Suggested Categories:

Role-Based Access Control (RBAC) Software
Role-Based Access Control (RBAC) software is a system that manages user access to resources based on predefined roles within an organization. It simplifies permission management by assigning roles to users, each with specific access rights tailored to their job responsibilities. This approach enhances security by ensuring users only have access to the data and systems they need, minimizing the risk of unauthorized access. RBAC software is highly scalable and can support complex organizational structures, making it ideal for businesses of all sizes. It also streamlines compliance with regulatory requirements by providing clear, auditable access control policies.
Access Control Systems
Access control systems are software and hardware systems that enable buildings and facilities to control who, how, and when employees, visitors, or residents can access a building, or a specific area within a property, facility or building.
Network Access Control (NAC) Software
Network access control (NAC) software provides companies with a security platform to manage sensitive data access through a network connection.
Version Control Systems
Version control systems help development teams track, manage, and organize changes to source code and other digital files over time. They allow multiple contributors to collaborate simultaneously while maintaining a complete history of revisions and updates. The software supports branching, merging, and rollback features to reduce errors and improve development workflows. Many version control systems integrate with CI/CD pipelines, project management tools, and code review platforms. By ensuring consistency, accountability, and collaboration, version control systems are essential for modern software development.
Document Control Software
Document control software is designed to manage and track documents throughout their lifecycle, ensuring that they are properly stored, organized, and accessible. It provides features like version control, audit trails, and access permissions to maintain document integrity and security. This software helps organizations maintain compliance with industry standards and regulations by ensuring documents are updated and reviewed in a controlled manner. It also facilitates the efficient sharing and retrieval of documents, reducing the risk of errors or outdated information being used. By centralizing document management, document control software streamlines workflows and improves collaboration while minimizing risks associated with document mismanagement.
Web Accessibility Testing Tools
Web accessibility testing tools are designed to evaluate websites and applications for compliance with accessibility standards such as WCAG, Section 508, and ADA. They scan and analyze elements like color contrast, keyboard navigation, semantic structure, and screen reader compatibility to ensure digital content is usable by people with disabilities. Many tools provide automated reports, recommendations, and simulations of accessibility barriers to guide developers in fixing issues. They are used by web designers, developers, and compliance teams to create inclusive digital experiences and reduce legal or reputational risks. By integrating into workflows, these tools help organizations continuously monitor, test, and improve accessibility across web properties.
Document Version Control Software
Document version control software is designed to track and manage changes made to documents over time, ensuring that all revisions are properly recorded and organized. It allows users to store multiple versions of a document, making it easy to view, compare, and restore previous versions if needed. The software typically includes features like automated version tracking, timestamps, and user identification to provide a clear history of document edits. By managing versions efficiently, it helps prevent conflicts or errors from outdated or conflicting document versions. This type of software is essential for maintaining accuracy, transparency, and collaboration, especially in environments with frequent document updates and multiple contributors.
Hosting Control Panels
Hosting control panels, also known as site management and web hosting control panels, are software tools that enable IT professionals to manage their website, servers, and hosting packages. Hosting control panels simplify the process of managing domains, email accounts, installing website and server applications, and more.
Privileged Access Management Software
Privileged access management software is a security tool that enables organizations to manage, control and monitor privileged user accounts. It helps to ensure secure access to confidential systems and data by imposing stringent authentication requirements and providing real-time alerts when suspicious activity is detected. Privileged access management software also includes tools for restricting user permissions based on the concept of least privilege, allowing only the necessary level of access needed to perform tasks.
Inventory Control Software
Inventory control software helps businesses manage and track their inventory levels, ensuring that stock is accurately recorded and available when needed. It automates processes like stock replenishment, order management, and tracking inventory across multiple locations. The software often includes features such as real-time inventory updates, barcode scanning, and alerts for low stock levels, helping prevent overstocking or stockouts. By providing detailed insights into inventory movements, it improves accuracy, reduces manual errors, and enhances operational efficiency. Ultimately, inventory control software optimizes stock management, reduces costs, and supports better decision-making for supply chain and warehouse operations.
Parental Control Apps
Parental control apps are a type of software or app designed to help parents protect their children from malicious online content. Parental control apps offer a range of tools and filters, such as a website blocker, online time management and activity monitoring. These tools allow parents to limit their children's exposure to potentially harmful content on the internet, while also allowing them to observe their children's online behavior.
Application Control Software
Application control software, sometimes referred to as application whitelisting software, provides organizations with the ability to monitor and manage applications installed on computers. It allows for the automated enforcement of regulatory compliance policies, including restricting user access to specific applications or functions. Application control software can also be used for enforcing cross-platform usage rights and tracking application resource utilization.
Pest Control Software
Pest control software allows pest control businesses to improve the efficiency of their operations by optimizing the management of customers, schedules, inventory and billing.
Website Accessibility Software
Website accessibility software enables companies to manage, analyze, track, monitor, audit, get reporting on, and fix accessibility issues on their websites and web apps. Website accessibility platforms help companies remain compliant with accessibility regulations, guidelines, and laws.
Cloud Access Security Brokers (CASB)
Cloud Access Security Brokers (CASBs) are software applications that sit between a cloud service provider and an organization. Their purpose is to provide visibility and control over the use of cloud services, ensuring that data remains secure while enabling users to access the resources they need from any device. CASBs operate in real-time and can be used with multiple cloud platforms, such as SaaS, IaaS, or PaaS. They also provide granular access controls on user activities within the cloud system, allowing administrators to create rules around data sharing.
Construction Quality Control Software
Construction quality control software is software that helps contractors and project managers ensure compliance with industry standards, safety regulations, and project specifications. It streamlines inspection processes, defect tracking, and documentation management, reducing the risk of costly rework. Many platforms offer real-time reporting, photo documentation, and mobile access, enabling teams to quickly identify and resolve quality issues on-site. Integration with project management and field collaboration tools enhances communication between stakeholders and ensures accountability.
PDF Accessibility & Remediation Software
PDF accessibility and remediation software is software that makes PDF documents accessible to all users, including those with disabilities. It ensures that documents meet accessibility standards, like WCAG and PDF/UA, by adding tags, alt text, and logical reading structures, which allow screen readers and assistive devices to interpret the content accurately. The software automates tasks such as adding semantic tags and adjusting reading order, significantly reducing the time and effort needed for manual remediation. It also provides validation tools to check and ensure that the PDF is fully compliant with accessibility regulations before publication. This software is essential for organizations aiming to make their digital content inclusive and legally compliant with accessibility standards.
Earned Wage Access Platforms
Earned wage access platforms enable employers to allow their employees to get access to their wages before the standard scheduled payroll dates. Earned wage access solutions, also known as early wage access software, provides a platform whereby employees can get access to the money they've earned when they need it, instead of waiting for their scheduled pay date.
Secure Remote Access Software
Secure remote access software provides users with secure access to computer networks, systems, and databases from an external location.
Distributed Control Systems (DCS)
A distributed control system (DCS) is a computerized control system for a process or plant, with autonomous controllers that are distributed throughout the system. It uses digital communication to coordinate these distributed controllers in order to achieve a common goal. DCS typically requires dedicated programming for configuration and more complex systems will include data historians, HMIs, and network components. They are generally used to provide higher levels of safety and efficiency in industrial applications.
View more categories (20) for "access control role"

290 Products for "access control role" with 1 filter applied:

  • 1
    Styra

    Styra

    Styra

    The fastest and easiest way to operationalize Open Policy Agent across Kubernetes, Microservices or Custom APIs, whether you're a developer, an admin, or a bit of both. Need to limit which folks can access your pipeline, based on who is currently on call? Simple. Want to define which microservices can access PCI data? We got you. Have to prove compliance with regulations across your clusters? No sweat. Built on open-source, and declarative by design, Styra Declarative Authorization Service gives you a turnkey OPA control plane to mitigate risk, reduce human error, and accelerate development. ...
    Starting Price: $70 per month
  • 2
    Cedar

    Cedar

    Amazon

    Cedar is an open source policy language and evaluation engine developed by AWS to facilitate fine-grained access control in applications. It enables developers to define clear and concise authorization policies, decoupling access control from application logic. Cedar supports common authorization models, including role-based access control and attribute-based access control, allowing for expressive and analyzable policy definitions. Its design emphasizes readability and performance, ensuring that policies are both easy to understand and efficient to enforce. ...
    Starting Price: Free
  • 3
    Control Plane

    Control Plane

    Control Plane

    Control Plane is a modern, multicloud-native app platform (PaaS) built on Kubernetes that enables you to build, deploy, and run microservices apps faster and easier, with ultra high availability and ultra low latency. Unlike other app platforms, Control Plane is: Multicloud and Multi-Region: Your workloads run agnostically across the combined computing power and geographic regions of AWS, GCP, Azure and Private Clouds.
  • 4
    Process Street

    Process Street

    Process Street

    ...Teams use it to create structured SOPs, assign tasks, collect data, and monitor execution with intelligent oversight. From onboarding and audits to vendor management and document control, Process Street ensures every step is followed and every action is logged. Built for regulated industries like financial services, healthcare, and manufacturing, it supports frameworks such as ISO, SOC 2, SOX, and HIPAA. With role-based permissions, audit logs, and powerful integrations, Process Street replaces static documents, spreadsheets, and manual processes with a single automated system of record. ...
    Starting Price: $1500/month
  • 5
    Anypoint MQ

    Anypoint MQ

    MuleSoft

    With Anypoint MQ, perform advanced asynchronous messaging — such as queueing and pub/sub — with fully hosted and managed cloud message queues and exchanges. As a service of Anypoint Platform™, Anypoint MQ supports environments, business groups, and role-based access control (RBAC) with enterprise-grade functionality.
  • 6
    Harbor

    Harbor

    Harbor

    CNCF Harbor is an open-source project that enhances container registry capabilities with a focus on security and compliance. It builds upon basic registry functionality by offering features such as vulnerability scanning to identify known security weaknesses in images, role-based access control for granular image access management, image signing to ensure authenticity and prevent tampering, and replication for efficient syncing of images across multiple other registries. Harbor strengthens the security of the image management process. It can be particularly beneficial for organizations that prioritize security and compliance in their containerized environments. ...
  • 7
    Sweagle

    Sweagle

    Sweagle

    The easy way to control configuration data. Firstly, Sweagle makes it easy to manage all the configuration data from infra, applications and environments into a consolidated data model with full life cycle support. Secondly, Sweagle handles who sees what with intelligent role-based access controls and automatically encrypts secrets or sensitive data - so it never enters a release environment.
  • 8
    PipeCD

    PipeCD

    PipeCD

    ...Automatically detect configuration drift to notify and render the changes. Automatically trigger a new deployment when a defined event has occurred (e.g. container image pushed, helm chart published, etc). Support single sign-on and role-based access control. Credentials are not exposed outside the cluster and not saved in the control plane.
  • 9
    Apache Usergrid
    ...Our asset storage can handle anything from text files to videos of several terabytes, with automatic content detection and full URL access control.
    Starting Price: Free
  • 10
    ZapKit

    ZapKit

    ZapKit

    ... - **AI Assistant System:** Create custom AI assistants to automate tasks such as content generation, data analysis, and customer support, enhancing operational efficiency. - **User & Admin Dashboard:** Robust authentication and role-based access control ensure secure and efficient user management. - **Blog System:** An integrated blogging platform with AI-
    Starting Price: $169/lifetime
  • 11
    Basejump

    Basejump

    Basejump

    ...Developers can integrate Basejump into existing projects with a single migration file, utilizing Supabase libraries across various programming languages such as JavaScript, Python, Go, and Swift. The platform offers customizable React components built on shadcn and Tailwind CSS, facilitating rapid deployment with full control over the user interface. Basejump leverages Supabase's Row Level Security (RLS) policies to enforce data access restrictions based on user roles, ensuring secure and efficient permission management. All data is stored within the user's Supabase database, allowing for extensive customization and extension with additional tables as needed. ...
    Starting Price: Free
  • 12
    Span

    Span

    Span

    ...It unifies performance dashboards, sentiment surveys, and operational telemetry into a single interface, enabling proactive identification of bottlenecks, automated prioritization of work, and accelerated decision‑making without adding manual processes or data‑entry overhead. Built for enterprise‑grade security, Span offers SOC 2 Type II certification, GDPR compliance, comprehensive audit logs, fine‑grained role‑based access control, and seamless SSO/SCIM integration, all powered by secure AI services that never train on your proprietary data.
  • 13
    Amplication

    Amplication

    Amplication

    ​Amplication is an open source backend development platform that streamlines the creation, maintenance, and scaling of backend services, embedding organizational best practices and standards. It enables developers to rapidly generate production-ready Node.js applications by defining data models, roles, and permissions, resulting in the automatic generation of REST and GraphQL APIs, authentication, role-based authorization, logging, and an admin UI. Amplication supports customization through...
    Starting Price: Free
  • 14
    Octopus Deploy

    Octopus Deploy

    Octopus Deploy

    ...Octopus Deploy was the first release automation tool to gain popular adoption by software teams, and we continue to invent new ways for Dev & Ops teams to automate releases and deliver working software to production. Runbook automation in Octopus sits side-by-side with your deployments and gives you control over your infrastructure and applications. Automate operations tasks like routine maintenance and emergency incident recovery. Flexible, role-based access control lets you manage who can deploy to production, change your deployment process, infrastructure, and more.
    Starting Price: Free
  • 15
    Kinde

    Kinde

    Kinde

    Authentication happens at some of the most important, and highly impactful, places in your customers' journey. Take control of user authorization with a passwordless authentication, social integrations, and enterprise SSO. Support the branding of all your customers with custom domains and a fully customisable UI by bringing your own pages and designs. Integrate with complex requirements and run your own code during authentication using our powerful workflows. Organise all your business...
    Starting Price: Free
  • 16
    8base

    8base

    8base

    ...Stop hacking together data sources, UI libraries and other application components. 8base enables frontend developers, designers, product managers and citizen-developers to collaborate to build powerful apps with basic JavaScript skills. Fully secure your API with role-based access controls down to the field and function level. Create custom JavaScript and TypeScript logic and run as 8base Serverless Functions. All CRUD operations are auto-generated, providing immediate API access to data. 8base provides simple data modeling for defining powerful data schemas. 8base automatically handles database provisioning, maintenance, scaling, replication and security.
    Starting Price: $25 per month
  • 17
    Testfully

    Testfully

    Testfully

    ...Flexible and secure, set global, environment, and folder variables scoped to workspace or user. Customize auth, parameters, headers, and body to build any HTTP request easily. Work together effortlessly, add teams, assign roles, and control folder access. Supports major schemes like OAuth2 for secure and streamlined authorization. From basic to complex, Testfully enables quick, effective testing without the need for coding, making advanced API testing accessible and hassle-free. Execute all requests in a folder simultaneously, sequentially, or randomly with just one click. ...
    Starting Price: $49 per month
  • 18
    Ragic Builder
    Ragic is a no-code database builder that lets users create systems tailored to their workflow using a familiar spreadsheet-like interface. It supports solutions ranging from simple contact management to fully-fledged ERP systems. Ragic’s powerful features include mobile access, role-based permissions, drag-and-drop data relationships, workflow automation, Excel import/export, approval workflows, advanced search and queries, history and version control, reports and dashboards, and integrations with other apps.
    Starting Price: $5/month/user
  • 19
    Ninox

    Ninox

    Ninox Software

    Ninox is your solution for organizing and managing complex data in a structured and efficient way. With its highly flexible user interface, you can analyze, process, and evaluate any type of data. Additionally, the Ninox API enables seamless integration with services like Google for enhanced functionality. Designed to work across all platforms, Ninox is available via native apps for macOS, iOS, and Android, as well as through any web browser. The platform empowers users to build custom...
    Starting Price: €11/month/user
  • 20
    TeamForge

    TeamForge

    Digital.ai

    ...Ensure software quality with end-to-end traceability across disparate tools, distributed teams, and diverse processes. Manage both distributed Git and centralized Subversion (SVN) version control systems on one platform. Enterprise-wide rollups based on realtime data provide managers unprecedented monitoring, reporting, and analysis capabilities. Unite global teams, safely delegate role-based access, and create cohesion across different tools with TeamForge®'s powerful integrations ecosystem and collaboration capabilities.
  • 21
    Azure Container Registry
    ...Automated container building and patching including base image updates and task scheduling. Integrated security with Azure Active Directory (Azure AD) authentication, role-based access control, Docker content trust, and virtual network integration. Streamline building, testing, pushing, and deploying images to Azure with Azure Container Registry Tasks.
    Starting Price: $0.167 per day
  • 22
    SaaS Pegasus

    SaaS Pegasus

    SaaS Pegasus

    ...A secure and extensible user account system with sign-up, authentication, email confirmation, password reset, and social login built in. Create multi-tenant applications with an optional teams/organizations model, invitation workflow, and role-based access control framework. Set up plans and collect recurring payments with a powerful and flexible Stripe subscription module. A responsive UI built with your choice of Tailwind CSS, Bootstrap, or Bulma. Build real-time UIs with asynchronous and WebSocket support with Django channels and a built-in group chat demo. Interactive pages in Pegasus are built with your choice of React or HTMX. ...
    Starting Price: $249 per year
  • 23
    OpenText Aviator Search
    ...Users can customize everything from clicks to chat workflows, activate interactive, chat-based search, and apply built-in OCR, object detection, and image classification to uncover insights within diverse content. Administrators benefit from GUI-driven connector management, role-based access controls, single sign-on integration, and PII/compliance checks, ensuring secure, permission-based discovery.
  • 24
    Nevatech Sentinet
    Nevatech Sentinet is a powerful, flexible, lightweight and scalable API Management and API Governance software platform designed to comprehensively address API management needs with extensive capabilities and ease of use. It provides an enterprise-level API repository with full support for API description, versioning, role-based access, life-cycle and multitenancy management, and a secure, lightweight API gateway that supports any form of APIs and services. Sentinet includes remote API management at design-time and run-time, a branded API Developer Portal for publishing and analytics, and centralized tools for creating, securing and monitoring APIs. ...
  • 25
    Jodoo

    Jodoo

    Jodoo

    ...With Jodoo, you can transform your daily operations into streamlined digital workflows, replacing messy spreadsheets with custom solutions that work exactly how your business needs. It offers a drag-and-drop form builder with over 20 field types, allowing the addition of photos, signatures, and calculations, accessible from any device. Its real-time database ensures all your business data is in one secure place, always up to date, with features like automatic data connection between forms, history tracking, and role-based access control.
    Starting Price: $12 per month
  • 26
    Nutanix Self-Service
    NCM Self-Service (formerly Calm) streamlines how teams manage, deploy and scale applications across hybrid clouds with self-service, automation, and centralized role-based governance. One-click self-service with centralized role-based IT governance across private and public clouds. End-to-end automation of application provisioning, scaling, and management. Deploy applications with centralized visibility across private and public clouds. Blueprints can be published directly to end-users through the Nutanix Marketplace and be created in a UI or via Python code enabling self-service provisioning of complex applications. ...
  • 27
    SaaS Starter Kit

    SaaS Starter Kit

    SaaS Starter Kit

    ...It incorporates a comprehensive suite of features, including subscription payments through Lemon Squeezy or Stripe, a complete authentication flow with magic email sign-in and social OAuth login, and subscription management via customer portals. The kit supports roles and permissions for fine-grained access control, and multi-tenancy allowing users to create organizations and invite team members, and a modern, SEO-optimized blog. Email workflows are streamlined using Resend and React Email, while the user interface is crafted with Shadcn and Tailwind CSS, ensuring easy customization and extension. ...
    Starting Price: $87 one-time payment
  • 28
    Genatron

    Genatron

    Red Axle

    ...Genatron empowers you to create sophisticated applications effortlessly—no coding knowledge required. From record management and reporting to dashboards with advanced metrics and charts, Genatron integrates seamlessly with your organization, complete with role-based access controls (RBAC) and robust security features. Unlike traditional platforms, Genatron requires no subscriptions. Pay a one-time price for exactly what you need—nothing more, nothing less. Designed for flexibility, Genatron ensures your applications evolve with your needs. It safely migrates existing data for new versions, enabling continuous updates without disruption. ...
    Starting Price: $599 (free evaluation)
  • 29
    GitCode

    GitCode

    GitCode

    ...Beyond search, GitCode offers online project browsing with automatic empty-directory folding, a Markdown editor with full emoji support, and both table and Kanban board views for issues and task management. The robust permission matrix lets teams define interdependent, role-based access controls while avoiding configuration errors, and the natural-language OpenAPI endpoint exposes repository metadata for integration into custom workflows.
  • 30
    Okta

    Okta

    Okta

    One platform, infinite ways to connect to your employees and customers. Build auth into any app. Create secure, delightful experiences quickly by offloading customer identity management to Okta. Get security, scalability, reliability, and flexibility by combining Okta’s Customer Identity products to build the stack you need. Protect and enable your employees, contractors, and partners. Secure your employees—wherever they are—with Okta’s workforce identity solutions. Get the tools to secure...
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB