"Technical support has been great."
"The cloud security part is very valuable. Security is the most important thing in today's world. With Azure Active Directory, there are some features that tell you how you need to improve your security level. It informs you if you set up certain policies, e.g., this is where my users sign in. It tends to let you know if your organization has been breached with this security set up. Therefore, it is easier to know when you have been breached, especially if you set up a Conditional Access policy for your organization."
"For some applications, it's not only working for authentication but it's also being used to apply roles for users. From the management perspective, it's much better to have this because in the past we constantly needed to go into the console of the different solutions and create or delete users or modify their roles and permissions. Now, with Azure Active Directory, we can do that from a single point. That makes our management model much easier."
"A use case that we did for an end user in a manufacturing organization: We used WVD with biometric authentication because 1,500 processes need to happen in a process. The user didn't want to use a login using their credentials. They wanted to use fingerprinting or tap their ID. That is where we integrated with the authentication. Now, they can process in a couple of hours, and they run those 1,500 processes every day. This changed their login process, which improved the manufacturing process. This helped a lot for their high deployment."
"Azure Active Directory is a very simple utility to use, it has very good visibility and transparency, and an easy-to-use panel."
"The security and infrastructure management features are the most valuable ones for us."
"Overall the solution functions very well, such as the ability to access it from the cloud."
"Azure Active Directory provides access to resources in a very secure manner. We can detect which user is logging in to access resources on the cloud. It gives us a comprehensive audit trace in terms of from where a user signed in and whether a sign-in is a risky sign-in or a normal sign-in. So, there is a lot of security around the access to resources, which helps us in realizing that a particular sign-in is not a normal sign-in. If a sign-in is not normal, Azure Active Directory automatically blocks it for us and sends us an email, and unless we allow that user, he or she won't be able to log in. So, the User Identity Protection feature is the most liked feature for me in Azure Active Directory."
"The most important thing for me is compliance. Everything that they have developed in Auth0 is already certified by many regulators such as ISO. So, we do not need to take care of that. We have the shared responsibility model to share assets with other products we are using in the cloud."
"It's a very powerful platform. It has the ability to do the usual stuff, according to modern protocols, like OIDC and OAuth 2. But the real benefit of using the platform comes from its flexibility to enhance it with rules and, now, with what they call authentication pipelines. That is the most significant feature, as it allows you to customize everything regarding the authentication and authorization process."
"The valuable features are that it is extremely secure and that it's developer-friendly."
"The solution's overall flexibility and customizability were the chief factors for selecting it in the beginning. They still remain among the best reasons to use Auth0. The flexibility that you get, and what it's allowed us to do on top of it in terms of code, is key."
"The most valuable feature is that it is simple to integrate, irrespective of your codebase."
"I have found this solution to be really practical and when a user wants to log in, it is effortless and runs smooth."
"It's a good solution for identification and access management."
"For example, there were some authentication features that, for security purposes, had certain limitations. Those limitations still exist, but the portal now has options so that the customers can make custom features to manage their identity."
"The synchronization with the local Active Directory and synchronization with all of the users on the local and cloud could be better."
"The technical support could improve by having a faster response time."
"The scalability of the solution is good."
"I had some issues with the Azure Active Directory on Windows XP. However, it worked well on Windows 7."
"I would like to see improvements made when it comes to viewing audit logs, sign-in logs, and resource tags."
"The product needs to be more user-friendly."
"The B2B Federation functionality is not perfect and could be improved. It is not on the same level that we could have if it were being used on-premises. It offers a different experience, which is a bit complicated and has some additional drawbacks."
"One conversation that we have had with Auth0 has been around uptime. They have one particular region, US West, which is the one that we're in, and over the last year that one has tended to have some problems. This last year has been an outlier in our experience, but there have been some stability issues there."
"In the past, there was an issue with the multi-tenant where there wasn't the ability to manage them."
"When they introduced the Organizations feature they did support different login screens per organization. However, they introduced a dependency between this feature and another called the New Universal Login Experience. The New Experience is a more lightweight login screen, but it is much less customizable. For example, today, we are able to fully customize our login screen and even control the background image according to the time of day. We have code to do that. But we are not able to write code anymore in the New Experience."
"This is a costly solution and the price of it should be reduced."
"There is a possibility to improve the machine-to-machine authentication flow. This part of Auth0 is not really well documented, and we could really gain some additional knowledge on that."
"The user interface needs to be simplified, it's complex and not user-friendly."
"The solution could be classified as a hilt system. There are a lot of resources being used and it is suitable for very large enterprises or the public sector."
The Azure Active Directory (Azure AD) enterprise identity service provides single sign-on and multi-factor authentication to help protect your users from 99.9 percent of cybersecurity attacks. With Azure Active Directory, you get:
- Single sign-on enabling access to your apps from anywhere
- Conditional Access and multi-factor authentication to help protect and govern access
- A single identity platform to engage with internal and external users more securely
- Developer tools to easily integrate identity into your apps and services
To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.
Auth0 is an easily adaptable authentication and authorization platform.You can easily and quickly connect your apps, choose identity providers, add users, set up rules, customize your login page and access analytics from your Auth0 dashboard. It really is identity made simple for developers.
Auth0’s identity and management platform provides:
With Auth0 You Can:
Reviews from Real Users:
And Engineer Lead for SaaS Technology & Customer Success at a media company says, "The solution's overall flexibility and customizability were the chief factors for selecting it in the beginning. They still remain among the best reasons to use Auth0. The flexibility that you get, and what it's allowed us to do on top of it in terms of code, is key.”
"It's a very powerful platform,” says Shlomi C., a System Architect at Skai. “It has the ability to do the usual stuff, according to modern protocols, like OIDC and OAuth 2. But the real benefit of using the platform comes from its flexibility to enhance it with rules and, now, with what they call authentication pipelines. That is the most significant feature, as it allows you to customize everything regarding the authentication and authorization process.”
Jakub W., Principal Architect at a computer software company, says "The most important thing for me is compliance. Everything that they have developed in Auth0 is already certified by many regulators such as ISO. So, we do not need to take care of that. We have the shared responsibility model to share assets with other products we are using in the cloud.”
For Siddhit R., Linux Platform Engineer at a tech services company, "The most valuable feature is that it is simple to integrate, irrespective of your codebase.”
IBM Security Access Manager helps you simplify your users' access while more securely adopting web, mobile, IoT and cloud technologies. It can be deployed on-premises, in a virtual or hardware appliance or containerized with Docker. ISAM helps you strike a balance between usability and security through the use of risk-based access, single sign-on, integrated access management control, identity federation and mobile multi-factor authentication. Take back control of your access management with IBM Security Access Manager.
Auth0 is ranked 3rd in Access Management with 5 reviews while IBM Security Access Manager is ranked 14th in Access Management with 2 reviews. Auth0 is rated 8.4, while IBM Security Access Manager is rated 7.6. The top reviewer of Auth0 writes "Extremely flexible, integrating with other identity providers and enabling social sign-on without having to custom code each one". On the other hand, the top reviewer of IBM Security Access Manager writes "Effortless user sign in, highly scalable, and reliable". Auth0 is most compared with Amazon Cognito, Okta Workforce Identity, OneLogin Workforce Identity and Cloudflare Access, whereas IBM Security Access Manager is most compared with Okta Workforce Identity, ForgeRock, CyberArk Privileged Access Manager, F5 BIG-IP Access Policy Manager (APM) and PingID. See our Auth0 vs. IBM Security Access Manager report.
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.