"The solution has some great features, such as identity governance, and user self-service. The Outlook application is very good and is used by a lot of people even if they are using Google services."
"It offers features that improve our security posture such as multifactor authentication, which is the second layer of protection that is used when we log into the cloud."
"Its ability to provide secure connections to people at all locations is the most valuable. It is mostly used by enterprises."
"The most valuable feature is that it is very easy to implement, you don't need a lot of effort to set up the solution. This is the most advantageous point, that you can do anything on Azure without taking too much time."
"The security features are great. They will report in advance to you in the case of suspicious activity."
"It enhanced our end user experience quite a bit. Instead of the days of having to contact the service desk with challenges for choosing their password, users can go in and do it themselves locally, regardless of where they are in the world. This has certainly made it a better experience accessing their applications. Previously, a lot of times, they had to remember multiple usernames and passwords for different systems. This solution brings it all together, using a single sign-on experience."
"Multi-factor authentication (MFA) has improved our customers' security posture. Multi-factor authentication has two layers of authentication, which helps in case you input your credentials into a phishing website and then it has access to your credentials. So if they use your credentials, then you have proof on your phone that was sent to the end user."
"This product is easy to use."
"It's reliable and it does what it is advertised to do."
"The most valuable features are ease of operation and visibility."
"The product requires very little maintenance."
"Its simplicity and its integration with various vendor-agnostic platforms are the most valuable features."
"Enabled MFA to access federated applications as well as increased user satisfaction through improved provisioning times and more reliable processes."
"We find the solution to be reliable for our customers and it is nice that it is cloud-based and can be accessed from anywhere."
"The support for YubiKey is really good because you don't actually have to type in your username and password."
"The most valuable features depend on a customer's needs. Our customers generally find multi-factor authentication very useful."
"It's very easy to implement everything."
"Some of the valuable features of the solution are the easy integration with processes, such as Single Sign-On. Overall WSO2 is straightforward and does not need customization."
"The Cloud Provisioning Agent cannot provision a lot of the information that AD Connect does. For starters, the lightweight version cannot synchronize device information. If you have computers on-premises, the information about them will not be synchronized by the Cloud Provisioning Agent. In addition, if you have a user on the cloud and he changes his password, that information should be written back to the on-premises instance. But that workflow cannot be done with the lightweight agent. It can only be done with the more robust version."
"Microsoft is working with Microsoft Identity Manager for Active Directory on-premise. It will be very important to have these identity management solutions directly in Azure Active Directory. It's very important to have some kind of Azure identity manager as a technology for identity and access management for working both in the cloud and inside the Azure suite."
"Technical support could be faster."
"From time to time it takes a little bit of time to replicate, with some of the applications—something like five to 10 minutes. I know that the design is not supposed to enable real-time replication with some of the applications. But, as an administrator, I would like to run a specific change or modification in Azure Active Directory and see it replicated almost immediately."
"The dashboard and interface could be better. It would be ideal if it was easier to use."
"The product needs to be more user-friendly."
"For example, there were some authentication features that, for security purposes, had certain limitations. Those limitations still exist, but the portal now has options so that the customers can make custom features to manage their identity."
"The monitoring dashboard could be a bit better."
"Application updates are lacking. Customer support needs to be improved."
"The pricing could be improved."
"The solution should have greater on-premises availability, not just cloud and more package customization in its processing."
"The lifecycle management part can be improved. It should also have identity governance and the ability to choose a specific factor authentication at the application level. Its licensing and pricing can also be improved."
"The solution can be quite expensive."
"SSO and MFA for improved end-user experience, and protection against password spray attacks, account password self-service."
"You can't hide the device when you're checking logs."
"The guest user access could be improved."
"The solution could improve its development from a user perspective."
"This solution does not have BPM workflows already integrated, we had to integrate the BPM module externally. They do not provide full-featured auditing and certification modules out of the box."
The Azure Active Directory (Azure AD) enterprise identity service provides single sign-on and multi-factor authentication to help protect your users from 99.9 percent of cybersecurity attacks. With Azure Active Directory, you get:
- Single sign-on enabling access to your apps from anywhere
- Conditional Access and multi-factor authentication to help protect and govern access
- A single identity platform to engage with internal and external users more securely
- Developer tools to easily integrate identity into your apps and services
To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.
Okta is an enterprise grade identity management service, built from the ground up in the cloud and delivered with an unwavering focus on customer success. With Okta, IT can manage access across any application, person or device. Whether the people are employees, partners or customers or the applications are in the cloud, on-premises or on a mobile device, Okta helps IT become more secure, make people more productive, and maintain compliance. Okta is an on-demand identity and access management service for web based applications, both in the cloud and behind the firewall.
WSO2 Identity Server can be used to simplify identity and access management (IAM) related activities in the enterprise. The product is based on open standards and open source principles. WSO2 Identity Server comes with seamless, easy to use integration capabilities that help connect applications, user stores, directories and identity management systems.
Okta Workforce Identity is ranked 2nd in Identity and Access Management as a Service (IDaaS) (IAMaaS) with 18 reviews while WSO2 Identity Server is ranked 5th in Customer Identity and Access Management with 2 reviews. Okta Workforce Identity is rated 8.4, while WSO2 Identity Server is rated 7.6. The top reviewer of Okta Workforce Identity writes "Stable and reliable solution but the application updates are lacking". On the other hand, the top reviewer of WSO2 Identity Server writes "Easy to implement with good customization capabilities and good security". Okta Workforce Identity is most compared with Google Cloud Identity, SailPoint IdentityIQ, Auth0 and Duo Security, whereas WSO2 Identity Server is most compared with Amazon Cognito, OpenIAM Identity Governance, SailPoint IdentityIQ, ForgeRock and Auth0. See our Okta Workforce Identity vs. WSO2 Identity Server report.
We monitor all Identity and Access Management as a Service (IDaaS) (IAMaaS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.