What is Stormpath?
Stormpath is an authentication and user management service that helps development teams quickly and securely build web and mobile applications and services.
Stormpath is a tool in the User Management and Authentication category of a tech stack.
Who uses Stormpath?
3 companies reportedly use Stormpath in their tech stacks, including Samsviran, Stormpath, and Notify-e.
34 developers on StackShare have stated that they use Stormpath.
Pros of Stormpath
- User Authentication as a Service
- Authorization – Easily model and manage your data, including pre-built roles
- Flexible User Profiles
- Single Sign-On Across your Apps
- Easy Partitioning for Multi-Tenant SaaS
- Pre-built Security Workflows - Password Reset, Email Verification
- Hosted Login Portal
- Social Login
- API Authentication & Key Management
- Token-based Authentication
- Multi-Factor Authentication
- Active Directory & LDAP Integrations
- Advanced Password Security
- Admin Console
- Safe Harbor Compliance
- HIPAA Compliance
- Private Deployments
Stormpath Alternatives & Comparisons
What are some alternatives to Stormpath?
See all alternatives
A set of unified APIs and tools that instantly enables Single Sign On and user management to all your applications.
Connect all your apps in days, not months, with instant access to thousands of pre-built integrations - even add apps to the network yourself. Integrations are easy to set up, constantly monitored, proactively repaired and handle authentication and provisioning.
It is authentication middleware for Node.js. Extremely flexible and modular, It can be unobtrusively dropped in to any Express-based web application. A comprehensive set of strategies support authentication using a username and password, Facebook, Twitter, and more.
You can create unique identities for your users through a number of public login providers (Amazon, Facebook, and Google) and also support unauthenticated guests. You can save app data locally on users’ devices allowing your applications to work even when the devices are offline.
It is an authorization framework that enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.