Best Identity Management Software for Linux of 2026 - Page 2

Find and compare the best Identity Management software for Linux in 2026

Use the comparison tool below to compare the top Identity Management software for Linux on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Data Rover Reviews
    Data Rover is an Advanced User Data and Security Management for any Data-Driven Organisation. A single solution for Infrastructure and Security managers that allows data users to explore, manage, process, and protect their data effectively and efficiently, by simultaneously addressing the two primary needs related to the use of data: Cyber Security and Data Management. Data Rover plays a key role in business asset protection and corporate data management policy definition. The software is designed for companies that need to ensure compliance with personal data protection regulations and provides detailed analysis of data access permissions. User Access Rights & Auditing Provides invaluable information about access privileges to files and folders. It allows you to analyse the effective permissions of the users, i.e. the real ones. It identifies not only who can access data, but also who did exactly what, when, and from where. Data Housekeeping Helps you identify and distinguish valuable assets from junk information that becomes unnecessary ballast and an unjustified cost to the company. Data Exchange Provides the company with an advanced data exchange and tracking system exclusively designed for the business.
  • 2
    MonoSign Reviews

    MonoSign

    MonoFor

    $4/month/user
    MonoSign is a complete Identity & Access Management Solution for Enterprise Level Companies. Get Universal Directory, Single-Sign-On, Adaptive Multi-Factor Authentication, Lifecycle Management, and many other features. MonoFor is here today with MonoSign, one of the most powerful and easy-to-deploy Identity & Access Management Software for enterprise-level companies.
  • 3
    Ping Identity Reviews

    Ping Identity

    Ping Identity

    $5 per user per month
    Ping Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow.
  • 4
    Authress Reviews

    Authress

    Rhosys

    $1.10 per month
    Authress offers a comprehensive Authentication API tailored for B2B needs. While authentication may seem straightforward at first glance, the intricacies of authorization can quickly escalate, making it unwise to navigate this complexity alone. Achieving robust authorization is a time-consuming endeavor; an average software team might spend around 840 hours developing authorization logic for basic scenarios, and this effort can multiply as additional features are integrated into the application. Lacking the necessary expertise exposes your organization to significant security vulnerabilities, potentially leading to breaches of user data, non-compliance with regulatory standards, and substantial financial repercussions. * Secure authorization API—Rather than constructing your own authorization framework, leverage our API for seamless integration. * Granular permissions—Establish various access levels and categorize them according to user roles, allowing for as much detail as needed. * Identity Provider integrations—Effortlessly connect your chosen identity providers through a straightforward API call. * SSO and comprehensive user management—Enjoy streamlined single sign-on capabilities along with complete control over user administration, ensuring a secure and efficient user experience.
  • 5
    Gravitee.io Reviews

    Gravitee.io

    Gravitee.io

    $2500 per month
    Gravitee.io, the most cost-effective, performant, and cost-effective Open Source API Platform, allows your organization to securely publish, analyze, and secure your APIs. Gravitee.io's OAuth2 OpenID Connect (OIDC), and Financial-grade API(FAPI) certified servers allow you to manage your identities. Gravitee.io APIM allows you to control precisely who, when, and how your APIs are accessed by your organization. It is lightweight, flexible, and lightning-fast. Gravitee.io allows you to manage, monitor, deploy, and secure your APIs with strong governance features like API review and API quality. Your API consumers can fully engage with your business through a Gravitee.io portal. This will ensure high quality engagement in the digital age.
  • 6
    Beyond Identity Reviews

    Beyond Identity

    Beyond Identity

    $0/ User/ Month
    Beyond Identity provides the strongest authentication on the planet, eliminating passwords completely for customers, employees, and developers. Unique to Beyond Identity, users never have to pick up a second device to enroll or authenticate, passwords are completely eliminated from user flows and your database, and organizations can implement risk-based access controls using granular user and device risk captured in real-time. By default, Beyond Identity authenticates with invisible MFA that only leverages unphishable factors. This allows organizations to secure access to applications and critical data by eliminating account takeover, ransomware, and all credential-based attacks all while improving the user experience
  • 7
    LogMeOnce Reviews

    LogMeOnce

    LogMeOnce

    $3 per user per month
    An effective cyber security strategy must focus on both internal and external threats to ensure comprehensive protection. Both types of threats share a critical factor: the commitment of end users to follow established security protocols, policies, and best practices. External threats often take advantage of internal users' compliance with these security measures to infiltrate systems. While various tools like firewalls can mitigate external risks, the root cause often lies in inherent weaknesses within the organization. To effectively manage internal risks, it is essential to implement “automatic & enforceable” security policies and encourage users to follow secure access guidelines with reliable credentials. Fortunately, LogMeOnce's patented technology provides numerous solutions to safeguard your team members, credentials, and organization through advanced automated authentication. Furthermore, the LogMeOnce dashboard streamlines access management, unifying a user’s diverse array of applications into a powerful, cohesive platform for improved security and efficiency. This integration not only enhances protection but also simplifies the user experience, making it easier to maintain security standards across the board.
  • 8
    ManageEngine AD360 Reviews
    AD360 is an integrated identity management (IAM), solution that manages user identities, controls access to resources, enforces security, and ensures compliance. AD360 allows you to perform all your IAM tasks using a simple and easy-to-use interface. All these functions are available for Windows Active Directory, Exchange Servers and Office 365. You can choose the modules that you need and get started addressing IAM issues across hybrid, on-premises, and cloud environments with AD360. You can easily provision, modify, and deprovision mailboxes and accounts for multiple users from one console. This includes Exchange servers, Office 365, G Suite, and Office 365. To bulk provision user accounts, you can use customizable templates for user creation and import data from CSV.
  • 9
    ZITADEL Reviews

    ZITADEL

    ZITADEL

    $100 per month
    ZITADEL serves as an open-source platform for identity and access management, aiming to streamline the processes of authentication and authorization for various applications. It encompasses a robust array of features, including customizable login pages, compatibility with contemporary authentication techniques like Single Sign-On (SSO) and social logins, as well as the implementation of multifactor authentication to bolster security measures. Developers have the option to either integrate ZITADEL’s APIs into their applications for direct authentication or create specialized login interfaces tailored to their needs. Furthermore, the platform's role-based access control mechanism allows for meticulous permission management tailored to specific user roles, and its multi-tenant architecture makes it easy to extend applications to accommodate new organizations. ZITADEL's flexibility not only supports diverse workflows and user management processes but also adheres to brand guidelines, with features such as ZITADEL Actions enabling the execution of workflows triggered by specific events without necessitating further code deployments. As a result, ZITADEL is an adaptable solution for businesses looking to enhance their identity management strategies efficiently.
  • 10
    Syteca Reviews
    Syteca is a full cycle insider risk management platform with capabilities in employee monitoring, privileged access management, subcontractor control, and compliance tasks. We help leading companies to protect their sensitive data from numerous industries like Financial, Healthcare, Energy, Manufacturing, Telecommunication and IT, Education, Government, etc. Over 2,500 organizations across the world rely on Syteca! Key solutions: - Privileged Access Management - User activity monitoring - Insider threat management - User and entity behavior analytics - Employee activity monitoring - Enhanced Auditing and Reporting
  • 11
    WSO2 Identity Server Reviews
    WSO2 Identity Server API-driven is built on open standards and offers the option of cloud, hybrid, or on-premise deployments. It is highly extensible and can support complex IAM requirements. WSO2 Identity Server allows you to do single sign-on as well as identity federation. It is backed up by strong and adaptive authentication. Securely expose APIs and manage identities by connecting with heterogeneous user accounts. Open-source IAM can be used to innovate quickly and to build secure Customer IAM solutions (CIAM) to deliver a user-friendly experience.
  • 12
    Privileged Access Management Reviews
    Xton Access Manager is the simplest, all-in-one solution for PAM without the price shock. Xton Access Manager, a privileged access management platform, provides a secure AES256 encrypted Identity Vault to ensure total administrative control over all passwords, certificates keys, files secrets and privileged accounts. Privileged session recording can be used to preserve all sessions and can be used to diagnose or forensic investigations. Keystroke logging can also be used. Integrated Job Engine and Policy Engine to automate Password Resets and Privileged Account Discovery. Configurable Workflows that can be used to implement Dual Control and Four Eyes policies to provide additional security for your secrets and privileged systems. Command Control is used to restrict the commands that users can execute in remote Windows or Unix sessions. Full system and user audit trails that can trigger notifications or in-application alerts.
  • 13
    Keyfactor EJBCA Reviews
    EJBCA, an Enterprise-grade PKI platform, can issue and manage digital certificates in the millions. It is one of the most widely used PKI platforms worldwide and is used by large enterprises in all sectors.
  • 14
    ImageWare CloudID Reviews
    ImageWare CloudID® is a versatile software platform that facilitates the rapid creation and implementation of secure yet adaptable biometric identity management solutions. This platform can be seamlessly integrated into both new and existing cloud environments, as well as incorporated as cloud-ready software into traditional client-server and data center infrastructures. Two key innovations set this biometric identity platform apart: it allows for the quick integration of virtually any biometric modality and algorithm from any provider, and it can be effortlessly scaled to meet the demands of small businesses or large jurisdictions, delivering highly scalable real-time solutions. Additionally, ImageWare CloudID’s server platform consists of a collection of configurable software modules that are designed to enhance or add biometric identity management and credential issuance functionalities to current applications, while also supporting the development of these features in new comprehensive applications. This flexibility ensures that organizations of all sizes can leverage advanced biometric technology to improve their identity management processes.
  • 15
    Deepnet DualShield Reviews
    If you're in search of a robust enterprise-level solution for two-factor authentication (2FA) or multi-factor authentication (MFA) that can effectively protect a variety of popular business applications while offering numerous authentication options, you've come to the right spot. Deepnet DualShield stands out as a comprehensive multi-factor authentication platform that integrates multiple authentication techniques, protocols, and user experiences seamlessly. Beyond its core MFA capabilities, DualShield also features self-service Password Reset, Single Sign-On (SSO), Identity & Access Management (IAM), and Adaptive Authentication functionalities. This system is recognized as one of the most effective and adaptable multi-factor authentication solutions available globally. Furthermore, Deepnet DualShield can be deployed either on-site or within a private cloud environment, granting you complete oversight of your user authentication processes and ensuring that your users' identities and credentials remain secure. With its versatility, DualShield not only enhances security but also streamlines user access across your organization.
  • 16
    Zluri Reviews
    Zluri is a SaaS Operations Management Platform for IT Teams. It allows IT teams to manage, secure, and comply with multiple SaaS applications from one dashboard. Zluri helps bring shadow IT to light, monitor and manage SaaS spend, and automates end to end application renewal management. Zluri is data-driven. It helps IT teams plan, organize, secure, and get more out of their SaaS app portfolio.
  • 17
    Infisign Reviews

    Infisign

    Infisign

    $4/user/month
    Infisign's Identity and Access Management platform is a cutting edge IAM platform that revolutionizes the digital security industry by leveraging decentralized identities, passwordless authentication and federation capabilities. The solution allows organizations to streamline authentication, manage access efficiently and ensure compliance in diverse environments. Infisign's unique approach addresses the challenges of traditional IAM and offers a comprehensive modern identity management solution.
  • 18
    NdSecure Reviews

    NdSecure

    Ndende Technologies

    $8/month/user
    NdSecure serves as an effective Single Sign-On (SSO) and Identity and Access Management (IAM) solution. It is designed to deliver a user-centric, adaptable, and customizable approach to identity and access management, suitable for a wide range of industry-specific frameworks. The primary function of NdSecure is to establish a secure and resilient logical access control environment that employs robust authentication techniques. This ultimately aims to thwart unauthorized access to corporate management systems, which helps in mitigating fraud associated with insider threats. Additionally, NdSecure's API management platform enhances workforce capabilities by offering sophisticated methods to regulate access to multiple applications. By taking advantage of pre-existing request content and identity repositories, NdSecure is able to offer a variety of features including: • Authentication driven by policies • Both coarse and fine-grained authorization capabilities • Single sign-on options utilizing SAML, OpenID Connect, social logins, or OAuth-based federation • Compliance with Common Criteria standards • Implementation of FIDO 2.0 and W3C WebAuthn technologies Furthermore, NdSecure's flexible architecture allows organizations to adapt their security measures to evolving threats and compliance requirements, thereby ensuring a comprehensive protection strategy.
  • 19
    Teleport Reviews
    The Teleport Infrastructure Identity Platform is a modernization of identity, access and policy for infrastructure for both human and not-human identities. It improves engineering velocity and resilience of critical infrastructure to human factors or compromise. Teleport is designed for infrastructure use cases. It implements trusted computing with unified cryptographic identity for humans, machines, and workloads. Endpoints, infrastructure assets and AI agents can all be identified. Our identity-everywhere solution vertically integrates identity governance, zero trust networking and access management into a single platform. This eliminates overhead and operational silos.
  • 20
    EmpowerID Reviews

    EmpowerID

    EmpowerID

    $2 per user per month
    EmpowerID is a distinguished, comprehensive suite for identity management and cloud security, created by The Dot Net Factory, LLC, also known as "EmpowerID". This innovative solution is adept at overseeing millions of identities, both internal and external, across various cloud and on-premise environments for organizations worldwide, offering the most extensive array of IAM functionalities available. Its robust, out-of-the-box offerings encompass features such as single sign-on, user provisioning, identity governance, group management, role mining, delegated identity administration, password management, privileged access management, access management for SharePoint, and a specialized identity platform designed for application developers. Each of these solutions utilizes a sophisticated authorization engine based on roles and attributes, capable of managing complex organizational structures and supporting multi-tenant SaaS providers. EmpowerID's architecture is highly scalable and fully customizable, ensuring that enterprises can achieve efficient and effective IAM results tailored to their specific needs. Ultimately, EmpowerID stands out as an essential tool for organizations looking to streamline identity management while enhancing security protocols.
  • 21
    SearchInform FileAuditor Reviews
    DCAP solution (datacentric audit and protection), for automated file system audit, search and detection of access violations, as well as monitoring for changes in critical data.
  • 22
    TozID Reviews
    A platform for Customer Identity Management and SSO with privacy and end to end encryption. You can centralize access control without increasing your security risk. Our cryptography-at-the-edge approach delivers identity protection where you need it - secure your customer's accounts with strong encryption and a customizable UI, or streamline protected access for your business and employees with SSO. All the features you'd expect, including SAML & OIDC Support along with push-based MFA. These are some of the key features that we think you will love!
  • 23
    FreeIPA Reviews
    Administer Linux users and client machines within your domain from a single, centralized interface, whether through a command-line interface, a web-based user interface, or remote procedure call access. Facilitate Single Sign-On capabilities across all your systems, services, and applications while establishing Kerberos-based authentication and authorization policies to safeguard your identities. Manage essential services such as DNS, SUDO, SELinux, and autofs efficiently. The solution encompasses a comprehensive security information management framework that integrates various components, including Linux (Fedora), 389 Directory Server, MIT Kerberos, NTP, DNS, and the Dogtag certificate system, among others. This platform is built upon well-established open-source technologies and adheres to standard protocols to ensure reliability and security. FreeIPA not only provides a web interface and command-line tools for administration but also streamlines user management and enhances system security across distributed environments. By utilizing such an integrated approach, organizations can maintain robust security measures while simplifying user access management.
  • 24
    XYGATE Identity Connector Reviews
    Effectively managing robust passwords and credentials can be quite difficult. The need to ensure proper storage, regular updates, adherence to complexity and compliance standards, along with maintaining audit trails, can feel daunting and complex to both implement and oversee. Existing methods for requesting and overseeing user access are often outdated and lack efficiency. The processes involved tend to be manual and convoluted, failing to align with the primary business objectives that demand change within organizations. Governance is frequently treated as a secondary priority, which can lead to heightened security vulnerabilities and risks of non-compliance with both external regulations and internal corporate guidelines. To enhance oversight, the visibility and control of NonStop user data directly from SailPoint IdentityIQ can be leveraged. This platform facilitates the swift identification of risks and entitlement issues while automating the provisioning process. Moreover, it effectively addresses account compliance challenges, supported by certified integrations with SailPoint and CyberArk, as well as being compatible with the XYGATE Suite, which fosters a more streamlined security environment. By improving these processes, organizations can significantly bolster their security posture and compliance readiness.
  • 25
    EZSSH Reviews
    EZSSH increases developer productivity by using your corporate identity to authenticate users to your multi-cloud and hybrid SSH endpoints. EZSSH uses SSH Certificates for short-term authentication to the endpoint. This removes the need to have a highly privileged agent running on it and also eliminates the need for your security team auditing and lifecycle SSH Keys.