Plug for HTTP authentication
An Ueberauth strategy for using Heroku to authenticate your users.
Flexible, lightweight and productive authentication for Plug, Phoenix and Ecto projects
An HTTP API client authentication scheme based on RSA signatures.
Authentication and authorization test support functions
An Ueberauth strategy for LinkedIn authentication
Library for authenticating keys matching on Redis instance.
An Elixir library for interacting with the Deribit cryptocurrency exchange API via WebSocket. Handles authentication, request/response ma...
Evernote API client for Elixir NOTE: Everex is UNDER DEVELOPMENT, and is NOT ready for production use. Feedback and contributions (via p...
An Ueberauth strategy for using Orcid to authenticate your users via OAuth2.
A simple, secure, and highly configurable Elixir identity [username | email | id | etc.]/password authentication module; Compatible wit...
An Ueberauth strategy for Withings OAuth2 authentication
Req plugin for GitHub authentication.
An Ueberauth strategy for using Github to authenticate your users.
Firebase token authentication strategy for AshAuthentication.
Passwordless authentication for LiveView applications.
An Ueberauth strategy for Fitbit OAuth2 authentication
A Req plugin for authenticating with AWS IMDSv2
Ueberauth strategy for Battle.net authentication.
A Plug for simple Bearer authentication
Provides authentication for phoenix applications
An Ueberauth strategy for authenticating your application with Shopify.
An Uberauth strategy for Bungie authentication.
An Uberauth strategy for Linear authentication.
Oneflow SDK that manages authentication and includes several structs for order management
HMAC API Authentication
Mellon is a Plug used in authentication of APIs. It's flexible, you can define your own validator etc.
Provides authentication to Plug applications by integrating with Ory Kratos.
An Uberauth strategy for ID Austria (eIDAS) authentication.
Cap is Central Authentication Plug for Phoenix, access control library with Role-based access control (RBAC) and Attribute-based access c...