privacyIDEA is a multi-factor authentication solution. It can manage any type of authentication device. All common OTP (one time password) devices are supported, including Google Authenticator, eToken Pass, OTP cards, Yubikey, SMSOTP, and mTAN/mobileTAN. New devices can be added easily. Users can be retrieved from flat files, LDAP, Active Directory, SQL databases, and SCIM services. It can also handle authorization and writes all events to a digitally signed audit log, giving you basic AAA functionality.
OpenTBS is a PHP tool that helps you to make OpenOffice and MS Office documents using templates. You first design your template using OpenOffice or MS Office, and then OpenTBS merges it with data that you supply from PHP code and databases. It has facilities to manage pictures. The resulting documents are saved to file, served for download, or returned as a string. In fact, OpenTBS can merge any OpenDocument files, any OpenXML files, and any XML files compressed in a Zip archive. No extra exe file is required and it makes no temporary files, since all work is done in memory. OpenTBS is based on the TinyButStrong template engine.
Nowadays, a simple password is not enough anymore! Multi-OTP is an OATH-certified PHP class, a Web interface, and a powerful command line tool that can be used to authenticate and manage OTP user tokens for strong two-factor authentication. It can create, update, and delete tokens to authenticate users with one time passwords (OTP). The users' data are stored in files. The class can also check the user token using several algorithms: Mobile OTP (MOTP), OATH/HOTP (RFC 4226), and OATH/TOTP HOTP Time Based (RFC 4226 extension). It works with compatible software tokens (iPhone, Android, PalmOS, Nokia, and other Java J2ME capable phones) and hardware tokens (such as Feitian, ZyXEL, Authenex, or Seamoon). The multiotp command line utility is also provided, both in "compiled" form (for Windows) and in source code (for Linux or educational purpose). The multiotp command line can be combined with FreeRADIUS (under Linux) or the free TekRADIUS LT (under Windows) in order to have a powerful radius strong authentication server.
LinOTP is a solution for strong two-factor authentication with one time passwords. It features a modular architecture into which UserIdResolver, authentication, and OTP calculation modules can be plugged. It includes UserIdResolver modules for LDAP/AD, SQL, and flat file user databases, and authentication modules for PAM and RADIUS. New modules can be developed easily. Supported tokens are HMAC-OTP/HOTP (RFC 4226/ OATH compliant), Aladdin eToken PASS, eToken NG-OTP, Safeword Alpine, Yubikey, Google Authenticator, motp, SMS OTP/Mobile TAN, email token, and a Simple Pass token for users without token hardware. TOTP is supported, along with a new algorithm for daily passwords for applications not supporting RADIUS. OCRA tokens are supported to allow transaction signing in banking environments. CLI, Web, and GTK+ GUI clients are available for management. LinOTP features multi-client capability, redundancy, and a self-service portal. It has been used with PAM for local and SSH logins, Apache, VPN, and Windows Terminal Server, and is OATH certified.
The OATH Toolkit makes it easy to build one-time password authentication systems. It contains shared libraries, commandline tools, and a PAM module. Supported technologies include the event-based HOTP algorithm (RFC4226) and the time-based TOTP algorithm (RFC6238). OATH stands for Open AuTHentication, which is the organization which specifies the algorithms. For managing secret key files, the Portable Symmetric Key Container (PSKC) format described in RFC6030 is supported.
RCDevs OpenOTP Server provides two-factor authentication with one-time passwords (OTP). It supports OATH RFC-4226 HOTP (Event-based) and TOTP (Time-based), OCRA (Challenge-based), Mobile-OTP, YubiKey Software/Hardware Tokens, SMSOTP, MailOTP, and OTP lists. It provides a SOAP/XML, RADIUS, and OpenID APIs and integrates into your LDAP (OpenLDAP, Novell, ActiveDirectory). It works with Web applications, VPNs, Linux PAM, Microsoft, and more. It is composed of the RCDevs WebADM server application, the OpenOTP SOAP service, the OpenOTP Radius Bridge, the User Self-service Desk, and Token Self-enrollemnt end-user Web application. VMWare appliances and Web demos are available.
RCDevs TiQR is an innovative way to authenticate yourself to Web applications. Its unique user friendly features include one-click enrollment using QR codes and secure authentication without having to re-type complicated codes by leveraging dynamic QR codes embedded in Web pages. TiQR supports the OCRA suite of authentication protocols. Its security is based on AES 256-bit encryption and the SHA family functions.
RCDevs OpenID Provider is an OpenID 1.1 and 2.0 provider with simple registration and multiple OpenID URL formats. Compared to other OpenID provider implementations, RCDevs OpenID Provider is extremely easy to implement: provided that you have a working WebADM server, installation just consists of adding the OpenID WebApp in WebADM and adding a markup in the index page of your public Web site. The RCDevs OpenID Provider works with LDAP and OpenOTP authentication back-ends. With OpenOTP, your OpenID users can authenticate with any OpenOTP one-time password mechanism (Soft Tokens, SMSOTP, MailOTP, Yubikey, MobileOTP). RCDevs OpenID Provider supports both query-string-based OpenID URLs and hostname-based OpenID URLs. An example of the format using a query string is "http://rcdevs.com/?user=myuser&domain=mydomain" and an example of the format using a hostname is "http://myuser.mydomain.rcdevs.com/".
epers stands for "Erlang persistence". As the name suggests, it tries to make it easy to use databases in Erlang programs, to make the language a little more agile, and (humbly) offer a nice adapter for several databases, hiding their implementation details (and the API of the library/framework/driver used to communicate with them). To achieve this, it aims to offer a somewhat consistent API to define and work with your model, while at the same not coupling your code too tightly to it.