Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • FusionAuth Reviews & Ratings
    168 Ratings
    Company Website
  • Auth0 Reviews & Ratings
    957 Ratings
    Company Website
  • Frontegg Reviews & Ratings
    361 Ratings
    Company Website
  • ManageEngine ADManager Plus Reviews & Ratings
    558 Ratings
    Company Website
  • Keeper Security Reviews & Ratings
    1,695 Ratings
    Company Website
  • Uniqkey Reviews & Ratings
    178 Ratings
    Company Website
  • Veriam Reviews & Ratings
    3 Ratings
    Company Website
  • ManageEngine ADSelfService Plus Reviews & Ratings
    114 Ratings
    Company Website
  • Source Defense Reviews & Ratings
    7 Ratings
    Company Website
  • Reflectiz Reviews & Ratings
    14 Ratings
    Company Website

What is authentik?

Authentik functions as an open-source identity provider, streamlining all aspects of identity management into one cohesive platform, thereby serving as an alternative to services such as Okta, Active Directory, and Auth0. Authentik Security operates with a public benefit ethos, dedicated to promoting and advancing the open-source movement. By choosing a self-hosted, open-source identity provider, you prioritize security and retain authority over your most sensitive data. With authentik, the need to rely on third-party services for identity management is removed, providing you with enhanced peace of mind. You can effortlessly integrate authentik into your current infrastructure, customizing it to fulfill a variety of needs. Our robust APIs and fully customizable policies enable you to effectively automate workflows, increasing efficiency. Facilitating deployment and scaling is made simple through our prebuilt templates, which are compatible with Kubernetes, Terraform, and Docker Compose. This approach allows you to eliminate reliance on external services for critical infrastructure while protecting your confidential information from exposure to the public internet. You can leverage our pre-built workflows or choose to adjust every aspect of the authentication process with flexible templates, infrastructure as code, and comprehensive APIs, ensuring a tailored experience that fits your specific requirements. This adaptability not only allows you to customize authentik for your organization's unique demands but also significantly strengthens your security protocols in the process. Overall, authentik presents a powerful solution for organizations aiming to take full control of their identity management while fortifying their data protection strategies.

What is Pomerium?

Pomerium offers a secure, clientless solution that enables users to easily access web applications and services without needing a corporate VPN. Its emphasis on improving developer productivity eliminates complicated access procedures that could hinder workflow efficiency. In contrast to traditional client-based tunneling solutions, Pomerium provides fast connections with low latency while upholding strong security and privacy measures. By using contextual information for access control, it embraces a principle of continuous verification, exemplifying a zero trust framework where each action is evaluated based on contextual factors before being approved or denied. This approach differs significantly from NextGen VPNs, which generally only verify authentication and authorization at the start of a session. Additionally, Pomerium allows secure access to a wide range of platforms, including web applications, databases, Kubernetes clusters, internal tools, and legacy systems, making it a versatile option for individuals as well as teams of various sizes. Through its innovative methodology, Pomerium is transforming how organizations oversee access to their digital assets while enhancing overall security protocols. As it continues to evolve, Pomerium’s unique features position it as a frontrunner in the realm of secure access solutions.

Media

Media

Integrations Supported

Keycloak
Skycloak
Active Directory
Amazon Web Services (AWS)
Auth0
Docker
FreeIPA
GitHub
GitLab
Google Cloud Platform
HashiCorp Vault
Microsoft Azure
NGINX
OAuth
Ory
Tailscale
Terraform
Traefik
Visual Studio Code
ZITADEL

Integrations Supported

Keycloak
Skycloak
Active Directory
Amazon Web Services (AWS)
Auth0
Docker
FreeIPA
GitHub
GitLab
Google Cloud Platform
HashiCorp Vault
Microsoft Azure
NGINX
OAuth
Ory
Tailscale
Terraform
Traefik
Visual Studio Code
ZITADEL

API Availability

Has API

API Availability

Has API

Pricing Information

$0.02 per month
Free Trial Offered?
Free Version

Pricing Information

$7 per month
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

authentik

Company Location

United States

Company Website

goauthentik.io

Company Facts

Organization Name

Pomerium

Company Location

United States

Company Website

www.pomerium.com

Categories and Features

Single Sign On

Biometric
Credential Management
Identity Federation
Multifactor Authentication
Password Management
Policy Management
Social Sign On
User Management

Categories and Features

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Popular Alternatives

Popular Alternatives

Accops HyID Reviews & Ratings

Accops HyID

Accops Systems
Vault One Reviews & Ratings

Vault One

VaultOne Software