We performed a comparison between IBM Tivoli Access Manager [EOL], Okta Workforce Identity, and Tools4ever HelloID based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Cisco, Auth0 and others in Single Sign-On (SSO)."Single Sign-On functionality is valuable because the core purpose of the product is to allow universal (or bespoke) SSO for application suites."
"SAML 2.0."
"The Verify feature: A push method which customers are going for."
"The integration effort with the end application is quite straightforward and easy."
"OAuth 2 is now the de facto standard for API protection and scoped authorized delegation. IBM TAM now supports OAuth 2 and can act as fully compliant OAuth 2 authorization server."
"They have good push authentications."
"Valuable features include UD, SSO functionality, MFA and Adaptive MFA functionality, ability to link multiple Directory databases with UD."
"It has a wide range of MFA options. I prefer "Okta Verify" out of them all."
"The product is easy to use."
"The solution can scale very well."
"We can automate the process of adding users to Okta if they are activated in Active Directory, or if they are added to the database of applications or Active Directory in the last couple of days."
"The product requires very little maintenance."
"A solution that's easy to use, stable, and reliable."
"Now we can easily control who has access to which client or client application."
"The Single Sign-On capabilities are endless and we haven't found a single app so far that couldn't be set up for SSO."
"You don't need to be a specialist in Identity and Access Management solutions to understand the software and configure it."
"The most valuable feature is the option to use SSO from different sources such as Microsoft AD, ADFS, Azure AD, SAML, form-based, etc."
"Looking at their roadmap, they have a broad grasp of the security features which the industry needs."
"The self-service portal needs improvement."
"An Amazon Machine Image (AMI) for the newer appliance versions for hosting the virtual appliances on AWS will help."
"The profiling element is incredibly robust, but also equally as complex, it requires an off-site course to be able to understand the context or the plethora of options available."
"Multi-factor authentication with social integration needs to improve."
"The error logging could be improved. Okta doesn't provide enough details when you are troubleshooting an issue. It's often difficult to fix it from our end, so we always need additional support from Okta."
"It can have more API integrations."
"Okta Workforce Identity could improve provisioning it can be made simpler."
"We experienced some technical glitches that need to be resolved."
"The solution should have greater on-premises availability, not just cloud and more package customization in its processing."
"Okta Workforce Identity could improve the support system, they are too slow."
"On the admin side, we can create our own passwords instead of generating one, which is usually difficult to explain to a user."
"We have experienced some challenges in integrating this solution with Scope and Cognito."
"I would like to have the built-in provisioning module improved."
"Integration with other Tools4ever applications such as SSRPM and IAM would be nice."
"When something needs to be changed with the sign-on policies, we have to apply this manually to every client environment that we have."
"Sometimes it generates a username that is not unique, but at the time of this writing, it is not possible to generate a new one that is unique."
More IBM Tivoli Access Manager [EOL] Pricing and Cost Advice →
Earn 20 points
Earn 20 points