Software Listing: Authentication

You need a PHP authentication library for your new AJAX web site? Look no further. PHP Authentication is a web service accessed via POST requests, producing XML or JSON output. It supports the following operations: register, unregister, verify account, log in, log out, request login data, get current user name, set private data, get private data, send invitation, get remaining invitations, delete expired data. Completely customizable, easily integrates with the client side. Source code included. Features: standard user registration, invite-only registration, user invitations and many more..

  • Platform: Not Applicable

Your PC keeps records of both your online and off-line activity. Any of the Web Pages, Movies, Pictures, Sounds, E-mail and Everything Else you have ever viewed could easily be recovered - even after many years passed! This is a serious threat to the legitimate user's privacy. Activity and Authentication Analyzer is a solution to this problem. AAAnalyzer is the powerful security software, which has been primarily destined to comprehensive search, analysis, and safe and secure deletion of the user activity traces left after work. The activity analysis and authentication or how it is called in brief statistics, as the method of information (intelligence data) collection is applied either for the preliminary exploring or when the access to information (posted message, telephone talk) is impossible or unwanted.

  • Platform: Win2000, Windows Server, WinOther

DAF is a complete package to handle Web user authentication on an NT/IIS server. It include: an ISAPI filter (DAF) which handles authentication for all HTTP requests received by IIS, an ASP application (Web User Manager) to manage users in any DAF databases through a Web interface, and an ASP component (DAFTools) to easily manage DAF users in ASP scripts..

  • Platform: Asp, Scripts

The Authentication Provider project is actually a collection which includes both the core components and the individual providers for each authentication type. At present the supported providers include Active Directory, LiveID and OpenID. Each member of the Authentication team leads the effort on their own specific provider. However, they work as a team to ensure that all the providers are well serviced (including forums, fixes, etc)..

  • Publisher: mikeh36
  • Date: 14-04-2013
  • Size: 41 KB
  • Platform: ASP.NET, Scripts

Uma (formerly known as Rampart) is a user authentication and management system written entirely in PHP and supports MySQL. There is an administrative web interface for managing users and API documentation available for developers..

  • Publisher: rampart
  • Date: 12-04-2013
  • Size: 82 KB
  • Platform: PHP, Scripts

Joomla! 1.5 Content Management System two-factor authentication (T-FA) plugin for use with the Yubico Yubikey one-time-password device. An accompanying component is included to manage Yubikey users. With this authentication plugin you may selectively choose which Joomla users will require a Yubikey device to log into Joomla. Two-factor authentication is achieved by requiring a Yubikey-enabled user to first input their Joomla password and then adding their Yubikey one-time-password to the end of that forming a single password consisting of the user's Joomla password and their Yubikey one-time-password concatenated to the end of that.

  • Platform: PHP, Scripts

Joomla! Authentication Tools provides a host and interface for extending authentication options for Joomla! 1.0.x and 1.5 releases. For more information, please read the wiki available at http://sammoffatt.com.au/jauthtools/ The best area to get support is the mailing list. The forums will be disabled shortly in preference to the mailing list. JAuthTools offers the following authentication solutions: Joomla! 1.0.x: * LDAP SSO * LDAP SSI * LDAP Sync * HTTP SSO Joomla! 1.5 * SSO (LDAP and HTTP) * User Sources (User Autocreation) Note: In Joomla! 1.5, SSI is handled by the core system and an LDAP plugin is supplied.

  • Platform: PHP, Scripts

Then go to the Plugins Manager and edit the new installed pluggin Authentication - IMAP, configure the IMAP server, the IMAP port and the default domain name for the IMAP server. When a user autenticates the plugin will try a sucessufull connection and authentication to the IMAP server, if it is sucessfull then creates the user in the Joomla! database with the username introduced, and the email is the concatenation of the username and the domain defined in the plugin options..

  • Publisher: Marco Erra
  • Date: 19-04-2013
  • Size: 10 KB
  • Platform: PHP, Scripts

Shetab SharePoint Live Authentication LiveID & OpenID Trusted Identity Provider for SharePoint Claims Based Authentication Shetab SharePoint Live Authentication allows you and your members sign in to your SharePoint site with any OpenID provider such as LiveID, Microsoft Account, Google Account or Facebook Account. You can manage member's access before and after user's login to your site via SharePoint standard access pages such as people picker. Shetab SharePoint Live Authentication implements a SharePoint Claims Provider and standard Security Token Service (STS). Let billion of users that already have account in famous identity provider such as Microsoft Live, Yahoo and Google can safety sign-in to your site.

  • Platform: Windows Server

PortalGuardOCOs Two-factor authentication can be enforced and deliver a one-time password (OTP) when the user is trying to access the web/cloud application directly, through a VPN connection using RADIUS, or when performing a self-service password reset. This demo shows an OTP delivered via SMS, voice, and printer, as well as answering a challenge question to access a web application using either test users or your local account. The full version of the software can deliver time-synched OTPs using a transparent toolbar and also supports domain accounts. About PortalGuard 2FA: Two-factor is an acceptable way to increase security; however, inflexibility and low usability have proven to be barriers for many organizations with the primary barrier being high cost in todayOCOs economic climate.

  • Platform: Win7 x32, Win7 x64, WinOther

O&K Authentication Client is a handy application that allows you to enter the password in order to print a document on a printer managed by the O&K Print Watch application. It is designed to be used on the computers connected in the same network as the server.

In order to use this tool you need to specify the server IP address during the setup process. It also allows you to view the balance of the user account and the activity for a specified time interval.


.

  • Platform: WinOther

The RSA Test Authentication Utility can be run on a computer with Microsoft Forefront Threat Management Gateway (TMG) installed.

The RSA Test Authentication Utility can verify that there is connectivity between a computer running Forefront TMG (the security client) and a computer running RSA Authentication Manager (the server) by authenticating to the server. This tool can also obtain the node secret that is needed for encrypting communication with the RSA Authentication Manager server.

Get RSA Test Authentication Utility for Forefront TMG and try it for yourself to fully assess its capabilities!

.

  • Platform: Windows Server

The Microsoft Exchange Server ActiveSync Certificate-Based authentication tool provides several utilities to assist an Exchange administrator in configuring and validating client certificate authentication for Exchange Server ActiveSync.

Because the tool writes information to the Active Directory, it must be run by someone with domain administrator privileges.

Get Microsoft Exchange Server ActiveSync Certificate-Based Authentication Tool and try it for yourself to see what it can actually do for you!

.

  • Platform: Win2000, WinServer

Authentication Manager is a tool for managing and operating the authentication method. An administrator can set up the authentication like LDAP authentication, Windows authentication and so on..

  • Platform: WinOther

Basic Authentication is a little program that converts a user name (login) and optionally a password to/from their Base64 Basic Authentication counterpart..

  • Platform: WinOther

COM library for Visual Basic 6, providing functionality to send emails. Supports multiple recepients, email (MIME) attachments, AUTH and POP3 authentication, HTML email, custom headers..

  • Publisher: OstroSoft
  • Date: 14-03-2004
  • Size: 76 KB
  • Platform: Win2000, WinOther

Protect access to Lotus Notes with smart cards, USB disks and biometrics. Dekart Logon for Lotus Notes allows you to store all your passwords on one removable storage device (USB flash drive or CD disk), a smart card or USB token and adds the strong authentication and convenience to the standard authentication procedure, thus eliminating the password risk. With Dekart Logon for Lotus Notes, you don't have to waste time entering complicated passwords, as all login data is entered automatically once the USB flash drive is connected to the computer. The login and password of the user are securely stored on the USB key, which can be protected with the user defined PIN code and (optional) his biometric data.

  • Publisher: Dekart
  • Date: 17-01-2005
  • Size: 1699 KB
  • Platform: Win2000, WinOther

WorkStation Lock Pro provides a simple, effective, multi-user approach to password protect your Windows NT/2000/XP Pro system quickly from the system tray, a desktop shortcut or after a period of inactivity without involving a screen saver. It provides a variety of features that make it more flexible than the native Windows locking mechanism. WorkStation Lock Pro uses Windows user authentication, so all of the password management is handled by Windows using your existing procedures..

  • Publisher: Posum LLC
  • Date: 24-2-2003
  • Size: 990 KB
  • Platform: Win2000, WinOther
  • Proteg
  • License: Shareware
  • Price: 19.90
  • Rating

Proteg is a software that allows users to secure their personal or notebook computers by preventing unauthorized access. It fortifies the existing Windows login mechanism by binding the user account to a ubiquitous hardware device: A portable USB storage device (USB Key, USB flash drive, thumbdrive). An additional hardware component becomes compulsory in order to login to the computer, instead of relying solely on the conventional username and password pair. Offering greater security than passwords alone, this hardware based system (commonly known as a two-factor authentication system) creates a physical link between a user and his identity.

  • Platform: Win2000, Windows Server, WinOther

Proteg Enterprise 2005 is a software that allows users to secure their personal or notebook computers by preventing unauthorized access. It fortifies the existing Windows login mechanism by binding the user account to a ubiquitous hardware device: A portable USB flash drive (USB Key, USB storage device, thumbdrive). An additional hardware component becomes compulsory in order to login to the computer, instead of relying solely on the conventional username and password pair. Offering greater security than passwords alone, this hardware based system (commonly known as a two-factor authentication system) creates a physical link between a user and his identity.

  • Platform: Win2000, Windows Server, WinOther

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


Coin World

Coin world is an interesting platforming demo game in which you play as “Colin the coin” as you take on the evil “bank note flash”. The premise alone is an interesting enough reason to play the game, and combined with the ...


Crash Boom Bang

Crash boom bang is a fairly interesting and unique puzzle game, which blends the elements of the pretty typical “removal” sub genre of puzzlers, with an interesting extra bit of variation added in the way the game works. This comes in ...


Screencatch

There are numerous occasions when you need to take screenshot of anything on your computer. A screenshot is used for serving many purposes like tutoring, in eBooks, as electronic proofs etc.Taking screenshots is a relatively tedious task without ...


World Domination 2

World domination 2 is a free flash turn based strategy game which has so many complex and realistic additions to the formula in the form of how production, technology and diplomacy between countries work, that it borders on being a realistic war ...


Arkout 3D Deluxe

Arkout 3d deluxe (or as we'll say from here on, simply arkout 3d) is a three dimensional re imagining of the classic concept of arcanoid, also known as brick or breakout. In the original arcanoid game, the aim is the move your baton across the ...


Mozilla Thunderbird

Mozilla is well known name in the internet industry. In fact, good amount of people are connecting to internet with Mozilla Firefox and this number is growing with time but I’ll be sharing my views on one of the lesser known product of ...


Avant Browser

There are many browsers available to download on World Wide Web, but more than 90% people use either of Chrome, Firefox or Internet Explorer. Due to this, many people either don’t know about other non-popular browsers or don’t care to ...


Brainteaser Cubes

Brain teaser cubes is a freeware first person action puzzle game, which is fully 3d, and has a fairly unique concept, most comparable to the console game portal, minus the portal elements (leaving just the cube based puzzles). The game is fairly ...


Key Launch

Key Launch is the time saving utility by Konrad Papala, helping you open your applications quicker than using the Start Menu. Instead of clicking the Start Button and using the your mouse or other pointing device to navigate through potentially ...



New Downloads

Dr.Web CureIt

Dr.Web CureIt is an
indispensable tool for curing
computers running MS Windows
8/7/Vista/XP/Server
2003/2008/2012 ...

My Bookmarks using PHP

Easily deliver powerful
bookmarking capabilities to
your site with this JavaScript
based client app. The app
allows your ...

Handy Library Manager

Handy Library Software for
Windows. Library database
system for small private,
public, or corporate
libraries. Our ...

DupScout Ultimate

DupScout Ultimate is a
powerful, fast and easy-to-use
duplicate files finder utility
allowing one to detect and
cleanup ...

VX Search Pro

VX Search Pro is an automated,
rule-based file search
solution capable of searching
files by the file type,
category, ...

CADbro

CADbro is a budget-friendly 3D
CAD viewer with multi-CAD
format support, especially
designed for everyone to
visualize ...

SUHide Lite

SUHide is an application that
will allow you to hide the
root status of your Android
device, so that applications
can not ...

Leawo Music Recorder for
Mac

Being the best music and audio
recording software for Mac OS
computer, Leawo Music Recorder
for Mac could easily record
...

Chronos Atomic Clock
Synchronizer

Chronos Atomic Clock
Synchronizer is a utility for
people who need their
computers to use exact time.
The program ...



Related Searches

Authentication Decod
Web Login Authentication Java
Password Authentication Software
Php Authentication Script
Authentication Software Mobile
Radius Test Authentication Tools
Socks Authentication
Socks Smtp Authentication
Authentication Eap Peap
Adobe Flash Encoder Authentication
Adobe Live Encoder Authentication
Air Cam Authentication Password