One Identity is an IGA tool for identity and access governance. One Identity has another product called Safeguard for privileged access management. Our organization is a startup, so we don't have any cloud applications in One Identity Manager. We manage the Active Directory, LDAP, JDBC applications, and CSV files.
Works at a comms service provider with 1-10 employees
It offers granular levels of control, but it's complicated to use and there are too many applications
Pros and Cons
- "I like how One Identity Manager is designed. We can control granular-level permissions. Compared to SailPoint and CyberArk, we can go granular in the access levels. We can control it at the table, column, and database levels. That's the power of One Identity."
- "I also find it difficult to add resources to the business roles because we have to use many options in One Manager for that. We have to add it to the IT shop so that the users can submit requests through the web portal, and we must generate that IT shop structure to add resources to the business. There is a lot of complexity in that."
What is our primary use case?
How has it helped my organization?
Realizing One Identity Manager's benefits takes some time because many organizations don't know the tool. It has to be pushed to the market. For big organizations that require more control over their data, such as pharmaceuticals and defense, it will be very successful compared to market competitors.
What is most valuable?
I like how One Identity Manager is designed. We can control granular-level permissions. Compared to SailPoint and CyberArk, we can go granular in the access levels. We can control it at the table, column, and database levels. That's the power of One Identity.
We can import business roles from a .csv or create them in the manager. It is easy to create as many roles as we want, and there is no limit to the resources we can assign to them.
What needs improvement?
One Identity's UI is fine once you get used to it, but it's a little harder to learn than its competitors. The font size is too small. You need bigger screens to host that application. The website and portal are fine, but the manager, designer, and other standalone applications used for management or configuration are too difficult to use. The UI should be easier to use, and they should reduce the number of standalone applications to three or four.
Customization is somewhat difficult in One Identity Manager. The problem is they're using VB.NET, which no one uses. There are no resources because One Identity isn't available on YouTube or any coaching institutes.
I also find it difficult to add resources to the business roles because we have to use many options in One Manager for that. We have to add it to the IT shop so that the users can submit requests through the web portal, and we must generate that IT shop structure to add resources to the business. There is a lot of complexity in that.
Buyer's Guide
One Identity Manager
September 2025

Learn what your peers think about One Identity Manager. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
869,832 professionals have used our research since 2012.
For how long have I used the solution?
I have used One Identity Manager for 16 months.
What do I think about the scalability of the solution?
It's an efficient tool for the enterprise level. There is no limit to the number of users. We can go from a hundred users to hundreds of thousands. It is based on the implementation level. We can add many servers to support the extension, but there are fewer resources in India because One Identity isn't a popular tool relative to SailPoint.
Which solution did I use previously and why did I switch?
I've used SailPoint. Compared to SailPoint, using One Identity is difficult and complex. You have to use many standalone applications to manage the target systems and for configuration and design, like custom implementation. With SailPoint, we don't need to use too many tools. It's all in the same product.
In One Identity, we need to use Launcher, Designer, and other tools, whereas SailPoint is completely web-based, and the UI changes based on permissions. But One Identity isn't like that. There are standard applications for administrative purposes, but the end users have a web interface where they log in and request access. SailPoint has a single web platform for administrators, developers, and users.
How was the initial setup?
One Identity Manager is mostly difficult to set up. I cannot say that it is easy to learn. It takes time to habituate to it and memorize where the options are. There are many options in a single tool. At the enterprise level, it takes between six to nine months to deploy, but it depends on the organization's size. Our organization has between 10,000 and 15,000 users, so we could complete the installation in six months.
For maintenance, we have to take care of the database. We must back that up and ensure there are connections between the database, One Identity Manager, and target systems. There is not much maintenance involved in One Identity Manager.
What other advice do I have?
I rate One Identity Manager eight out of 10.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner

Cyber security lead at a tech vendor with 10,001+ employees
It's easy to integrate SAP
Pros and Cons
- "It's role-based access control, and you can manage it. It's perfect for our customer's governance control."
- "One Identity should open the market with accessible training material and content so that more developers can be available. They have to improve their marketing strategy, partners, and vendors. One Identity should be attracting engineers to learn their product and get certified. They should have strong forums. They could have a certification program where any engineer can get certified. However, their overall approach is complex, which I do not prefer."
What is our primary use case?
One Identity Manager can handle all identity use cases.
What is most valuable?
It's easy to integrate SAP with One Identity. SAP has different modules, and you can manage users through the One Identity interface. Integrating through a stream connector is simple.
It's role-based access control, and you can manage it. It's perfect for our customer's governance control. One of my customers is using One Identity's PAM solution. It is a separate component and licensing model.
What needs improvement?
One Identity should open the market with accessible training material and content so that more developers can be available. They have to improve their marketing strategy, partners, and vendors. One Identity should be attracting engineers to learn their product and get certified. They should have strong forums. They could have a certification program where any engineer can get certified. However, their overall approach is complex, which I do not prefer.
The platform isn't very intuitive like the others, but One Identity Manager has migrated their review scripting to the Angular framework, so now it's good, and they're competing with others from the UI perspective.
One Identity Manager is a little complex from a development perspective. If you compare it to SailPoint, it is easy, but One Identity Manager has so many separate components that it is quite complex for development. And sometimes, we have seen some performance issues.
For how long have I used the solution?
I have used One Identity Manager for more than 10 years.
What do I think about the stability of the solution?
I rate One Identity Manager eight out of 10 for stability.
What do I think about the scalability of the solution?
One Identity is scalable.
How are customer service and support?
One Identity must improve its support because they have a very limited pool of engineers, and they're often occupied.
Which solution did I use previously and why did I switch?
I have used SailPoint.
What's my experience with pricing, setup cost, and licensing?
I rate One Identity seven out of 10 for affordability. It's reasonably priced.
What other advice do I have?
I rate One Identity Manager eight out of 10. It's more suitable for the enterprise level. I wouldn't recommend it for small or medium-sized enterprises.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
One Identity Manager
September 2025

Learn what your peers think about One Identity Manager. Get advice and tips from experienced pros sharing their opinions. Updated: September 2025.
869,832 professionals have used our research since 2012.
IT Engineer at a tech services company with 10,001+ employees
Allows us to apply the same governance coverage to all environments
Pros and Cons
- "One Identity's biggest benefit is application integration."
- "The identity governance components have some room for improvement, particularly the ability to terminate an employee's ID after leaving the company."
What is our primary use case?
We use One Identity to integrate our internal and external applications into SSO.
How has it helped my organization?
One Identity's biggest benefit is application integration. The solution allows us to apply the same governance coverage to all environments. It helps consolidate procurement. One Identity streamlines application access decisions. It allows the application team to choose the protocol the application will use. We can automate access control with One Identity, saving us time and money. The automation gives us a few errors, but it's manageable.
What is most valuable?
One Identity's interface is pretty good. It's user-friendly, and you can access most applications inside the console. The user experience is solid. You can use One Identity if you are a layman without much technical experience. You might need a little more training with admin access, but it's easy to learn.
What needs improvement?
The identity governance components have some room for improvement, particularly the ability to terminate an employee's ID after leaving the company. Customization can be difficult because One Identity uses specified attributes that we must use.
For how long have I used the solution?
We have used One Identity Manager.
What do I think about the stability of the solution?
I rate One Identity Manager eight out of 10 for stability.
How are customer service and support?
I rate One Identity support seven out of 10.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
Oracle Access Manager is comparable to One Identity. It's a good product.
How was the initial setup?
Deploying One Identity Manager took around half an hour. Three or four people were involved on our side, and the application team required our product manager and change manager. One Identity requires annual maintenance depending on the customer's requirements, and the number of people devoted to maintenance depends on your environment's size.
What was our ROI?
I estimate that the return on investment is around 40-50 percent.
What's my experience with pricing, setup cost, and licensing?
One Identity Manager isn't the best solution on the market, but it's cost-effective.
What other advice do I have?
I rate One Identity Manager seven out of 10. I would recommend One Identity to a small company. It requires minimum support because it's user-friendly, but you may need something more secure for a large-scale deployment.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Principal Architect at ING
Really strong for governance of users, data, and privileged accounts
Pros and Cons
- "There are a lot of valuable features, including connectors, attestations, and workflow."
- "It has problems with performance. This is a very serious issue for us. Other than that, it's really capable. The performance is what is missing. It's really poor."
What is our primary use case?
We use the solution for the management of identity and access identity, mostly for our employees.
How has it helped my organization?
It really helps in application access decisions, application compliance, and application auditing. That is what we mainly use it for: to have governance and compliance.
The solution has helped application owners make application governance decisions without IT. That's how we configured it. That has been a positive effect.
What is most valuable?
There are a lot of valuable features, including connectors, attestations, and workflow.
For the governance of users, data, and privileged accounts, it's really strong. It's really good, a 10 out of 10.
We also make use of its business roles to map company structures for dynamic application provisioning. That aspect is super important.
What needs improvement?
It has problems with performance. This is a very serious issue for us. Other than that, it's really capable. The performance is what is missing. It's really poor.
A second problem is the visibility in the search functionality. You don't have flexible search capabilities when you look for either roles or users. You cannot use multiple attributes. The search fields are very limited and that definitely needs improvement.
Also, the interface is really old. From that perspective, it's a six out of 10.
Another issue is that it is really difficult to customize it to our needs. If "10" is super-difficult, I would rate the customization at eight. When it comes to the options, it is super flexible. From that perspective, it is really strong.
For how long have I used the solution?
I have been using One Identity Manager for almost two years.
What do I think about the stability of the solution?
It's a stable solution.
What do I think about the scalability of the solution?
So far, it has been scalable when it comes to connecting new systems. When it comes to the performance of the tool, as I mentioned, if you want to have multiple users using it at the same time, it really lacks scalability.
We currently have around 60,000 users of the solution.
How are customer service and support?
I believe we use Premier Support. To be perfectly honest, we were not very happy about Premier Support, and it was escalated.
The answer we usually get is that something will be fixed in the next release, or the release after that. Sometimes they help, but most of the problems are not solved.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We had a previous solution, RSA, previously known as Aveksa, but it was not scalable enough for our needs, and it had internal bugs and problems.
We upgraded to One Identity mainly for the connectors. Because of the performance, we're struggling a little bit with One Identity. Other than that, it gives us what we need.
How was the initial setup?
Taking into account our requirements, the deployment had to be complex because we're a complex organization. In general, we have one central solution that is delivered to the entire organization. We operate in a tenant model where particular entities can manage their scopes of applications and roles.
We were super-fast in the deployment. It took us about one and a half years. But we migrated the previous solution into One Identity, so we had already built most of the structures. We also had the connectors and definitions.
We had 10 to 14 people involved.
There is a lot of maintenance, including patching, upgrading versions, implementing improvements, and building new functionalities. It includes the whole life cycle.
What's my experience with pricing, setup cost, and licensing?
I don't have access to how much we pay for licenses. That usually depends on how the company negotiates. But I believe the pricing is fair.
What other advice do I have?
We recently started connecting One Identity Manager to SAP. I'm not an expert on SAP, but it's not the main system that we're interested in. One Identity Manager connects SAP accounts to employees' identities under governance, but it's just in one of the countries where we operate, and it's not even the biggest one that is using SAP. It's critical for them, but our entire company is not based on SAP.
If you configure One Identity Manager and use it properly, it helps minimize holes in data coverage for test, dev, and production servers. But it usually depends on the coverage.
In terms of Zero Trust, that requires a lot of more things, not only One Identity Manager, and we don't use other products from them.
The performance problems are a pain point, but if I compare it to not having the solution in place, it really has a positive impact. One Identity Manager really can help you, but compared to our previous process, because of the performance issues, it is actually a little down from what we had before.
Overall, I would definitely recommend One Identity Manager because we were struggling previously with our other solution, which was a little bit worse.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
IIMB expert at a tech services company with 1,001-5,000 employees
Helps create a unified platform, is flexible, and offers numerous connectors
Pros and Cons
- "One Identity Manager is flexible and offers numerous connectors that enable us to serve as the core component of the system, as well as to construct our own connectors using the API."
- "One Identity Manager can be made more user-friendly for end users."
What is our primary use case?
We utilize One Identity Manager to oversee all the identities within the company, and we are constructing workflows to enable self-service keys for compliance and access matters.
How has it helped my organization?
One Identity Manager is the optimal solution for creating a unified platform for enterprise-level user administration and governance.
One Identity Manager provides a unified platform for managing both data and privileged accounts. We receive alerts for privileged access and, based on specific criteria, we can determine whether the request is for an end-user account or a privileged account, and apply the appropriate permissions seamlessly.
The user experience and interactivity of One Identity Manager are straightforward for non-IT individuals to utilize.
Customizing One Identity Manager is easy to do.
The business roles of the solution that maps company structures for dynamic application provisioning are important because they help our organization fulfill the needs of any employee automatically, based on the structure. This provides users with immediate access, eliminating the need for human intervention.
The ability of One Identity Manager to extend governance to cloud applications is of great importance because cloud applications have become a new tool in our society. Whether we use private or public clouds, every company will eventually have to transition to the cloud. Therefore, it is crucial to be able to manage all our access within a single platform, which is the best approach. Hence, we obviously require a platform that can connect to the cloud and also handle compromised applications, making it transparent for business use.
One Identity Manager's ability to automate tasks that previously required human intervention has benefited our organization by freeing up the time of our IT department to concentrate on other tasks.
The solution helps us minimize gaps in governance coverage among test, development, and production servers because we can provide access through any environment within the system, freeing up time for our business.
The solution has helped us create a privileged governance stance to close the security gap between privileged users and standard users. We can now view all the accesses from a single interface, which enables us to be proactive in our compliance efforts. Without One Identity Manager, we would have to depend on multiple tools and reports, which can sometimes be delayed. By utilizing One Identity Manager, we can establish preventive rules to avoid any SOC problems or on-the-fly access. While certain access can be granted without risk, it is crucial to have a clear overview, of which One Identity Manager provides.
One Identity Manager helps streamline application access decisions for both permissions and licenses. Using a web designer, we have designed routines that allow us to create disclaimers or automated questions. Based on the user's responses, we can propose either a free license or a pro license, depending on the specific case. Additionally, we have implemented routines to uninstall and deactivate licenses when they are not in use. However, this is always a challenging task because we want to ensure that users do not waste time if they need the software again. The fact that we can easily request any application through an automated process is advantageous. Furthermore, canceling a license does not significantly impact the business since it can be reinstated within minutes if needed again after a few months of not being used.
Streamlining application compliance and application auditing is essential. The single pane of glass visibility helps us maintain compliance, and for application auditing, we can utilize all the reports provided by the IT team. Additionally, we can conduct our own audit reviews and collect evidence to ensure that the process is followed without relying solely on the IT team. This approach aligns with our automation mindset, which we aim to introduce.
One Identity Manager facilitates application owners or line of business managers in making application governance decisions without involving IT. We can provide them with a view where they can see the individuals who have worked on it, the process of their request, and the validating authority, all without needing to inquire from the site.
One Identity Manager has assisted us in achieving an identity-centric zero-trust model through the implementation of various processes.
What is most valuable?
One Identity Manager is flexible and offers numerous connectors that enable us to serve as the core component of the system, as well as to construct our own connectors using the API.
What needs improvement?
One Identity Manager can be made more user-friendly for end users. Out of the box, it can be difficult to navigate through the drop-down menu, especially when it comes to accessing the subcategories.
For how long have I used the solution?
I have been using One Identity Manager for four years: two years as an integrator and two years as a user.
What do I think about the stability of the solution?
One Identity Manager is stable.
What do I think about the scalability of the solution?
I give the scalability of One Identity Manager a ten out of ten. We are able to scale no matter what. It's completely compatible with the S5 and can achieve load balancing on web servers. It can be integrated into a single database or a cluster for scalability. I can confidently say that if my company were to triple in size tomorrow, it could handle that. I don't have to install what I don't see. I just need to make some improvements to the database and convert it into a web server that will be accessible to users.
How are customer service and support?
If we experience a major incident in production, we can expect to receive a response within one hour. We find solace in knowing that any significant problems will be promptly addressed.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We had previously worked with Evidian Identity Governance and Administration, among others, but none of them provided all the features in a single solution, unlike One Identity Manager.
How was the initial setup?
The initial setup is complex. Every identity solution is complex because the most important thing is not really linked to the project. It's linked to the analysis we have made before, and then our solution is not linked to the project. Every time, I think that whenever we have to put the analysis management solution in place, it will be complex because we have to take care of the processes that are already in place and also what is happening in the same tool. We have to consider all the existing processes and challenge them to make them better. Many times, some processes are difficult because we couldn't execute them perfectly with the previous solution. So we have to be able to identify if the process is in place like this because of the previous solution that doesn't handle every aspect easily, or if it needs to be redone. The deployment took one year to complete.
We had two individuals from the integrator and two internal employees dedicated full-time to the deployment.
What about the implementation team?
The implementation was completed by our integration partner who provided us with an excellent expert from their team, even though the solution required additional personnel capable of integrating everything within one year. Overall, the experience was positive.
What other advice do I have?
I give One Identity Manager a nine out of ten. This is a solution I want to work with because it brings satisfaction to our users.
We have a complex environment with over 50 locations, various departments, and multiple companies, each with hundreds of distinct functions.
We have two individuals responsible for maintenance, updates, and access to integrators who can provide assistance if necessary. We have around 5,000 end users.
I recommend that organizations wishing to utilize One Identity Manager should first provide internal training for their employees. This approach will enable them to develop their own understanding of the company and reduce dependence on external integrators.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Architect at a consultancy with 1-10 employees
A cost-effective solution with a lot of depth and advanced features
Pros and Cons
- "It has a lot of depth. It has advanced features. As a customer or as someone who is managing the solution, I like its self-service capabilities where it has lots of powers, and the users can select any reference users."
- "There is no out-of-the-box or very easy way to configure processes to manage non-human accounts. The functionalities that we have built are totally customized on top of what One Identity provided out of the box. It would have been nice to see some out-of-the-box or plug-and-play features available for it."
What is our primary use case?
We are utilizing One Identity Manager as a provisioning engine. The main use case for us is to manage the identity life cycle of enterprise users in our context.
How has it helped my organization?
In my current role where I am managing this overall program, not only from the administration aspect but as the one whom all other departments reach out to with their request, one clear benefit is delegation. One aspect that I like about this solution is delegation. We have delegated administration in a way that we have access to new campaigns configured. This solution has a prebuilt option where we can configure campaign managers, and those campaign managers have a very nice prebuilt dashboard where they can monitor the campaign itself. That is very helpful. We can give these department's folks access.
Our identity landscape is very customized and unique. We are not only providing access for different users; we also have a huge set of non-human identities. We have a huge set of provisioned and service accounts. In our previous legacy solution, the issue that we were facing was that the solution was not very robust. We could not come up with some self-governed scenarios, such as moving the ownership of non-human identities, moving the ownership of service accounts based on the change in the managerial hierarchy, or based on users' movements within the organization. With One Identity, there are very good features that come prebuilt. For example, the department hierarchy within the One Identity solution helped us to build some automated logic, which was missing in the legacy solution. Other than the self-service features, there is also the ability to use ready-made capabilities and scale up on top of it. That was another reason to go for this solution at that time.
We make use of the solution’s business roles to map company structures for dynamic application provisioning. We use it quite heavily. In our context, we have two types of roles. We are using more of the requestable roles, not dynamic roles, and we also have dynamic role-based access control configured as per our organization hierarchy. We have defined entitlements and accesses that each department leverages. Accordingly, we have defined roles in our system.
The capabilities of this solution, in terms of out-of-the-box features and the ability for us to do customization on top of it, have helped us to come up with some automated processes, which were earlier taken care of manually by our staff. Whenever human intervention is involved, it is prone to error. It has helped us to bridge those gaps, which ultimately enhanced our governance score.
It has overall helped us to create a privileged governance stance to close the security gap between privileged users and standard users. With the processes that we had earlier, there were gaps in terms of changing the ownerships of privileged accounts and managing them in a way to have notifications in place. The majority of the stuff is provided out of the box to manage privileged accesses. Also, if you are a One Identity shop and have the Privileged Access Management product from One Identity, you are covered 100% out of the box. You do not have to do any customizations. If you are using any other tools for privileged access management, the product has very good features, which you can scale up and customize in your own context.
It has helped enable application owners or line-of-business managers to make application governance decisions without IT, but we are not using it that extensively for that. In terms of the product having features to do it, it has the features because we are using business roles where we have defined owners of business roles. Product-wise, there is out-of-the-box functionality for business owners to manage the membership. In this way, those lines of business owners are empowered to either revoke access or conduct a review on it. Earlier, with the legacy product, they were not able to do that because there was no such functionality.
In terms of user experience, once you get an understanding of the overall working of the product, it is not that difficult. There are so many underlying components within the product, and they are interlinked and working together. The initial impression is that it is just way too complicated for any developer to customize, but once you get familiar with how it is processing the information and how each box is working in silos, and what is the linkage in between, it makes sense. On a scale of ten, I would give it a seven. Three points to spare are for One Identity to enhance its documentation and maybe come up with more. They have a very good YouTube channel where they post content about One Identity. That is very helpful. However, in terms of explaining to new developers, there is room for improvement.
What is most valuable?
It has a lot of depth. It has advanced features. As a customer or as someone who is managing the solution, I like its self-service capabilities where it has lots of powers, and the users can select any reference users. The majority of the time, we face an issue where new joiners are not aware of what they need to have in order for them to do their job. One Identity has the answer where they can know this by selecting any reference users, which are basically their colleagues. This way, they can quickly know what sort of access they have in the system, and they can raise the same. The system will automatically identify it for them. It saves a lot of time and is also a very useful feature.
Another valuable aspect is the depth of the product. It allows the support team to reroute certain requests to different people, and within their request flow itself, you can ask questions. All these features are very helpful in our context.
What needs improvement?
There is room for improvement in terms of the ease of adding custom forms to onboard contingent workers. IT Shop is a great tool, specifically in terms of the self-service mechanism where it allows users to request different accesses. However, there are no prebuilt or easily customizable forms that developers can use to create onboarding forms for contingent workers. In most organizations, contingent workers do not have any authoritative source as HR. The majority of the time, the only authoritative source is the Identity Manager or the Identity Management department itself. I would love to see any enhancement in this regard. For user experience and intuitiveness, on a scale of ten, I would rate it an eight out of ten.
There is no out-of-the-box or very easy way to configure processes to manage non-human accounts. The functionalities that we have built are totally customized on top of what One Identity provided out of the box. It would have been nice to see some out-of-the-box or plug-and-play features available for it. However, the functionality was there, and we were able to scale up in terms of customization. Whatever we did was totally customized.
There should be some ready-to-use templates or utilities as the other Identity product providers have. There should be some sort of features that you can enable or there should be utilities that you can even purchase at extra cost. For example, it would be nice to see the utilities to manage privileged accounts or forms, onboarding forms, or other small things that different clients can leverage, even if it comes at a fraction of the cost.
The overall documentation needs improvement. This product has a lot of features, but people are not aware of it. The depth itself is still unknown.
Skilled resources are very difficult to find for One Identity, which leads us to the conclusion that there is very little certification or free information that users can just opt for and learn. In addition to the documentation, they should also provide more resources. Free training for partners would be nice because being a manager, it is very hard for me to locate skilled resources for this tool.
For how long have I used the solution?
I have been using this solution for a total of five years. I have worked with it for three years in a technical role and for two years in a managerial role where I am managing people who are directly and technically managing the solution.
What do I think about the stability of the solution?
It is very stable. We do not need to do anything even with patching. I would rate it a nine out of ten for stability.
What do I think about the scalability of the solution?
I would rate it a seven out of ten for scalability because I feel that the architecture of the product is such that you cannot have very effective active-to-active integration between the job servers.
How are customer service and support?
For critical issues, it is good because you can call them, but for the regular issues, I feel that there is a lack of skilled resources on their side.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We had another solution from a different vendor, and we replaced that solution with One Identity. We switched because of the self-service capabilities and advanced governance features, which were missing in the earlier solution.
Onboarding from authoritative sources and onboarding directly to One Identity Manager for contingent workers was never an issue for us, even with the legacy solution that we had earlier. The main use case for which we mainly deployed One Identity Manager and replaced the legacy solution was the self-service capabilities. There were limited self-service capabilities in the legacy solution. So, we brought this solution, which complemented the automated provisioning of users in a way that not only the solution is capable of automatically provisioning accesses based upon the policies and templates that we define in our system, but it also has very good features where it allows the end users to do many tasks by themselves. There is a self-service portal, which is called IT Shop in One Identity's terminology.
In terms of consolidation of procurement and licensing, we have not used any other solutions in such depth or so extensively. We still have one use case, which we had with the previous product as well, where we have all Oracle E-Business Suite accesses published on our self-service. The same flows are valid with One Identity as well. However, they are managing the POs and other things. That is still with the ERP itself. We have not gone to the extent of taking responsibility for the functionality of each responsibility within our identity management.
How was the initial setup?
It is deployed on-prem. Our project was not just a deployment. It was also replacing the legacy solution. It was quite a unique and complex project. It took us around eight months to complete it fully because we not only deployed it, we also replaced the whole solution, and we had many integrations in place.
It requires maintenance in terms of product upgrades and security patching. In terms of One Identity upgrades, every two years, we have to upgrade because the previous version is not supported. The other thing for every organization is infrastructure vulnerability patching, so it does require maintenance.
What about the implementation team?
The team that performed the deployment and did the migration had three people: two technical and one architect. The team that is currently managing includes one administrator, one architect, and one developer.
What's my experience with pricing, setup cost, and licensing?
It is cost-efficient compared to its competitors. It is cost-effective. I do not know about the other regions, but here in the Middle East, the competitors are almost double the price.
What other advice do I have?
I would recommend One Identity Manager in terms of value for money, but I would not recommend it in terms of skilled resources. If One Identity increases education, then it is a very good value product.
In terms of the extension of governance to cloud apps, we do have such a mechanism, but we are not directly connecting with any cloud apps. We follow our process. We do it through a proxy or some sort of data power or middleware tool. So, we do have some integration with cloud apps, but we have not used the new feature. I suppose they now have out-of-the-box connectors to connect with cloud apps, but we are not using that feature as of now because it requires a separate license. Unfortunately, we have a short budget on that ground. However, from what I heard from my developers, it is a very nice feature, and it is easy to connect, but we do not have the use case to validate.
Overall, I would rate One Identity Manager an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IDM Senior Engineer at a tech services company with 1,001-5,000 employees
Provides good performance, has a nice appearance, and helps minimize governance
Pros and Cons
- "The most valuable features are the behavior, configuration, and customization options."
- "Using dynamic business roles can degrade the performance of One Identity Manager."
What is our primary use case?
We utilize One Identity Manager to manage the employee lifecycle, provision user accounts, administer numerous systems, and maintain a web portal.
How has it helped my organization?
One Identity Manager's ability to consolidate tools helps simplify the administration process.
I would rate the UI nine out of ten. The performance and appearance have improved since the new portal was implemented.
With my experience and the help of the user community, customizing One Identity Manager is not difficult.
The business roles feature is easy to use.
We see the benefits of One Identity Manager within weeks of deployment.
One Identity Manager helps minimize governance gaps between test, development, and production servers. An administrator's experience typically correlates with increased ease of use.
One Identity Manager simplifies the process of determining application access. Integration is straightforward for standard systems like Active Directory or Exchange, but connecting custom web applications requires developing a connector, which is time-consuming but manageable for experienced programmers.
What is most valuable?
One Identity Manager is more reliable than other identity managers. The most valuable features are the behavior, configuration, and customization options.
What needs improvement?
Using dynamic business roles can degrade the performance of One Identity Manager.
I would like to have better documentation for configuring other Microsoft systems.
For how long have I used the solution?
I have been using One Identity Manager for almost four years.
What do I think about the stability of the solution?
One Identity Manager is stable. If it crashes, it is due to human error, not the solution itself.
What do I think about the scalability of the solution?
One Identity Manager's scalability depends on the use of other Microsoft systems, such as SQL and Windows servers.
How was the initial setup?
The deployment is straightforward. The deployment takes between one and two hours and requires one engineer. The overall implementation requires a team consisting of an architect, an analyzer, one or two programs, testers, and an engineer.
What about the implementation team?
We are integrators who implement One Identity Manager for our customers.
What other advice do I have?
I would rate One Identity Manager nine out of ten.
In most cases, the customer doesn't need to do any maintenance.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cyber Security Analyst at a tech services company with 10,001+ employees
A single platform that is customizable and user-friendly
Pros and Cons
- "One Identity Manager's account creation feature stands out as its most valuable functionality."
- "I would like One Identity Manager to offer an easier way for users to learn to use their new features."
What is our primary use case?
We operate in three regions and use One Identity Manager for identity governance.
How has it helped my organization?
One Identity Manager enables us to manage SAP systems efficiently. We can configure user settings and assign global and business roles, adding them to the directory regardless of their account activation status.
One Identity Manager integrates SAP accounts with employee identities. We can create accounts by importing job data into the server. However, if an employee's data is missing, we must input it first to create their profile.
One Identity Manager provides a single platform for enterprise-level administration and governance of users' data and privileged accounts.
The interface is intuitive, displaying all employee details and allowing for direct edits after account creation.
Customizing One Identity Manager is easy to do.
One Identity Manager allows us to manage business roles, including adding and removing them through the deployment flow sheet.
One Identity Manager is user-friendly, offering both ease of understanding and management. From a central console, we can apply both business and referral roles.
One Identity Manager helps to make procurement and licensing easier.
One Identity Manager helps us achieve an identity-centric zero-trust model.
What is most valuable?
One Identity Manager's account creation feature stands out as its most valuable functionality.
What needs improvement?
I would like One Identity Manager to offer an easier way for users to learn to use their new features.
For how long have I used the solution?
I have been using One Identity Manager for two years.
What do I think about the stability of the solution?
One Identity Manager is stable.
How was the initial setup?
The initial deployment of One Identity Manager was straightforward. We have three environments where we deploy the load sheets to servers in a top-down approach. For removal, we follow the same procedure in reverse order.
What other advice do I have?
I would rate One Identity Manager nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.

Buyer's Guide
Download our free One Identity Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: September 2025
Popular Comparisons
Microsoft Entra ID
SailPoint Identity Security Cloud
Omada Identity
Fortinet FortiAuthenticator
ForgeRock
Microsoft Entra ID Protection
CyberArk Identity
One Identity Active Roles
Microsoft Identity Manager
OneLogin by One Identity
Oracle Identity Governance
SAP Identity Management
EVOLVEUM midPoint
OpenText Identity Manager
Buyer's Guide
Download our free One Identity Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which one is best: Quest One Identity Manager or Forgerock Identity Management
- Looking for an Identity and Access Management product for an energy and utility organization
- Which Identity and Access Management solution do you use?
- What are your best practices for Identity and Access Management (IAM) in the Cloud?
- What are some tips for effective identity and access management to prevent insider data breaches?
- Which is the best legacy IDM solution for SAP GRC?
- Sailpoint IdentityIQ vs Oracle identity Governance
- OpenIAM vs Ping identity
- When evaluating Identity and Access Management, what aspect do you think is the most important to look for?
- What access management tools would you recommend to help with GDPR compliance?