Single purpose API
API Mashups (11)
Simple Latitude is a location-tracking iPhone app that helps users stay in touch with their families and friends. It can show a user's location, location accuracy, and timestamp on a map to people...
PhotoHab is new professional social networks for photographers featuring blogging, photo sharing, interactive forums, personalized profiles, and place where photographers from all experience levels...
Crisply is a revolutionary time tracking software that connects with the systems you use to automatically track how you are spending your time, making it easier than ever to complete your timesheet....
Google is shutting down a number of deprecated APIs on April 20, including YouTube Data, OpenID, Webmaster Tools, Apps Admin, Documents List and ClientLogin.
Our API directory now includes 40 identity APIs. The newest is the Instantor API. The most popular, in terms of mashups, is the Google OpenID API. We list 10 Google OpenID mashups.
||The Stormpath Client API provides tools for authentication, authorization, and user management for frontend and mobile developers. With the endpoints, developers can incorporate such tasks into...||Authentication||02.14.2017|
PKI Cloud CA
||The PKI Cloud CA API offers a gateway to the EJBCA Certificate Authority software. Available resources include certificate profile management, CRL generation and retrieval, and server and client...||Security||02.14.2017|
||Okta is a fully standards-compliant OAuth 2.0 authorization server and a certified OpenID Provider. The OAuth 2.0 APIs provide API security via scoped access tokens, and OpenID Connect provides user...||Security||02.10.2017|
||Ubivar offers fraud detection and financial risk tools that help eMerchants in detecting and verifying payments. Ubivar features self-learning risk score, blacklist update automation, and multiple...||Payments||02.10.2017|
||This API provides a way for secrets to manage any sensitive data which a container needs at runtime but you don’t want to store in the image or in source control, such as: Usernames and passwords,...||Security||02.08.2017|