Try our new research platform with insights from 80,000+ expert users

Centrify Endpoint Services [EOL] vs Fortinet FortiAuthenticator comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Omada Identity
Sponsored
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
49
Ranking in other categories
User Provisioning Software (4th), Identity Management (IM) (4th), Identity and Access Management as a Service (IDaaS) (IAMaaS) (4th), Customer Identity and Access Management (CIAM) (3rd)
Centrify Endpoint Services ...
Average Rating
7.0
Number of Reviews
1
Ranking in other categories
No ranking in other categories
Fortinet FortiAuthenticator
Average Rating
8.0
Reviews Sentiment
6.8
Number of Reviews
62
Ranking in other categories
Single Sign-On (SSO) (6th), Authentication Systems (3rd), Identity Management (IM) (9th), Multi-Factor Authentication (MFA) (1st)
 

Featured Reviews

Pernilla Hulth - PeerSpot reviewer
The interface is easy to use and gives you a solid overview
The cloud-based deployment was straightforward, but the on-prem deployment was in a highly complex ecosystem. Omada has matured since then. I wouldn't say that it isn't straightforward, but it depends on the customer. A standard deployment is relatively easy, but it can be more painful if you need a lot of customization. We deployed the cloud solution in around four months, nearly meeting the 12-week benchmark. The on-prem deployment took three years. It was a highly complex ecosystem that was dependent on other systems. Depending on the size of your environment, you need a product owner and some specialists for maintenance. My last customer was a university with a complex environment. They had around 12 people involved in maintenance at that organization. Typically, it's between 2-5 people.
OM
Has system multi-factor authentication abilities but is lacking connection between on-premise and cloud-based solutions
What can be improved is the integration between the on-premise environment, specifically for Linux environments with the cloud infrastructure, such as Microsoft as it was during my time as a solution architect. My customers were looking to authenticate from the on-premise environment directly to Centrify LDAP and authenticate with the Microsoft Azure Active Direct for workloads that are sitting in Microsoft's cloud platform. The central sites are kind of limited in providing this capability. I'd like to see enhancement of the integration between the on-premise environment, both Linux and Windows-based workloads from on-premise integration into the cloud environment integration. The cloud environment needs improvement, specifically the Microsoft Azure, AWS, and Google cloud platform environments. If this platform can provide the capability to act as an integration, or API, between an on-premise and cloud-based identity and access management solution, then I see this as a complete solution for identity and access management and solutions.
Yonas Abebe - PeerSpot reviewer
Integration capabilities simplify authentication and migration challenges need addressing
The integration capabilities of Fortinet FortiAuthenticator are very interesting, as it can be integrated with third-party devices easily and is straightforward to configure. The integration with FortiToken is outstanding, adding a layer of security for authentication. In addition, it can be used by integrating with zero trust single access, enhancing overall security measures.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The best features of Omada Identity include its cloud version, which is really fast, and I appreciate the main menu and overall look of the features; it is really user-friendly and easy for the users to understand what they want."
"The best feature in Omada Identity is that it enables us to implement standardized employee life cycle processes so that we don't have to create them ourselves. We can then use the standard workflows. The breadth and scope of the solution’s IGA features also fulfill our requirements."
"What I like most is that we can always find a solution, and we can also find the cause when something goes wrong. I like that the most because everything is in one way or another traceable. That is what I like most. I like its reliability."
"The teams we work with at Omada provide great insights and support. Overall, it has been a pleasure working with them. That's the part we value the most."
"The most valuable feature is the automatic provisioning and reconciliation of things like the Active Directory groups and memberships."
"The support response time and the freedom from strange bugs and strange things happening in the software are valuable."
"We are able to onboard new user accounts much faster by automating the process and standardizing our operations globally. Previously, there were many individual processes and manual admin interactions. We also see a lot of cost savings and benefits because through automation and standardization."
"We don't have to go in and do a lot of the work that we did before. It may have saved us somewhere in the range of 10 to 30 percent of the time we spent on provisioning access."
"The most valuable feature in Centrify is the ability to authenticate in a Linux environment, because this is what my customers were looking for. They are coming from a Linux environment, so they appreciate the identity and access management for allowing Linux workloads to authenticate securely."
"Valuable features include the robust SSO features, when you have more complicated authentication within an organization. We can mix AD, Radius, Portal, SSO Portals (Google, etc.), and build our own environment. It is very flexible."
"The most valuable feature is the flexibility in using the SMS messages."
"Once you configure it properly, it runs fine."
"Fulfilled our requirement at a good price."
"Fortinet FortiAuthenticator is an easy-to-use solution."
"The tool's most valuable features are push notifications and integration with the FortiGate firewall. Push notifications provide an instant acceptance mechanism. When customers try to access SSL VPN, the solution sends a push notification to their mobile phone, and they can easily approve the access. The integration with FortiGate firewall is very easy if our customers use FortiGate for their firewall."
"It is used for SSO, single sign-on, and as a captive portal."
"I prefer the passing tool that sent an active directory console to a Fortinet FortiAuthenticator, then Fortinet FortiAuthenticator does not pass the locks."
 

Cons

"Improved traceability would be helpful for administrators. For example, let's say a user's permission is being revoked. We can only see the system that has carried out a particular action but not what triggered it. If an event definition or something has changed in the criteria for the permission being removed or something like that, we don't have immediate access to that information. It takes a little detective work."
"What I would most like to see added to the product is role management, especially enterprise or business role management, and the processes around that."
"In our organization, all the data is event-driven, which means that if an attribute is changed in the source system, it can be updated within a few seconds in all end-user systems. There is room for improvement in Omada regarding that. Omada is still batch-based for some processes, so sometimes it can take an hour or even four hours before the execution is run and the update is sent."
"If you find an error and you need it fixed, you have to upgrade. It's not like they say, "Okay, we'll fix this problem for you." You have to upgrade. The last time we upgraded, because there was an error in a previous version, we had to pay 150,000 Danish Krone (about $24,000 at the time of this review) to upgrade our systems... That means that we have to pay to get errors fixed that Omada has made in programming the system. I hope they change this way of looking at things."
"Omada Identity has a steep learning curve."
"Omada could communicate better with us about the product roadmap. We haven't gotten any updates about it. The user interface is often a bit difficult to understand. It isn't optimized for small screens, so it doesn't display all of the information clearly, so users need to scroll a lot."
"The biggest issue, which is the reason why we are transitioning from their product to SailPoint, is the overall user experience."
"The user interface could be improved. The interface between Omada and the user is mainly text-based."
"What can be improved in Centrify is the integration between the on-premise environment, specifically for Linux environments with the cloud infrastructure, such as Microsoft as it was during my time as a solution architect."
"The user interface and clustering are areas with shortcomings that need improvement."
"I would like to see more integration and inclusion of features for ransomware protection directly within the FortiAuthenticator without requiring additional devices."
"The technical support could be improved as some staff lacks the necessary knowledge to assist effectively."
"We have issues with HA (high availability). These should be addressed in future releases."
"I don't have any issues with this solution, but it may need a better, more user-friendly interface or better design of the platform."
"We've had some issues with integration."
"I would like to see more security features in reference to identity login or identity identification."
"Fortinet FortiAuthenticator provides only authentication. It should also enable authorization services"
 

Pricing and Cost Advice

"The initial total cost of ownership to implement Omada Identity is not small. The TCO for the implementation is as high as any other solution. However, the cost of maintaining the solution is at par or lower than competitors, including adding more features or maintaining the system after the initial deployment or installation to make sure that they are available for users to use or extending the functionalities of those activities. Those maintenance costs are lower than other vendors, but the initial cost of getting the system installed is still high."
"There were a lot of administrator, partner, and supplier accounts for people who were no longer working for us but still in the system. So, we reduced the number of users no longer with the company, which saved us some money on licensing."
"The pricing is too high for SMBs."
"Being Dutch, I can only say that it is extremely expensive, but all software products are expensive. If you have 38,000 users, then even one dollar or one euro per person would amount to a significant amount of money. Because of the high number of users, anything gets expensive very fast here."
"It is expensive. Fortunately, I had a very good procurement manager on my side, but they are expensive. The closest competitors are also very expensive. You get a full-fledged solution that can do everything you dream of, but you pay for everything."
"The pricing for Omada Identity is fair."
"It is fairly priced for an on-premise environment, but for the cloud environment, I am not that happy with the pricing."
"It is not cheap. None of these solutions are cheap, but we have good pricing at least for now from a licensing perspective."
Information not available
"The price seems okay. It's not that expensive compared to other authenticators."
"On a scale of one to ten, where one is a high price and ten is a low price, I rate the pricing a seven."
"The customers need to pay for licenses, and some pay on a yearly basis while others pay on a three-yearly or five-yearly basis. Also, it is not an expensive solution."
"I rate its pricing a three to five out of ten."
"It costs more to license the high-availability option."
"The product could be more competitively priced."
"The cost of the license could be less expensive. The license is paid on a yearly basis."
"The pricing is fair."
report
Use our free recommendation engine to learn which Identity Management (IM) solutions are best for your needs.
869,785 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
15%
Computer Software Company
12%
Manufacturing Company
9%
Government
6%
No data available
Computer Software Company
15%
Comms Service Provider
10%
Government
7%
Manufacturing Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business8
Midsize Enterprise3
Large Enterprise41
No data available
By reviewers
Company SizeCount
Small Business38
Midsize Enterprise17
Large Enterprise10
 

Questions from the Community

What do you like most about Omada Identity Cloud?
As an administrator, we benefit from a lot of functionality that is available out of the box, but it is also configur...
What is your experience regarding pricing and costs for Omada Identity Cloud?
They are positioned at a good price point. They are lower than some of their competitors.
What needs improvement with Omada Identity Cloud?
The biggest issue, which is the reason why we are transitioning from their product to SailPoint, is the overall user ...
Ask a question
Earn 20 points
What is your experience regarding pricing and costs for Fortinet FortiAuthenticator?
Fortinet FortiAuthenticator is not overly expensive compared to other Fortinet subscriptions. However, it would be be...
What needs improvement with Fortinet FortiAuthenticator?
The area for improvement in Fortinet FortiAuthenticator is its price.
 

Also Known As

Omada Identity Suite, Omada Identity Cloud
Centrify Identity Service
FortiAuthenticator
 

Overview

 

Sample Customers

Bayer, ECCO Shoes, Vattenfall, NuStar Energy, Unicredit, Schiphol Group, BMW Group, Deutsche Leasing
Apttus
Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data
Find out what your peers are saying about SailPoint, Microsoft, One Identity and others in Identity Management (IM). Updated: October 2025.
869,785 professionals have used our research since 2012.