We performed a comparison between Auth0 and Safe-T Secure Application Access based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Auth0, Okta and others in Access Management."It has improved our organization by providing login authentication for a mobile app."
"It's a very powerful platform. It has the ability to do the usual stuff, according to modern protocols, like OIDC and OAuth 2. But the real benefit of using the platform comes from its flexibility to enhance it with rules and, now, with what they call authentication pipelines. That is the most significant feature, as it allows you to customize everything regarding the authentication and authorization process."
"The valuable features are that it is extremely secure and that it's developer-friendly."
"The most valuable feature of the product is scalability."
"It supports identity federation, FSO and multi-tenancy."
"The most valuable feature is interface application integration, but we haven't fully used it yet. We'll need it in the future for a few potential clients."
"It has a lot of customization and out-of-the-box features."
"It is very scalable because it provides a new environment for companies based on their number of users and other factors. The tool can take a lot of users."
"If you want a very flexible system that you can easily integrate, and develop interfaces for it or plug-ins to other application environments, it's probably the most flexible"
"the security level is very high. After we tested it and checked all the security aspects of the product, we found that it's highly secure."
"Safe-T is very good for users because it has plug-in for Outlook."
"It's easy to use over the web. A user who is not in the office can use it and securely insert files."
"I think they can do a better job in explaining what you're supposed to do next in order to correctly follow an idiomatic approach to using the solution beyond simply passing a JWT token to a server and having the server check then signature to validate the token."
"The product could use a more flexible administration structure"
"There could be easy integration with IoT devices for the product."
"When they introduced the Organizations feature they did support different login screens per organization. However, they introduced a dependency between this feature and another called the New Universal Login Experience. The New Experience is a more lightweight login screen, but it is much less customizable. For example, today, we are able to fully customize our login screen and even control the background image according to the time of day. We have code to do that. But we are not able to write code anymore in the New Experience."
"The price modelling is a bit confusing on the site and can be costly."
"The Management API could be improved so it's easier to get user information."
"There are indeed areas where the product could improve. For instance, Okta offers various application configurations, enabling access management, which the tool could consider implementing."
"The product support for multi-tenancy could be improved."
"One important thing that we haven't found in this product is the ability to provide a read-only view for documents. Also, the ability for the customer to add annotations to these documents."
"The Outlook agent is not working well for installing it in the entire office."
Earn 20 points
Auth0 is ranked 2nd in Access Management with 14 reviews while Safe-T Secure Application Access is ranked 27th in Access Management. Auth0 is rated 8.2, while Safe-T Secure Application Access is rated 7.8. The top reviewer of Auth0 writes "Has good documentation but improvement is needed in MFA and application configurations ". On the other hand, the top reviewer of Safe-T Secure Application Access writes "The architecture is open to integration and development, making the product very flexible". Auth0 is most compared with Microsoft Entra ID, Amazon Cognito, Frontegg, Cloudflare Access and ForgeRock, whereas Safe-T Secure Application Access is most compared with .
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.