Best Role-Based Access Control (RBAC) Software in the Middle East

Find and compare the best Role-Based Access Control (RBAC) software in the Middle East in 2024

Use the comparison tool below to compare the top Role-Based Access Control (RBAC) software in the Middle East on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Auth0 Reviews
    Top Pick

    Auth0

    Okta

    Free plan
    809 Ratings
    See Software
    Learn More
    Auth0 by Okta takes a modern approach to Identity and enables organizations to provide secure access to any application, for any user. Auth0 is highly customizable, and simple yet flexible. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is a part of Okta, The World’s Identity Company™. With Auth0, you can rapidly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with your own custom, secure, and standards-based unified login. With Universal Login, users are redirected to a central authorization server. Because authentication takes place on the same domain as the login, credentials are not sent across sources, increasing security and protecting against attacks like phishing and credential stuffing. OAuth 2.0 recommends that only external user agents (like the browser) should be used by native applications for authentication flows. Universal Login provides this in a secure manner while also enabling SSO.
  • 2
    Okta Reviews
    Top Pick
    One platform, infinite ways for you to connect with your customers and employees. Any app can be made authable. Okta can help you create secure and delightful experiences quickly. Okta's Customer ID products can be combined to create the stack you need. This will provide security, scalability and reliability. Protect and empower your employees, contractors, partners. Okta's workforce identification solutions will protect your employees no matter where they are. You will have the tools you need to automate cloud journeys and support hybrid environments. Okta is trusted by companies around the globe to protect their workforce identities.
  • 3
    SolarWinds Access Rights Manager Reviews
    SolarWinds®, Access Rights Manager is designed for IT and security administrators to quickly and easily provision, deprovision, manage, audit, audit, and audit user access rights to files, systems, and data. This allows them to help protect their organizations against the potential risks of data theft or breaches. Analyzing user authorizations and access permissions will give you a visual representation of who has access to what and when. To demonstrate compliance with many regulatory requirements, customized reports can be created. Provision and deprovision users can be done using role-specific templates. This will ensure compliance with security policies and access privilege delegation.
  • 4
    System Frontier Reviews
    Delegate granular management of servers, workstations, network devices and users to non-admins. Turn PowerShell, Python and other scripts into web tools to empower Tier 1 support teams. Every action maintains an audit trail and protects your IT operations with RBAC.
  • 5
    Adaxes Reviews

    Adaxes

    Softerra

    $1,600 one-time payment
    Adaxes is a management solution that automates Microsoft 365 environments, Exchange, and Active Directory. Adaxes is a rule-based platform that can be used to automate Microsoft 365, Exchange, and Active Directory. It also provides a web-based management environment. You can use a role-based access control model to delegate privileges, adds security and workflow approvals, and allows you enforce corporate data standards. Adaxes automates all aspects of user lifecycle management, including provisioning, reprovisioning, and deprovisioning in Active Directory, Microsoft 365, and Skype for Business.
  • 6
    Aserto Reviews
    We make it simple for developers to secure their cloud apps. Adapt your authorization model so that it supports the principle of least privilige with fine-grained accessibility. Authorization decisions are based on the users, groups, domain models, resource hierarchy and relationships between them. Locally make authorization decisions using real-time information in milliseconds with 100% availability. Locally enforce using real-time information. Manage policies from one location. Define and manage all policies for your applications from a central location. Spend less time on access control and more time delivering core features. Allowing policy and code to develop independently will streamline the interaction between engineering and security. Create a secure supply chain for software that supports your policies. Store and version code for your policies in a git repository, just like you would any other code. Just like any other application artifact, you can build, tag, sign and immutable images of your policies.
  • 7
    Logto Reviews

    Logto

    Silverhand

    $0
    Logto is a modern Auth0 replacement designed for SaaS and apps. It is a great choice for growing companies and individuals. Comprehensive Identity Solution Logto SDKs enable easy authentication. Supports multiple sign-in methods, including social and passwordless. Customize UI components to match brand. The infrastructure is ready-to-use, so there's no need to do any extra setup. Provides a ready-to-use management API It offers flexible connectors to customize and scale, and is customized for SAML, OAuth and OIDC protocols. Enterprise-ready, with role-based Access Control (RBAC), Organizations (multi-tenant applications), User Management, Audit Logs, Single Sign-On (SSO), Multi-factor Authentication (MFA), and Single Sign-On (SSO).
  • 8
    Styra Reviews

    Styra

    Styra

    $70 per month
    Open Policy Agent is the fastest and most efficient way to implement Open Policy Agent across Kubernetes Microservices and Custom APIs. This works for admins as well as developers. You need to restrict who can access your pipeline based on who's currently on call. It's easy. You can define which microservices have access to PCI data. We can help. Do you need to prove compliance across your clusters with regulations? It's easy. Styra Declarative Authorization Service, which is open-source and declarative by design, provides a turnkey OPA control plan to reduce risk, human error, and speed up development. A built-in library for policies. Our OPA project allows you to customize and implement authorization policies-as-code. Pre-running allows you to validate and monitor policy changes before they are committed, which helps reduce risk before deployment. Declarative model describes the desired state to prevent security drift, and eliminate errors before they can occur.
  • 9
    Zluri Reviews
    Zluri is a SaaS Operations Management Platform for IT Teams. It allows IT teams to manage, secure, and comply with multiple SaaS applications from one dashboard. Zluri helps bring shadow IT to light, monitor and manage SaaS spend, and automates end to end application renewal management. Zluri is data-driven. It helps IT teams plan, organize, secure, and get more out of their SaaS app portfolio.
  • 10
    Access Auditor Reviews

    Access Auditor

    Security Compliance Corp

    Access Auditor automates user access reviews and user entitlement reviews. Access Auditor alerts you to any changes in user access rights and monitors for violations of separation of duties. It also shows who has what access. Any AD/LDAP, Database or REST API can be used to import users. Enterprise roles (RBACs) can be modelled and defined, which allows for full RBAC reviews and provisioning. Access Manager uses the same ease-of use to automate provisioning and managing user access rights. Role-based access controls can be used to manage any system that has a database, REST API, or LDAP. SCC's simple and powerful approach to Identity Management allows for rapid success at a low cost. Access Auditor has a 100% customer success rate and can automate user access reviews in less than a week.
  • 11
    Oso Cloud Reviews

    Oso Cloud

    Oso

    $149 per month
    Customers want features you can't provide without a refactor. Your code is fragile, hand-rolled and difficult to debug. It is spread across the codebase, and relies on multiple sources of data. There is no central place to check who has access to which data, how authorization works, or why requests have been approved or not. Workbench is our visual rule editor. Start by defining who can do what. Then, extend your logic using Polar, our configuration language. Send core authorization data like roles and permissions. Authorization checks and filter lists based upon authorization are now possible instead of IF statements and custom SQL.
  • 12
    ZITADEL Reviews

    ZITADEL

    ZITADEL

    $100 per month
    ZITADEL, an open-source platform for identity and access management, simplifies authentication and authorization of applications. It has a wide range of features including customizable hosted logins pages, support for authentication methods like Single Sign-On (SSO), social logins and multifactor authentication. Developers can integrate authentication into their applications directly using ZITADEL APIs or create dedicated login interfaces. The platform is multi-tenant and supports role-based control. This allows for precise permissions based on roles. ZITADEL’s extensibility allows for seamless adaptation to workflows, user-management processes, and brand guidelines. Features like ZITADEL Actions execute workflows based on predefined events, without the need for extra code deployment.
  • 13
    Casbin Reviews
    Casbin is a free authorization library that supports a variety of access control models including Access Control Lists, Role-Based Access Control and Attribute-Based Access Control. It is available in many programming languages, including Golang, Java (C/C++), Node.js (JavaScript), PHP, Laravel (Python),.NET (C#), Delphi (Rust), Ruby, Swift (Objective C), Lua (OpenResty), Dart(Flutter), and Elixir. This provides a consistent API on different platforms. Casbin abstracts the PERM metamodel into configuration files, allowing developers and administrators to change or upgrade authorization mechanisms simply by changing configurations. It supports a variety of databases, including MySQL, PostgreSQL and Oracle, MongoDB, Redis and AWS S3. The library includes a role manager that handles RBAC roles hierarchies, and it supports filtered policies management for efficient enforcement.
  • 14
    OpenFGA Reviews

    OpenFGA

    The Linux Foundation

    Free
    OpenFGA is a free authorization solution that allows developers to implement finely-grained access controls using a modeling language and APIs. It is based on Google's Zanzibar Paper and supports various access control model, including Relationship Based Access Control, Role Based Access Control, and Attribute Based Access Control. OpenFGA provides SDKs in multiple programming languages such as Java,.NET JavaScript, Go and Python to facilitate seamless integration with diverse applications. The platform is built for high performance and can process authorization checks in milliseconds. It is suitable for projects of all sizes, from small startups to large corporations. OpenFGA, which is a sandbox under the Cloud Native Computing Foundation, emphasizes transparency and collaboration with the community, and invites contributions to its development.
  • 15
    Permify Reviews
    Permify is a service that helps developers create and manage scalable, fine-grained access control systems in their applications. Permify, which is based on Google's Zanzibar authorization service, allows for the structuring of authorizations models, storage of authorizations in preferred databases and interaction with its API. It supports multiple access models, such as Role-Based Access Control and Attribute-Based Access Control. This allows for the creation and management of granular policies and permissions. Permit centralized authorization logic by abstracting it from codebases to make reasoning, testing and debugging easier. It provides flexible storage options for policies and a role manager that can handle RBAC hierarchy roles. The platform supports filtered policies for efficient enforcement of policies in large, multitenant environments.
  • 16
    Tools4ever IAM Reviews
    Streamline your operations and ensure compliance with HIPPA, SOX, or other requirements. IAM allows for user provisioning, central account management, and role-based access control through the integration of personnel and directory systems. Automated onboarding/offboarding ensures that the right people have access at the right times. You can learn more about how IAM works in your environment. It is a full-time job to manually create, manage, or disable user accounts in today’s complex corporate environment. Tools4ever's IAM user provisioning software connects HR systems, directory services (e.g. Active Directory, LDAP and GSuite) and downstream services. The entire process can be automated, allowing IT staff to recover significant bandwidth.
  • 17
    Bravura Identity Reviews
    Access governance and identity administration can be automated with full process automation on-premises or in the cloud. Bravura Identity integrates identity, group and security entitlement management across applications and systems. It allows users to be granted access quickly and ensures that entitlements are relevant to their business needs. Access can also be revoked if no longer required. Bravura Identity uses the following business processes to manage changes to identities, groups, and entitlements on applications and systems: Automation: Grant or revoke access based upon changes in trusted data (typically HR). Requests: Users can request access rights or changes to their identity data -- either for themselves or for others. Certification: stake-holders review the status and access rights of other users, to identify access which is no longer business-appropriate. Workflow: Users are invited to approve requests, make changes or review access.
  • 18
    ManageEngine Identity Manager Plus Reviews
    A secure, single sign-on (SSO) solution for enterprises. ManageEngine's Identity Manager Plus, the IT division at Zoho, allows end users to access the applications they need in one click. IT administrators can also manage and monitor application access using a single console. Users can gain secure, one-click access for enterprise applications. To access all their applications, users only need to log in once. Allow SSO to hundreds popular applications from our app catalog, or any SAML-based internal app using custom integrations. Track who accessed which application, when, and from what source. Find out which applications are most used, inactive users, etc. You can import users directly from G Suite or Azure AD. Or you can use the Zoho Directory built-in to onboard contractors and temporary employees. You can configure SSO for applications, add users and enable application access to users. You can also track application access from one central console.
  • 19
    Delinea Cloud Access Controller Reviews
    You can have complete control over web applications and cloud-based cloud management platforms. Cloud Access Controller by Delinea is a comprehensive PAM solution. It operates at cloud speed, can be deployed quickly, and provides secure access to any web app. Cloud Access Controller allows you to integrate existing authentication solutions with any other web application. You can create granular RBAC policies to enforce zero trust and least privilege, even for legacy and custom web applications. Specify what web applications each employee can read or modify. Cloud applications can be granted, managed and revoked. At a very fine level, specify who has access to which cloud applications. You can track usage of every cloud application. Without agents, clientless session recording. Secure access to all web apps, including legacy and custom web applications.
  • 20
    Lumos Reviews
    Lumos is an internal AppStore for companies. You can speed up access requests, access reviews, or license management via self-service. Automated access requests, approvals, provisioning, and provisioning will reduce support tickets. Get visibility into your SaaS apps, spend, and more Automated workflows make it easy to remove unused licenses. You are hiring more employees than ever before and they work from anywhere. This means that you are being bombarded with helpdesk tickets asking for permissions and access to apps (and emails asking if they have seen their helpdesk ticket). You have. You can set permissions and approve access for a certain time period all within Slack! Lumos will notify the manager of a new hire and help them set-up all apps for that employee before they start. Each employee does not need to have access to all apps. Avoid headaches by customizing your AppStore according to employee roles.
  • 21
    Delinea Server Suite Reviews
    Microsoft Active Directory allows you to consolidate multiple identities for Linux or Unix. A flexible, just in time privilege elevation model helps to reduce the risk of a security breach and minimize lateral movement. Advanced session recording, auditing, compliance reporting, and monitoring are all part of forensic analysis of privilege abuse. To facilitate identity consolidation into Active Directory, centralize discovery, management, user administration, and user administration for Linux or UNIX systems. The Server Suite makes it easy to follow best practices for privileged access management. You will see a higher level of identity assurance, a reduced attack surface, and fewer identity silos, redundant identities and local accounts. Active Directory allows you to manage privilege user and service accounts for Windows and Linux. Access control that is precise and just-in-time with RBAC or our patented Zones technology. Complete audit trail for security review and corrective action as well as compliance reporting.
  • 22
    AuthZed Reviews
    Unblock your business using an authorization system based on Google's Zanzibar White Paper. AuthZed, the team behind SpiceDB's permissions system, delivers enterprise-ready permissions built for security and scale. The most mature Zanzibar open source implementation, designed for consistency and performance. Define fine-grained permissions for any object within your application or product suite, and manage them using a central schema. You can specify consistency requirements for each authorization check. Tunable consistency features allow you to balance performance and accuracy according to your usage case. SpiceDB returns lists with authorized subjects and resources that are accessible. This is useful when pre-filtering results based on permissions. SpiceDB is equipped with observability tools, a powerful Kubernetes Operator, and load testing capabilities.
  • 23
    Clarity Security Reviews
    Eliminate audit angst with 10-minute user access reviews, flexible provisioning/de-provisioning workflows, and audit-friendly reporting, all in one simple, scalable IGA platform. White-glove implementation takes the burden off team members, reducing the impact of other IT initiatives. Automated evidence gathering into a downloadable ledger reduces the need to waste time gathering spreadsheets and screenshots. Clarity Explorer and nested entitlements provide insights into what users are granted access to and why. Role-based access control and automated workflows aligned with your organization's structure and needs. Clarity is a powerful tool that allows you to upgrade your identity governance program quickly and adapt it seamlessly as your organization grows. Fast reviews to certify user access, entitlements and roles, application access and more.
  • 24
    Azure Resource Manager Reviews
    Azure Resource Manager is the Azure deployment and management service. It is a management layer that allows you to create, modify, and delete resources from your Azure account. To secure and organize your resources, you can use management features such as access control, locks, tags, and tags. Resource Manager receives any request sent by a user from any of the Azure tools or APIs. It authenticates and authorizes your request. The request is sent to Azure by Resource Manager. Azure takes the requested action. All requests are handled using the same API. This ensures consistency in results and capabilities across all tools. All the capabilities available in the portal can also be accessed through PowerShell and Azure CLI, REST APIs, client SDKs, or REST APIs. Within 180 days of initial release, API functionality will be available in the portal.
  • 25
    CyberArk Conjur Reviews
    Securely authenticate, control, and audit non-human access across tools and applications. Secrets allow access to tools, critical infrastructure, and other sensitive data. Conjur protects these secrets by tightly controlling them with granular Role-Based Access Control. Conjur authenticates an application that requests access to a resource. It then checks the security policy against the authorization and distributes the secret securely. Conjur's security policy is code. Security rules are written in.yml format, checked into source control and loaded onto Conjur. Security policy is treated as any other source control asset. This adds transparency and collaboration to the organization’s security requirements.
  • Previous
  • You're on page 1
  • Next