes. OmniDefend eliminates fraud by identifying and securing customer transactions online or in-person using multi-factor authentication. OmniDefend lets you quickly add authentication to a website, so that you can provide a password-free experience for your customers while securing e-commerce transactions. OmniDefend uses industry-proven standards when it comes to security. OmniDefend supports OpenId 2.0, OAuth 2.0 and SAML to ensure maximum compatibility and security when using single-sign-on applications. SCIM 2.0 enables OmniDefend to seamlessly integrate with identity management and user provisioning. -
27
Enzoic for Active Directory
Enzoic
$0Managing password security in Active Directory can be challenging, but it doesn’t have to be. Enzoic makes it easy with automated, always-on protection that works quietly in the background. Designed for IT professionals, it delivers smarter security without adding unnecessary complexity. - Always-On Monitoring: Passwords and credentials are automatically protected 24/7—no manual effort required. - Real-Time Breach Defense: Daily updates block compromised passwords before they pose a risk. - Comprehensive Coverage: Protects not just passwords but entire credential sets to reduce vulnerabilities. - Block Weak Passwords: Prevents predictable options like "Password123" while guiding users to create stronger alternatives. - Effortless Compliance: Achieve NIST 800-63B compliance with built-in protections and policies. - User-Friendly Tools: An optional Windows client provides real-time feedback to users, reducing IT workload. Cutting-Edge Threat Intelligence: With billions of compromised passwords updated daily, Enzoic protects your systems from new and old breaches alike. Built for IT, Designed for Simplicity: Enzoic integrates seamlessly into your environment, eliminating unsafe passwords and improving security. -
28
Stytch
Stytch
The authentication platform for developers. Stytch's APIs allow you to authenticate, sign up, and engage with your users. Flexible, passwordless authentication solutions that improve security and user experience. Let us help you build the infrastructure so that you can concentrate on your product. Our SDKs allow you to create seamless onboarding and authentication experiences. They can be customized to your logo, colors, fonts, or logo. Our direct API integration gives you more control over your user experience. It considers both the developer and user experience and ensures fast, secure, and passwordless authentication flows. With clear and complete documentation, we make integration easy and painless. -
29
Google Cloud Identity
Google
$6 per user per monthUnified identity, access, app and endpoint management platform (IAM/EMM). This platform helps IT and security teams maximize end user efficiency, protect company data, transition to a digital workspace, and transition to it. Protect your organization using the BeyondCorp security model, and Google's threat intelligence signals. Security Center can control access to SaaS apps and enforce strong multi-factor authentication (MFA). This will protect user accounts, manage endpoints, investigate threats, and ensure that users are protected. Optimize efficiency by providing intuitive user experiences on endpoint devices. You can also unify user, access and app management from one console. Users can access thousands of apps using single sign-on (SSO), and manage their company accounts the same way as their personal Google accounts. Integrate your existing systems onto a trusted platform and transition to digital. Directory Sync allows you to extend your existing directory to the cloud. -
30
AppSmart Identity
AppSmart
Securely connect everyone with everything. Digital transformation requires that you connect with people, apps, and devices. AppSmart Identity provides identity management and access management for all users across all applications and interconnected systems. This allows you to securely access and manage all cloud migration services as well as all other services from one place. Users don't want multiple passwords. Single sign-on allows users to access business systems from one account. This ensures seamless user experience for all cloud migration services and cloud managed service. Users can ensure that all identities that have access to business systems are verified with strong authentication and multi-factor authentication. Policy-based MFA stops unauthorized users from accessing corporate information with passwords alone. All your cloud managed services, eg. Manage all your users, groups, and devices. -
31
Specops Password Auditor
Specops Software
FreeAuthentication is essential. Our password audit tool scans your Active Directory to identify password-related vulnerabilities. Multiple interactive reports are generated from the collected data. These reports contain user and password policy information. Specops Password Inspector is a free, read-only program that can be downloaded for no cost. Analyze domain password policies and fine-grained password policies to determine if they allow users to create secure passwords. To identify password vulnerabilities in accounts, such as expired passwords and identical passwords, you can generate reports. Specops Password Audior provides additional insights and allows you to assess the effectiveness of your policies against a brute force attack. The product overview contains a complete list. -
32
LoginRadius
LoginRadius
3 RatingsLoginRadius allows businesses to provide a pleasant customer experience without compromising security. Companies can use our customer identity platform to offer a simplified login process, protect digital accounts, and comply with data privacy regulations. LoginRadius has over 3,000 users and 700 million monthly visitors worldwide. Registration services, adaptive security, integrations with third-party apps, and customer insights are some of the key platform features. Gartner, KuppingerCole and Computer Weekly have named the company an industry leader in customer identification and access management (CIAM). Microsoft is a major technology investor and partner. LoginRadius has its headquarters in Vancouver, Canada. There are additional offices in Toronto, USA and Australia. LoginRadius Services: API Authentication OAuth Data Management Secure Login One Sign On SAML SSO Sign up for social media Two Factor Authentication -
33
Visual Guard
Novalys
1.55/month/ user Visual Guard is an advanced identity and access management (IAM) tool. It offers a complete solution to secure sensitive applications and data. Visual Guard facilitates the implementation of robust, standards-compliant security policies, with centralized management of users and permissions, User management : Create, modify & delete user accounts Integrate with LDAP or Active Directory directories Automatic synchronization of user information Access control : Fine-grained access rights to features and resources Permission and Role Management Multi-factor authentication (MFA) Single Sign-On (SSO) Security Audit and Monitoring : Permission Matrix Detailed logs Historical & Real-time Graphs Integration: Compatibility with major development platforms, frameworks, and protocols. APIs for integration of authentication and authorization features into custom applications Benefits : Simplified access management Enhanced data security Improved regulatory compliance Reduce identity management cost Visual Guard is the ideal tool for organizations seeking to optimize their IT security strategy, while ensuring efficient and effective identity management. -
34
Veridium
Veridium
Veridium is an AI-based Behavioral biometrics-powered Integrated Identity Platform that provides multi-factor authentication (MFA), digital ID verification and a truly enterprise-grade passwordless experience to employees and customers. It is low code, flexible, and agile. Customers can forget their passwords. This eliminates friction and provides greater security for online connections. We offer a single-step multi-factor authentication solution that offers increased security. Organizations also get higher levels of identity assertion. Veridium provides an end-to-end authentication platform that can handle all your WFH requirements and any VPN solution. It delivers strong, multi-factor, passwordless workforce authentication. -
35
Cipherise for developers. All you need to create powerful and user-friendly authentication. Your users will have the best experience possible. Multi-Factor Authentication. MFA is simple and highly secure, which is almost invisible to end users. No complex passwords. No more complicated passwords, usernames, or credential sharing Omni Channel. The user experience is consistent regardless of whether it's on a mobile, tablet, laptop, or PC. Hackers are no longer able to access centralized credential Honeypots. Bi-Directional authentication. Before the user authenticates to it, the service authenticates to them. Mobile Native. Mobile Native. Protect your valuable IP and Content. We make it easy for your customers to sign up and access your content from any device.
-
36
Entrust Identity as a Service
Entrust
Cloud-based identity management (IAM), which includes multi-factor authentication (MFA), credential based passwordless access and single sign-on (SSO). Cloud-based multi-factor authentication provides secure access to all your users' apps, networks, devices, and accounts. Optimal user experience is achieved through adaptive authentication, proximity-based login, and adaptive authentication. Happy users won't try to bypass security measures. Everyone wins. This is easier than any other thing you have tried. The work-saving features, such as built-in provisioning tools, on-premises integrations, and cloud integrations, reduce the IT workload from deployment to everyday management. To move forward faster, you need strong IAM. Cloud-based Identity as a Service scales rapidly to accommodate new users, expanding use case, and evolving security threats. -
37
PropelAuth
PropelAuth
$150 per monthDevelopers will find it easy to integrate and use the APIs. User management built-in for teams that interact with customers. Data and insights for executives and PMs. PropelAuth was built on the belief that a great authentication product should get out of your way. We give you the tools you need to make sure your users have a smooth and secure experience. Your team will be given a list of tasks and information to complete as soon as they begin onboarding new users. PropelAuth is a first class concept when it comes to organizations. Our UIs will help you get started quickly, or you can build your own using our APIs. Create your own roles or start with our defaults. We will even update existing users when you make changes. Integrating with identity providers like Okta or Azure AD is easy. We provide guides to help your users set up and test configuration. Set custom session durations for each organization, enforce MFA and more. We take care of the complexity, so you don't need to. -
38
LoginTC
Cyphercor
$3/month/ user Cyphercor is a two factor authentication provider that offers a best-in-class solution that's effortless, intuitive, and cost-effective called "LoginTC". LoginTC adds an additional layer of security to your systems and applications including VPNs, Firewalls, remote desktop, active directory, and more. LoginTC offers a wide range of two factor options for end-users to authenticate, including SMS, email, push notifications, hardware tokens, U2F, OTP, bypass codes, and more. LoginTC can help you reduce your insurance costs and meet compliance regulations with ease. -
39
Sysgem Password Management
Sysgem
These tools are effective in optimizing day-to-day password management. They can be used to ensure compliance with regulatory and corporate security regulations and free up your helpdesk. Sysgem Self-Service password reset must be installed in three parts. The domain controller should host the central service. The web enrolment system should be installed on any IIS server within the domain. End-users should also install the workstation component on their workstations in order to reset their passwords on demand. The Domain Controller runs a Windows Service that resets passwords for end users. It also has a database of questions, which are created and used to verify the identity of the person who wishes to reset their password. -
40
GateKeeper Password Manager
Untethered Labs, Inc.
$3/user/ month Proximity-based passwordless login for desktop applications, Macs, websites, PCs, Macs and Macs. Active proximity-detection allows hands-free wireless 2FA and password management. IT administrators can allow users to log into their computers and websites dynamically using a physical key. This can be done either automatically, manually, by touch, pressing Enter, or with an PIN. You can easily log in, switch users, change computers, and log out without any passwords, touch, trouble, or hassle - all you need is a key. The computer locks automatically when a user leaves, preventing access to the computer or web passwords. Continuous authentication ensures that users are constantly being checked to make sure they have access. No more typing passwords. Administrators and compliance can now automate password protection from a central admin console. This allows them to enforce stronger passwords, enforce 2FA and give employees the ability to log in without having to interrupt their workflow. Helpdesk tickets for forgotten passwords/password changes will be reduced. Login to enable auto-lock and presence detection -
41
Enzoic Account Takeover Protection
Enzoic
$0Protect your users with seamless Account Takeover prevention. Enzoic's Rest API integrates seamlessly into your login, password reset, and account setup workflows. It provides real-time detection for compromised credentials from third party breaches. This allows you to take immediate actions, such as requiring a reset of passwords or enabling step up authentication, to keep your accounts secure. Enzoic provides proactive protection without affecting the user's experience. Our solution reduces fraud by using a database of billions compromised credentials. Enzoic can identify and neutralize risks from recent breaches or older ones. Enzoic is designed for flexibility and ease-of-use. It allows your organization to stay on top of account takeover threats, while maintaining smooth operations. -
42
Logto
Silverhand
$0Logto is a modern Auth0 replacement designed for SaaS and apps. It is a great choice for growing companies and individuals. Comprehensive Identity Solution Logto SDKs enable easy authentication. Supports multiple sign-in methods, including social and passwordless. Customize UI components to match brand. The infrastructure is ready-to-use, so there's no need to do any extra setup. Provides a ready-to-use management API It offers flexible connectors to customize and scale, and is customized for SAML, OAuth and OIDC protocols. Enterprise-ready, with role-based Access Control (RBAC), Organizations (multi-tenant applications), User Management, Audit Logs, Single Sign-On (SSO), Multi-factor Authentication (MFA), and Single Sign-On (SSO). -
43
FortiAuthenticator
Fortinet
FortiAuthenticator offers Identity Access Management (IAM) and Single Sign-On. FortiAuthenticator offers identity and access management services (IAM) to prevent breaches caused by unauthorized users accessing a network, or inappropriate access levels granted to valid users. FortiAuthenticator ensures that only the right person has access to your sensitive data and resources at the right time. FortiAuthenticator, combined with FortiToken or FIDO2 authentication, ensures that only authorized users are granted access to sensitive information. This additional layer of protection reduces the risk of data leakage and helps companies meet audit requirements related to government and business privacy regulations. -
44
RSA SecurID
RSA Security
2 RatingsRSA SecurID allows organizations of all sizes to reduce identity risk and ensure compliance without compromising user productivity. It provides users with easy access to their information and confirms that they are who they claim to be. RSA SecurID also provides unified visibility across all organizations' islands of identity and control. RSA SecurID combines multi-factor authentication with identity governance to address security concerns associated with providing easy access to dynamic user populations in complex environments. It assesses risk and business context to provide access and identity assurance. Digital transformation presents new challenges in authentication, access management, and identity governance for organizations. As a result, more users require access to more systems via more devices than ever before. RSA SecurID is a tool that helps organizations address these issues and protect their identity. -
45
Pirean Access: One
Pirean Software
We offer robust authentication and authorisation services for web and mobile. Our Access: One platform protects data, equity, and IP across critical industries. To protect their services worldwide, we partner with some the largest organizations in the world. Our private cloud identity platform allows our customers to quickly access identity services that are: - Provide a central point for controlling entitlements and identities - Flexible access management, including single sign-on and strong authentication Deliver an agile, robust IAM API to extend the reach of your identity infrastructure We are known for our innovation, versatility, and focus on the end-user. -
46
WSO2 Identity Server
WSO2
WSO2 Identity Server API-driven is built on open standards and offers the option of cloud, hybrid, or on-premise deployments. It is highly extensible and can support complex IAM requirements. WSO2 Identity Server allows you to do single sign-on as well as identity federation. It is backed up by strong and adaptive authentication. Securely expose APIs and manage identities by connecting with heterogeneous user accounts. Open-source IAM can be used to innovate quickly and to build secure Customer IAM solutions (CIAM) to deliver a user-friendly experience. -
47
OpenAM
Open Identity Platform
You will need to provide seamless authentication for all sites and applications within your company if you have multiple sites or applications. If a user logs in to one of your sites, he doesn't need to enter his credentials for other sites. OpenAM can solve all these problems. OpenAM comes with more than 20 authentication module that you can customize your authentication process. You can also customize the sequence of authentication modules to provide multi-factor authentication or adaptive authentication. OpenAM also allows you to manage authorization. You can limit access to resources according to different authorization policies. OpenAM can extend any functionality, including authentication modules and user data sources. It also supports UI customization, allowing you to create individual pages for end-users with your branding. -
48
OneLogin, a trusted identity management (IAM), solution for modern enterprises, helps you secure company information and empower your employees. OneLogin is a great solution for companies that want to simplify business logins and strengthen enterprise security. OneLogin features include single sign-on (SS), user provisioning, unified directory, user provisioning and adaptive authentication. Compliance reporting is also available.
-
49
Sima
Active Witness
FreeSima does more than keep bad guys out. Sima is a cloud-based Access Control reader that is highly secure and yet easy to use. Sima can read both facial biometrics and mobile credentials (QR codes). This cloud-based integrated software can issue single (QR only), and multi-factor (facial verification) codes for highly secure and customized facility access. We respect your privacy. To perform facial authentication, we use facial recognition technology. This technology allows us to verify identity, and allow access to a specific location. Only for identification purposes, facial data will be stored on our servers. We will not share your personal data, including your face image, with any third parties. -
50
Silverfort
Silverfort
1 RatingSilverfort's Unified Identity Protection Platform was the first to consolidate security controls across corporate networks to prevent identity-based attacks. Silverfort seamlessly integrates all existing IAM solutions (e.g. AD, RADIUS Azure AD, Okta. Ping, AWS IAM), providing protection for assets that cannot be protected previously. This includes legacy applications, IT infrastructure, file system, command-line tools and machine-tomachine access. Our platform continuously monitors access to users and service accounts in both cloud and on-premise environments. It analyzes risk in real-time and enforces adaptive authentication.