We performed a comparison between ManageEngine Password Manager Pro and Microsoft Entra ID based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Cisco, Auth0 and others in Single Sign-On (SSO)."It is user-friendly. Someone who doesn’t have a lot of IT knowledge can work with the product easily."
"The support from the customer service team is good, they respond on time, and they always seem to be quite knowledgeable."
"It is very safe and we haven't had any security issues."
"The security provided is very enhanced and it does a great job of keeping passwords safe."
"It's a very scalable solution."
"The most valuable features are the Conditional Access policies, SSPR, and MFA. Another good functionality is registering enterprise applications to provide access to external parties. These four features are precious and are the most used across different use cases for various clients and projects."
"Single sign-on provides flexibility and helps because users don't want to remember so many passwords when logging in. It's a major feature. Once you log in, you have access to all the applications. It also enables us to provide backend access controls to our users, especially when it comes to groups, as we are trying to normalize things."
"We have not had any formal issues with scalability."
"The solution has some great features, such as identity governance, and user self-service. The Outlook application is very good and is used by a lot of people even if they are using Google services."
"The ability to grant access to other organizations is helpful."
"The most valuable feature of the solution is its ability to delegate roles to each individual resource, which is great."
"The user functionality enables us to provide different levels of access, across many applications, for each user. We can customize the access level and set a security level in connection with that access. For instance, we can require MFA. That is a feature that helps enhance our security posture a lot."
"It's a pretty technical solution. It's designed for more technical people."
"The user interface could be improved and made more user friendly."
"There is room for improvement in making the UI more user-friendly."
"Initially, we wanted to exclude specific users from MSA. So, we had a condition policy, which forces MSA for all the users. So we wanted to exclude users who are using an NPS extension. So it was not listed, as a NPS extension was not listed outside an application, in actual, so, we go back and were not able to exclude users using NPS extension from MSA. So that was one limitation that we found and we had to work around that."
"The solution was difficult to scale because the group's configuration was complex. I would rate the scalability level of Azure Active Directory a five out of ten."
"The custom role creation function could be improved as it's somewhat tricky to use."
"Microsoft Authenticator can improve their notifications because sometimes, my team doesn't receive notifications about app updates and authentication failures."
"Microsoft is working with Microsoft Identity Manager for Active Directory on-premise. It will be very important to have these identity management solutions directly in Azure Active Directory. It's very important to have some kind of Azure identity manager as a technology for identity and access management for working both in the cloud and inside the Azure suite."
"There is a lot of room for improvement in terms of its integration with the local Active Directory. There are some gaps in terms of the local Active Directory through which Microsoft is syncing our environment from our data center. There should be the availability of custom attributes on Azure Active Directory. In addition, there should be the availability of security groups and distribution groups that are residing on the local Active Directory. Currently, they are not replicated on Azure Active Directory by default."
"Its area of improvement is more about the synchronization of accounts and the intervals for that. Sometimes, there're customers with other network challenges, and it takes a while for synchronization to happen to the cloud. There is some component of their on-prem that is delaying things getting to the cloud. The turnaround time for these requests is very time-sensitive. I don't mean this as derogatory for this service, but in my experience, that happens a lot."
"Microsoft services and most familiar third-party applications are currently supported, but we can't find many other platforms that integrate with Office 365 or Azure Active Directory. Microsoft should develop connectors for different applications and collaborate more with other vendors to cover a broader range of applications."
More ManageEngine Password Manager Pro Pricing and Cost Advice →
ManageEngine Password Manager Pro is ranked 16th in Single Sign-On (SSO) with 4 reviews while Microsoft Entra ID is ranked 1st in Single Sign-On (SSO) with 190 reviews. ManageEngine Password Manager Pro is rated 7.2, while Microsoft Entra ID is rated 8.6. The top reviewer of ManageEngine Password Manager Pro writes "An affordable solution with good tech support, but room for improvement in making the UI more user-friendly". On the other hand, the top reviewer of Microsoft Entra ID writes "Allows users to authenticate from home and has excellent integrations in a simple, stable solution". ManageEngine Password Manager Pro is most compared with Azure Key Vault, Fortinet FortiAuthenticator, HashiCorp Vault, BeyondTrust Password Safe and CyberArk Privileged Access Manager, whereas Microsoft Entra ID is most compared with Microsoft Intune, Google Cloud Identity, CyberArk Privileged Access Manager, Yubico YubiKey and Cisco Duo.
See our list of best Single Sign-On (SSO) vendors.
We monitor all Single Sign-On (SSO) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.