Loading...

Conjur OSS is a free Privileged Access Management tool developed by Conjur. Security professionals most commonly compare it with Crypto4A QxVault™. All 102 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to Conjur OSS, including their key features and shared capabilities.
Secrets management vault with built-in FIPS 140-3 HSM for on-prem/private cloud.
Shares 3 capabilities with Conjur OSS: Kubernetes, PAM, Secrets Management
Unified PAM platform for privileged account, session, endpoint & vendor access mgmt
Provides secretless remote access to infrastructure with Zero Trust controls
Cloud-native JIT privileged access mgmt for DevOps & NHIs.
Cloud-native PAM platform for securing and monitoring privileged accounts.
Centralized access control & PAM platform for enterprise infrastructure.
PAM & secrets mgmt suite with JIT access, SSH key mgmt & ZSP.
NHI security platform replacing secrets with identity-based, just-in-time access.
Secrets management vault with built-in FIPS 140-3 HSM for on-prem/private cloud.
Unified PAM platform for privileged account, session, endpoint & vendor access mgmt
Provides secretless remote access to infrastructure with Zero Trust controls
Cloud-native JIT privileged access mgmt for DevOps & NHIs.
Cloud-native PAM platform for securing and monitoring privileged accounts.
Centralized access control & PAM platform for enterprise infrastructure.
PAM & secrets mgmt suite with JIT access, SSH key mgmt & ZSP.
NHI security platform replacing secrets with identity-based, just-in-time access.
Cloud-native PAM platform for human, machine, and AI identity security
Identity security platform with PAM, SSO, MFA, and secrets management
Browser-based PAM solution for secure, recorded access to critical assets
Enterprise PAM platform securing privileged access across hybrid and multi-cloud
PAM solution for discovering, managing, auditing privileged accounts & sessions
Cloud-native PAM platform for securing access to infrastructure and endpoints
PAM platform for managing privileged accounts, sessions, and access control
PAM solution for HPE NonStop systems with granular access control & auditing
PAM solution providing just-in-time access with Zero Standing Privilege
PAM platform for MSPs to manage privileged access across client infrastructure
JIT/JEP access mgmt platform replacing standing privileges w/ time-bound access
Brokers privileged access with JIT provisioning and credential masking
Secrets management solution for DevOps tools and cloud workloads
PAM solution for controlling, monitoring, and securing privileged accounts
Discontinued PAM vault solution, replaced by Secret Server
Cloud-native secrets vault for DevOps credentials, API keys, and certificates
Secrets management platform for storing and managing credentials
Identity provider for AI agents with secrets mgmt and access control
Unified secrets management connector for multiple vaults and platforms
PAM solution for managing and securing privileged access to systems
SaaS platform for PAM, identity management, and remote access control
NHI and AI agent security platform with discovery, governance, and ITDR
Automates just-in-time access requests with least privilege policies
PAM platform with JIT access, zero standing privileges, and policy-driven control
Identity-based access control and security platform for AI infrastructure
PAM services and managed solutions for securing privileged accounts
Policy-driven authorization platform for fine-grained access control
PAM solution with Zero Trust for managing privileged access and credentials
Emergency elevated access mgmt integrated with on-call systems like PagerDuty.
JIT privileged access mgmt platform for cloud-native teams on AWS & GCP.
PAM solution for MSPs to remove local admin rights via least privilege.
JIT local admin & identity verification platform for IT service desks.
PAM solution eliminating standing privileges via JIT access & credential rotation.
IT productivity & security suite: PAM, remote access, and password mgmt.
PAM tool for MSPs enabling MFA-validated JIT admin elevation on endpoints.
z/OS mainframe cybersecurity software, IAM, compliance & audit tools.
PAM platform securing privileged accounts across endpoints, servers & cloud.
JIT access platform issuing ephemeral certs to eliminate standing privileges.
PAM vendor acquired by SailPoint; products no longer for sale.
PAM platform replacing standing access with JIT, least-privilege controls.
JIT privileged access management for human, NHI, and AI identities.
PAM and user activity monitoring platform for insider risk management.
BeyondTrust Privileged Access Management (PAM) provides comprehensive security controls for privileged accounts and users.
Core PAM solution for managing, controlling, and auditing privileged access and
Identity-first security platform with PAM, ZTNA, and ITDR capabilities
Centralized privileged account mgmt platform with access control & auditing
Remote privileged access solution for OT/ICS and cyber-physical systems
PAM solution for securing privileged accounts and access across enterprises
Privileged access platform eliminating standing permissions via JIT access
Endpoint privilege mgmt solution for removing local admin rights on endpoints
Privileged access security platform for discovery, classification & protection
Enforces least privilege & JIT access on Windows, macOS & Linux endpoints.
Zero-trust remote access gateway for desktops, servers, databases, and web apps
Manages third-party vendor privileged access with Zero Trust controls
Automates least privilege enforcement in cloud via centralized policies & ChatOps
PAM solution with zero standing privilege and just-in-time access controls
PAM solution for controlling, auditing, and protecting privileged accounts
Endpoint privilege mgmt & app control for workstations with least privilege
Browser-based VPN-less remote privileged access with RDP/SSH support
Enterprise PAM vault for managing privileged account credentials and sessions
Manages secure access to social media accounts with SSO, MFA, and access controls
Access mgmt platform for nonstandard apps lacking SSO/SCIM support
Automates time-bound privileged access mgmt for SAP, Oracle & business apps
Zero Trust PAM solution for IT/OT environments with session recording
PAM quickstart solution for managing admin accounts and privileged access
Privileged Access Management solution from BeyondTrust
Converged identity security platform combining PAM, IAM, CASB, and MFA
Converged identity security platform with PAM, IAM, CASB, and MFA capabilities
Emergency access management solution for SAP environments with audit trails
Just-in-time privileged access mgmt with session monitoring and audit trails
Centralized PAM solution for controlling privileged access to IT/OT systems
Secure remote access solution for third-party vendors without VPN or shared passwords
Browser-based PAM extension for secure web app access with session recording
Centralized mgmt console for multiple WALLIX PAM deployments
Automates identity-based access controls for users, devices, and applications.
Policy-based endpoint privilege mgmt granting apps elevated rights w/o user admin
Real-time access analytics and threat detection for PAM with audit trails
Identity-first security platform with encryption, IAM, and PAM capabilities
Unified identity layer for infrastructure access across humans, machines, and AI
Endpoint privilege management tool enforcing least-privilege access on workstations.
AI-powered just-in-time access automation with risk and behavioral analysis
Automates least privilege enforcement across cloud, SaaS, and on-prem identities.
Cloud IAM permission rightsizing tool for human and non-human identities
IAM solution for auditing and managing data access permissions across environments
Identity mgmt for on-prem systems replacing static credentials w/ ephemeral IDs
Enterprise gateway for managing AI agent access to enterprise data via MCP
PAM solution for managing & securing remote access to critical systems
AI-powered PAM solution with behavioral analysis and session monitoring
Cloud-native platform for secure third-party access mgmt with monitoring
JIT cloud permissions mgmt platform enforcing least privilege access.
Endpoint privilege mgmt enforcing least privilege & ITDR for fed agencies.
MPC-based platform for threshold cryptography & privacy-preserving computation.
Project hosting scripts for implementing Pass the Hash mitigations with PtHTools module commands.
A CLI utility that simplifies switching between different AWS roles by automatically managing AWS credentials file modifications.
Common questions security professionals ask when evaluating alternatives and competitors to Conjur OSS.
The most popular alternatives to Conjur OSS include Crypto4A QxVault™, Securden Unified PAM, Akeyless Secure Remote Access, Britive DevOps & Automation Workflows, and ObserveID PAM. These Privileged Access Management tools offer similar capabilities and are frequently compared by security professionals evaluating their options.