No more typing reviews! Try our Samantha, our new voice AI agent.

Microsoft Entra ID Governance vs Okta ISPM comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Entra ID Governance
Average Rating
7.8
Reviews Sentiment
6.3
Number of Reviews
14
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (9th)
Okta ISPM
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
Identity Security and Posture Management (ISPM) (9th)
 

Mindshare comparison

Microsoft Entra ID Governance and Okta ISPM aren’t in the same category and serve different purposes. Microsoft Entra ID Governance is designed for Identity and Access Management as a Service (IDaaS) (IAMaaS) and holds a mindshare of 3.2%, up 1.5% compared to last year.
Okta ISPM, on the other hand, focuses on Identity Security and Posture Management (ISPM), holds 2.4% mindshare, up 0.5% since last year.
Identity and Access Management as a Service (IDaaS) (IAMaaS) Mindshare Distribution
ProductMindshare (%)
Microsoft Entra ID Governance3.2%
Microsoft Entra ID16.1%
Okta Platform9.2%
Other71.5%
Identity and Access Management as a Service (IDaaS) (IAMaaS)
Identity Security and Posture Management (ISPM) Mindshare Distribution
ProductMindshare (%)
Okta ISPM2.4%
Saviynt Identity Cloud26.2%
Veza22.1%
Other49.3%
Identity Security and Posture Management (ISPM)
 

Featured Reviews

AmitRathod - PeerSpot reviewer
Senior Analyst at Toll Group
Automated access governance has strengthened security and supports user-centric approvals
The workflows such as joiner, mover, and leaver work in Microsoft Entra ID Governance. Entitlement Management is a bundle of resources where Microsoft Entra ID applications, groups, and SharePoint sites are packaged into a single package so that users can request it. This is one of the great features for Microsoft Entra ID Governance. Another feature is Access Review, which allows an automated schedule to be managed for the manager or resource owner so that they can verify whether people still need access. Privileged Identity Management is another feature for governance that provides just-in-time (JIT) access for administrative roles. For example, instead of being a permanent or global admin, which is a major security risk, an IT professional is eligible for the role and must request four hours of access only when they need to perform a specific task. There is a feature called access package. If any user wants particular application access, they can request this application via Microsoft Entra ID Governance access package. Whenever an end user makes a request, the access goes to one application manager and their current line manager. If they approve it, then they get the application access. This is a very good feature for user-centric purposes. Microsoft Entra ID Governance includes securing AI agent identity. As a company uses more AI generation such as Copilots or custom bots, those bots need their own identity just as employees do. Microsoft Entra now provides a way to assign unique identities to AI agents so you can control what data they can access. Microsoft Entra ID Governance protection now looks for risky behavior in AI agents. If a bot suddenly tries to download an unusual amount of data or unconscious data, it can detect this as a risk detection factor. Security Copilot allows Entra administrators to manage identity with natural language. Microsoft Entra ID Governance has protection and authentication features. Smart risk detection protects and analyzes to detect threats such as impossible travel. If a person is logging in from many different locations, it detects this as a risk factor. A user cannot use an unauthenticated password or log in from an incompatible device. These AI features are used in conditional access management in Microsoft Entra ID Governance. Automation is used for user onboarding, user offboarding, and user update processes through user lifecycle management. If an organization uses Workday as an HR application where new users join and fill in their details, all these details get reflected into Workday and then reflected into Active Directory as well as Microsoft Entra ID Governance. This automation helps to manage the day-to-day user onboarding process, user offboarding process, and user update process. Microsoft Entra ID Governance automation also helps with password-related tasks, access recertification, and reporting.
Use Okta ISPM?
Leave a review
report
Use our free recommendation engine to learn which Identity and Access Management as a Service (IDaaS) (IAMaaS) solutions are best for your needs.
892,611 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
10%
Government
10%
Financial Services Firm
9%
Comms Service Provider
8%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business2
Midsize Enterprise2
Large Enterprise10
No data available
 

Questions from the Community

What do you like most about Microsoft Entra ID Governance?
The most valuable feature of Microsoft Entra ID Governance is access reviews.
What needs improvement with Microsoft Entra ID Governance?
There is one feature that I do not prefer. If a manager approves access for a particular user and wants to change their decision about whether the user should retain access or not, once they approv...
What is your primary use case for Microsoft Entra ID Governance?
I use Microsoft Entra ID Governance for identity and access management as well as access recertification. The workflows such as joiner, mover, and leaver work in Microsoft Entra ID Governance. Enti...
Ask a question
Earn 20 points
 

Overview

Find out what your peers are saying about Microsoft, Okta, SailPoint and others in Identity and Access Management as a Service (IDaaS) (IAMaaS). Updated: April 2026.
892,611 professionals have used our research since 2012.