We use AWS Cognito for authentication and authorization of our system. We use Cognito alongside Okta. Because of the high cost of Okta, we have a hybrid model of both solutions.
Distinguished Engineer & Senior Technical Architect at Pitney Bowes
Data synchronization solution with competitive pricing and good premium support
Pros and Cons
- "The federation is one of the most efficient features as the pricing is competitive."
- "The ease and simplicity of integration could be improved when using this solution. When using Okta, scope is a single endpoint with a parameter as a scope. In the Cognito for each scope, there is a separate endpoint."
What is our primary use case?
What is most valuable?
The federation is one of the most efficient features as the pricing is competitive.
What needs improvement?
The ease and simplicity of integration could be improved when using this solution. When using Okta, scope is a single endpoint with a parameter as a scope. In the Cognito for each scope, there is a separate endpoint.
What do I think about the stability of the solution?
This is a stable solution.
Buyer's Guide
Access Management
May 2024
Find out what your peers are saying about Amazon Web Services (AWS), Auth0, Microsoft and others in Access Management. Updated: May 2024.
771,212 professionals have used our research since 2012.
What do I think about the scalability of the solution?
This is a scalable solution.
How are customer service and support?
We are premium customers of AWS, so we get support in a very efficient way.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is straightforward.
What's my experience with pricing, setup cost, and licensing?
The pricing of this solution is good compared to other solutions on the market.
What other advice do I have?
I would recommend Cognito for users who are already AWS customers. Cognito will provide inbuilt authentication on operation for those services and capabilities in a cost-efficient manner.
I would rate this solution an eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Snr. Developer at Mama Money Pty
The multi-factor authentication setup needs to be improved
Pros and Cons
- "The multi-factor authentication setup has room for improvement."
- "You need to evaluate the export users. The multifactor authentication, much less this room for improving the configuration setup of that."
What is our primary use case?
We use it as a dedicated solution. We use it to authenticate our web applications.
What is most valuable?
Setting up groups is easy, as well as assigning users to groups.
What needs improvement?
You need to evaluate the export users. The multi-factor authentication setup has room for improvement.
For how long have I used the solution?
I have been using Amazon Cognito for three years.
What do I think about the scalability of the solution?
It is a scalable solution.
How was the initial setup?
The initial setup is not straightforward.
What other advice do I have?
I would rate the overall solution a four out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: May 15, 2024
Flag as inappropriateBuyer's Guide
Download our free Access Management Report and find out what your peers are saying about Amazon Web Services (AWS), Auth0, Microsoft, and more!
Updated: May 2024
Product Categories
Access ManagementPopular Comparisons
Microsoft Entra ID
CyberArk Privileged Access Manager
Okta Workforce Identity
ForgeRock
Cloudflare Access
F5 BIG-IP Access Policy Manager (APM)
WSO2 Identity Server
NetIQ Access Manager
SecureAuth Identity Platform
Buyer's Guide
Download our free Access Management Report and find out what your peers are saying about Amazon Web Services (AWS), Auth0, Microsoft, and more!
Quick Links
Learn More: Questions:
- What are the Top 5 cybersecurity trends in 2022?
- What are some tips for effective identity and access management to prevent insider data breaches?
- What are your best practices for Identity and Access Management (IAM) in the Cloud?
- What are security features to look out for when choosing a Customer Identity and Access Management solution?
- Why is identity and access management (IAM) so important in preventing data breaches?
- What access management tools would you recommend to help with GDPR compliance?
- Which is the best choice of Zero Trust Network Access (ZTNA)?
- When evaluating Access Management, what aspect do you think is the most important to look for?
- What are some tips for managing the identity lifecycle securely and effectively?
- What is the difference between IDAM , PIM and PAM?