
In Casbin, an access control model is abstracted into a CONF file based on the PERM metamodel (Policy, Effect, Request, Matchers). So switching or upgrading the authorization mechanism for a project is just as simple as modifying a configuration. You can customize your own access control model by combining the available models.
Compare Casbin to these popular alternatives based on real-world usage and developer feedback.

A set of unified APIs and tools that instantly enables Single Sign On and user management to all your applications.

It enables you to manage access to AWS services and resources securely. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.

It is an Open Source Identity and Access Management For Modern Applications and Services. It adds authentication to applications and secure services with minimum fuss. No need to deal with storing users or authenticating users. It's all available out of the box.
JSON Web Token is an open standard that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed.

It is an authorization framework that enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.

You can create unique identities for your users through a number of public login providers (Amazon, Facebook, and Google) and also support unauthenticated guests. You can save app data locally on users’ devices allowing your applications to work even when the devices are offline.

It is a framework that focuses on providing both authentication and authorization to Java applications. The real power of Spring Security is found in how easily it can be extended to meet custom requirements.

It provides backend services, easy-to-use SDKs, and ready-made UI libraries to authenticate users to your app. It supports authentication using passwords, phone numbers, popular federated identity providers like Google,
It is a comprehensive identity and access management solution that gives you a robust set of capabilities to manage users and groups. You can get the reliability and scalability you need with identity services that work with your on-premises, cloud, or hybrid environment.

Connect all your apps in days, not months, with instant access to thousands of pre-built integrations - even add apps to the network yourself. Integrations are easy to set up, constantly monitored, proactively repaired and handle authentication and provisioning.

Devise is a flexible authentication solution for Rails based on Warden
It is authentication middleware for Node.js. Extremely flexible and modular, It can be unobtrusively dropped in to any Express-based web application. A comprehensive set of strategies support authentication using a username and password, Facebook, Twitter, and more.

OmniAuth is a Ruby authentication framework aimed to abstract away the difficulties of working with various types of authentication providers. It is meant to be hooked up to just about any system, from social networks to enterprise systems to simple username and password authentication.
It is a simple identity layer on top of the OAuth 2.0 protocol. It allows Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server, as well as to obtain basic profile information about the End-User in an interoperable and REST-like manner.

It is a free, open-source implementation of the Lightweight Directory Access Protocol. Lightweight Directory Access is an application protocol that is used to crosscheck information on the server end.

Clerk gives you more than just a "sign-in box". You get a complete set of User Management UIs and APIs, including a powerful Admin Dashboard. Purpose-built for React, Next.js, and the Modern Web. Finally, an auth service that "just works".

It is a mature, flexible, and well supported standards-based mechanism for interacting with directory servers. It’s often used for authentication and storing information about users, groups, and applications, but an LDAP directory server is a fairly general-purpose data store and can be used in a wide variety of applications.

This package provides JSON Web Token Authentication support for Django REST framework. Unlike some more typical uses of JWTs, this module only generates authentication tokens that will verify the user who is requesting one of your DRF protected API resources.

Passwords are the bane of app security. With a few lines of code and no bloat, it lets you build apps with blazing-fast, customizable, passwordless login - with future-proof crypto and identity tech under the hood.

FreeIPA is an integrated Identity and Authentication solution for Linux/UNIX networked environments. A FreeIPA server provides centralized authentication, authorization and account information by storing data about user, groups, hosts and other objects necessary to manage the security aspects of a network of computers.

Stormpath is an authentication and user management service that helps development teams quickly and securely build web and mobile applications and services.

Teleport makes it easy for users to securely access infrastructure and meet the toughest compliance requirements. Teleport replaces shared credentials with short-lived certificates and is completely transparent to client-side tools.

The authentication and authorization system BuzzFeed developed to provide a secure, single sign-on experience for access to the many internal web apps used by our employees.

It helps you do single sign-on and identity federation backed by strong and adaptive authentication, securely expose APIs, and manage identities by connecting to heterogeneous user stores. Leverage the power of open-source IAM in your enterprise to innovate fast and build secure Customer IAM (CIAM) solutions to provide an experience your users will love.

It is the open source implementation of RADIUS, an IETF protocol for AAA (Authorisation, Authentication, and Accounting).. It is responsible for authenticating one third of all users on the Internet.

It is a Colorado-based startup that customers use to authenticate, authorize, and manage users, devices, and applications. They do it all easily via a common directory in the cloud, instead of through legacy, on-premises IT systems.

Oso Cloud is authorization-as-a-service. It provides abstractions for building and iterating on authorization in your application – based on years of work with hundreds of engineering teams.

It provides enterprise identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges.

OAuth is a protocol that aimed to provide a single secure recipe to manage authorizations. It is now used by almost every web application. However, 30+ different implementations coexist. OAuth.io fixes this massive problem by acting as a universal adapter, thanks to a robust API. With OAuth.io integrating OAuth takes minutes instead of hours or days.

Simple and secure remote access — to any system anywhere based on trusted identity. It enables practitioners and operators to securely access dynamic hosts and services with fine-grained authorization without requiring direct network access.

AWS Service Catalog allows IT administrators to create, manage, and distribute catalogs of approved products to end users, who can then access the products they need in a personalized portal. Administrators can control which users have access to each application or AWS resource to enforce compliance with organizational business policies. AWS Service Catalog allows your organization to benefit from increased agility and reduced costs because end users can find and launch only the products they need from a catalog that you control.

It is an Identity Provider that can be used for web and apps. Users are authenticated by verifying access to an email address or a securely stored private key.

Satellizer is a simple to use, end-to-end, token-based authentication module for AngularJS with built-in support for Google, Facebook, LinkedIn, Twitter authentication providers, plus Email and Password sign-in method. You are not limited to the sign-in options above, in fact you can add any OAuth 1.0 or OAuth 2.0 provider by passing provider-specific information during the configuration step.

It is a customer-managed solution that can be deployed on premises or on any public cloud, such as AWS, Azure, or Google Cloud Platform. It provides users with secure access and single sign-on to all the virtual, SaaS and web applications they need to be productive.

It enables you to discover and access infrastructure (e.g. Kubernetes, databases). We help you connect an identity provider such as Okta or Azure active directory, and map users/groups with the permissions you set to your infrastructure.

Start selling to enterprise customers with just a few lines of code.

It provides auth, login, SSO, MFA, and is free for unlimited users. It provides secure, single-tenant, on-prem or private cloud identity, custom emails with localization, social logins, group-based auth and more.

It is a cloud native user management system. It provides user login and registration, multi-factor authentication, and user information storage with a headless API. It is fully configurable and supports a wide range of protocols such as Google Authenticator, and stores user information using JSON Schema.

It is an open-source authentication and authorization server providing 2-factor authentication and single sign-on (SSO) for your applications via a web portal. It acts as a companion of reverse proxies like nginx, Traefik or HAProxy to let them know whether queries should pass through. Unauthenticated users are redirected to Authelia Sign-in portal instead.

It is an award-winning application written in native PHP that deals with authentication. It supports some other identity protocols and frameworks, such as Shibboleth 1.3, A-Select, CAS, OpenID, WS-Federation or OAuth, and is easily extendable, so you can develop your own modules if you like.

BlockScore is an identity verification and anti-fraud solution. Protecting your business from fraud is difficult; chargebacks, fake or fraudulent identities, age verification and compliance are serious concerns that take time away from you and your employees. We hook into your application behind the scenes and verify your customers’ identities using our unobtrusive and modern API that doesn’t require cumbersome documents or physical records.

It supports a family of privileged identity management, privileged remote access, and vulnerability management products for UNIX, Linux, Windows and Mac OS operating systems.

It offers a suite of fully-automated identity verification components with worldwide coverage that can be configured and branded to create custom-tailored flows for any use case.

It is a comprehensive identity platform that makes it easy to build authentication into any stack or code base, so you can tailor it to fit your unique requirements and end user experience.

It is a best-in-class Identity-as-a-Service (IDaaS) offering for organizations that prefer a more hands-free approach to identity and access management (IAM) for their customers and workforce.

It allows you to manage user permissions and roles in a database.

Veriff is the highly-automated identity verification platform connecting companies with honest customers. Veriff makes it easy to connect with people you can trust. With the combined forces of machine learning and eagle-eyed specialists, Ve

Avoid dealing with OAuth logic in your code, and spend more time creating your product. Guardian reduces the OAuth footprint in your code to a single request. Built with modularity in mind, Guardian leverages plugins to handle OAuth flows, should you encounter a flow that Guardian doesn't handle, create a small flow plugin to do so and carry on. Guardian comes with 5 pre-made plugins that cover 99% of OAuth services.

It converts your passive OTP process to active push notification. It works like magic! When you use it's Chrome Extension, it will identify your visited website's OTP request and will send it to your mobile phone as a push notification. When you Accept that request on your phone, your code will be generated on your mobile phone and send it back to the Chrome Extension. That extension will put your OTP code to the OTP text box and will redirect you to the application automatically.

It is a platform enabling quick access to mobile and web apps with mobile phone number only. Enables apps' users to quickly access apps without the need for a one-time password (OTP). In addition to being fast, secure and flexible. It also provides the opportunity to choose a preferred messaging platform.