Loading...
Browse 25 authorization tools
IAM solution for AI agents and agentic AI authentication and authorization
IAM solution for AI agents and agentic AI authentication and authorization
Professional API penetration testing services for security assessment
Professional API penetration testing services for security assessment
Compliance mgmt platform for evidence collection, policy tracking & reporting
Compliance mgmt platform for evidence collection, policy tracking & reporting
Centralized access management platform with SSO, MFA, and risk-based policies
Centralized access management platform with SSO, MFA, and risk-based policies
Developer-focused customer identity platform for authentication & authorization
Developer-focused customer identity platform for authentication & authorization
Unified IAM platform for customer, B2B, gig worker, and workforce identities
Unified IAM platform for customer, B2B, gig worker, and workforce identities
ABAC-based dynamic authorization for fine-grained access control
ABAC-based dynamic authorization for fine-grained access control
Automates identity provisioning and deprovisioning across enterprise systems.
Automates identity provisioning and deprovisioning across enterprise systems.
Centralized access mgmt platform for self-service requests & governance
Centralized access mgmt platform for self-service requests & governance
API security framework covering authentication, authorization, and protection
API security framework covering authentication, authorization, and protection
Educational initiative promoting API security awareness through stages
Educational initiative promoting API security awareness through stages
AI-powered identity security platform for real-time access decisions & auditing
AI-powered identity security platform for real-time access decisions & auditing
Google's zero trust implementation for secure access without VPN
Google's zero trust implementation for secure access without VPN
Enterprise IAM platform for identity management and access control
Enterprise IAM platform for identity management and access control
Enterprise IAM platform with zero trust identity fabric capabilities
Enterprise IAM platform with zero trust identity fabric capabilities
Identity security platform for threat detection and access management
Identity security platform for threat detection and access management
IAM consulting and identity security solutions provider for Nordic organizations
IAM consulting and identity security solutions provider for Nordic organizations
IAM platform with visual identity orchestration and low/no-code workflows
IAM platform with visual identity orchestration and low/no-code workflows
Identity and access management platform for authentication and authorization
Identity and access management platform for authentication and authorization
Hapi is a Node.js web application framework that provides built-in functionality for building scalable server-side applications and APIs with security features and plugin architecture.
Hapi is a Node.js web application framework that provides built-in functionality for building scalable server-side applications and APIs with security features and plugin architecture.
Automatic authorization enforcement detection extension for Burp Suite
Automatic authorization enforcement detection extension for Burp Suite
Santa is a macOS binary and file access authorization system that monitors executions and makes allow/block decisions based on local database rules.
Santa is a macOS binary and file access authorization system that monitors executions and makes allow/block decisions based on local database rules.
A blog post explaining the concept of Active Directory Trusts and their enumeration and exploitation
A blog post explaining the concept of Active Directory Trusts and their enumeration and exploitation
Red October is a TLS-based encryption server that implements two-man rule authorization, requiring multiple users to collaborate for cryptographic operations.
Red October is a TLS-based encryption server that implements two-man rule authorization, requiring multiple users to collaborate for cryptographic operations.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance