Try our new research platform with insights from 80,000+ expert users

Microsoft Entra ID vs Oracle Identity Cloud Service comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 2, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Entra ID
Ranking in Identity and Access Management as a Service (IDaaS) (IAMaaS)
1st
Average Rating
8.6
Reviews Sentiment
7.0
Number of Reviews
266
Ranking in other categories
Single Sign-On (SSO) (1st), Authentication Systems (1st), Identity Management (IM) (2nd), Access Management (1st), Microsoft Security Suite (2nd)
Oracle Identity Cloud Service
Ranking in Identity and Access Management as a Service (IDaaS) (IAMaaS)
19th
Average Rating
7.6
Reviews Sentiment
7.1
Number of Reviews
8
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of December 2025, in the Identity and Access Management as a Service (IDaaS) (IAMaaS) category, the mindshare of Microsoft Entra ID is 22.9%, down from 29.8% compared to the previous year. The mindshare of Oracle Identity Cloud Service is 1.0%, up from 0.7% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity and Access Management as a Service (IDaaS) (IAMaaS) Market Share Distribution
ProductMarket Share (%)
Microsoft Entra ID22.9%
Oracle Identity Cloud Service1.0%
Other76.1%
Identity and Access Management as a Service (IDaaS) (IAMaaS)
 

Featured Reviews

JP
Senior Information Security Engineer at a financial services firm with 1,001-5,000 employees
Implementing seamless integration boosts secure access and supports Zero Trust
What I appreciate the most about Microsoft Entra ID is that it integrates seamlessly with all the Defender products and is easy to use. Microsoft Entra ID's integration capabilities influence our Zero Trust model by allowing us to enforce our Zero Trust model. Conditional access policies allow us to leverage Microsoft Entra ID to verify that devices signing in to our cloud services are coming from registered devices, and that people are passing all the other requirements we have in order to complete sign-on or conditional access policies. Since implementing Microsoft Entra ID, I've observed changes in the frequency and nature of identity-related security incidents. The organization already had it implemented when I arrived, and I've been working to enhance it. Better configuration of Microsoft Entra ID has allowed us to better protect our organization from threats. Having it alone isn't a solution, but ensuring proper configuration goes a long way in preventing future compromises. My company's approach to defending against token theft and nation-state attacks has evolved since implementing Microsoft Entra ID. We haven't experienced any known compromises from nation-state attacks, and implementing newer features gives me more confidence in our protection. Regarding device-bound passkeys in Microsoft Authenticator and our approach to phishing-resistant authentication, we are currently implementing Microsoft Entra ID certificate-based authentication. Adding a strong form of MFA is important as we found it to be the most cost-effective way. While other solutions might be equally or more secure, they are significantly more expensive. Having worked as an IT consultant mainly with the Microsoft stack across various industries, I have experience with different identity management solutions. Microsoft Entra ID remains the best option. The major advantages when comparing it to Okta include integration with Defender products, Defender for Identities' integration with conditional access policies, and insider threat management integration for blocking sign-ins based on risk factors. The enhancement of Microsoft Entra ID's implementation is relatively straightforward. My main concern is the occasional lack of documentation and the frequency of changes, which can make feature location challenging.
Amimesh Anand - PeerSpot reviewer
Senior Architect at a consultancy with 10,001+ employees
Offers single sign-on capabilities to users
Suppose you are totally dependent and have requirements where you have a cloud application or several applications for integration with the cloud. In that case, I will suggest the use of Oracle Identity Cloud Service. Oracle Identity Cloud Service has much scope for customization. If you have a high customization level, then I would suggest IAM. The tool's multifactor authentication capabilities are easy to implement. If a client has a banking system, they need a strong authentication service, and only a password is not required; the user has to authenticate via fingerprint, face recognition, or go for or any RSA token. Double authentication is required where the banking department has access to very critical applications, or else they cannot go ahead and give the password. It is very difficult to hack once you have MFA in place. You have to either give the print fingerprint or any RSA token, making it not so easy to hack the system. We suggest MFA to clients who have the most critical application with them. I recommend the tool for every client we have, but it depends on how they want to have it because some customers don't want to go for the cloud application, and they might be thinking about changing the cloud vendors. Suppose a company has some costs in mind, and if they have a large number of employees, like 50,000 or 1,00,000 users, then it will be costlier for them than having an on-prem tool, like IAM. If a customer has 5,000, 10,000, or 20,00 employees, Oracle Identity Cloud Service can be a cheaper tool than the IAM product. I will suggest Oracle Identity Cloud Service only for smaller organizations. The tool does not have any AI capabilities. I would recommend the tool to everyone. I rate the tool an eight out of ten.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The security and infrastructure management features are the most valuable ones for us."
"Microsoft Entra ID works well for scalability in my organization, as we have grown from 150 employees to 700 employees."
"With Azure Active Directory we were able to manage with different options the access for different users."
"Conditional access and Privileged Identity Management (PIM) are the most valuable features from a security perspective."
"We do not have to deploy lots of machines all over the place to run things as a service, which is how we like to deploy things, just as a service."
"The most valuable aspect of Microsoft Entra ID is its ability to integrate with other cloud applications."
"Microsoft Entra ID provides granular role assignments for Azure permissions or Azure AD roles. Using a privileged identity manager allows us to give specific access to certain groups of employees for a limited time. Entra's ability to integrate Azure Virtual Machines and security benefits has been exceptional, especially for managing infrastructure and applications."
"We have a complex scenario with several applications, and we're trying to achieve SSO for most of our applications, but some of our legacy applications don't support SSO or modern protocols. Our core applications are ready for SSO or to be federated. We've centralized our authentication process using Entra ID, so we can collect sign-offs from the users and filter using conditional access."
"Identity Cloud has simplified our migrations. Since we're primarily working with native Oracle solutions, we can adopt many features of Oracle Identity Cloud Management."
"Federation and Identity let us create users and send federation tools, giving the authentication and authorization to users. With the on-premise solution, I can do the installation, configuration, and integration of Identity Access Management. This gives us direct access. The integration with the single solution E-business suite is also very valuable."
"The most valuable feature is identity management."
"The APIs are well documented, which has allowed us to access the IDCS security applications in our custom APIs."
"The most valuable features are the high stability and good performance."
"Onboarding of new employees, consultants, and partners has rapidly increased. We reduced the time to onboard them and the ease of onboarding has been improved. Therefore, we recognize there has been efficiency which has been brought into our organization."
"The tool's most valuable feature is its single sign-on capabilities."
"The most valuable feature is the reduced maintenance burden for the client."
 

Cons

"I would like it if Intune could manage MacOS or iOS directly. Right now, we have to use a third-party solution."
"ESAE management, especially the admin tools, could be improved. It should be built in by the vendor, and I shouldn't have to add patches or updates to connect to my domain directly. It should be added by default. The price could be better."
"The workflow management for registering new applications and users could be improved."
"The solution was difficult to scale because the group's configuration was complex. I would rate the scalability level of Azure Active Directory a five out of ten."
"There is a lot of room for improvement in terms of its integration with the local Active Directory. There are some gaps in terms of the local Active Directory through which Microsoft is syncing our environment from our data center. There should be the availability of custom attributes on Azure Active Directory. In addition, there should be the availability of security groups and distribution groups that are residing on the local Active Directory. Currently, they are not replicated on Azure Active Directory by default."
"Generally, everything works pretty well, but sometimes, Azure Active Directory has outages on the Microsoft side of things. These outages really have a very big impact on the users, applications, and everything else because they are closely tied to the Azure AD ecosystem. So, whenever there is an outage, it is really difficult because all things start failing. This happens very rarely, but when it happens, there is a big impact."
"You can manage the users from the Office 365 administration center, and you can manage them from Azure Active Directory. Those are two different environments, but they do the same things. They can gather the features in one place, and it might be better if that place were Azure."
"I rate Microsoft support five out of 10. It's just okay."
"The initial setup was a little complex. At that time, the method of integration was a bit complicated due to the scripts that we were required to write for the integration."
"The tool doesn't have many out-of-the-box connectors for the target integration."
"Self Service features are still limited in IDCS, and there is a need for more customization of the self-service screens."
"We still see a lot of bugs in any of the versions that Oracle comes out with. So, there are a lot of bugs that need to be fixed."
"The IDs that are not used for a particular number of days should be disabled automatically."
"Oracle needs to improve the GUI and many other aspects of the cloud console. It isn't as slick as Azure, Google, or IWS cloud. The documentation could be better, too."
"The cost of this solution should be reduced."
"The protocol could be easier to use."
 

Pricing and Cost Advice

"It is good. We have Office 365 E3, and then that is tied in with Azure Active Directory. I believe that we only have to pay for our technician-level access or IT department access for Azure Active Directory Premium, which I am sure they call Entra Premium P2 licensing, so it is not a very large cost. We just adopted that, and that gives us a lot of insights into user security that we would not otherwise have."
"Most features of Entra ID are part of Microsoft's ecosystem and included in Microsoft 365 bundles, which means there are no additional costs associated with pricing and licensing."
"Make sure that you get the most out of your Office 365 licenses for Azure AD. If you have additional concerns for users who don't have an Office 365 license, consider Azure AD Premium P1 and P2. Be aware that you have to evaluate your license usage beforehand."
"Microsoft Entra ID service can be quite costly due to its hidden expenses linked to usage."
"Compared to other Microsoft products, the cost is not too expensive. There's a free tier available, though it doesn't include all features. Overall, it's well-priced."
"We have various levels of their licensing, which includes users on different levels of their enterprise offering."
"It can be a bit expensive for organizations, but they do have different pricing models. Their free tier can be used on a personal level, but for an organization, the licenses might be a bit expensive. In general, the licenses can become cheaper, which will make it accessible for more people."
"It's pretty good. We're using the native features. It's bundled with our Office 365 licenses. We aren't paying anything extra for Azure Active Directory. It's pretty good for us because it's complementary to Office 365. We're only paying for Office 365."
"The foundation tier that is offered with other cloud services subscriptions is fairly extensive and supports the use of identities, groups, and privileges in those cloud services."
"The tool's implementation costs totally depend on the number of users. The cost depends on how many users are going to use it, so a per-user cost model is needed for the tool."
"Our licensing costs are on a yearly basis."
report
Use our free recommendation engine to learn which Identity and Access Management as a Service (IDaaS) (IAMaaS) solutions are best for your needs.
879,259 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
11%
Computer Software Company
11%
Manufacturing Company
9%
Government
8%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business85
Midsize Enterprise38
Large Enterprise155
By reviewers
Company SizeCount
Small Business2
Midsize Enterprise1
Large Enterprise4
 

Questions from the Community

How does Duo Security compare with Microsoft Authenticator?
We switched to Duo Security for identity verification. We’d been using a competitor but got the chance to evaluate Duo for 30 days, and we could not be happier. Duo Security is easy to configure a...
What do you like most about Azure Active Directory?
It is very simple. The Active Directory functions are very easy for us. Its integration with anything is very easy. We can easily do third-party multifactor authentication.
What is your experience regarding pricing and costs for Azure Active Directory?
My experience with the pricing, setup costs, and licensing of Microsoft Entra ID is that it is decent.
What is your experience regarding pricing and costs for Oracle Identity Cloud Service?
The tool's implementation costs totally depend on the number of users. The cost depends on how many users are going to use it, so a per-user cost model is needed for the tool.
What needs improvement with Oracle Identity Cloud Service?
The tool doesn't have many out-of-the-box connectors for the target integration. The connectors are very small and don't have much customization scope. If we talk about the IAM tool from Oracle, it...
What is your primary use case for Oracle Identity Cloud Service?
I use the solution in my company as it is the same version of the tools' IAM product but on the cloud. If we look at IAM before, there is AAM, which is adaptive access management, which was discont...
 

Also Known As

Azure AD, Azure Active Directory, Azure Active Directory, Microsoft Authenticator
No data available
 

Interactive Demo

Demo not available
 

Overview

 

Sample Customers

Microsoft Entre ID is trusted by companies of all sizes and industries including Walmart, Zscaler, Uniper, Amtrak, monday.com, and more.
Valuecube, Doosan Heavy Industries & Construction, Ricoh
Find out what your peers are saying about Microsoft Entra ID vs. Oracle Identity Cloud Service and other solutions. Updated: December 2025.
879,259 professionals have used our research since 2012.