Based on our record, AbuseIPDB should be more popular than Keycloak. It has been mentiond 13 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
Origin server only shows Cloudflare IP's so I decided to add this UA to my WAF with a Managed Challenge. After roughly 30 minutes and almost 100 hits on it CSR was 0%. Looking at the CF logs for the specific WAF shows IP's and locations from everywhere(US, UK, India, China, Nigeria, etc) and when I check IP's at abuseipdb.com they're all clean but none of them seem to get through the managed challenge. I removed... Source: 10 months ago
Switched to Maspik Anti-Spam, with a manually curated list of keywords, and integration with abuseipdb.com and proxycheck.io. But both of those were also causing false positives, especially from my co-worker who uses a virtual machine, so upped the tolerance to 70 on both. Source: about 1 year ago
This install of Docker is only a few days old. Most of the IPs associated are showing "banned" on abuseipdb.com. Source: about 1 year ago
People build lists like OP is all the time, have you seen https://abuseipdb.com/? Source: about 1 year ago
To keep your Synology safe, regularly update list of blocked ip addresses. I'm using this script, which takes list of ip addresses from blocklist.de and abuseipdb.com and add them to my block list. I keep them blocked forever. Source: about 1 year ago
Most of the time nowadays, I prefer offloading this to an identity provider, using OpenID Connect or soon Federated Credential Management (FedCM), even if that means shipping an identity provider as part of the deliverables (I generally go with Keycloak, with keycloak-config-cli to provision its configuration). I'm obviously biased though as I work in IT services, developping software mainly for... - Source: dev.to / 7 months ago
Yet another breach of Okta... Why are companies not running something like keycloak [1] themselves? Are administrative/maintenance costs too high or is it plausible deniability? [1] https://keycloak.org. - Source: Hacker News / 7 months ago
I'd stick with a solution like https://keycloak.org in that instance. Source: over 1 year ago
A few more projects in this space: - Keycloak (you won't get fired for picking this)[0] - CloudFoundry's UAA[1] - Gluu [2] - Keratin [3] - OpenUnison [4] - Dex[5] - Netlify's GoTrue[6] All of these solutions are a bit different but here are some of the axes: - Whether or not they function as an OAuth provider - Whether they're centered around application-user-login (email + password) or application auth (OAuth) or... - Source: Hacker News / over 3 years ago
URLscan.io - urlscan.io is a free service to scan and analyse websites. When a URL is submitted to urlscan.io, an automated process will browse to the URL like a regular user and record the activity that this page navigation creates.
Auth0 - Auth0 is a program for people to get authentication and authorization services for their own business use.
VirusTotal - VirusTotal is a free service that analyzes suspicious files and URLs and facilitates the quick...
Okta - Enterprise-grade identity management for all your apps, users & devices
Joe Sandbox - Automated Malware Analysis - Development and Licensing of Automated Malware Analysis Tools to Fight Malware
OneLogin - On-demand SSO, directory integration, user provisioning and more