We performed a comparison between Microsoft Entra ID and Oracle Access Manager based on real PeerSpot user reviews.
Find out in this report how the two Access Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Azure AD has features that have helped improve our security posture."
"The solution has some great features, such as identity governance, and user self-service. The Outlook application is very good and is used by a lot of people even if they are using Google services."
"The most valuable features of this solution are security, the conditional access feature, and multifactor authentication."
"This product is easy to use."
"Overall the solution functions very well, such as the ability to access it from the cloud."
"The interface is well laid out and it is easy to navigate."
"Active Directory itself is the best feature it has. It also gives us a single pane of glass for managing user access."
"The solution has a variety of tools. Two of the most valuable features are the ability to create users and to replicate the user account from on-premise to the cloud."
"Excellent SSO solution for Oracle products."
"The product supports customization."
"The MFA is the most valuable aspect."
"From a technical perspective, the solution is very good we can operate and control the user by ourselves."
"In general, the customization that is offered is very good. The company that I am working with currently is using this feature quite extensively."
"The most valuable features of Oracle Access Manager are the single sign-on capability and is a very robust platform. It can take a high number of authentication, and authorization requests. It's very flexible."
"The product allows customization via custom code."
"My company has used most features of Oracle Access Manager for various implementations, but the most helpful feature of the solution for the business and customers is single sign-on."
"There are some features, where if you want to access them, then you need to make use of PowerShell. If someone is not really versed in PowerShell scripting, then they would definitely have issues using some of those features in Azure Active Directory."
"The ease of use regarding finding audit information for users could also be improved."
"Initially, we wanted to exclude specific users from MSA. So, we had a condition policy, which forces MSA for all the users. So we wanted to exclude users who are using an NPS extension. So it was not listed, as a NPS extension was not listed outside an application, in actual, so, we go back and were not able to exclude users using NPS extension from MSA. So that was one limitation that we found and we had to work around that."
"You can manage the users from the Office 365 administration center, and you can manage them from Azure Active Directory. Those are two different environments, but they do the same things. They can gather the features in one place, and it might be better if that place were Azure."
"The product takes at least ten minutes to activate privilege identity management roles."
"The licensing cost is a bit prohibitive."
"We have a custom solution now running to tie all those Azure ADs together. We use the B2B functionality for that. Improvements are already on the roadmap for Azure AD in that area. I think they will make it easier to work together between two different tenants in Azure AD, because normally one tenant is a security boundary. For example, company one has a tenant and company two has a tenant, and then you can do B2B collaboration between those, but it is still quite limited. For our use case, it is enough currently. However, if we want to extend the collaboration even further, then we need an easier way to collaborate between two tenants, but I think that is already on the roadmap of Azure AD anyway."
"I would like it if Intune could manage MacOS or iOS directly. Right now, we have to use a third-party solution."
"The performance of Oracle Access Manager could be improved. It should be quick to install, but it wasn't, so this is another area for improvement. The Oracle Access Manager console also has room for improvement because it's slow."
"The technical support is not very good at all."
"Sometimes if a session takes too long, you have to log in again."
"The initial implementation can definitely be improved because you have to work on several components to configure it correctly."
"The product is complicated and difficult to install and configure."
"The mobile access to the solution isn't ideal. They should work to improve its functionality."
"In the next release, they should focus more on use cases related to customer access management, customer identity, and access management."
"Multi-factor authentication requires a lot of processes and technicalities."
Microsoft Entra ID is ranked 1st in Access Management with 190 reviews while Oracle Access Manager is ranked 16th in Access Management with 15 reviews. Microsoft Entra ID is rated 8.6, while Oracle Access Manager is rated 7.6. The top reviewer of Microsoft Entra ID writes "Saves us time and money and features Conditional Access policies, SSPR, and MFA". On the other hand, the top reviewer of Oracle Access Manager writes "A convenient solution that supports customization and provides many features in a single suite". Microsoft Entra ID is most compared with Microsoft Intune, Google Cloud Identity, CyberArk Privileged Access Manager, Ping Identity Platform and Okta Workforce Identity, whereas Oracle Access Manager is most compared with Okta Workforce Identity, ForgeRock, Ping Identity Platform, Auth0 and F5 BIG-IP Access Policy Manager (APM). See our Microsoft Entra ID vs. Oracle Access Manager report.
See our list of best Access Management vendors.
We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.