Ory logoOR

About

We're a team building identity infrastructure that doesn't suck - authentication, authorization, and access management that actually works the way developers expect. Founded in 2019, we started from the open-source community and grew into a platform trusted by OpenAI, Mistral AI, Axel Springer, and Fortune 500 companies who need security at scale without the friction.

What we do: provide modular IAM components you can deploy however fits your setup - fully managed in Ory Network, self-hosted with enterprise support, or completely open-source. We handle the complex standards like OAuth2, OpenID Connect, and zero-trust architectures so you can focus on building your product. Our approach is cloud-native, headless by design, and built to scale horizontally without the dependencies that usually slow things down.

Similar companies

One Identity logoOI

One Identity

One Identity provides identity-security solutions for managing and governing access across enterprise IT environments, protecting 250 million identities for 80 Fortune 100 customers.

3 jobs
Saviynt logoSA

Saviynt

Saviynt is an AI-based identity security platform that secures and governs every identity across your entire digital ecosystem, trusted by global enterprises to safeguard their digital assets.

Ping Identity logoPI

Ping Identity

Ping Identity provides a cloud-native identity and access management platform - including SSO, MFA, and API security - securing over 2 billion identities for large enterprises worldwide.

Britive logoBR

Britive

Britive is a cloud-native privileged access management platform that eliminates standing access risks through Just-in-Time ephemeral permissions for human, machine, and AI identities across multi-cloud environments.

Infisical logoIN

Infisical

Infisical is an open-source platform that manages application secrets, certificates, SSH keys, and configurations for teams and infrastructure at scale.

SGNL.ai logoSG

SGNL.ai

SGNL.ai provides a Continuous Identity platform that unifies identity and security context to orchestrate real-time access decisions across enterprise IAM, IGA, PAM, and AI agent environments.