We performed a comparison between LastPass and Microsoft Entra ID based on real PeerSpot user reviews.
Find out in this report how the two Single Sign-On (SSO) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It's always hard to put a value on return on investment. You avoid one breach and it's paid for a million times over. We got a penetration test company internally, just to see how secure our network is, and there happened to be one bit of software that had been overlooked by an external company that managed it. It hadn't been upgraded so that managed to get them into the network. They would've been able to access through the test thing a file that we had previously. If that was a real-life scenario they would have been able to get into our network and get full access to our organization's passwords. If they did get in, they would have gotten access to the cloud. The ROI we see is that we are completely secured compared to what we had previously where there was a vulnerability."
"Tech support has been good. We haven't needed it much, because it is not a complex application. There is not that much you have to do with it."
"Reduction in number of sensitive passwords stored insecurely on local systems."
"This product helps keep us secure."
"The initial setup for this process is straightforward and extremely easy. It just works."
"The most valuable feature is the liberty of keeping encrypted passwords and elevated information in a sealed vault."
"Off-boarding of people is easy without changing shared account passwords."
"It is easy to use."
"The scalability is good now, and I find it to be more stable and faster since scaling up to ESX."
"It's pretty easy to implement."
"If you want to replicate a website at the frontend in Azure, it's very easy to do it globally."
"It's multi-tenant, residing in multiple locations. The authentication happens quickly. Irrespective of whether I'm in Australia, the US, India, or Africa, I don't see any latency. Those are the good features that I rely on."
"The portal version of the Azure active directory is pretty robust."
"With Azure Active Directory we were able to manage with different options the access for different users."
"Azure Active Directory's single sign-on feature has been helpful because users don't need to authenticate again and again each time they access it. Users only need to sign in the first time, and Azure handles everything. We haven't experienced any errors or security-related issues in the past four years. Many people use our protection servers from outside, requiring multi-factor authentication. Each authentication is logged precisely."
"The most valuable feature of the solution is its ability to delegate roles to each individual resource, which is great."
"I also don't like the add-in for Internet Explorer and Google Chrome, because when you do the add-in, you can actually save that to your credentials in your IE, and the problem is, if I left my screen open, or any of the IT people leave their screen open someone could come up and access all their credentials in LastPass without having to put a password in within your own network. I don't like that functionality. We've banned that from any of our staff adding that as an add-in because we see that as a security risk."
"We have issues from time to time where, for some reason, it just keeps auto logging-out the user and then, the next day, they'll come in and it will work just fine."
"One thing I wish LastPass had is an integration with Active Directory, not for synchronizing users but to actually manage, in some way, privileged accounts by replacing the password of LastPass itself."
"It is not super feature laden. It does not stand out versus the competition."
"The ability to set up an account expiration limit/date would be very useful."
"The biggest thing is there is no good way to have LastPass rotate passwords without human intervention. Right now, we have to go into each folder, then rotate and manually update each password. It can be done it by loading a bunch of passwords into a spreadsheet, but this makes the whole process insecure because then the passwords have been noted into a spreadsheet which have to be upload. We have to go into 40 to 50 applications and manually update passwords, because we don't view their solution of writing a bunch of passwords on a spreadsheet, then uploading them as a secure solution. This should be done internally within LastPass."
"The management through the plugin is poor. It consumes tons of client resources especially as an administrator."
"Its user interface should be better, and there should probably be more information about scalability."
"There is no great solution in the cloud for Conditional Access authentication and RADIUS-type authentication."
"The Cloud Provisioning Agent cannot provision a lot of the information that AD Connect does. For starters, the lightweight version cannot synchronize device information. If you have computers on-premises, the information about them will not be synchronized by the Cloud Provisioning Agent. In addition, if you have a user on the cloud and he changes his password, that information should be written back to the on-premises instance. But that workflow cannot be done with the lightweight agent. It can only be done with the more robust version."
"We would like to see more system updates."
"Certain aspects of the user interface can be rather clunky and slow. It can sometimes be circular in terms of clicking a link for a risky user sign-in and seeing what the risky login attempts were. It takes you in a circle back to where you started, so drilling down into details, especially if you are not in it every day and it is one of many tools that you use, can be difficult. It can be difficult to track down the source of an issue."
"Microsoft is working with Microsoft Identity Manager for Active Directory on-premise. It will be very important to have these identity management solutions directly in Azure Active Directory. It's very important to have some kind of Azure identity manager as a technology for identity and access management for working both in the cloud and inside the Azure suite."
"Microsoft Entra ID's impact on access and identity management is relatively limited."
"There are issues using it with ADFS."
"Azure AD needs to be more in sync. The synchronization can be time-consuming."
Earn 20 points
LastPass is ranked 22nd in Single Sign-On (SSO) while Microsoft Entra ID is ranked 1st in Single Sign-On (SSO) with 190 reviews. LastPass is rated 7.4, while Microsoft Entra ID is rated 8.6. The top reviewer of LastPass writes "Straightforward to set up, good support, intuitive to use, and offers good value for the cost". On the other hand, the top reviewer of Microsoft Entra ID writes "Saves us time and money and features Conditional Access policies, SSPR, and MFA". LastPass is most compared with Azure Key Vault, BeyondTrust Password Safe, HashiCorp Vault, Keeper and Devolutions Password Hub, whereas Microsoft Entra ID is most compared with Microsoft Intune, Google Cloud Identity, CyberArk Privileged Access Manager, Ping Identity Platform and Okta Workforce Identity. See our LastPass vs. Microsoft Entra ID report.
See our list of best Single Sign-On (SSO) vendors.
We monitor all Single Sign-On (SSO) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.