* Allow end users to reset AD password by either answering security questions or by generating OTP
* Reduce load on helpdesk
* Allow end user self-service outside office hours by allowing access to self-service portal from outside corporate network
* Allow end users to reset AD password by either answering security questions or by generating OTP
* Reduce load on helpdesk
* Allow end user self-service outside office hours by allowing access to self-service portal from outside corporate network
It allows end-users to reset their password by generating a one-time password (OTP) that they receive on their mobile. They're not dependent on the help desk. They can do self-service from anywhere in the world. So, if they're traveling, they can still reset their password or change the password. They are not locked out of their account at any given time.
The OTP part and self-service are most valuable. You are not dependent on the help desk people.
It does have advantages over the other products that we are seeing. Other products don't have the out-of-the-box OTP option, whereas One Identity Password Manager has the out-of-the-box OTP option. It also has a cloud-based solution for generating OTPs. So, the customers can either opt for their own SMS gateway, or they can use the One Identity OTP option where they don't have to have an SMS gateway. With other products, customers must have their own SMS gateway.
One Identity Password Manager also has the option to synchronize the password with any connected application. For example, if there is an Oracle application or any other application, there is an option of synchronizing. Once the Active Directory Password is reset, you can synchronize the password with connected applications, so you don't have to separately reset the password in connected applications. I haven't come across this feature with any other solution.
If there is a self-service option to update the mobile number, it will be much more useful.
If possible, there should be an option for the cloud password reset and synchronization of the password to the cloud.
I have been using this solution for more than 17 years.
It is very stable.
It is based on the Windows platform, so it is very easy to scale. It is suitable for small, medium, and large enterprises.
Their support is pretty good. I would rate them a nine out of 10.
Its initial setup is simple. A plain vanilla implementation could take a day to be up and running. This duration can vary if a customer has requirements for different password policies and different roles.
It doesn't require any maintenance.
Its price is on the cheaper side. It has a perpetual license, and everything is included in the license. You only have to pay separately for the SMS gateway or the OTP part.
It is suitable for all enterprises where end-users have to call the help desk people for resetting or changing the password and unlocking the account. If you try the wrong password three or four times, the account gets locked. In that case, an end-user needs to call the help desk people. On top of that, the help desk is not able to verify whether the end-user is the right person.
One of the requirements that many organizations have but don't know how to implement is validation. If I call by your name or some other person's name, the help desk people will allow me to reset the password. Validation is very important. You can implement validation easily in Password Manager. If you go with the OTP option, then you don't even need validation. The end-users will get an OTP on their mobile, and then they can reset the password.
I would rate One Identity Password Manager a nine out of 10.
The primary use case for One Identity Password Manager is for a user to reset the password himself. For example, if the end-user goes on vacation or emergency leave, after some time when that user returns to work, he could forget his password. That end-user can ask the system administrator or Active Directory administrator to reset the password because there's a way for the administrator to crack the password for the user. Still, if the user has One Identity Password Manager, he can reset the password by answering a few questions correctly. He'll be able to answer the questions if he sets the questions on One Identity Password Manager before the password reset.
Implementing One Identity Password Manager is better because it can provide better security. For example, the administrator could reset the password without knowing whether the person requesting the password reset was the actual user and not a scammer.
What I found most valuable in One Identity Password Manager is its easy use. It's a flexible solution.
I also like that One Identity Password Manager supports many languages, including Arabic. Here in the Middle East, some users like a user interface in Arabic, which makes it easier and better to deal with. Arabic language support is one of the good points of One Identity Password Manager, at least for users here in the Middle East.
An area for improvement in One Identity Password Manager is the management gap since Quest is no longer under Dell and One Identity is under Quest. The management gap resulted in poor support because it created disconnections between my company and One Identity. After all, my company used to deal with the Dell team, so right now, support for One Identity Password Manager needs improvement.
My familiarity with One Identity Password Manager started six years ago. Still, recently, my company proposed One Identity Password Manager to a customer for password reset in case a user forgets his password.
Overall, One Identity Password Manager is a stable solution.
One Identity Password Manager is a scalable solution.
On a scale of one to five, I'd rate the technical support for One Identity Password Manager as four. Because of the product rebranding, there's a small gap in the support provided, which needs improvement.
One Identity Password Manager was easy to implement at least seven years ago. The process could still be easy today, but I have yet to see how it's implemented.
How long the deployment of One Identity Password Manager takes would depend on prerequisite readiness on the customer side. Sometimes, the customer says the prerequisite is ready, but when you go to the site, only fifty percent is prepared, so that causes some delay in the implementation.
The licensing for One Identity Password Manager depends on the customer's requirement. For example, it could be one year, or it could be three years.
In general, One Identity Password Manager is not an expensive product. Pricing for it is competitive.
My company is not an end user or customer of One Identity Password Manager. It's a reseller. My company resells One Identity Safeguard, One Identity Privileged Access Management, and One Identity Password Manager to customers.
The latest version of One Identity Password Manager will be implemented for the customer, though the implementation has yet to start because the customer requested the vendor to implement it.
I'm not sure if One Identity Password Manager has a cloud deployment, but the customer requested an on-premise deployment.
One person is enough to deploy and maintain One Identity Password Manager. It may not be a big solution, but it's helpful.
I would recommend One Identity Password Manager to others because it's a good solution and helpful. However, it would be best if you didn't use it as your main product in terms of network security. It would be best if you had your primary security solutions for your network infrastructure while One Identity Password Manager is your second priority or second-level solution. It's not a high-priority solution. You can bring this into your network later, but it's also an essential solution. You should implement high-priority security solutions first, then One Identity Password Manager after.
Based on my experience, I'd rate One Identity Password Manager as eight out of ten.
My company is a silver partner of One Identity Password Manager.
