IT Central Station is now PeerSpot: Here's why

Top 8 Customer Identity and Access Management

ForgeRockOmada IdentityAuth0FronteggWSO2 Identity ServerOkta Customer IdentitySalesforce IdentitySAP Customer Identity and Access Management
  1. leader badge
    The solution is very scalable. We have a lot of users that have been increasing over the years that we have been using it. We have approximately 20,000 users.
  2. leader badge
    The best feature in Omada Identity is that it enables us to implement standardized employee life cycle processes so that we don't have to create them ourselves. We can then use the standard workflows. The breadth and scope of the solution’s IGA features also fulfill our requirements.
  3. Buyer's Guide
    Customer Identity and Access Management
    July 2022
    Find out what your peers are saying about ForgeRock, Omada, Auth0 and others in Customer Identity and Access Management. Updated: July 2022.
    620,068 professionals have used our research since 2012.
  4. leader badge
    It's a very powerful platform. It has the ability to do the usual stuff, according to modern protocols, like OIDC and OAuth 2. But the real benefit of using the platform comes from its flexibility to enhance it with rules and, now, with what they call authentication pipelines. That is the most significant feature, as it allows you to customize everything regarding the authentication and authorization process.
  5. It has Audit Log and many cool features that if we were to develop them by ourselves, it would require a lot of research and development resources. Frontegg gives us everything we need to ensure that our customers have a safe and reliable authentication system in which they can also manage some of the features and roles by themself which gives them more control over their environment.
  6. The single sign-on procedure itself, as well as the ability to connect to external user sources such as Microsoft Active Directory and LDAP servers, are the solution's most valuable features.
  7. The most valuable features of Okta Customer Identity are there is no infrastructure cost, integrated, has plenty of documentation, and is user-friendly.
  8. report
    Use our free recommendation engine to learn which Customer Identity and Access Management solutions are best for your needs.
    620,068 professionals have used our research since 2012.
  9. The user experience was great because it had all the features that the client needed. It was fully customized for the client, and it was very simple. It was the best solution at that time.
  10. The most valuable aspect of the product is the provisioning of a lot of SAP systems. It offers automated provisioning.

Advice From The Community

Read answers to top Customer Identity and Access Management questions. 620,068 professionals have gotten help from our community of experts.
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
May 20 2022

Hi infosec professionals,

Can you share your best practices and advice to follow (by an enterprise) when implementing IAM in the Cloud?

Thanks for your help in educating our community!

Ladislav Nyiri - PeerSpot reviewer
Ladislav NyiriIdentity and access management in the cloud - there are more interpretations of… more »
6 Answers
Ram Chenna - PeerSpot reviewer
Ram Chenna
Enterprise Architect at Blueray Digital Services
May 19 2022
Hello everyone, We are working with an retail client based in the US. Our suite of applications is Bespoke applications built on Microsoft Stack (.NET, MVC, ASP.NET, .NET core, SQL Server, .NET CORE RESTful services, etc). We integrate with a host of external vendor products such as Payment Ga...
Read More »
Joanna Stevens - PeerSpot reviewer
Joanna Stevens@Ram Chenna ​Hi Ram! I would suggest that this is a great place to start… more »
13 Answers
Amimesh Anand - PeerSpot reviewer
Amimesh Anand
Senior Associate at a tech services company with 10,001+ employees
Hi community, Our client is looking for risk elimination but doesn't want IdAM to be implemented? How can we convince the client to choose IdAM? What approach would you use? Also, which tool can be embedded along with IdAM to make security more efficient and more versatile?
Read More »
Samuel Paul - PeerSpot reviewer
Samuel PaulHi @Amimesh Anand, It seems to be important first to analyse the current… more »
5 Answers
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Dear IT Central Station community, What advice can you share with the community (especially with enterprise users) on Password Day 2021? Thanks, IT Central Station Community Team
Read More »
reviewer1324719 - PeerSpot reviewer
reviewer1324719The very question is endemic of the problem associated with passwords. A day… more »
4 Answers
Rony_Sklar - PeerSpot reviewer
Rony_Sklar
PeerSpot (formerly IT Central Station)

Insider data breaches can be a real problem in businesses. One way to address this issue is by implementing an identity and access management solution. 

What tips do you have for ensuring that one's identity and access management solution is effective?

Chris Bunn - PeerSpot reviewer
Chris BunnThe simplest and most common activity for every insider threat action is the… more »
6 Answers

Customer Identity and Access Management Articles

Shibu Babuchandran - PeerSpot reviewer
Shibu Babuchandran
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Does access control terminology puzzle you? Many people often mistake PIM, PAM, and IAM – privileged identity management, privileged access management, and identity and access management. Oftentimes, they also believe that privileged access management (PAM) and privileged account management (al...
Read More »
Shibu Babuchandran - PeerSpot reviewer
Shibu Babuchandran
Regional Manager/ Service Delivery Manager at ASPL INFO Services
                                What is Privileged Account Management (PAM)? Privileged account management can be defined as managing and auditing account and data access by privileged users. A privileged user is someone who has administrative access to critical systems. For instance, anyone ...
Read More »
Buyer's Guide
Customer Identity and Access Management
July 2022
Find out what your peers are saying about ForgeRock, Omada, Auth0 and others in Customer Identity and Access Management. Updated: July 2022.
620,068 professionals have used our research since 2012.