Authentication Software for Linux

View 40 business solutions
  • Iris Powered By Generali - Iris puts your customer in control of their identity. Icon
    Iris Powered By Generali - Iris puts your customer in control of their identity.

    Increase customer and employee retention by offering Onwatch identity protection today.

    Iris Identity Protection API sends identity monitoring and alerts data into your existing digital environment – an ideal solution for businesses that are looking to offer their customers identity protection services without having to build a new product or app from scratch.
    Learn More
  • The full-stack observability platform that protects your dataLayer, tags and conversion data Icon
    The full-stack observability platform that protects your dataLayer, tags and conversion data

    Stop losing revenue to bad data today. and protect your marketing data with Code-Cube.io.

    Code-Cube.io detects issues instantly, alerts you in real time and helps you resolve them fast. No manual QA. No unreliable data. Just data you can trust and act on.
    Learn More
  • 1
    serve

    serve

    Static file serving and directory listing

    Assuming you would like to serve a static site, single page application or just a static file (no matter if on your device or on the local network), this package is just the right choice for you. Once it's time to push your site to production, we recommend using Vercel. In general, serve also provides a neat interface for listing the directory's contents. The quickest way to get started is to just run npx serve in your project's directory. If you prefer, you can also install the package globally using Yarn (you'll need at least Node.js LTS). The core of serve is serve-handler, which can be used as middleware in existing HTTP servers. In order to customize the default behaviour, you can also pass custom routing rules, provide your own methods for interacting with the file system and much more.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    uuid

    uuid

    Go package for UUIDs based on RFC 4122 and DCE 1.1: Authentication

    The uuid package generates and inspects UUIDs based on RFC 4122 and DCE 1.1: Authentication and Security Services. This package is based on the github/pborman/uuid package. It differs from these earlier packages in that a UUID is a 16 byte array rather than a byte slice. One loss due to this change is the ability to represent an invalid UUID (vs a NIL UUID). Full go doc style documentation for the package can be viewed online without installing this package by using the GoDoc site.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 3
    Doorkeeper

    Doorkeeper

    Doorkeeper is an OAuth 2 provider for Ruby on Rails / Grape

    Doorkeeper is a gem (Rails engine) that makes it easy to introduce OAuth 2 provider functionality to your Ruby on Rails or Grape application. Doorkeeper is an oAuth2 provider built in Ruby. It integrates with Ruby on Rails and Grape frameworks. The installation process depends on the framework you're using. Doorkeeper follows Rails maintenance policy and supports only supported versions of the framework. Currently, we support Ruby on Rails 5 and higher. Extensions that are not included by default and can be installed separately. These applications show how Doorkeeper works and how to integrate with it. Start with the oAuth2 server and use the clients to connect with the server. See list of tutorials in order to learn how to use the gem or integrate it with other solutions/gems.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    Kanidm

    Kanidm

    Kanidm: A simple, secure, and fast identity management platform

    Kanidm is a simple and secure identity management platform, allowing other applications and services to offload the challenge of authenticating and storing identities to Kanidm. The goal of this project is to be a complete identity provider, covering the broadest possible set of requirements and integrations. You should not need any other components (like Keycloak) when you use Kanidm - we already have everything you need. To achieve this we rely heavily on strict defaults, simple configuration, and self-healing components. This allows Kanidm to support small home labs, families, small businesses, and all the way to the largest enterprise needs. If you want to host your own authentication service, then Kanidm is for you.
    Downloads: 6 This Week
    Last Update:
    See Project
  • Agentic AI SRE built for Engineering and DevOps teams. Icon
    Agentic AI SRE built for Engineering and DevOps teams.

    No More Time Lost to Troubleshooting

    NeuBird AI's agentic AI SRE delivers autonomous incident resolution, helping team cut MTTR up to 90% and reclaim engineering hours lost to troubleshooting.
    Learn More
  • 5
    jwt-auth

    jwt-auth

    JSON web token authentication for Laravel and Lumen

    jwt-auth provides a simple means of authentication within Laravel using JSON Web Tokens (spec). There are several ways to create a token within the package. There are simple ways to do it, and more advanced methods if you want greater control. The most common way to create a token would be to authenticate the user via their login credentials, and if successful return a token corresponding to that user. You can also skip user authentication and just pass in a User object. Once a user has logged in with their credentials, then the next step would be to make a subsequent request, with the token, to retrieve the users' details, so you can show them as being logged in. To make authenticated requests via http using the built in methods, you will need to set an authorization header. If you don't like the idea of catching mulitple exceptions inline, then you are free to add a global exception handler with Laravel.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 6
    sso

    sso

    Single sign-on solution for securing internal services

    sso — lovingly known as the S.S. Octopus or octoboi — is the authentication and authorization system BuzzFeed developed to provide a secure, single sign-on experience for access to the many internal web apps used by our employees. It depends on Google as its authoritative OAuth2 provider and authenticates users against a specific email domain. Further authorization based on Google Group membership can be required on a per-upstream basis. The main idea behind sso is a "double OAuth2" flow, where sso-auth is the OAuth2 provider for sso-proxy and Google is the OAuth2 provider for sso-auth.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 7
    MaxKey

    MaxKey

    MaxKey SSO ,Leading-Edge IAM-IDaas(Identity and Access Management)

    Maxkey Single Sign On System, which means the Maximum key, Leading-Edge IAM/IDaas Identity and Access Management product, supports OAuth 2.x/OpenID Connect, SAML 2.0, JWT, CAS, SCIM, and other standard protocols, and provide Secure, Standard and Open Identity management (IDM), Access management (AM), Single Sign On (SSO), RBAC permission management and Resource management. MaxKey focuses on performance, security, and ease of use in enterprise scenarios, is widely used in industries such as healthcare, finance, government, and manufacturing.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 8
    Pocket ID

    Pocket ID

    Easy-to-use OIDC provider that allows to authenticate with passkeys

    Pocket-ID is an open-source OpenID Connect (OIDC) identity provider that prioritizes passwordless authentication using modern passkeys, making secure login easier for self-hosted services. By supporting passkeys instead of traditional passwords, Pocket-ID aligns with evolving web authentication standards, letting users sign in with devices, hardware keys like YubiKey, or platform-managed credentials. It’s designed to be simpler to install and use than larger identity solutions like Keycloak or Hydra and integrates smoothly with other self-hosted applications that understand OIDC protocols. With Docker-ready setup and broad community interest, the project supports a fully self-managed authentication stack where you control user identity, sessions, and login flows without relying on third-party services. It has gained popularity in the self-hosted ecosystem as a straightforward way to add single sign-on capabilities and modern security to your apps.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 9
    VoidAuth

    VoidAuth

    Single Sign-On for Your Self-Hosted Universe

    VoidAuth is a self-hosted, open-source Single Sign-On (SSO) authentication provider that simplifies managing user access and identity for a suite of private applications. Built around standards like OpenID Connect (OIDC), it serves as a central authentication authority so that users can log in once and gain secure access to multiple services without duplicating credentials. The platform offers a user and group management interface where administrators can invite users, enable self-registration, and configure policies like multi-factor authentication and password resets with email verification. Designed with flexibility in mind, VoidAuth supports features such as passkeys and customizable branding, making it adaptable to a wide range of deployment environments and aesthetic preferences.
    Downloads: 5 This Week
    Last Update:
    See Project
  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
    Try for free
  • 10
    Überauth

    Überauth

    An Elixir Authentication System for Plug-based Web Applications

    Ueberauth is a two-phase authentication framework that provides a clear API, allowing for many strategies to be created and shared within the community. It is heavily inspired by Omniauth. You could call it a port but it is significantly different in operation, but almost the same concept. Huge hat tip to Intridea. Ueberauth provides only the initial authentication challenge, (initial OAuth flow, collecting the information from a login form, etc). It does not authenticate each request, that's up to your application. You could issue a token or put the result into a session for the needs of your application. Libraries like Guardian can help you with that aspect of authentication. Strategies implement the two phases and then may allow the request to flow through to your downstream plugs. Implementing the request and callback phases is optional depending on the strategies requirements. If a strategy does not redirect, the request will be decorated with Ueberauth information.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 11
    Zentyal, Linux Small Business Server

    Zentyal, Linux Small Business Server

    Zentyal is a Linux Small Business Server

    Zentyal Server is an easy to use and affordable Linux server, specially designed to meet the needs of small and medium businesses Thanks to Zentyal's Samba integration, Zentyal provides native compatibility with Microsoft Active Directory, allowing you to join Microsoft clients to a domain and manage them easily. Zentyal Server incorporates all the network services required in a small and medium business environment: * Directory & Domain Server with native compatibility with Microsoft Active Directory * Mail Server with ActiveSync and webmail * Gateway with firewall and proxy * Infrastructure Server with DNS/DHCP server, Certification Authority and Virtual Private Networks For more information and download, please access the project's home page.
    Downloads: 24 This Week
    Last Update:
    See Project
  • 12
    Integrated Windows Authentication (Single Sign-On) in Java.
    Leader badge
    Downloads: 22 This Week
    Last Update:
    See Project
  • 13
    CID

    CID

    Insert and manage Linux computers in AD

    CID (Closed In Directory) is a set of bash scripts for inserting and managing Linux computers in Active Directory domains. Modifications made to the system allow Linux to behave like a Windows computer within AD.
    Downloads: 25 This Week
    Last Update:
    See Project
  • 14
    Broot

    Broot

    A new way to see and navigate directory trees

    Get an overview of a directory, even a big one. That's what makes it usable where the old tree command would produce pages of output. Hit alt/enter and you're back to the terminal in the desired location. This way, you can navigate to a directory with the minimum amount of keystrokes, even if you don't exactly remember where it is. Broot is fast and doesn't block (any keystroke interrupts the current search to start the next one). Never lose track of file hierarchy while you search. Broot tries to select the most relevant file. You can still go from one match to another one using tab or arrow keys. You may also search with a regular expression. To do this, add a / before the pattern. You may also apply logical operators or combine patterns, for example searching test in all files except json ones could be !/json$/&c/test and searching carg both in file names and file contents would be carg|c/carg.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 15
    authentik

    authentik

    The authentication glue you need

    authentik is an open-source Identity Provider that emphasizes flexibility and versatility. It can be seamlessly integrated into existing environments to support new protocols. authentik is also a great solution for implementing sign-up, recovery, and other similar features in your application, saving you the hassle of dealing with them. authentik is an open-source Identity Provider focused on flexibility and versatility. You can use authentik in an existing environment to add support for new protocols, implement sign-up/recovery/etc. in your application so you don't have to deal with it, and many other things. You can adopt authentik to your environment, regardless of your requirements. Need an Active-Directory integrated SSO Provider? Do you want to implement a custom enrollment process for your customers? Are you developing an application and don't want to deal with User verification and recovery? authentik can do all of that, and more.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 16
    LDAP Account Manager
    LDAP Account Manager (LAM) is a webfrontend for managing accounts stored in an LDAP directory. You can use templates for account creation and use multiple configuration profiles. Account information can be exported as PDF file.
    Leader badge
    Downloads: 102 This Week
    Last Update:
    See Project
  • 17
    LDAP Explorer is a multi platform, graphical LDAP tool that enables you to browse, modify and manage LDAP servers.
    Downloads: 51 This Week
    Last Update:
    See Project
  • 18
    2FAS Auth Browser Extension

    2FAS Auth Browser Extension

    Source code for 2FAS Auth Browser Extension

    2FAS Auth Browser Extension is a cross-browser plugin that integrates the 2FAS multi-factor authentication platform directly into the user’s web browsing workflow, helping streamline login flows by interfacing with web pages and 2FA token generation in a seamless way. Once installed in browsers like Chrome, Firefox, or others that support standard extension APIs, it can detect 2FA prompts on login forms and offer to fill or suggest one-time passwords generated by your 2FAS mobile clients or local vault, reducing friction and manual copy-paste steps. The extension communicates securely with companion mobile or desktop clients to fetch or synchronize token data, respecting encryption and privacy boundaries so that secrets are never exposed to the extension itself without user consent. It also lets users manage or view registered accounts, add new ones by scanning QR codes via companion apps, and handle token organization from within browser UI elements.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19
    PAM module which permits authentication for arbitrary services via ssh-agent. Written with sudo in mind, but like any auth PAM module, can be used for for many purposes.
    Leader badge
    Downloads: 42 This Week
    Last Update:
    See Project
  • 20
    WiKID Two-Factor Authentication System

    WiKID Two-Factor Authentication System

    Two-factor authentication system

    The WiKID Strong Authentication System is a public-key based two-factor authentication system. It is a flexible, extensible, and secure alternative to tokens, certs and passwords. Application & API support exists for Java, ASP, PHP, Ruby, OpenVPN, TACACS+, etc. Read our eGuide on how to setup your network with two-factor authentication: http://www.wikidsystems.com/learn-more/two-factor-authentication-white-papers
    Downloads: 22 This Week
    Last Update:
    See Project
  • 21
    AutoIndex is a PHP script that makes a table that lists the files in a directory, and lets users access the files and subdirectories. It includes searching, icons for each file type, an admin panel, uploads, access logging, file descriptions, and more.
    Downloads: 17 This Week
    Last Update:
    See Project
  • 22
    Led is a general purpose LDAP editor which allows editing of LDIF records or standard unix flat file representations of LDAP databases using your favorite editor.
    Leader badge
    Downloads: 19 This Week
    Last Update:
    See Project
  • 23
    Ember Simple Auth

    Ember Simple Auth

    A library for implementing authentication/authorization in Ember.js

    Ember Simple Auth is a lightweight library for implementing authentication/authorization with Ember.js applications. It has minimal requirements with respect to application structure, routes etc. With its pluggable strategies it can support all kinds of authentication and authorization mechanisms. it maintains a client-side session and synchronizes its state across multiple tabs/windows of the application. it authenticates the session against the application's own server, external providers like Facebook etc. The session service is the main interface to the library. It provides methods for authenticating and invalidating the session as well as for setting and reading session data. The session store persists the session state so that it survives a page reload. It also synchronizes the session state across multiple tabs or windows of the application so that e.g. a logout in one tab or window also results in a logout in all other tabs or windows of the application.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 24
    Howdy For Linux

    Howdy For Linux

    Windows Hello style facial authentication for Linux

    Howdy provides Windows Hello™ style authentication for Linux. Use your built-in IR emitters and camera in combination with facial recognition to prove who you are. Using the central authentication system (PAM), works everywhere you would otherwise need your password: Login, lock screen, sudo, su, etc.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    Tesseral

    Tesseral

    Open source auth infrastructure for B2B SaaS

    Tesseral is an open-source authentication and identity management platform tailored for B2B SaaS applications, offering enterprise-grade features like SAML SSO, SCIM provisioning, RBAC, API key management, and audit logging through a unified API-first service. Tesseral is a multi-tenant, API-first service designed to run on the cloud. It is not an authentication library tied to a particular language or framework; Tesseral works with any tech stack. Tesseral is open source auth infrastructure for business software (i.e., B2B SaaS). Tesseral is built for B2B SaaS. Your customer's admins control how their users log in to their tenant, and can add or remove users at will.
    Downloads: 2 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB