Apps with 'RBAC' feature

All apps in Apps with 'RBAC' feature category. Use the filters below to narrow down your search. 
Copy a direct link to this comment to your clipboard
  1. Aserto icon
     Like

    Aserto is an application authorization as a service. It helps developers add real-time resource-level access controls to their applications. SDKs and quickstarts for every popular languages are available to help you get up and running quickly.

    • FreemiumProprietary
    • Self-Hosted
    • Software as a Service (SaaS)
    Aserto screenshot 1
    Best alternatives are Keycloak iconKeycloakandZITADEL  iconZITADEL 11 alternatives
  2. Logto icon
     6 likes

    Logto helps you build the sign-in, auth, and user identity within minutes. We provide an OIDC-based identity service and the end-user experience with username, phone number, email, and social sign-in, for web and native apps.

    Configure sign-in and sign-up method
    Best alternatives are AuthKit iconAuthKitandKeycloak iconKeycloak53 alternatives
  3. Permit.io icon
     2 likes

    Permit.io is the permissions infrastructure for the internet. It is a fullstack authorization solution that enables developers to bake in access control into their code in minutes and be ready for future requirements from customers and regulators.

    • FreemiumProprietary
    • Python
    • .NET Framework
    • Java
    • Node.JS
    User Management
    Best alternatives are Keycloak iconKeycloakandAserto iconAserto14 alternatives
  4. Frontegg icon
     2 likes

    Frontegg is a developer platform that enables product-led-growth through a customer-facing user-management interface embedded seamlessly within any product.

    • FreemiumProprietary
    • Online
    • Software as a Service (SaaS)
    Frontegg screenshot 1
    Best alternatives are AuthKit iconAuthKitandKeycloak iconKeycloak27 alternatives
  5. grsecurity icon
     2 likes

    Grsecurity® is an extensive security enhancement to the Linux kernel that defends against a wide range of security threats through intelligent access control, memory corruption-based exploit prevention, and a host of other system hardening that generally require no...

    • Linux
    grsecurity screenshot 1
    Best alternatives are Qubes OS iconQubes OSandSELinux iconSELinux6 alternatives
  6. oo.tools icon
     1 like

    oo.tools is a no-code web application builder. It makes creating and maintaining software more efficient and also enables non-technical people to do so.

    • Online
    • Software as a Service (SaaS)
    Role-based access control
    Best alternatives are NocoDB iconNocoDBandAirtable iconAirtable24 alternatives
  7. Role based access control for remote Windows server, workstation and network device management. A flexible and granular permission model allows organizations to grant only the rights needed to manage their IT systems.

    Computer management console.
    Best alternatives are RunDeck iconRunDeckandCyberark iconCyberark2 alternatives
  8. strongDM icon
     Like

    Single sign-on for everything your staff needs: databases, servers, Kubernetes, cloud CLIs, intranets, and web apps. Try it Free.

    • Remote Desktop Tool
    • Mac
    • Windows
    • Linux
    • Online
    • Self-Hosted
    • Software as a Service (SaaS)
    strongDM screenshot 1
    Best alternatives are Apache Guacamole iconApache GuacamoleandFudo iconFudo8 alternatives
  9. Phase Two icon
     Like

    Phase Two builds on top of Keycloak, one of the most widely used open source identity and access management systems in the world. Our extensions bring multi-tenancy, audit logging, a self-service admin portal, and more to enhance Keycloak for SaaS and on-premise use cases.

    Phase Two screenshot 1
    Best alternatives are AuthKit iconAuthKitandKeycloak iconKeycloak9 alternatives
  10. Cedar is a language for defining permissions as policies, which describe who should have access to what. It is also a specification for evaluating those policies.

    • FreeOpen Source
    • Self-Hosted
    Cedar Language screenshot 1
  11. With the K8 Web Kit, you can create database applications on the web extremely quickly and easily. The K8 Web Kit generates complete elements such as forms, lists, catalogs or charts from SQL tables.

    • FreeOpen Source
    • Online
    • Self-Hosted
    Create out of the table: forms, lists, catalogs and charts
  12. Permify icon
     Like

    Permify is a open-source authorization service for creating and managing fine-grained permissions in your applications and services. Inspired by Google’s consistent, global authorization system, Google Zanzibar

    • FreemiumOpen Source
    • Self-Hosted
    • Docker
    Permify screenshot 1
    Best alternatives are Keycloak iconKeycloakandauthentik iconauthentik7 alternatives
  13. Authress icon
     Like

    IAM authorization as service. Protects service resource assets, helps to ensure user data privacy, and make any app enterprise-security level ready.

    • FreemiumProprietary
    • Online
    • Software as a Service (SaaS)
    Best alternatives are Keycloak iconKeycloakandauthentik iconauthentik7 alternatives
  14. Hypertune icon
     1 like

    Hypertune is the most flexible platform for feature flags, A/B testing, analytics and app configuration. Built with full end-to-end type-safety, Git-style version control and synchronous, in-memory, local flag evaluation.

    • A/B Testing Tool
    • FreemiumProprietary
    • Online
    • Next.js
    • Rust
    • Python
    • React
    • JavaScript
    • PHP
    • Go (Programming Language)
    • Typescript
    Best alternatives are LaunchDarkly iconLaunchDarklyandDevCycle iconDevCycle29 alternatives