Free

pGina Fork

pGina Fork is a pluggable open source GINA that offers alternate access management methods and interactive user authentication on a machine running the Windows operating system. It exclusively allows your Windows users for authentic login by using the backend of your desire. You can easily and smoothly decide about your users’ management, authentication, and authorization. It allows you to use a custom backend or craft desirable authentication code.

The fork was first explicitly created for Github’s contribution, but now it’s hard to merge back due to code differences. pGina Fork offers multiple features or services, including password change options, improved login mask, event-based logoff in the Local Machine Plugin, new plugin pgSMb, and many more.

ADVERTISEMENT

pGina Fork Alternatives

#1 Portecle

Paid
0

Portecle is user-friendly GUI software designed to create, manage, and examine keystrokes, keys, certificate requests, revocation lists of certificates, and more. The software effectively provides each user with properly authenticated certificates that will prove valuable for enterprise infrastructure. Portecle is dispensing some security settings in some environments that do not allow a web application to start by default.

The software is free to use, and you can redistribute it or modify it by having the GNU, and can be launched directly from Java web start. The prominent features include created load, key pair entries based on DSA and RSA, view details of certificates, import CA replies, cloning and changing the password of key pair entries and keystrokes, and renaming keystrokes entries more to add. You can also view the details of certificates in keystroke entries, SSL connections, and certificate files.

ADVERTISEMENT

#2 OpenXPKI

Paid
0

OpenXPKI is professional enterprise software for PKI endorsement and is implementing all the necessary features to operate PKI in supportive environments. The preliminary design to run as an online CA or RA for managing certificates like X509V3 is flexible for many use cases regarding cryptographic key management.

The software is known for its stable, mature, and growing code base, and there are various professional installations and hosts multiple certificate authorities with thousands of active certificates. There are various resources to look forward to, such as FreeBSD ports, mailing lists, package repository, documentation, and a one-stop demo. Common features include web UI compatibility, auto-enrollment, issue certificates, easy adjustments, and more to add.

#3 Dogtag PKI

Paid
0

Dogtag PKI is an all-in-one enterprise certificate authority management that covers all of your PKI needs. The software is fully featured and facilitates real-world deployments. There is advanced support for life cycle management aspects such as smartcard management, OCSP, key archival, and many more. The interface is very clear and operative with various options like configuration, status, authentication instance, and authentication plugin registration.

Six different subsystems come with Dogtag PKI like CA, KRA, OCSP, TKS, TPS, and Achme responder. The software can be downloaded for free, and setup will take less than an hour. You can either add a new instance name or plugin name, edit or delete them permanently. Multiple features are users and groups, access control list, log, system keys and certificates, authentication, job scheduler, search certificates, certificate manager, and more.

ADVERTISEMENT

#4 EJBCA

Paid
0

EJBCA is a useful and open source CA software that can be scaled and match your PKI’s needs. The software covers all your requirements, whether for registration, enrollment certificate management, and validation. The platform leads your way in the long run with its long projects that will bring robustness and reliability with less time consumption.

Whether you are cop up with a national eID, securing your industrial IOT platform, or managing your own internal PKI. The program is implemented in Java EE and is fully independent of the platform, and is completely clusterable. You can also run multiple instances of EJBCA simultaneously and share the database containing the current certificate authorities. The key features are online certificate status protocol, multiple algorithms, high performance, and capacity, adding more to the list.

#5 Keywhiz

Paid
0

Keywhiz is a protection provider software that comes with strong encryption, making it easier for you to manage secrets and secure reliability. The software provides you severs in a cluster; this way, secrets are centrally stored and encrypted in the database. Keywhiz can be fit very easily with service-oriented architecture. The authenticated users can administer Keywhiz with CLI’s help and enable workflow courtesy of automated APIs over mTLS.

The software facilitates organizations with having systems that require secrets such as TLS certificates, GPG keys, API tokens, and database credentials. Clients have the authority to use the mutually authenticated TLS to retrieve secrets if they want access to them. There is customizable authentication possible with LDAP, and more importantly, bcrypt-hashed passwords are supported now. Furthermore, the software stores all the secret memory, and they will never urge to be on disk, and in case of server power loss, then all the servers will be safely removed from that server.

#6 gnoMint

Free
0

gnoMint is a free-to-use software designed for managing certification authorities for graphical and command-line environments. The software comes with an easy-to-use interface that is reliable for creating the certification authorities and all the related elements, including digital certificates, certificate signing requests, and certificate revocation lists.

The software allows the infrastructure to save all the digital certificates to save only in one file. More importantly, it can create the required certificate signing request and export them. gnoMint somehow manages a whole hierarchy of CAs at the same time with their required certificates. Various features come with gnoMint, including creating X.509 certificates, revoking the certificates’ ability, pre-existing certificates authority, the exportability of the certificates to PEM files, and more to add.

#7 TinyCA

Free
0

TinyCA is a graphical user interface that allows users to manage a small certification authority written in Perl language. The platform supports various languages, and users can export CRLs as PEM or TXT. Moreover, it offers unlimited CAs and supports users in creating and managing SubCAs.

The platform enables users to use certificates with Apache, Postfix, Cyrus, OpenVPN, etc. Moreover, the client certificates can be used with Netscape, Opera, Outlook, Internet Explorer, etc. Lastly, it works with backend software like OpenSSL, Perl-Gtk2, etc.

#8 Duo Security

Paid
0

Duo Security is a security company providing you with top-notch two-factor authentication and data encryption that adds a layer of security to your data and logins. Duo Security aims to secure a network of computers. For example, you can implement it in educational institutes to protect student logins, portals, and data access. Duo’s access solution mitigates data breach risk and helps comply data with NIST standards. Implementation in Law firms provides secure access to confidential client data with two-factor authentication.

Duo Security integrates into retails software to help secure customer’s credit card information and payment details. Duo Security also provides its solutions to Technology & IT department, Healthcare, and Financial service departments. The features that make you choose Duo Security over others are BYOD security for ease of data use on multiple devices and Cloud Security for integrating data security on-premises or on the cloud.

Endpoint security and Mobile security features are also a part of its security system. With the Adaptive Access policies, control every user to give the right amount of data access without worrying about sensitive data from the employee side. All in all, Duo Security is a top-notch tool that you should integrate into your system and forget about security issues.

#9 Google Authenticator

0

Google Authenticator app elegantly generates two-step verification codes on your cell phones and tablets to bring a stronger security level. Google Authenticator is a fabulous product introduced in the market by Google LLC to enhance the level of safety for your Google Account by requiring a second step of verification while signing in.

The app helps you in generating verification codes without needing any internet connection and helps you get everything done offline. The app works elegantly with plenty of accounts and providers that you keep in your cell phones and tablets. Google Authenticator app supports Android Wear, Dark theme availability, and automatic setup via QR code.

While on the other hand, you also need a code generated by the Google Authenticator app over your cell phones apart from your passcode. The app boosts and secures your productivity by bringing amazing service right to you. So just grab the Google Authenticator app from the store and secure all the interesting and important things.

#10 Authy

0

Authy brings one of the best ways of implementing two-factor security by receiving a text when you log in to an account secured by this app. It has a feature to pull back the codes from a cellphone and desktop. You will get a message on your phone when someone tries to access the account.

It creates a backup plan on the cloud so you will not lose the token (8 Digits) passwords forever and get codes after resetting the phone. It helps you to protect all your private as well as personal accounts from hackers with additional layer security systems. You can also generate a barcode to scan for login purposes.

It supports many authentication accounts like Google, Twitch, Slack, and various others. Authy app requires your email and SMS method for the authentication. You can register in Authy through the help of Google account. It’s a very secure way to get high-security for your online accounts. It has some popular partners like Coinbase, Mercado Libre, and many more.

#11 Ping Identity

Paid
0

Ping Identity is a platform that offers privacy and consent management and allows businesses to earn customer trust and comply with privacy regulations. The solution provides security to the customers and the workforce when it comes to their identities. It is a complete solution for all kinds of identity security services.

The platform helps businesses in providing their customers with easy-to-use registration, which helps them in acquiring and retaining customers. Moreover, companies can deliver personalized multi-channel experiences to enhance their revenues whenever customers interact with them. Companies can allow customers to gain full insight into their data to help them in building trust.

Ping Identity enables businesses to gain security over the identity of their workforce to keep their businesses secure. Moreover, it allows companies to improve their security posture and allows them to increase business agility by outpacing their competitors by cloud and rapid integrations.

#12 OneLogin

Paid
0

OneLogin is a leading Identity and Access Management software specially designed to simplify business logins while improving the security and efficiency of your systems. Thousands of businesses and individuals use the solution because it is fast and easy to implement and helps in streamlining numerous of a user’s workflows and processes, resulting in enhanced productivity without compromising security.

With the help of OneLogin, all applications, users, and all the other devices are unified in a deeply integrated cloud-based system. It makes IAM (Identity and Access Management) fast and easy, providing users with the correct implementation of your policy while reducing the load of your IT and make it work on its identity first strategy.

The system gives your staff access to the applications that are certified policy compliant. All the devices in your business are secured as the solution brings enterprise agility coupled with secure application access. This security is fully applied across the entire network and organization, including corporate desktops, web applications, and mobile devices. OneLogin is a simple but powerful application that manages your complete system. It also has a list of prominent features that make it more interesting.

#13 Microsoft Authenticator

0

Microsoft Authenticator is a free multi-factor security application by Microsoft that gives stability and security at an additional level, launched in June 2016. It generates codes based on the Two-Step authentication system. For accessing your account, the password is not the only required thing, you also need a code sent by the authenticator.

The authenticator will send you a shortcode of six characters called OTP (One-time password) to further access (generates this code after every 30 seconds). Microsoft Authenticator also supports fingerprint on your smartphone that brings ease for users who have phones with fingerprints sensors. This authenticator also supports one-tap notification that brings an excellent way to prevent yourself by hackers from breaking your passwords.

You can install the Microsoft Authenticator application to phone and get access to your private files from the account. You can enable this on Facebook, Google Account, Dropbox, and many other platforms to protect data for years. It works smoothly like a security app. So just download Microsoft Authenticator, sign-up with your necessary details, start a safe journey, and stay protected from online as well as offline threats.

#14 Myki

0

Myki: Offline Password Manager & Authenticator is a fabulous product introduced by Myki Inc. that helps you focus on securing all your important stuff. Myki is a secure password manager, authenticator, and password generator designed with ultimate privacy. You can securely log in to all of your accounts with a fingerprint and enjoy its point-to-point ultra-safe encryption technique.

It is a private app designed to prevent all third-party hackers and crackers from accessing your accounts. Myki – Offline Password Manager and Authenticator app does not store your passwords in the cloud or does not place them anywhere else. It intuitively relies on point-to-point encryption military-grade encryption to push your passcodes from your cell phones or tablets to your PC securely.

Myki App is an elegantly designed authenticator and passcode manager that stores AES256 and PBKDF2 encryption to bring extreme security. You can precisely share access with your family members, colleagues, and buddies, even without sharing the passcodes.

The app supports the auto-filling of passwords on websites and apps. Myki: Offline Password Manager and Authenticator is an elegantly designed productivity tool for you if you are fed of remembering the passcodes of multiple platforms and want to enjoy just a single fingerprint login.

#15 FreeOTP Authenticator

0

FreeOTP Authenticator precisely brings a second, secure layer of security for your online social or private accounts. The app works by generating one time passwords (OTP) on your cell phones that can be used in the combo with your ordinary passcodes to secure your logins highly.

Free OTP Authenticator is a superb tool developed in the market by Red Hat Inc. that helps its global users to enjoy extreme safety over their online passcodes. It is a sleekly designed productivity tool for you to add a 2nd layer of security over accounts.

It works with plenty of online platforms and services that you already use, such as Facebook, Google, GitHub, Evernote, and various others. It is a superb security tool for your private organization if you implement the standardized HOTP or HOTP protocols and carries great enterprise solutions (FreeIPA).

The app also generates these one-time passcodes even if your phones are in airplane mode as well. FreeOTP Authenticator is a free and open-source software where you can obtain source code for Free OTP. So grab the FreeOTP Authenticator app from the store and enjoy extreme level security on your online content.

#16 Yubico Authenticator

0

Yubico Authenticator enables its global users to use a YubiKey to store the TOTP as well as HOTP supported credentials and keep it always with them everywhere. Yubico Authenticator is a superb tool presented in the market by Yubico Inc. that allows its users to store OATH credentials as used by Google Apps, Amazon, Hotmail, Dropbox, Microsoft, and plenty of other platforms.

You can precisely secure all your credentials after storing the credentials on an OATH enabled YubiKey, even if your cell phone is compromised. These OTPS are used for on 2-step verification with plenty of major services. The app keeps on changing the OTPs after 30 seconds, and you can also change them on request.

You can precisely secure your credentials from third-party hackers or crackers by boosting your level of security through its two-factor authentication algorithm. Yubico Authenticator app also makes it hell easy to move your desired credentials between multiple Android devices.

#17 LastPass Authenticator

0

LastPass Authenticator is an elegantly designed two-factor security authenticator for your LastPass account as well as plenty of other supported Google Apps. LastPass Authenticator is a fine product developed in the market by LogMeIn, Inc. that enables its global users to get all the security without any frustration through its secure cloud backup support as well as one-tap verification.

The app allows you to add more security by safeguarding your Lastpass account by getting 2-fac authentication codes whenever signing up to online accounts. The app elegantly enhances your digital security b protecting your account with an additional yet secure login step.

Having this app, your account can’t be accessed without 2-fac authentication even if your passcode is compromised. The app can also be implemented on any services as well as apps that support TOTP based 2-fac authentication or Google Authenticator. It precisely generates 6-digit codes after every 30 sec, support push notifications, SMS codes, automated set-up through QR code, multiple account availability and various other features.

The app also supports other TOTP services and apps as well (such as Google Authenticator). You can precisely edit LastPass Authenticator or even use the barcode in its Multifactor options. You can turn your LastPass Authenticator on by downloading it to your cell phones, log in and launch the app, and get started.

#18 WinAuth

Free
0

WinAuth is an open-source portable software that works as an authenticator for Windows to provide time-based common implementations such as the Google Authenticator. The platform acts as a safeguard to users for their online accounts, and users can attach the software with their online files. It helps users access their accounts from any place other than home securely, and it keeps users’ data safe.

The software comes with a clean and simple interface, and users can adjust the size of the window according to their needs and according to the number of accounts on the software. It offers its services to many gaming websites such a Steam and Bitcoin trading websites to help them in staying protected. The software’s portability helps users to carry it anywhere and use it whenever they need it. Moreover, users can store up any number of authenticators and can personalize them with a different name and reference.

#19 ID.me Authenticator

0

ID.me Authenticator lets you get an instant, free, and super-secure access to Two Factor authentication solution for your online services as well as the ID.me account. The app secures all your online accounts on websites that support 2-factor authentication. It elegantly generated 6-digit, Time-Based OTPs (one-time passwords) as well as push notification truly based on one-touch (OT) authentication.

The app lets you grab verification codes without having any internet or cellular connection, and you can get verification codes whenever you want after its configuration. You can elegantly connect the authenticator to your account for 2-factor authentication by scanning the QR codes at setup time.

The app lets you enter your passcode and username whenever signing into your account and then approve the push notification sent on whatever cellular device you are using. In order to enable its features, the ID.me Authenticator app allows you to enroll and connect it to your ID.me account.