Integration Tools for the German ID Card
☆18Nov 13, 2025Updated 4 months ago
Alternatives and similar repositories for identglue
Users that are interested in identglue are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Keycloak-Extension zur Anbindung des BundID-IdentityProvider (SAML)☆29Updated this week
- A fake HTTP client for making requests to your HTTP::Handler classes☆14Jun 16, 2025Updated 9 months ago
- A wrapper shard for llama.cpp that acts as a client to work directly with AI models through llama.cpp from within Crystal applications☆18Jan 23, 2025Updated last year
- Roda-inspired HTTP framework for Crystal, providing routing, sessions, forms, etc☆28Jan 8, 2026Updated 2 months ago
- A micro-service acting like PID/mDL Issuer according to OpenID4VCI☆31Updated this week
- ☆20Aug 26, 2023Updated 2 years ago
- Key Management Services for Go☆10Oct 27, 2025Updated 4 months ago
- A Java library for the "Selective Disclosure for JWTs (SD-JWT)" specification.☆33Oct 31, 2025Updated 4 months ago
- RDF fact prover and proof validator operating on simple conjunctive rules.☆11Feb 28, 2026Updated 3 weeks ago
- This repository demonstrates lazy loading of modules using routing.☆11Nov 24, 2020Updated 5 years ago
- Create a custom GPT for your organization with file search. This demo shows how to create an assistant, set up a vector store, upload and…☆10May 23, 2024Updated last year
- ☆42Updated this week
- Typescript abstractions over Rust crypto library's WASM wrapper☆36Dec 18, 2025Updated 3 months ago
- EUDI Wallet Prototype☆167Mar 16, 2026Updated last week
- A pure Crystal implementation of BlurHash algorithm☆26Mar 4, 2024Updated 2 years ago
- collection of example documents for use within cocalc's library☆17Sep 11, 2025Updated 6 months ago
- ☆15Nov 6, 2025Updated 4 months ago
- Workday credentials common libraries☆11Dec 15, 2022Updated 3 years ago
- A tool for the automatic generation of Isabelle/HOL correctness proofs for security protocols.☆18Jun 21, 2015Updated 10 years ago
- Implementation of everything OIDC and OAuth2☆46Updated this week
- An hash-chain with efficient O(1) append and O(logN) proof.☆14May 23, 2018Updated 7 years ago
- Random collections of code examples.☆12Mar 19, 2025Updated last year
- a python script which asks you for login and ask any other email_id . it downloads all attachments of inbox came from that other email_i…☆11Dec 22, 2017Updated 8 years ago
- ☆12Jan 29, 2026Updated last month
- This was the night of the crawling terror!☆32Dec 22, 2023Updated 2 years ago
- mobile international certificate of vaccination☆12Nov 9, 2021Updated 4 years ago
- API Server to control Cloud Browser with natural language instructions using AI.☆15Nov 10, 2024Updated last year
- Ontology Implementation of Rosetta Blockchain Standard☆10Mar 7, 2023Updated 3 years ago
- Bindings for libsystemd-daemon☆18Mar 25, 2024Updated 2 years ago
- Desktop implementation of Steam's mobile authenticator app☆11Feb 9, 2022Updated 4 years ago
- Simplify Pulumi authentication without having to configure secrets for your workflows.☆12Aug 22, 2025Updated 7 months ago
- Security model and verified implementation of QUIC packet encryption in Low*, built over EverCrypt and EverParse.☆13Aug 11, 2025Updated 7 months ago
- Source code for Interpretable Reward Redistribution in Reinforcement Learning: A Causal Approach (NeurIPS 2023)☆10Dec 12, 2023Updated 2 years ago
- cheetah, hacked by yelpers☆20Dec 22, 2025Updated 3 months ago
- ☆15Mar 3, 2016Updated 10 years ago
- Shared Rust data types and utility functions for Hyperledger Indy.☆14Feb 27, 2026Updated 3 weeks ago
- ☆11May 8, 2023Updated 2 years ago
- ☆12Aug 21, 2024Updated last year