Top 15 Keycloak Alternative and Similar Softwares | Nov 2024

Keycloak is an open source identity and access management solution

1. OpenID

OpenID OpenID is an open standard that describes how users can be authenticated in a decentralized manner, eliminating the need for services to provide their own ad hoc systems and allowing users to consolidate their digital identities. Users may create accounts with their preferred OpenID identity providers, and then use those......

2. CAS

CAS CAS provides enterprise single sign-on service:An open and well-documented protocolAn open-source Java server componentA library of clients for Java, .Net, PHP, Perl, Apache, uPortal, and othersIntegrates with uPortal, Blackboard, Bannner, PeopleSoft, Drupal, Canvas, Liferay, Moodle and othersCommunity documentation and implementation supportAn extensive community of adopters......

3. Openam

Openam OpenAM provides open source Authentication, Authorization, Entitlement and Federation software. Through OpenAM, the community actively continues development of OpenSSO.OpenAM provides core identity services to simplify the implementation of transparent single sign-on (SSO) as a security component in a network infrastructure. OpenAM provides the foundation for integrating diverse web applications that......

4. 10Duke Indentity Provider

10Duke Indentity Provider 10Duke Identity Provider is an enterprise identity management solution, provides seamless SSO access, supports federated identity, AD, Azure AD, LDAP, social sign-in and others.Popular online services such as Google ID or Facebook Login have changed expectations regarding the ease with which a user expects to be able to access your......

5. Facebook Connect

Facebook Connect Facebook Connect is a set of APIs from Facebook that enable Facebook members to log onto third-party websites, applications, mobile devices and gaming systems with their Facebook identity. While logged in, users can connect with friends via these media and post information and updates to their Facebook profile. Developers can......

6. LemonLDAP::NG

LemonLDAP::NG LemonlLDAP::NG is a modular Web-SSO based on Apache::Session modules. It simplifies the build of a protected area with a few changes in the application. It manages both authentication and authorization and provides headers for accounting. So you can have a full AAA protection for your web space as described below.......

7. Persona

Persona Persona (formerly BrowserID) allows you to sign in to sites using an email address you choose. So, instead of having to manage multiple usernames and passwords across your favorite sites and devices, you’ll have more time to do the important stuff. Persona lets you get started with just your email......

8. IBM QRadar

IBM QRadar IBM® Security QRadar® SIEM consolidates log source event data from thousands of devices endpoints and applications distributed throughout a network. It performs immediate normalization and correlation activities on raw data to distinguish real threats from false positives. As an option, this software incorporates IBM Security X-Force® Threat Intelligence which supplies......

9. Palo Alto AutoFocus

Palo Alto AutoFocus ACTIONABLE INTELLIGENCE HAS ARRIVED.Introducing AutoFocus™. Available exclusively to Palo Alto Networks customers through a limited-time Community Access program.The challenge with too much dataSecurity practitioners have been inundated with an overwhelming volume of security data and alerts, making it virtually impossible to quickly identify and respond to advanced, targeted threats before......

10. Securonix

Securonix Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track......

11. Qualys Cloud Platform

Qualys Cloud Platform Qualys, Inc., is the most widely-deployed information security and compliance cloud solution in the world with over 7,700 customers including a majority of the Forbes Global 100 and a majority of the Fortune 100. The Qualys Cloud Platform and integrated suite of solutions helps organizations simplify security operations and lower......

12. Fortscale

Fortscale Fortscale is an innovative cyber security company, comprised of an enthusiastic team of cyber security, big data analytics and intelligence experts.While you are reading these lines, we are working hard on developing a new analytics platform to help you protect your organization better than ever. Chances are, your organization is......

13. Lockitron

Lockitron Lockitron lets you share temporary or permanent virtual keys with friends and family. Receive a notification when your guest arrives for the first time and make sure your door is locked from anywhere in the world. Lockitron will even send you a notification when someone knocks at your door.Thanks to......

14. CNTLM

CNTLM Cntlm - Fast NTLM authentication proxy accelerator with tunneling, written in pure C......

15. Exabeam

Exabeam Threats are going unnoticed. SIEM technologies today aren’t capable of detecting subtle anomalies and tracking entire attack chains — missing threats and flooding you with false positives.Introducing User Behavior Intelligence. By combining session tracking, behavior analysis and risk scoring, we help you automatically detect cyber attacks and improve operational security......