souvenir
Tag cloud
Picture wall
Daily
RSS Feed
  • RSS Feed
  • Daily Feed
Filters

Links per page

  • 20 links
  • 50 links
  • 100 links

Filters

Untagged links
2 results tagged authorization  ✕   ✕
Ockam https://www.ockam.io/
02/10/2022 cluster icon
  • Cloud Carbon Footprint : Cloud Carbon Footprint is an open source tool that provides visibility and tooling to measure, monitor and reduce your cloud carbon emissions. Archite...
  • BlackBox : Safely store secrets in a VCS repo (i.e. Git, Mercurial, Subversion or Perforce).
  • Vector : Vector is an open-source utility for collecting, transforming, and routing logs, metrics, and events.
  • Diagrams : Diagrams lets you draw the cloud system architecture in Python code. It was born for prototyping a new system architecture without any design tools. Y...
  • n8n.io : n8n (pronounced nodemation) helps you to interconnect each and every app with an API in the world with each other to share and manipulate its data wit...
thumbnail

Ockam is a suite of open source tools, programming libraries, and managed cloud services to orchestrate end-to-end encryption, mutual authentication, key management, credential management, and authorization policy enforcement – at massive scale.

opensource tool cloud orchestration encryption authentication secrets authorization
The Bastion https://github.com/ovh/the-bastion
30/10/2020 cluster icon
  • OverTheWire: Wargames : The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games.
  • Ockam : Ockam is a suite of open source tools, programming libraries, and managed cloud services to orchestrate end-to-end encryption, mutual authentication, ...
  • Grype : A vulnerability scanner for container images and filesystems.
  • TruffleHog : TruffleHog is an open-source SAST (static application security testing) tool for detecting secrets in various sources. While GitHub and GitLab reposit...
  • Snyk : Snyk helps you use open source and stay secure. Continuously find & fix vulnerabilities in your dependencies.
thumbnail

Bastions are a cluster of machines used as the unique entry point by operational teams to securely connect to devices using ssh.
The Bastion provides mechanisms for authentication, authorization, traceability and auditability for the whole infrastructure.

ssh security tracing audit authentication authorization
1636 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Theme by kalvn