Implemented with only 4000 lines of code, it is fast and easily examined for vulnerabilities. The integration with Ubiquiti gateways (Dream Machine et. al.) is easily implemented on both the gateway and endpoints. It's cross-platform capability allow connectivity from nearly all endpoints including iOS, Android, Windows, MacOS and Linux. Review collected by and hosted on G2.com.
Managing, distributing and securing client keys is problematic which is why it should be limitied to SOHO applications. A client key allows access from any endpoint with no relationship to user or app identity. Security requires regular review of logs to reveal potential compromise because a compromised configuration file permits unrestricted access to the target environment. Review collected by and hosted on G2.com.
At G2, we prefer fresh reviews and we like to follow up with reviewers. They may not have updated their review text, but have updated their review.
The reviewer uploaded a screenshot or submitted the review in-app verifying them as current user.
Validated through a business email account
This reviewer was offered a nominal gift card as thank you for completing this review.
Invitation from G2. This reviewer was offered a nominal gift card as thank you for completing this review.



