Home / Identity and Access Management (IAM) / Authentication & Authorization

Authentication & Authorization

Secure access control with robust authentication and authorization solutions within IAM.

Try these 161 AI Authentication & Authorization Tools

Incognia
Free

Incognia View Incognia

Incognia provides a private, location-behavior-based identity solution that enhances mobile app and connected device experiences through frictionless personalization. Leveraging sophisticated location behavior and device intelligence, Incognia offers robust zero-factor authentication and background risk assessments, delivering a superior defense against account takeover (ATO) fraud without adding friction for legitimate users.

Private, location-behavior-based identity
Frictionless personalization for mobile apps and devices
Zero-factor authentication for enhanced security
Infisign
Free

Infisign View Infisign

Infisign revolutionizes Identity and Access Management (IAM) by leveraging existing organizational identities, such as employee ID cards, for effortless passwordless authentication. Built upon the robust Zero Trust security model, Infisign meticulously authenticates, authorizes, and monitors every access request. This approach significantly enhances security posture, mitigates risks, and provides seamless, secure access across all devices, aligning with the future of modern security needs.

Passwordless authentication using existing digital identities
Full adoption of Zero Trust security principles
Seamless multi-factor authentication (MFA) across all devices
Informatics International
Free

Informatics International View Informatics International

Leverage Informatics International's expertise as a premier ICT provider in Sri Lanka to fortify your digital defenses. Our dedicated Cyber Security team offers a comprehensive suite of advanced solutions, including adaptive network access security with NordLayer and seamless multi-factor authentication via MIRACL, empowering your organization with enhanced security and resilience against evolving cyber threats.

Advanced Cyber Security Solutions
Adaptive Network Access Security (NordLayer)
Single-Step Multi-Factor Authentication (MIRACL)
Innefu Labs
Free

Innefu Labs View Innefu Labs

Innefu Labs is a pioneering Information Security R&D startup specializing in advanced Data Analytics and comprehensive Information Security solutions. Leveraging cutting-edge Artificial Intelligence and Machine Learning, Innefu delivers a Unified Authentication Solution, including robust Biometric and Facial Authentication, widely adopted in India and the Middle East. Their Data Analytics and ML solutions are also deployed within Law Enforcement Agencies across South East Asia, enhancing operational efficiency and security.

AI-powered Data Analytics
Unified Authentication Solutions
Biometric Authentication
Innova
Free

Innova View Innova

Innova is a premier IT solutions provider in Turkey, delivering platform-independent solutions across telecommunications, finance, manufacturing, public, and service sectors. Their comprehensive service offerings encompass the full project lifecycle, from initial consulting and design to application development, integration, and ongoing support, with specialized expertise in IT systems management and robust IT security. Innova partners with best-in-class technologies like MIRACL for passwordless multi-factor authentication and BackupVault for automated cloud backup and data protection against cyber threats.

Platform-independent IT solutions
End-to-end project lifecycle services
IT Systems Management
InstaSafe Technologies
Free

InstaSafe Technologies View InstaSafe Technologies

InstaSafe Technologies provides a unified, Software-Defined Perimeter (SDP) based secure access solution designed for both on-premise and cloud environments. Our platform offers comprehensive, uncompromising protection for mobile and remote workers, enabling secure access to enterprise applications, email, and web resources from any location and network. By integrating advanced solutions like MIRACL's passwordless multi-factor authentication and Resecurity's unified threat intelligence, InstaSafe delivers robust security-as-a-service that prioritizes user experience and organizational safety.

Software-Defined Perimeter (SDP) Architecture
Cloud and On-Premise Application Security
Secure Access for Mobile and Remote Workers
Intensity Analytics
Free

Intensity Analytics View Intensity Analytics

Intensity Analytics offers a cutting-edge, patent-allowed software solution for physical User and Entity Behavior Authentication (physical UEBA). Our technology elevates identity verification beyond traditional credential checks, focusing on recognizing *who* is actually using a computer through sophisticated, innovative algorithms. This provides unparalleled authentication integrity and actionable threat intelligence, enhancing your defense-in-depth strategy against credential theft without introducing user friction.

Next-generation physical UEBA technology
Sophisticated, novel authentication algorithms
Transition from credential verification to identity recognition
Intrinsic-ID
Free

Intrinsic-ID View Intrinsic-ID

Intrinsic ID, now part of Synopsys, pioneered SRAM Physical Unclonable Function (PUF) technology, enabling robust, hardware-based digital authentication. By harnessing inherent manufacturing variations within standard SRAM, Intrinsic ID creates unique, unclonable identities and cryptographic keys for devices, data, and systems. This cost-effective solution eliminates the need for additional hardware, making advanced security accessible and crucial for the expanding IoT, payment, and government sectors.

SRAM Physical Unclonable Function (PUF) technology
Unique, unclonable device identities
Hardware-based cryptographic key generation
inWebo
Free

inWebo View inWebo

inWebo is the premier specialist in Multi-Factor Authentication (MFA), dedicated to safeguarding digital data and identities in today's high-stakes environment. Our robust SaaS platform provides comprehensive strong authentication management, effectively combatting identity theft, account spoofing, and phishing attacks. By seamlessly integrating maximum security with an optimized user experience, inWebo empowers organizations to protect their critical assets.

Multi-Factor Authentication (MFA) Specialist
Comprehensive SaaS Platform for Strong Authentication Management
Protection Against Identity Theft, Account Spoofing, and Phishing
IPification
Free

IPification View IPification

IPification offers a cutting-edge, credential-less authentication solution designed for mobile and IoT devices, ensuring a frictionless user experience and robust digital identity protection. By leveraging advanced network capabilities beyond traditional methods like SMS, IPification provides adaptive security that seamlessly prevents unauthorized access, serving over 1.5 billion devices through strategic partnerships with Mobile Network Operators. This secure, network-based approach minimizes user effort while maximizing protection against fraudulent activity.

Credential-less authentication for enhanced security and user experience
Network-based identity verification leveraging Mobile Network Operator assets
Advanced security features exceeding SMS, Header Enrichment, and USSD capabilities
iProov
Free

iProov View iProov

iProov provides a secure and seamless identity assurance platform, utilizing genuine one-time biometrics to establish digital trust. Our patented liveness detection technology, powered by advanced deep learning, ensures that online users are real and present, effectively countering sophisticated spoofing techniques like deepfakes, masks, and replay attacks. Safeguard your organization with unparalleled biometric authentication that guarantees user authenticity in any environment.

Genuine Biometric Liveness Detection
Patented Spoof Prevention Technology
Real-time Identity Verification
ISC2
Free

ISC2 View ISC2

ISC² is a premier global provider of cybersecurity resources and training, empowering professionals and organizations to build resilient digital defenses. Access an extensive Supplier Directory featuring over 8,000 specialized cybersecurity service providers across 128 countries, ensuring you can find the right expertise for your unique security needs. Discover innovative solutions from leading cybersecurity brands designed to enhance network security, implement robust multi-factor authentication, and protect against evolving cyber threats.

Extensive Global Cybersecurity Supplier Directory (8,000+ providers, 128 countries)
Access to adaptive network access security solutions
Industry-leading single-step Multi-Factor Authentication (MFA)
IT Voice
Free

IT Voice View IT Voice

IT Voice delivers comprehensive Managed IT and cutting-edge VoIP solutions, designed to streamline your technology infrastructure and empower your business to focus on core objectives. We leverage our deep technological expertise to drive tangible business outcomes, offering advanced cybersecurity through Vala Secure, passwordless Multi-Factor Authentication with MIRACL, and adaptive network access security with NordLayer.

Managed IT Services
VoIP Solutions
Advanced Cybersecurity (Vala Secure)
Keyless Technologies
Free

Keyless Technologies View Keyless Technologies

Keyless Technologies is revolutionizing access control and identity management with its advanced, passwordless authentication solutions. By eliminating traditional credentials, Keyless significantly enhances security posture and user experience for businesses and their customers. Our innovative platform leverages cutting-edge biometric and cryptographic methods to provide seamless, secure, and compliant access across all digital touchpoints.

Passwordless Authentication
Advanced Biometric Verification
FIDO2 Certified
Keyri
Free

Keyri View Keyri

Keyri empowers businesses to implement robust, yet user-friendly anti-fraud and authentication solutions. By creating immutable device fingerprints and integrating passwordless authentication via Passkeys and WebAuthn, Keyri safeguards against account takeovers, bot attacks, and promotional abuse, all while delivering a seamless user experience.

Immutable Device Fingerprinting
Passwordless Authentication via Passkeys/WebAuthn
Fraud Prevention (Account Takeover, Bots, Promo Abuse)
Keystrike
Free

Keystrike View Keystrike

Keystrike provides unparalleled workstation security by establishing a true Root of Trust, safeguarding against advanced persistent threats and sophisticated workstation-as-a-proxy (WaaP) attacks that bypass traditional identity controls like MFA and PAM. Our patented technology verifies that all remote commands originate directly from the employee's physical workstation, preventing attackers from leveraging compromised devices to advance their objectives. Keystrike's 'Block by Default' posture offers a proactive defense, enabling precise detection, automated isolation, and orchestrated response to neutralize threats before they escalate.

Patented physical keystroke verification
Protection against Workstation-as-a-Proxy (WaaP) attacks
Establishes a Root of Trust on endpoints
Ksmartech
Free

Ksmartech View Ksmartech

Ksmartech specializes in advanced security and authentication solutions for connected ecosystems, including FinTech, IoT, and smart vehicles. Leveraging deep expertise in wired and wireless IT services, our solutions facilitate secure human-to-object and object-to-object interactions. We pioneer R&D in communication technologies like NFC, BLE, TEE, and WBC-based wireless security to deliver robust authentication for the modern digital landscape.

NFC and BLE communication security
TEE and WBC-based wireless authentication
FinTech security solutions
LEADS
Free

LEADS View LEADS

LEADS is a premier ICT Solution Provider and trusted IT partner in Bangladesh, specializing in end-to-end business application software design, development, implementation, and maintenance. We deliver comprehensive IT solutions and services, including robust network infrastructure and advanced security. Our security offerings encompass authentication and identity management, SSL certificates, and PKI solutions, safeguarding mobility, remote connectivity, and enterprise computing against evolving cyber threats.

End-to-end business application software development
Network infrastructure design and implementation
Advanced IT security solutions
LinOTP
Free

LinOTP View LinOTP

LinOTP is a robust, enterprise-grade One-Time Password (OTP) platform designed for flexible and powerful strong authentication. Its highly modular and vendor-independent architecture seamlessly integrates with diverse authentication protocols, token types, and user repositories, ensuring maximum compatibility and avoiding vendor lock-in. LinOTP's support for multi-tenancy, effortless scalability, and user-friendly implementation empowers organizations to achieve the highest security standards with unparalleled adaptability.

Modular and vendor-independent architecture
Support for multiple authentication protocols (e.g., RADIUS, SAML)
Wide range of token type support (hardware, software OTP, SMS, Push)
Loccus AI
Free

Loccus AI View Loccus AI

Loccus AI specializes in state-of-the-art AI-driven voice security solutions, focusing on identity verification, deepfake detection, and robust fraud protection for both enterprises and consumers. Leveraging advanced deep learning, Loccus provides cloud-based tools enabling seamless integration of cutting-edge voice authentication technology. Acquired by Hiya in 2024, Loccus continues its mission to revolutionize voice security with unparalleled accuracy and reliability.

AI-powered Identity Verification
Deepfake Detection Systems
Voice Fraud Protection Products
Mi-Token
Free

Mi-Token View Mi-Token

Mi-Token is a robust, enterprise-grade two-factor authentication (2FA) solution designed for unparalleled security, flexibility, and ease of integration. Since 2009, Mi-Token has empowered leading global organizations, including major banks, governments, and corporations, with advanced access control and single sign-on (SSO) capabilities. Its evolution into a comprehensive SSO solution, fully SAML compliant and ADFS friendly, ensures seamless and secure user access across diverse applications.

Advanced Two-Factor Authentication (2FA)
Seamless Single Sign-On (SSO) Integration
SAML Compliance and ADFS Compatibility
miniOrange
Free

miniOrange View miniOrange

miniOrange offers a robust cloud and on-premise Identity and Access Management (IAM) solution designed to securely connect enterprises with their customers and partners. Our comprehensive suite supports Single Sign-On (SSO), Multi-Factor Authentication (MFA), User Provisioning, Adaptive Authentication, Social Login, and advanced Network Security solutions, ensuring seamless and protected access to all web-based applications from a single, centralized platform.

Cloud and On-Premise IAM Solution
Single Sign-On (SSO)
Multi-Factor Authentication (MFA)
MIRACL
Free

MIRACL View MIRACL

MIRACL offers a revolutionary single-step Multi-Factor Authentication (MFA) solution designed to completely replace passwords across all devices, including mobiles, desktops, and Smart TVs. Leveraging proprietary cryptography and protocols via its MIRACL Trust® ID SaaS platform, it delivers robust, hardware-agnostic security without storing or transmitting sensitive data, effectively neutralizing common cyber threats like credential stuffing and phishing. Experience seamless user enrollment and rapid integration, transforming your security posture with an intuitive, friction-free authentication experience that significantly reduces support overheads.

Single-step, passwordless Multi-Factor Authentication (MFA)
Replaces passwords on all devices (mobile, desktop, Smart TV)
SaaS solution with no reliance on hardware or OS security
Multifactor
Free

Multifactor View Multifactor

The agentic era is rapidly advancing, yet its security remains a critical vulnerability, with escalating incidents of AI agents exhibiting unauthorized behavior. Multifactor addresses this gap by providing advanced authentication, authorization, and auditing solutions specifically designed for complex multi-agent systems. Our patented technology enables secure, revocable sharing of online accounts with agents, offering granular permissions and detailed event histories to protect enterprises against threats like prompt injection, thereby accelerating AI adoption with confidence.

Fine-grained permissions for agent access to online accounts
Verifiable authentication and authorization for multi-agent systems
Detailed event auditing and history for AI activities