

Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems.
One Identity Active Roles provides excellent reporting and auditing functionality, allowing administrators to track permissions, actions, and responsibilities effectively.
It has saved 90% of the time compared to before.
Their resolution time is timely, and they provide solutions efficiently.
I am satisfied with their service.
One Identity's support is great.
I rate customer service and support as a seven because, although they are helpful when needed, there can be delays in responding to tickets and finding necessary fixes.
Sometimes having a fix for a bug takes too much time.
There is a need to scale more effectively to accommodate a larger number of users and bulk users.
Regarding Fortinet FortiToken's scalability, we can purchase licenses according to our needs.
I would rate scalability for Fortinet FortiToken as nine and a half or ten.
It is very beneficial for large and complex environments.
If you are a major enterprise customer, it is a matter of scaling out on resources with more memory, disk, and CPU power.
The solution is highly scalable, with a scalability rating of nine.
I would rate stability for Fortinet FortiToken as the best solution.
FortiToken is stable, but there are some restrictions when it comes to supporting two-factor authentication in multi-factor environments.
There were no major problems with One Identity Active Roles.
We haven't had any glitches.
I would rate the stability as a seven because there are sometimes performance issues, which require restarting the services.
Any Fortinet FortiToken cannot be removed; if a box expires or loses support, it cannot be removed, and customers must purchase it from scratch.
This would allow for broader distribution among a larger number of system admins and software engineers, which is currently not feasible with the existing hardware-only approach.
If I can receive it on email, it would be more flexible.
A way to connect to various directories and integrate with cloud directories would be beneficial.
Enhancements to the console are also necessary because it is more confusing than the web interface.
The user interface needs to be more modern and scalable.
Discounts are often provided to close deals, making it a cost-effective solution.
The pricing for FortiToken is not low; I regard it as medium-priced.
It is quite expensive, costing more than 50 euros per identity.
The pricing is high.
The pricing of One Identity Active Roles is expensive, but the return on investment justifies the cost, allowing for savings in other areas.
The main use case of FortiToken is that it is a hardware-based solution, providing secure two-factor authentication for administrators.
Fortinet FortiToken provides very important security benefits because it is used to manage FortiGate from outside, exclusively with Fortinet FortiToken.
It is very user-friendly and easily integrates with various firewalls, making it convenient to use within diverse environments.
It's improved our security posture. It has limited access to our crown jewels, where all our identities lie within Active Directory.
It helps in removing custom Active Directory delegation, which enhances security by eliminating unnecessary privileges, addressing identity-based breaches by reducing the number of Active Directory delegations.
Dynamic groups are also one of the best features, eliminating the need to add or manage members manually.
| Product | Market Share (%) |
|---|---|
| Fortinet FortiToken | 4.6% |
| Microsoft Entra ID | 11.6% |
| Cisco Duo | 7.2% |
| Other | 76.6% |
| Product | Market Share (%) |
|---|---|
| One Identity Active Roles | 10.4% |
| ManageEngine ADManager Plus | 14.1% |
| Netwrix Auditor | 11.0% |
| Other | 64.5% |


| Company Size | Count |
|---|---|
| Small Business | 17 |
| Midsize Enterprise | 5 |
| Large Enterprise | 9 |
| Company Size | Count |
|---|---|
| Small Business | 7 |
| Midsize Enterprise | 2 |
| Large Enterprise | 17 |
As we've seen, passwords alone don't keep unwanted guests out of your network. Password-only authentication has led to security breaches, malware infections, and policy violations. With two-factor authentication, a password is used along with a security token and authentication server to provide far better security. Authorized employees can remotely access company resources safely using a variety of devices, ranging from lpatops to mobile phones.
One Identity Active Roles is a highly regarded solution for Active Directory (AD) security and account management. One Identity Active Roles will enhance group, account, and directory management while eradicating the need for manual processes. The end result is a significant increase in the overall speed, efficiency, and security of the organization.
Using One Identity Active Roles, users can:
Managing accounts in AD and Azure AD can be tremendously challenging; continually keeping these important systems safe and secure presents an even greater challenge. Traditional tools can be inefficient, error-prone, and very disjointed. In today’s robust marketplace, organizations are finding it somewhat difficult to keep pace with the constant access changes in a hybrid AD ecosystem. Additionally, there are significant security issues to consider (government compliance, employee status/access changes, and other confidential business requirements). And, of course, there is a requirement to properly manage Active Directory and Azure Active Directory access in addition to managing all the other numerous SaaS and non-Windows applications that organizations use today.
Users can easily automate all of these tedious, mundane administrative tasks, keeping their systems safe and error-free. Active Roles ensures users can perform their job responsibilities more effectively, more efficiently, and with minimal manual intervention. Active Roles was created with a flexible design, so organizations can easily scale to meet your organizational needs, today, tomorrow, and in the foreseeable future.
Reviews from Real Users
A PeerSpot user who is a Network Analyst at a government tells us, “It has eliminated admin tasks that were bogging down our IT department. Before we started using Active Roles, if one of our frontline staff members deleted a user or group, it could take several hours to try to reverse that mistake. Whereas now, the most our frontline staff can do is a deprovision, which just disables everything in the background, but it's still there. We can go in and have it back the way it was two minutes later. Instead of it taking two hours, it only takes two minutes.”
Becky P., Sr Business Analyst at George Washington University, shares, “In addition, with the use of workflows and the scheduled tasks, we were able to automate and centrally manage a number of the processes as well as utilize them to work around other product limitations. Those include, but are not limited to syncing larger groups, which have 50,000 plus members, to Azure AD. We sync up to Azure AD using ARS. If we had not already had ARS in place, it would have been impossible for us to have done so in the time period we did it in. We did it in under six months. ARS probably saves us at least two weeks out of every month. It's reduced our workload by 50 percent, easily.”
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.