Open Source Systems Administration Software - Page 5

Systems Administration Software

View 1978 business solutions
  • The full-stack observability platform that protects your dataLayer, tags and conversion data Icon
    The full-stack observability platform that protects your dataLayer, tags and conversion data

    Stop losing revenue to bad data today. and protect your marketing data with Code-Cube.io.

    Code-Cube.io detects issues instantly, alerts you in real time and helps you resolve them fast. No manual QA. No unreliable data. Just data you can trust and act on.
    Learn More
  • Loan management software that makes it easy. Icon
    Loan management software that makes it easy.

    Ideal for lending professionals who are looking for a feature rich loan management system

    Bryt Software is ideal for lending professionals who are looking for a feature rich loan management system that is intuitive and easy to use. We are 100% cloud-based, software as a service. We believe in providing our customers with fair and honest pricing. Our monthly fees are based on your number of users and we have a minimal implementation charge.
    Learn More
  • 1
    ksar is a sar graphing tool that can graph for now linux,mac and solaris sar output. sar statistics graph can be output to a pdf file
    Downloads: 33 This Week
    Last Update:
    See Project
  • 2
    2FAS Auth for Android

    2FAS Auth for Android

    Source code for 2FAS Auth Android app

    2FAS Auth for Android is the general Android authenticator client for the 2FAS open-source multi-factor authentication suite, designed to help users protect their online accounts with secure, rotating one-time passwords and optionally manage related vault entries. This client lets users add and view TOTP and HOTP tokens for countless services, restore and backup token sets across devices, and secure the app with passcodes or biometrics. The Android implementation emphasizes straightforward setup and usage, providing an incremental list of codes that update in real time, quick token management, and compatibility with common OTP QR codes. It also supports sync and optional integration with 2FAS browser extensions to autofill or streamline authentication workflows when signing in to services across devices.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 3
    Authing

    Authing

    IDaaS/IAM solution that can Auth to web and mobile applications

    Authing quickly implements authentication and user management for any Web, App, and enterprise software to provide the most complete login solution for your customers and employees. Authing serves as an identity infrastructure, or Identity As A Service (IDaaS) for cloud computing. Authing focuses on identity and building social infrastructure for identity sharing across all SaaS software and users to help companies build a secure modern IT infrastructure that not only protects their business but also redefines the user experience. Authing is the foundation for secure connections between a complex identity ecology and an application ecology in which countless identities access applications and resources in a borderless way. Authing taking "API first" as the product cornerstone, all commonly used functions in the identity field are modularized and all capabilities are provided to developers through the full scene programming language SDK.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    Google Auth Library

    Google Auth Library

    Google Auth Library for Node.js

    This is Google's officially supported node.js client library for using OAuth 2.0 authorization and authentication with Google APIs. Use Application Default Credentials when you use a single identity for all users in your application. Especially useful for applications running on Google Cloud. Application Default Credentials also support workload identity federation to access Google Cloud resources from non-Google Cloud platforms. Use JWT when you are using a single identity for all users. Especially useful for server->server or server->API communication. Use workload identity federation to access Google Cloud resources from Amazon Web Services (AWS), Microsoft Azure or any identity provider that supports OpenID Connect (OIDC). Use workforce identity federation to access Google Cloud resources using an external identity provider (IdP) to authenticate and authorize a workforce—a group of users, such as employees, partners, and contractors.
    Downloads: 6 This Week
    Last Update:
    See Project
  • The Most Powerful Software Platform for EHSQ and ESG Management Icon
    The Most Powerful Software Platform for EHSQ and ESG Management

    Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.

    Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
    Learn More
  • 5
    Kanidm

    Kanidm

    Kanidm: A simple, secure, and fast identity management platform

    Kanidm is a simple and secure identity management platform, allowing other applications and services to offload the challenge of authenticating and storing identities to Kanidm. The goal of this project is to be a complete identity provider, covering the broadest possible set of requirements and integrations. You should not need any other components (like Keycloak) when you use Kanidm - we already have everything you need. To achieve this we rely heavily on strict defaults, simple configuration, and self-healing components. This allows Kanidm to support small home labs, families, small businesses, and all the way to the largest enterprise needs. If you want to host your own authentication service, then Kanidm is for you.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 6
    Moby

    Moby

    Project for the container ecosystem to assemble containe-based systems

    An open framework to assemble specialized container systems without reinventing the wheel. Moby is an open framework created by Docker to assemble specialized container systems without reinventing the wheel. It provides a “lego set” of dozens of standard components and a framework for assembling them into custom platforms. At the core of Moby is a framework to assemble specialized container systems which provides a library of containerized components for all vital aspects of a container system, OS, container runtime, orchestration, infrastructure management, networking, storage, security, build, image distribution, etc. Tools to assemble the components into runnable artifacts for a variety of platforms and architectures: bare metal (both x86 and Arm); executables for Linux, Mac and Windows; VM images for popular cloud and virtualization providers.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 7
    Integrated Windows Authentication (Single Sign-On) in Java.
    Leader badge
    Downloads: 28 This Week
    Last Update:
    See Project
  • 8

    PHP Shell

    A shell terminal using just PHP

    A convenient interface to execute shell-commands or browse the filesystem on your remote web server. Similar to a telnet or SSH connection. Use it for administration and maintenance of your web site using commands like ps, cat, gunzip, and more. Additional website: https://phpshell.sourceforge.io/
    Downloads: 44 This Week
    Last Update:
    See Project
  • 9

    secure rm

    srm is a command-line program to delete files securely.

    srm (secure rm) is a command-line compatible rm(1) which overwrites file contents before unlinking. The goal is to provide drop in security for users who wish to prevent recovery of deleted information, even if the machine is compromised.
    Leader badge
    Downloads: 42 This Week
    Last Update:
    See Project
  • Data management solutions for confident marketing Icon
    Data management solutions for confident marketing

    For companies wanting a complete Data Management solution that is native to Salesforce

    Verify, deduplicate, manipulate, and assign records automatically to keep your CRM data accurate, complete, and ready for business.
    Learn More
  • 10
    Monitoring AIX, VMware,Oracle, Nutanix

    Monitoring AIX, VMware,Oracle, Nutanix

    AIX, Linux, VMware, Nutanix, Oracle, RHV, Cloud performance monitoring

    The tool offers you end-to-end views of your server environment and can save you significant money in operation monitoring by predicting utilization bottlenecks in your virtualized environment. You can also generate policy-based alerts, capacity reports and load forecasts. The product supports these virtualization platforms: - IBM Power Systems - VMware - Nutanix - Proxmox - Huawei FusionCompute - OracleVM - Oracle Solaris LDOM, CDOM, Zone - oVirt / RedHat Virtualization (RHV) - MS Windows and Hyper-V - XenServer, Citrix - Amazon Web Services - Google Cloud - Microsoft Azure - IBM Cloud - Kubernetes - Docker - Red Hat OpenShift - Apache CloudStack - PostgreSQL database - Oracle Database - Microsoft SQL Server Try demo at http://demo.lpar2rrd.com
    Leader badge
    Downloads: 51 This Week
    Last Update:
    See Project
  • 11
    Logsurfer is a program for monitoring system logs in real-time, and reporting on the occurrence of events. It is capable of grouping information together to enhance loganalysis and create automatic reports.
    Leader badge
    Downloads: 80 This Week
    Last Update:
    See Project
  • 12
    SSHGuard

    SSHGuard

    Intelligently block brute-force attacks by aggregating system logs

    SSHGuard protects hosts from brute-force attacks against SSH and other services. It aggregates system logs and blocks repeat offenders using several firewall backends, including iptables, ipfw, and pf.
    Leader badge
    Downloads: 143 This Week
    Last Update:
    See Project
  • 13
    Simple Software-restriction Policy

    Simple Software-restriction Policy

    Control which folders programs can be run from.

    A software policy makes a powerful addition to Microsoft Windows' malware protection. In particular, it is more effective against ransomware than traditional approaches to security. If you know about the Linux 'execute permission' bit then you'll understand what this is for. The mode of operation is somewhat different in that execute permission is granted to folders and subfolders rather than individual files, but the intention is the same, to stop undesirable or unknown software from launching unless you OK it. Additionally, it is possible to specify that certain executables (typically browsers and email clients) are run with reduced rights. This is a valuable damage-limitation measure against browser plugin vulns, etc. The protection can be turned off without a reboot whilst installing legitimate software, and will automatically reactivate after a specified time
    Downloads: 40 This Week
    Last Update:
    See Project
  • 14
    Silver Shield PM Control for Linux

    Silver Shield PM Control for Linux

    Control software for GEMBIRD USB controlled power strips

    sispmctl is an application enabling the use of the GEMBIRD SiS-PM and mSiS(sispm) USB-controlled power-outlet device under Linux. Note that the device is also sold under different Names, i.e. as "IntelliPlug" in Germany.
    Leader badge
    Downloads: 35 This Week
    Last Update:
    See Project
  • 15
    ISPConfig Hosting Control Panel
    ISPConfig - ISP management and Hosting Control Panel. ISPConfig manages one or more webservers, mailservers, BIND DNS server, FTP servers, MySQL databases and virtual Servers with an easy to use webinterface for administrators, resellers and clients.
    Downloads: 25 This Week
    Last Update:
    See Project
  • 16
    NagiosQL - Nagios configuration tool
    NagiosQL is a professional, web based configuration tool for Nagios 2.x/3.x/4.x. It is designed for large enterprise requirements as well as small environments. Any Nagios functionalities are supported.
    Leader badge
    Downloads: 31 This Week
    Last Update:
    See Project
  • 17
    Better Auth

    Better Auth

    The most comprehensive authentication library for TypeScript

    Better Auth is framework-agnostic authentication (and authorization) library for TypeScript. It provides a comprehensive set of features out of the box and includes a plugin ecosystem that simplifies adding advanced functionalities with minimal code in a short amount of time. Whether you need 2FA, multi-tenant support, or other complex features. It lets you focus on building your actual application instead of reinventing the wheel.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 18
    MaxKey

    MaxKey

    MaxKey SSO ,Leading-Edge IAM-IDaas(Identity and Access Management)

    Maxkey Single Sign On System, which means the Maximum key, Leading-Edge IAM/IDaas Identity and Access Management product, supports OAuth 2.x/OpenID Connect, SAML 2.0, JWT, CAS, SCIM, and other standard protocols, and provide Secure, Standard and Open Identity management (IDM), Access management (AM), Single Sign On (SSO), RBAC permission management and Resource management. MaxKey focuses on performance, security, and ease of use in enterprise scenarios, is widely used in industries such as healthcare, finance, government, and manufacturing.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 19
    NativeScript Fingerprint Authentication

    NativeScript Fingerprint Authentication

    Forget passwords, use a fingerprint scanner or facial recognition

    The nativescript-fingerprint-auth plugin enables biometric authentication in NativeScript applications, allowing users to authenticate using fingerprint or facial recognition, enhancing security and user convenience.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 20
    Pocket ID

    Pocket ID

    Easy-to-use OIDC provider that allows to authenticate with passkeys

    Pocket-ID is an open-source OpenID Connect (OIDC) identity provider that prioritizes passwordless authentication using modern passkeys, making secure login easier for self-hosted services. By supporting passkeys instead of traditional passwords, Pocket-ID aligns with evolving web authentication standards, letting users sign in with devices, hardware keys like YubiKey, or platform-managed credentials. It’s designed to be simpler to install and use than larger identity solutions like Keycloak or Hydra and integrates smoothly with other self-hosted applications that understand OIDC protocols. With Docker-ready setup and broad community interest, the project supports a fully self-managed authentication stack where you control user identity, sessions, and login flows without relying on third-party services. It has gained popularity in the self-hosted ecosystem as a straightforward way to add single sign-on capabilities and modern security to your apps.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 21
    Traefik Forward Auth

    Traefik Forward Auth

    Forward authentication service. Google/OpenID oauth based login

    A minimal forward authentication service that provides OAuth/SSO login and authentication for the traefik reverse proxy/load balancer. Traefik prepends the namespace to the name of middleware defined via a Kubernetes resource. This is handled automatically when referencing the middleware from another resource in the same namespace (so the namespace does not need to be prepended when referenced). However, the full name, including the namespace, must be used when referenced from static configuration.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 22
    VoidAuth

    VoidAuth

    Single Sign-On for Your Self-Hosted Universe

    VoidAuth is a self-hosted, open-source Single Sign-On (SSO) authentication provider that simplifies managing user access and identity for a suite of private applications. Built around standards like OpenID Connect (OIDC), it serves as a central authentication authority so that users can log in once and gain secure access to multiple services without duplicating credentials. The platform offers a user and group management interface where administrators can invite users, enable self-registration, and configure policies like multi-factor authentication and password resets with email verification. Designed with flexibility in mind, VoidAuth supports features such as passkeys and customizable branding, making it adaptable to a wide range of deployment environments and aesthetic preferences.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 23
    sso

    sso

    Single sign-on solution for securing internal services

    sso — lovingly known as the S.S. Octopus or octoboi — is the authentication and authorization system BuzzFeed developed to provide a secure, single sign-on experience for access to the many internal web apps used by our employees. It depends on Google as its authoritative OAuth2 provider and authenticates users against a specific email domain. Further authorization based on Google Group membership can be required on a per-upstream basis. The main idea behind sso is a "double OAuth2" flow, where sso-auth is the OAuth2 provider for sso-proxy and Google is the OAuth2 provider for sso-auth.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 24
    Überauth

    Überauth

    An Elixir Authentication System for Plug-based Web Applications

    Ueberauth is a two-phase authentication framework that provides a clear API, allowing for many strategies to be created and shared within the community. It is heavily inspired by Omniauth. You could call it a port but it is significantly different in operation, but almost the same concept. Huge hat tip to Intridea. Ueberauth provides only the initial authentication challenge, (initial OAuth flow, collecting the information from a login form, etc). It does not authenticate each request, that's up to your application. You could issue a token or put the result into a session for the needs of your application. Libraries like Guardian can help you with that aspect of authentication. Strategies implement the two phases and then may allow the request to flow through to your downstream plugs. Implementing the request and callback phases is optional depending on the strategies requirements. If a strategy does not redirect, the request will be decorated with Ueberauth information.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 25
    Find And Replace Text command line utility. New & improved version of the well-known grep command, with advanced features such as: case-adaption of the replace string; find (& replace) in filenames, auto CVS edit. Moved to https://github.com/lionello/fart-it
    Leader badge
    Downloads: 29 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB