

Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems.
Teams spend far less time on password issues, access requests, and onboarding, often cutting IT tickets by 30 to 50 percent.
We have been able to save 50% of our cost and time.
The automation workflow that we are using has removed the manual workflow that we were using, and the time required has been reduced.
Their resolution time is timely, and they provide solutions efficiently.
I am satisfied with their service.
I would rate the customer support a 10.
I have contacted support on a few occasions, mainly for advanced configuration guidance, troubleshooting provisioning issues, and clarifying documentation for complex integrations.
They were helpful and responsive.
There is a need to scale more effectively to accommodate a larger number of users and bulk users.
Regarding Fortinet FortiToken's scalability, we can purchase licenses according to our needs.
I would rate scalability for Fortinet FortiToken as nine and a half or ten.
Role-based access controls, automated provisioning, and directory integration scale smoothly, allowing me to maintain consistent policies and workflows even as complexity increases.
We have not faced any major issues trying to scale it for different organizations and a bigger client base.
It does not have the functionality to add multiple enterprise-level applications.
I would rate stability for Fortinet FortiToken as the best solution.
FortiToken is stable, but there are some restrictions when it comes to supporting two-factor authentication in multi-factor environments.
Overall, OneLogin's stability gives me confidence that it can support my organization's current needs and scale as we grow.
During the trial period, which was for thirty days, I never faced any downtime.
Regarding stability, I would not say there are downtime, bugs, or glitches.
Any Fortinet FortiToken cannot be removed; if a box expires or loses support, it cannot be removed, and customers must purchase it from scratch.
This would allow for broader distribution among a larger number of system admins and software engineers, which is currently not feasible with the existing hardware-only approach.
If I can receive it on email, it would be more flexible.
More real-time alerts, such as when access fails or MFA is triggered, would help users understand issues faster.
It is easy to implement and incorporate in any enterprise, and you can define the ROI pretty fast.
The user interface and the integration with third-party applications could use some work.
Discounts are often provided to close deals, making it a cost-effective solution.
The pricing for FortiToken is not low; I regard it as medium-priced.
The pricing is good, and I believe it is cheaper than other products.
Overall, the pricing, setup, and licensing structure are transparent and deliver a good return on investment, especially when considering the operational efficiency and security improvements gained from using OneLogin.
OneLogin by One Identity was affordable compared to other solutions in the market when considering pricing, setup cost, and licensing.
The main use case of FortiToken is that it is a hardware-based solution, providing secure two-factor authentication for administrators.
Fortinet FortiToken provides very important security benefits because it is used to manage FortiGate from outside, exclusively with Fortinet FortiToken.
It is very user-friendly and easily integrates with various firewalls, making it convenient to use within diverse environments.
With SmartFactor Authentication, I can balance between them. I can give users an easy and smooth user experience as long as the risk indices are low, but I can implement pretty rigid authentication workflows if the risk gets higher.
By allowing users to log in with just one set of credentials, we have seen a noticeable reduction in password fatigue.
OneLogin's best features are its MFA capabilities as well as making it easier to access different applications depending on the user.
| Product | Market Share (%) |
|---|---|
| Fortinet FortiToken | 3.5% |
| Microsoft Entra ID | 7.8% |
| Cisco Duo | 5.0% |
| Other | 83.7% |
| Product | Market Share (%) |
|---|---|
| OneLogin | 2.4% |
| Microsoft Entra ID | 18.4% |
| Google Cloud Identity | 11.0% |
| Other | 68.2% |


| Company Size | Count |
|---|---|
| Small Business | 18 |
| Midsize Enterprise | 5 |
| Large Enterprise | 9 |
| Company Size | Count |
|---|---|
| Small Business | 24 |
| Midsize Enterprise | 11 |
| Large Enterprise | 29 |
As we've seen, passwords alone don't keep unwanted guests out of your network. Password-only authentication has led to security breaches, malware infections, and policy violations. With two-factor authentication, a password is used along with a security token and authentication server to provide far better security. Authorized employees can remotely access company resources safely using a variety of devices, ranging from lpatops to mobile phones.
OneLogin offers organizations a user-friendly platform for single sign-on, multifactor authentication, and seamless access management. It enhances security and streamlines processes, making it vital for application management.
Designed for ease of integration, OneLogin helps organizations efficiently manage access and improve cybersecurity through centralized application management. It simplifies onboarding and offboarding, enhancing remote work capabilities and offering robust user mapping. Users appreciate seamless integration and reliable logs. However, it could improve with enhanced technical support, more out-of-box connectors, and better customization options. Challenges with device management and system integrations have been noted, with legacy application support and infrastructure stability needing attention.
What are the key features of OneLogin?Organizations employ OneLogin for single sign-on and identity management, connecting users to applications like CRM and Slack. It supports role-based access control and seamless cloud transition, integrating with Active Directory to enhance user management in industries demanding strong security and efficiency.
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.