We performed a comparison between Microsoft Entra ID and RSA Adaptive Authentication based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Cisco, Fortinet and others in Authentication Systems."It is a really nice tool and we have a license for the more complex model."
"Application integration is easy. MFA and password self-service have reduced most of the supportive work of IT. We use multi-factor authentication. Every access from a user is through multi-factor authentication. There is no legacy authentication. We have blocked legacy authentication methods. For people who use the MDM on mobile, we push our application through Intune. In a hybrid environment, users can work from anywhere. With Intune, we can push policies and secure the data."
"The technical support is pretty good."
"It's pretty easy to implement."
"All of the features are amazing, such as identity governance and privileged identity management."
"The visibility and control for permission management are excellent."
"Azure is the leading market solution because of its history, features, and maturity."
"Conditional access is a very important feature where a specific user can be restricted such that they cannot connect to the application if they travel outside of the US."
"Risk Engine’s risk score, eFN, GeoIP, and device binding all coming together in the Policy Rules to decide when to escalate to MFA."
"The capability to manage your business policy related to security when required without vendor involvement."
"Our customer are seeing value from the product, as they experience cost reductions. They can stop fraud from their customers, then their customers can have a better experience from their services."
"The most valuable feature is the stock tokens. That works the best for us."
"Ingestion of logs and raising alert space on those logs are the most valuable features."
"The solution has certain limitations. For example, it has very little governance functionality."
"When you start to deal with legacy applications, provisioning is not as intuitive."
"The robustness of the conditional access feature of the zero trust strategy to verify users is adequate but not comprehensive."
"The onboarding process for new users can be improved. It can be made simpler for people who have never registered to Azure AD previously and need to create an account and enable the MFA. The initial setup can be made simpler for non-IT people. It should be a bit simpler to use. Unless you get certifications, such as AZ-300 and AZ-301, it is not a simple thing to use at the enterprise scale."
"Microsoft needs to make improvements in this regard and extend its services to other operating systems as well, especially when considering their widespread usage."
"Allowing for more customization would be very useful. There is a limited metadata capability. When you look at a user, there are only six pieces of information you can see, but organizations are way more complex, so having that metadata available and being able to use that for dynamic user groups and other policies would be very helpful."
"The security policy of Azure Active Directory should be based on a matrix so that we can easily visualize which users have access to what."
"One thing that bothers me about Azure AD is that I can't specify login hours. I have to use an on-premises instance of Active Directory if I want to specify the hours during which a user can log in. For example, if I want to restrict login to only be possible during working hours, to prevent overtime payments or to prevent lawsuits, I can't do this using only Azure AD."
"RSA Adaptive Authentication lacks a mechanism to verify the identity of a new user in the Enrollment event workflow."
"Reporting modules is one of the major areas that can be improved further."
"It has taken years to implement."
"The product is basically unusable. We need better ease of use; it's overly complicated."
"I would like to see a more adaptive type of solution, something that we could use on our web pages..."
"Better filters when searching for events. The current features for current filters when searching fraud events are not very comprehensive. You can only filter by certain fields in the transaction."
Earn 20 points
Microsoft Entra ID is ranked 1st in Authentication Systems with 190 reviews while RSA Adaptive Authentication is ranked 25th in Authentication Systems. Microsoft Entra ID is rated 8.6, while RSA Adaptive Authentication is rated 6.8. The top reviewer of Microsoft Entra ID writes "Allows users to authenticate from home and has excellent integrations in a simple, stable solution". On the other hand, the top reviewer of RSA Adaptive Authentication writes "It stops fraud in banks and reduces their costs". Microsoft Entra ID is most compared with Microsoft Intune, Google Cloud Identity, CyberArk Privileged Access Manager, Yubico YubiKey and Cisco Duo, whereas RSA Adaptive Authentication is most compared with RSA Authentication Manager, ThreatMetrix, Fortinet FortiAuthenticator and IBM Trusteer.
See our list of best Authentication Systems vendors.
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.