What is Stormpath?
Stormpath is an authentication and user management service that helps development teams quickly and securely build web and mobile applications and services.
Stormpath is a tool in the User Management and Authentication category of a tech stack.
Who uses Stormpath?
3 companies reportedly use Stormpath in their tech stacks, including Stormpath, Samsviran, and Notify-e.
32 developers on StackShare have stated that they use Stormpath.
Why developers like Stormpath?
Here’s a list of reasons why companies and developers use Stormpath
- User Authentication as a Service
- Authorization – Easily model and manage your data, including pre-built roles
- Flexible User Profiles
- Single Sign-On Across your Apps
- Easy Partitioning for Multi-Tenant SaaS
- Pre-built Security Workflows - Password Reset, Email Verification
- Hosted Login Portal
- Social Login
- API Authentication & Key Management
- Token-based Authentication
- Multi-Factor Authentication
- Active Directory & LDAP Integrations
- Advanced Password Security
- Admin Console
- Safe Harbor Compliance
- HIPAA Compliance
- Private Deployments
Stormpath Alternatives & Comparisons
What are some alternatives to Stormpath?
See all alternatives
A set of unified APIs and tools that instantly enables Single Sign On and user management to all your applications.
Connect all your apps in days, not months, with instant access to thousands of pre-built integrations - even add apps to the network yourself. Integrations are easy to set up, constantly monitored, proactively repaired and handle authentication and provisioning.
You can create unique identities for your users through a number of public login providers (Amazon, Facebook, and Google) and also support unauthenticated guests. You can save app data locally on users’ devices allowing your applications to work even when the devices are offline.
Devise is a flexible authentication solution for Rails based on Warden
It is a framework that focuses on providing both authentication and authorization to Java applications. The real power of Spring Security is found in how easily it can be extended to meet custom requirements.