Based on our record, KeePassXC seems to be a lot more popular than Keycloak. While we know about 232 links to KeePassXC, we've tracked only 4 mentions of Keycloak. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
KeePassXC[1] password manager supports TOTP and I use it for that purpose in addition to storing passwords. It never made sense to me to use an app like Authy. [1] . - Source: Hacker News / 2 months ago
If you use KeePass, make sure you use the KeePassXC variant. KeePass is dead. https://keepassxc.org/. - Source: Hacker News / 4 months ago
For the internet, use a password manager like keepassxc with a strong password. Source: 5 months ago
When you're at a point where you're relying on a display name to make security-critical decisions, you've already lost. Character substitutions like ķeepass or ƙeepass or keypass are at least possible to spot if you know the name of the product, but not the full URL. But there are many ways to create lookalike domains that don't change the product name: https://keepass.org https://keepass.net https://keepass.info... - Source: Hacker News / 6 months ago
> People love to hate on passwords but the reality is that for many circumstances (threat models) they are the best compromise. You can make them more than strong enough (take 32+ bytes out of /dev/random and encode however you like, nobody will ever brute force that in this universe) and various passwords managers solve the problem of re-use (never reuse a password). > And it comes with the benefit that you... - Source: Hacker News / 7 months ago
Most of the time nowadays, I prefer offloading this to an identity provider, using OpenID Connect or soon Federated Credential Management (FedCM), even if that means shipping an identity provider as part of the deliverables (I generally go with Keycloak, with keycloak-config-cli to provision its configuration). I'm obviously biased though as I work in IT services, developping software mainly for... - Source: dev.to / 5 months ago
Yet another breach of Okta... Why are companies not running something like keycloak [1] themselves? Are administrative/maintenance costs too high or is it plausible deniability? [1] https://keycloak.org. - Source: Hacker News / 5 months ago
I'd stick with a solution like https://keycloak.org in that instance. Source: about 1 year ago
A few more projects in this space: - Keycloak (you won't get fired for picking this)[0] - CloudFoundry's UAA[1] - Gluu [2] - Keratin [3] - OpenUnison [4] - Dex[5] - Netlify's GoTrue[6] All of these solutions are a bit different but here are some of the axes: - Whether or not they function as an OAuth provider - Whether they're centered around application-user-login (email + password) or application auth (OAuth) or... - Source: Hacker News / about 3 years ago
bitwarden - Bitwarden is a free and open source password management solution for individuals, teams, and business organizations.
Auth0 - Auth0 is a program for people to get authentication and authorization services for their own business use.
KeePass - KeePass is an open source password manager. Passwords can be stored in highly-encrypted databases, which can be unlocked with one master password or key file.
Okta - Enterprise-grade identity management for all your apps, users & devices
1Password - 1Password can create strong, unique passwords for you, remember them, and restore them, all directly in your web browser.
OneLogin - On-demand SSO, directory integration, user provisioning and more