10

8

6

4

2


9.4

9.8

9.3

9.8

7.6

9.8

8.5

9.8

7.5

9.5

7.2

8.6

19 Security libraries and projects

  • Keycloak

    9.4 9.8 L2 Java
    Open Source Identity and Access Management For Modern Applications and Services
  • Spring Security

    9.3 9.8 L4 Java
    Spring Security
  • Bouncy Castle

    7.6 9.8 L2 Java
    Bouncy Castle Java Distribution (Mirror)
  • Cryptomator

    8.5 9.8 L5 Java
    Multi-platform transparent client-side encryption of your files in the cloud
  • pac4j

    7.5 9.5 L4 Java
    Security engine for Java (authentication, authorization, multi frameworks): OAuth, CAS, SAML, OpenID Connect, LDAP, JWT...
  • Keywhiz

    7.2 8.6 Java
    A system for distributing and managing secrets
  • Themis by Cossack Labs

    6.0 8.1 L3 C
    Easy to use cryptographic framework for data protection: secure messaging with forward secrecy and secure data storage. Has unified APIs across 14 platforms.
  • Okta Spring Boot Starter

    4.2 7.5 Java
    Okta Spring Boot Starter
  • Apache Shiro

    8.7 7.4 L3 Java
    Apache Shiro
  • Okta Authentication SDK for Java

    2.9 6.3 Java
    okta-auth-java
  • jCasbin

    6.6 7.2 Java
    An authorization library that supports access control models like ACL, RBAC, ABAC in Java
  • jjwt

    8.9 6.0 L1 Java
    Java JWT: JSON Web Token for Java and Android
  • Hdiv

    3.8 2.1 L2 Java
    Hdiv CE | Application Self-Protection
  • Nbvcxz

    3.5 1.5 L3 Java
    Password strength estimator
  • Google Keyczar

    6.0 0.0
    Easy-to-use crypto toolkit
  • OACC Framework

    3.1 0.0 L1 Java
    OACC (Object ACcess Control) is an advanced Java Application Security Framework
  • PicketLink

    3.7 0.0 L4 Java
    Umbrella project for security and identity management.
  • Nimbus JOSE+JWT

    2.2 0.0
    JSON Web Token (JWT) implementation for Java with support for signatures (JWS), encryption (JWE) and web keys (JWK).
  • Vault

    -
    Secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets. It handles leasing, key revocation, key rolling, and auditing. Through a unified API, users can access an encrypted Key/Value store and network encryption-as-a-service, or generate AWS IAM/STS credentials, SQL/NoSQL databases, X.509 certificates, SSH credentials, and more.

Add another 'Security' Library