Coming October 25: PeerSpot Awards will be announced! Learn more

Top 8 Identity and Access Management as a Service (IDaaS) (IAMaaS)

Azure Active Directory (Azure AD)Okta Workforce IdentitySailPoint IdentityIQGoogle Cloud IdentityAxiad CloudJumpCloudCyberArk IdentityAWS Directory Service
  1. leader badge
    Let's say we decide that our users need to have MFA, multi-factor authentication. It is very easy to implement that with Azure Active Directory.It has things like conditional access. For example, if someone is accessing sensitive information, then we could force them to do multi-factor authentication. Therefore, we can stop access if it is coming from a location that we did not expect.
  2. leader badge
    What I found most valuable in Okta Workforce Identity is that it worked together with VMware Workspace One, so there was this device check at the same time. My company used the trusted device method that enabled you to define that only the trusted devices including the Workspace One agent were able to access the applications directly without an additional authentication step.
  3. Buyer's Guide
    Identity and Access Management as a Service (IDaaS) (IAMaaS)
    September 2022
    Find out what your peers are saying about Microsoft, Okta, SailPoint and others in Identity and Access Management as a Service (IDaaS) (IAMaaS). Updated: September 2022.
    635,987 professionals have used our research since 2012.
  4. leader badge
    It is simple and easy to implement.SailPoint IdentityIQ has more enriched out-of-box connectors than the others.
  5. The most valuable feature of Google Cloud Identity is group access. You are able to assign policies to groups instead of users individually.The solution is moderate to difficult to use. I found the approach was practical. Following the steps made it very easy to use.
  6. What I have found most valuable is the overall way Axiad listened to our problems and helped us solve them. They provided guidance and expertise, with their experience, that enabled us to be successful in a very challenging space.
  7. The most valuable features of JumpCloud are flexibility, policy management for devices, and device patch management. For example, we can limit access to devices only in Chile or send a number of commands to the devices to manage them.
  8. report
    Use our free recommendation engine to learn which Identity and Access Management as a Service (IDaaS) (IAMaaS) solutions are best for your needs.
    635,987 professionals have used our research since 2012.
  9. The setup, via cloud, is simple. The initial setup is straightforward. It takes me up to an hour and a half.
  10. The support is very good. I would rate the technical support as a nine out of ten.AWS Directory Service is secure.

Advice From The Community

Read answers to top Identity and Access Management as a Service (IDaaS) (IAMaaS) questions. 635,987 professionals have gotten help from our community of experts.
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Jul 13 2022

Hi security professionals,

Can you please clarify the definition of the Zero Trust vs Least Privileged model? How are they different?

In which cases you'd use each of them? Please share an example.

Thanks for sharing your knowledge!

reviewer1231281 - PeerSpot reviewer
reviewer1231281Least Privilege is about giving the least privilege (role and privilege) as… more »
3 Answers
Rony_Sklar - PeerSpot reviewer
Rony_Sklar
PeerSpot (formerly IT Central Station)
May 24 2022

Hi peers,

What role does IAM play in preventing data breaches? What are the risks associated with not using an IAM solution?

Amimesh Anand - PeerSpot reviewer
Amimesh AnandThere could be 2 types of action that can be taken to measure the data breach… more »
5 Answers
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
May 20 2022

Hi infosec professionals,

Can you share your best practices and advice to follow (by an enterprise) when implementing IAM in the Cloud?

Thanks for your help in educating our community!

Ladislav Nyiri - PeerSpot reviewer
Ladislav NyiriIdentity and access management in the cloud - there are more interpretations of… more »
6 Answers
Ram Chenna - PeerSpot reviewer
Ram Chenna
Enterprise Architect at Blueray Digital Services
May 19 2022
Hello everyone, We are working with an retail client based in the US. Our suite of applications is Bespoke applications built on Microsoft Stack (.NET, MVC, ASP.NET, .NET core, SQL Server, .NET CORE RESTful services, etc). We integrate with a host of external vendor products such as Payment Ga...
Read More »
Joanna Stevens - PeerSpot reviewer
Joanna Stevens@Ram Chenna ​Hi Ram! I would suggest that this is a great place to start… more »
13 Answers
reviewer1740369 - PeerSpot reviewer
User at Jkumar infra

Hi all,

Can anyone help me out to understand what's the difference between the IDAM, PIM and PAM terms?

I've tried to check them out on the Web but unfortunately, was unable to understand the core concept.

I appreciate the help!

Shibu Babuchandran - PeerSpot reviewer
Shibu BabuchandranHi @reviewer1740369, This is something that I have been doing research for… more »
2 Answers

Identity and Access Management as a Service (IDaaS) (IAMaaS) Articles

Shibu Babuchandran - PeerSpot reviewer
Shibu Babuchandran
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Cyber Security has become one of the top priorities in today’s hyper-connected fast-growing technologies like cloud, mobile, and virtualization, making the lives of security professionals more challenging. Building multiple layers of security on the perimeter such as VPNs, access controls, fire...
Read More »
Shibu Babuchandran - PeerSpot reviewer
Shibu Babuchandran
Regional Manager/ Service Delivery Manager at ASPL INFO Services
Does access control terminology puzzle you? Many people often mistake PIM, PAM, and IAM – privileged identity management, privileged access management, and identity and access management. Oftentimes, they also believe that privileged access management (PAM) and privileged account management (al...
Read More »
Shibu Babuchandran - PeerSpot reviewer
Shibu Babuchandran
Regional Manager/ Service Delivery Manager at ASPL INFO Services
                                What is Privileged Account Management (PAM)? Privileged account management can be defined as managing and auditing account and data access by privileged users. A privileged user is someone who has administrative access to critical systems. For instance, anyone ...
Read More »
Tony Adjuder - PeerSpot reviewer
Tony Adjuder
Technology Principal Consultant (IDM/GRC/SECURITY SME) at SAP
The use of Central User Administration (CUA) if you are an SAP customer is outdated. This user management method is over 20 years old. Managing users with CUA is time-consuming and painful, setting users up in an Enterprise environment. The Benefit of an IDM implementation using SAP IDM NW 8 for...
Read More »

Identity and Access Management as a Service (IDaaS) (IAMaaS) Topics

What does identity and access management do?

Identity and access management (IAM) systems manage user identities and access permissions. Using an IAM system allows IT departments to use provisioning (specifying the specific tools or access levels users can be granted), assign roles, or provide authentication. IAM also permits IT teams to remove access if needed. Additionally, identity and access management is useful in generating reports that indicate types of authentication, which systems have been accessed, and login times, and also shed light on security risks.

What is identity management as a service?

Identity and access management as a service (or IDaaS) consists of cloud-based solutions meant for IAM functions to authenticate users and make sure they are who they say they are. IDaaS allows users who work both on- and off-premise (whether they are third-party, customers, or employees) to securely access sensitive information. IDaaS is also used to obtain a better understanding of user behaviors.

Are identity management and access management the same?

They are not exactly the same thing. Identity management stores information about a user’s identity to authenticate that you are who you claim to be. Access management, on the other hand, is the management of your identity information to determine your access rights to software suites or any other resource needed to perform your job responsibilities.

Why do we need IAM?

Organizations need identity and access management to protect their enterprise systems and sensitive information from unauthorized users. With an IAM system in place, businesses can improve their security. For example, your organization becomes very vulnerable to attacks if a user’s password or email address is breached. However, IAM services work to prevent that. In addition, organizations benefit from IAM because it increases productivity. Employees don’t have to worry about access or having the correct password, and consequently, IT departments have a more reduced workload.

What are the IAM tools?

IAM tools include some of the following:

  • Role-based access: This IAM tool enables IT teams to define role-based access and permissions specific to their roles.
  • Data storage either on-site or in the cloud: Not all organizations have a server rack on site. For those that don’t, using an identity access management provider helps lower operational costs and helps them take advantage of advanced security.
  • Multi-factor authentication (MFA): This provides an added layer of security which helps protect passwords that can be easily compromised. The most commonly used form of MFA is the generation of a one-time code that is usually populated by the app you are using on your phone.
  • Single sign-on: This allows users to access multiple applications using only a single set of credentials to login. Single sign-on also allows IT departments to provision and deprovision employee access when necessary.
  • Employee-centric data: This can be used to identify individual users through directories or an HR system.
  • Password management: An IAM tool is used to manage passwords and/or workflows.
  • User flexibility: This refers to tools that can be used to add, delete, or modify users.
  • Reporting: Gain insight into how information and/or systems are being used.
What does an IAM implementation strategy include?

An implementation strategy for identity and access management includes the following:

  • Training and support: Providers of IAM systems often provide training along with customer service after installation.
  • Zero-trust: When implementing a strategy for IAM, it is important to include a zero-trust policy where the IAM solution constantly secures identity and access points and provides ongoing monitoring. This way, each employee’s access is managed more easily.
  • Secure access: Authentication is key in securing your organization’s systems. An IAM should record all aspects of a login attempt, including location, time, device, etc., either by implementing multi-factor authentication or using another adaptive authentication process.
  • Privileged accounts: Accounts with special privileges may need different access controls for sensitive information. If this is the case for your company, your IAM implementation strategy should include a tier of security and support to accommodate their status.
Benefits of Identity and Access Management as a Service

The benefits of identity and access management as a service include:

  • Password protection: IAM systems prompt users to use strong passwords and also frequently request that users change them to avoid data breaches.
  • Limit the damage caused by insiders: By deploying IDaaS, organizations can mitigate insider threats. IAM systems can do this by granting users access to only the systems they need to perform their jobs.
  • Block anomalous activity: IAM solutions combine technologies like artificial intelligence, machine learning, or even risk-based authentication to identify, track, and remediate anomalies.
  • Three-factor authentication: Multi-factor security provides enterprises with the extra confidence to be sure their systems are fully protected by using extra layers of security, such as iris scanning, facial recognition, or fingerprint sensors.
Features of Identity and Access Management as a Service

When selecting an identity and access management as a service, here are some features you may want to look for:

  • User provisioning and deprovisioning
  • Single sign-on
  • Multi-factor authentication
  • Access management
  • User activity compliance
  • Centralized access from one platform
  • Compliance control and audit reports
  • User activity reports
  • Intuitive dashboard
  • Data leakage prevention
  • Analytics tool with real-time insight
  • Abnormal behavior alerts
  • Ability to create risk models using machine learning
  • Unified mobile experience
Buyer's Guide
Identity and Access Management as a Service (IDaaS) (IAMaaS)
September 2022
Find out what your peers are saying about Microsoft, Okta, SailPoint and others in Identity and Access Management as a Service (IDaaS) (IAMaaS). Updated: September 2022.
635,987 professionals have used our research since 2012.