Home to public development of NIST Special Publication 800-63-3: Digital Authentication Guidelines
☆721Aug 29, 2025Updated 7 months ago
Alternatives and similar repositories for 800-63-3
Users that are interested in 800-63-3 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆44Aug 26, 2025Updated 7 months ago
- Draft SP 800-179r1 macOS 10.12 Security project files: draft publication, security settings spreadsheet and Bash script implementation of…☆115Oct 25, 2018Updated 7 years ago
- NIST/NCCoE Mobile Threat Catalogue☆150Aug 13, 2025Updated 8 months ago
- Verifiable Credentials Use Cases☆55Mar 17, 2026Updated 3 weeks ago
- Support PIV/CAC with identity-idp☆26Apr 7, 2026Updated last week
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Pan-Canadian Trust Framework | Cadre de Confiance Pancanadien☆79Feb 9, 2026Updated 2 months ago
- VSAQ is an interactive questionnaire application to assess the security programs of third parties.☆860Jan 11, 2021Updated 5 years ago
- Login.gov Core App: Identity Provider (IdP)☆575Updated this week
- MyUSA was a single sign-on project for government, now deprecated. (More info: https://18f.gsa.gov/2015/05/18/myusa/)☆42Dec 28, 2016Updated 9 years ago
- A list of certificates shipped by various vendors and Open Source Projects☆38Nov 26, 2015Updated 10 years ago
- A variant of a Fuzzy Vault cryptographic scheme designed for encrypting data with better human recovery features.☆51Feb 7, 2021Updated 5 years ago
- Define a common terminology for understanding the security requirements applicable to wallet architectures and wallet-to-wallet and walle…☆14Dec 6, 2022Updated 3 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Feb 19, 2014Updated 12 years ago
- Project Wycheproof tests crypto libraries against known attacks.☆3,015Apr 7, 2026Updated last week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Data Privacy Vocabulary☆18Jun 29, 2022Updated 3 years ago
- Web security drafts☆32Apr 29, 2019Updated 6 years ago
- WikiMo documentation (mainly the security space, but everyone's welcome to use this)☆67Jan 17, 2024Updated 2 years ago
- Security audit tool for Encrypt.to☆14May 2, 2015Updated 10 years ago
- Collection point for feature requests for Consent Receipt spec family☆13Jul 4, 2019Updated 6 years ago
- This is the old location for the PIV Playbook. New location below.☆74Apr 28, 2021Updated 4 years ago
- ☆11Jun 10, 2020Updated 5 years ago
- Export Tweets from Twitter into JSON file then publish as a Graph objects in Neo4j DB☆10Dec 7, 2018Updated 7 years ago
- Working draft of FIPS 201-3☆19May 6, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This is the repository of all specifications related to the User Managed Access Group☆30May 5, 2024Updated last year
- ☆2,195Mar 14, 2023Updated 3 years ago
- Open Security Controls Assessment Language (OSCAL)☆869Updated this week
- ☆15Aug 7, 2023Updated 2 years ago
- uber's ssh certificate pam module☆867Mar 19, 2023Updated 3 years ago
- UAF - Universal Authentication Framework☆288Jun 21, 2024Updated last year
- Verify the configuration of your OS X machine.☆1,241Feb 19, 2019Updated 7 years ago
- GSA Security Benchmarks and Tools☆21Sep 19, 2019Updated 6 years ago
- Documents for Mozilla's PKI policies - certificate root program, etc.☆55Feb 24, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The Credential Profile Matrix and its documentation☆22Apr 1, 2023Updated 3 years ago
- A diagram with the adoption status of FIDO2 and WebAuthn☆25Mar 22, 2019Updated 7 years ago
- The identity selector software source☆20Updated this week
- Abandoned—Virtual FIDO U2F Token Chrome Extension☆62Dec 13, 2015Updated 10 years ago
- SeaSponge is an accessible threat modelling tool from Mozilla☆281Apr 16, 2018Updated 7 years ago
- GRR Rapid Response: remote live forensics for incident response☆5,052Feb 16, 2026Updated last month
- E2EMail is a simple Chrome application - a Gmail client that exchanges OpenPGP mail.☆801Feb 28, 2017Updated 9 years ago