The primary use case is the JML role-based access provisioning and access re-certification.
We don't use the solution exactly for SAP, but for provisioning and reconciliation. We manage an integrated environment. We use SAP as one of our information sources. Although SAP is one of our trusted sources, it is not an authorized source.
One Identity Manager connects SAP accounts to employee identities under governance which is important for our organization.
The solution delivers SAP-specialized workflows and business logic. The good part is the customization; whatever way we customize the solution, the product is superb. But at the same time, complexity can be difficult because if we do a lot of customization, it's not easy for the new team to think exactly the same way as someone who has implemented the solution.
We use the solution's business roles to map company structures for dynamic application provisioning.
We use the solution to extend governance to cloud apps. I don't have real-time experience with One Identity Manager Cloud One. I believe the solution extends governance to cloud apps because some of our cloud-based target systems are currently integrated, including Azure. I don't see any challenges, and One Identity Manager seems to be functioning smoothly.
The solution has improved the way our organization functions. In the latest version, some of the basic challenges and bugs have been improved. One Identity Manager is definitely one of the most robust enterprise identity manager platforms. One of the advantages is the cost-effectiveness of the solution. The solution is also a light-based application, has easy-to-manage infrastructure, and an easy-to-use UI. The reporting features and auditing features are all up to the mark. There are no issues, no security concerns, or risks. The risk handling is up to par, with features like managing privileged systems and accounts. This makes it a safe and reliable choice for businesses.
The solution helps us minimize gaps in governance coverage among testing, development, and production servers. One Identity Manager provides a number of out-of-the-box tools to help migrate the solution from one environment to another. This makes it easy to transport our package from the development environment to the testing environment to the production environment.
It helped us create a privileged governance stance to close the security gap between privileged users and standard users. One Identity Manager is a data-based application that provides a large scope compared to other IGA products such as SailPoint and Saviynt. The solution separates the identifier between the privilege and standard account as well as access certification, auditing, and reporting.
One Identity Manager is compliant with our business requirements regarding procurement and licensing consolidation.
The solution helps streamline application governance and application access decision compliance. One of the benefits of using the solution to certify privileged accounts and users is that it minimizes risk. This is done by applying proper governance, which is something that is needed in any organization.
The solution helps enable application owners or line of business managers to make application governance decisions without IT.
One Identity Manager helped us to achieve an identity-centric zero-trust model through risk minimization and segregation of duties.
We have Premier support services. If there's any product work or product limitation based on the requirements or any new challenges that come up, we can access the Premier support services, but we need to opt in.
Premier support has added value to our overall investment. We have a weekly follow-up call with their support team.
Having Premier support has influenced us to purchase additional licenses and products from the vendor. We also use Password Manager.
The most valuable feature is the JML. Unlike other identity manager tools, the JML is more customizable, making it easier to find.
The solution provides IGA for the difficult-to-manage aspects of SAP such as T-codes profiles.
It provides a single platform for enterprise-level administration and governance of users' data-privileged accounts. We have end-to-end JML features, including role-based access provisioning, access certification, and reporting. One Identity Manager is a very good platform, especially for those who have been working with it for the last two or three years. They are likely to be very happy with it.
Another good feature of One Identity Manager is its multi-language support. I give the solution a seven out of ten for its single platform feature.
One Identity Manager has an intuitive interface that is customizable.
One Identity Manager needs to come up with many more out-of-the-box connectors, similar to Workday and ServiceNow. There's a scope for One Identity Manager to improve itself.
The reporting feature should be improved similarly to other IGA products.
Unlike other solutions, One Identity Manager doesn't have a strong support team.
I consider One Identity Manager as a niche solution because we have a demand for it, but we can't find the proper skill set in the market. That is the highest pain point with this solution. Other vendors, such as SailPoint, Saviynt, and even Oracle and IBM, reach out to people to provide materials and make them aware of their products. This leaves One Identity Manager at a disadvantage.
I have been using the solution for four years.
Technical support needs some improvement.
The initial setup is straightforward. There are more than 20 components. It takes almost eight hours to deploy.
It is deployed in our customer environments. We monitor around 300 thousand identities.
We require over 50 administrators.
The implementation is done in-house with the help of our team.
One Identity Manager's pricing is one of its strong points. It is very reasonable compared to other IGA solutions. The licensing cost is per user.
I give the solution a six out of ten.
I have worked with similar solutions such as Oracle One, CA, RSA, SailPoint, and IBM. Other identity manager platforms mostly use Java J2EE-based frameworks. The challenging part with One Identity Manager is that it uses the .NET Framework, for example, VBScript. It's a struggle to find the properly skilled resources in the market. VBScript is considered a niche skill right now.
One Identity Manager seems to be lagging behind its competitors in terms of its out-of-the-box connectors. Almost every other identity manager product has connectors for a variety of applications, such as ServiceNow, Workday, and SAP, but One Identity Manager does not. The auditing and reporting modules of the solution definitely need to be improved. It needs to be more intuitive for business people, especially those who don't deal with IT.
Each solution has its own pros and cons. Oracle has a little heavier deployment compared to One Identity Manager. However, when compared to other vendors' solutions - such as Saviynt or SailPoint that can be deployed within two to three hours, One Identity Manager requires a full day.
The amount of maintenance required for the solution depends on the type of implementation.
One Identity Manager is good for organizations looking for multilingual support, low-cost, and highly customizable solutions.
The underlying technology of the UI is going to change. One Identity Manager is moving from VBScript and HTML to Angular with the latest version.