Help developers discover the tools you use. Get visibility for your team's tech choices and contribute to the community's knowledge.
Voice agent QA for teams who can't afford broken calls, compliance gaps, or production failures. Simulate thousands of conversations, validate legal | CloudEagle.ai is an AI-powered SaaS Security platform that secures SaaS environments by discovering all applications, monitoring access risk, enforcing least-privilege policies, and automating access reviews. Organizations reduce risk, improve compliance, and gain continuous visibility across SaaS apps. |
Product, Use Cases, Resources, Contact, 5 levels of consent disclosure (from minimal notice to full high-assurance) | Controls who can access AI tools through role-based approvals and policy enforcement. |
Statistics | |
Stacks 0 | Stacks 0 |
Followers 1 | Followers 1 |
Votes 1 | Votes 1 |

A set of unified APIs and tools that instantly enables Single Sign On and user management to all your applications.

Stormpath is an authentication and user management service that helps development teams quickly and securely build web and mobile applications and services.

It is an Open Source Identity and Access Management For Modern Applications and Services. It adds authentication to applications and secure services with minimum fuss. No need to deal with storing users or authenticating users. It's all available out of the box.

Devise is a flexible authentication solution for Rails based on Warden

It is a developer centric open source load testing tool for testing the performance of your backend infrastructure. It’s built with Go and JavaScript to integrate well into your development workflow.

It provides backend services, easy-to-use SDKs, and ready-made UI libraries to authenticate users to your app. It supports authentication using passwords, phone numbers, popular federated identity providers like Google,

Locust is an easy-to-use, distributed, user load testing tool. Intended for load testing web sites (or other systems) and figuring out how many concurrent users a system can handle.

You can create unique identities for your users through a number of public login providers (Amazon, Facebook, and Google) and also support unauthenticated guests. You can save app data locally on users’ devices allowing your applications to work even when the devices are offline.

It enables you to manage access to AWS services and resources securely. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.

Start selling to enterprise customers with just a few lines of code.