Try our new research platform with insights from 80,000+ expert users

Google Cloud Identity vs Microsoft Entra ID comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Feb 8, 2026

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Google Cloud Identity
Ranking in Identity and Access Management as a Service (IDaaS) (IAMaaS)
8th
Average Rating
7.6
Reviews Sentiment
6.6
Number of Reviews
26
Ranking in other categories
Enterprise Mobility Management (EMM) (10th), Cloud Resource Access Management (5th)
Microsoft Entra ID
Ranking in Identity and Access Management as a Service (IDaaS) (IAMaaS)
1st
Average Rating
8.6
Reviews Sentiment
7.0
Number of Reviews
266
Ranking in other categories
Single Sign-On (SSO) (1st), Authentication Systems (1st), Identity Management (IM) (2nd), Access Management (1st), Microsoft Security Suite (2nd)
 

Mindshare comparison

As of March 2026, in the Identity and Access Management as a Service (IDaaS) (IAMaaS) category, the mindshare of Google Cloud Identity is 10.7%, down from 11.4% compared to the previous year. The mindshare of Microsoft Entra ID is 18.5%, down from 29.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Identity and Access Management as a Service (IDaaS) (IAMaaS) Market Share Distribution
ProductMarket Share (%)
Microsoft Entra ID18.5%
Google Cloud Identity10.7%
Other70.8%
Identity and Access Management as a Service (IDaaS) (IAMaaS)
 

Q&A Highlights

ID
Owner at Brains
May 12, 2020
 

Featured Reviews

BL
Head - Work Transformation at Econz
User lifecycle management becomes streamlined with unified access and context-aware policies
If applications support SAML protocols, integration is always an easy task. However, there are difficulties with form-based applications or LDAP-based applications, particularly traditional applications. We need more flexibility not only with SAML but also with LDAP-based and form-based applications. Context-aware access currently only works with SAML-based applications. If other application integrations could support context-aware access, that would be helpful, as companies are in a transition mode with various traditional, form-based, and LDAP-based applications. Mobile device management could be improved. Through Google Cloud Identity, we can manage Android applications and have control over iOS devices, but container functionality is missing. This is particularly important for BYOD (Bring Your Own Device) scenarios, especially in India where the market is now split equally between iOS and Android users. Improvements in this area and integration capabilities would be beneficial.
JP
Senior Information Security Engineer at a financial services firm with 1,001-5,000 employees
Implementing seamless integration boosts secure access and supports Zero Trust
What I appreciate the most about Microsoft Entra ID is that it integrates seamlessly with all the Defender products and is easy to use. Microsoft Entra ID's integration capabilities influence our Zero Trust model by allowing us to enforce our Zero Trust model. Conditional access policies allow us to leverage Microsoft Entra ID to verify that devices signing in to our cloud services are coming from registered devices, and that people are passing all the other requirements we have in order to complete sign-on or conditional access policies. Since implementing Microsoft Entra ID, I've observed changes in the frequency and nature of identity-related security incidents. The organization already had it implemented when I arrived, and I've been working to enhance it. Better configuration of Microsoft Entra ID has allowed us to better protect our organization from threats. Having it alone isn't a solution, but ensuring proper configuration goes a long way in preventing future compromises. My company's approach to defending against token theft and nation-state attacks has evolved since implementing Microsoft Entra ID. We haven't experienced any known compromises from nation-state attacks, and implementing newer features gives me more confidence in our protection. Regarding device-bound passkeys in Microsoft Authenticator and our approach to phishing-resistant authentication, we are currently implementing Microsoft Entra ID certificate-based authentication. Adding a strong form of MFA is important as we found it to be the most cost-effective way. While other solutions might be equally or more secure, they are significantly more expensive. Having worked as an IT consultant mainly with the Microsoft stack across various industries, I have experience with different identity management solutions. Microsoft Entra ID remains the best option. The major advantages when comparing it to Okta include integration with Defender products, Defender for Identities' integration with conditional access policies, and insider threat management integration for blocking sign-ins based on risk factors. The enhancement of Microsoft Entra ID's implementation is relatively straightforward. My main concern is the occasional lack of documentation and the frequency of changes, which can make feature location challenging.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"It is a stable solution. Stability-wise, I rate the solution a ten out of ten."
"Although we have not looked at the whole product and explored it completely, we find that all the authentication features that we are using now are valuable."
"I think the first thing that is great is that it gives you a lot of features, like login, and then vaulted passwords and secure LDAP. It becomes easier for the end customer to leverage all those features without going to a higher SKU of G Suite."
"The most valuable feature is that you can manage users from one central location."
"Google is always on its own. Google Cloud Identity is pretty good on every point."
"The tool provides a free service that you can integrate for laptop authentication. You also don’t need a separate Active Directory."
"One of the most useful features was the single sign-on. You can use it as an identity provider or service provider. And you can use their organization unit feature to enable or disable some of the features for a specific group of users."
"Google Cloud Identity uses what they call organizational units (OUs) instead of the security groups you'd find in Microsoft's Entra."
"The best feature of Microsoft Entra ID is that it provides more granular control over user identities."
"The visibility and control for permission management are excellent."
"My two preferred features are conditional access and privileged identity management."
"The security features, such as attack surface rules and conditional access rules, are the most valuable aspects of Azure AD."
"It's multi-tenant, residing in multiple locations. The authentication happens quickly. Irrespective of whether I'm in Australia, the US, India, or Africa, I don't see any latency. Those are the good features that I rely on."
"The most valuable components of the solution are provisioning and deprovisioning since both features work...Microsoft Entra Verified ID is a very stable solution."
"What I appreciate the most about Microsoft Entra ID is that it integrates seamlessly with other Microsoft products, which streamlines the process."
"Microsoft Entra ID deserves a ten out of ten rating."
 

Cons

"The interface could be improved by simplifying it further."
"The integration should be made easier."
"Google Cloud Identity should improve its compatibility with other products without any impact, such as Jamf Cloud."
"The interface could be more user-friendly."
"For Google Cloud Identity, there will be a recurring cost. There is no ROI."
"The customer service and support team is not so good."
"Mobile device management could be improved. Through Google Cloud Identity, we can manage Android applications and have control over iOS devices, but container functionality is missing."
"The solution's storage capacity could be increased."
"Initially, we wanted to exclude specific users from MSA. So, we had a condition policy, which forces MSA for all the users. So we wanted to exclude users who are using an NPS extension. So it was not listed, as a NPS extension was not listed outside an application, in actual, so, we go back and were not able to exclude users using NPS extension from MSA. So that was one limitation that we found and we had to work around that."
"When it comes to Azure, creating certain things or getting different resources isn't very clear. You need a certain level of knowledge of the system. It could be a little bit more friendly so that some of the things can be done easily, but after everything is created, it's easy to use."
"Better user sign-in logging is needed. We work with Okta, and the two of them do not always work well together. We can have more insight into some of the user information and how it interacts."
"It doesn't function the same way as an Active Directory inside of an infrastructure, that is, a physical infrastructure. In the cloud, it is all flat. That's one of the disadvantages."
"Adding a new account can be tricky."
"The most challenging aspect I found was the creation of organizational units and specific domains. They have a tool called Bastion, which is expensive and a little bit confusing."
"I would like it if Intune could manage MacOS or iOS directly. Right now, we have to use a third-party solution."
"On a scale from one being the worst and ten being the best, I would rate my customer service and technical support from Microsoft a three."
 

Pricing and Cost Advice

"Licensing fees are on a yearly basis."
"The product is billed on a monthly basis depending on the number of users."
"The licensing cost depends on the partners and the relationship between the company and the partners."
"The fees are paid monthly and there are no additional costs other than the licensing fees."
"We probably spend about $50,000 a year on licensing."
"The solution is not expensive."
"When I worked on Cloud Identity, they offered a free or enterprise version. You can synchronize and create up to 100 user identities in the free version. After that, you have to purchase a business or enterprise license. In that model, you'll be charged based on the number of users."
"I rate the product price a seven on a scale of one to ten, where one is a low price, and ten is a high price."
"Entra has P1 and P2 licenses that are bundled with lots of applications."
"We make sure that we only enable the licenses that are needed for the users, rather than enabling licenses in a blanket fashion."
"Compared to other Microsoft products, the cost is not too expensive. There's a free tier available, though it doesn't include all features. Overall, it's well-priced."
"The product's price is in the midrange."
"The price is affordable, and we pay around $100 per month."
"The basic tier of Azure Active Directory is free, so many users use the service for free. For a small company having the security and compliance that Azure offers is a great benefit. For small companies that are using the basic services, not having to pay for Azure Active Directory is the main asset because they can manage their users and have authentications tools and security."
"It is bundled with other services and the pricing is quite reasonable."
"Active Directory is bundled with a package of Microsoft services, so it doesn't cost much. I don't know about the individual license of Active Directory."
report
Use our free recommendation engine to learn which Identity and Access Management as a Service (IDaaS) (IAMaaS) solutions are best for your needs.
883,026 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Manufacturing Company
11%
Financial Services Firm
9%
Comms Service Provider
7%
Financial Services Firm
11%
Manufacturing Company
10%
Computer Software Company
9%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business11
Midsize Enterprise5
Large Enterprise8
By reviewers
Company SizeCount
Small Business85
Midsize Enterprise38
Large Enterprise155
 

Questions from the Community

How does Google Cloud Identity compare with Microsoft Intune?
Microsoft Intune offers not only an easy-to-deploy data protection and productivity management solution, but also access to both Microsoft’s user community as well as around-the-clock customer s...
What is your experience regarding pricing and costs for Google Cloud Identity?
It's crucial to monitor costs carefully, as there can be unexpected charges. I have been charged even when there was supposed to be free credit.
What needs improvement with Google Cloud Identity?
If you are asking about room for improvement with Google Cloud Identity, whatever is there already, cost is the only problem. If you are comparing with GCP, OCI, the cost will be a little bit highe...
How does Duo Security compare with Microsoft Authenticator?
We switched to Duo Security for identity verification. We’d been using a competitor but got the chance to evaluate Duo for 30 days, and we could not be happier. Duo Security is easy to configure a...
What is your experience regarding pricing and costs for Azure Active Directory?
My experience with the pricing, setup costs, and licensing of Microsoft Entra ID is that it is decent.
What needs improvement with Azure Active Directory?
I think Microsoft Entra ID could be improved by assigning permissions to nested groups in the next release.
 

Also Known As

Cloud Identity, Cloud Identity Premium
Azure AD, Azure Active Directory, Azure Active Directory, Microsoft Authenticator
 

Interactive Demo

Demo not available
 

Overview

 

Sample Customers

ExtraHop Networks, HealthChannels
Microsoft Entre ID is trusted by companies of all sizes and industries including Walmart, Zscaler, Uniper, Amtrak, monday.com, and more.
Find out what your peers are saying about Google Cloud Identity vs. Microsoft Entra ID and other solutions. Updated: February 2026.
883,026 professionals have used our research since 2012.