Featured 

Okta Authentication

Software
iDownloader
rating
683
iPubsoft
This application allows you to save videos to your hard disk for offline enjoyment. Multiple downloading...
This application allows you to save videos to your hard disk for offline enjoyment. Multiple
SecureCRT
rating
431
VanDyke Software
SecureCRT for Windows, Mac, and Linux provides rock-solid terminal emulation, secure remote access...
other protocols, with authentication via password, public key...support for larger authentication k
SharePlusLite
free rating
345
SouthLabs
Access your SharePoint's data from anywhere with SharePlus. Browse all your SharePoint's knowledge assets easily...
configuration sharing ★ Multi factor authentication ★ Custom Features & Features trimming
iActivate Mdm Bypass
free rating
232
iActivate
iActivate Mdm Bypass is a robust and easy-to-use iActivate tool that can remotely delete MDM profiles...
just 1 click, bypass MDM Authentication Screen during device's activation
Citrix Secure Access
free rating
87
Citrix Systems Inc
Citrix Secure Access enables Zero Trust Network Access with adaptive...
Network Access with adaptive authentication to all IT sanctioned
eID Connector
free rating
86
e-Contract.be BV
eID Connector is a Safari extension...
case of an eID authentication, or the creation
MQTTX
free rating
76
EMQ Technologies Co., Ltd.
MQTTX is a simple and elegant MQTT 5.0 client tool. It offers a convenient solution to quickly...
single/two-way SSL authentication
IPinator VPN
rating
30
PopNet Media LLC.
Surf anonymously, prevent hackers from acquiring your IP address...
Surf anonymously, prevent hackers from acquiring your IP address, send anonymous email, and encrypt
Bluebird
rating
23
13bold
Bluebird 1...
which uses the basic authentication scheme
SimpleAuthority
free rating
19
simpleauthority.com
SimpleAuthority is a fully functional Certification Authority (CA) that is designed to be very easy to use...
secure two factor authentication - using...server SSL authentication - to authenticate
HackerEvolutionDuality
rating
15
exosyphen studios
Hacker Evolution Duality starts in the early days of Brian Spencer...
to sophisticated voice print authentication systems
Kerberos Commander
free rating
4
Stanford University
Kerberos Commander configures Kerberos for use at Stanford. If an application at Stanford requires Kerberos...
Stanford requires Kerberos authentication (e.g., Stanford OpenAFS...Your Kerberos authentication
VShell Server
rating
4
VanDyke Software
VShell Secure Shell server for Windows, Mac...
strong encryption, trusted authentication ...options and trusted authentication methods give
Netlock VPN Client for Nortel
rating
4
Apani Networks
The Netlock VPN Client supports various IPSec tunneling modes including tunneling private...
VPN concentrators. Authentication suport includes...WinNT Domain Authentication, two-factor
Download With SCP
free rating
4
Douglas Stebila
This project provides Mac OS X Automator actions for downloading and uploading files using the secure copy (scp)...
be able to automatically authenticate with the client ...using SSH public key authentication
GSI-SSHTerm
free rating
1
Leibniz-Rechenzentrum
GSISSH-Term is a Java based terminal client application for accessing the Grid. It supports the use of grid...
of grid certificates for authentication. Users have to place
MiriToken-ID Vault
free rating
1
Miri Systems, LLC
MiriToken-ID Vault allows users the convenience of storing up to eight of their MiriToken...
the correct password for authentication
MiriToken
free rating
1
Miri Systems, LLC
MiriToken allows secure access to computer systems and/or...
It verifies the authenticity...that requires positive authentication, such as government
Confidant Mail
free rating Mike Ingle
Confidant Mail is an open-source non-SMTP cryptographic email system optimized for large...
) for content encryption and authentication, and TLS 1.2 with ephemeral
AgileSSHClient
rating Ronald LO
Agile SSH Client is a client application in which you can connect with multiple servers with the SSH protocol...
/password or a private key authentication through SSH. It can