We are tech consultants who deploy One Identity for our clients. Our clients use One Identity for provisioning and deep provisioning users. It is also used for the recertification process and access review. We have integrated One Identity for 15 to 20 clients. Soon, we expect to deploy it for another five to 10.
Software tech lead at 1DConsulting
It's a highly stable solution for deep provisioning
Pros and Cons
- "I rate One Identity nine out of 10 for stability. We haven't seen any downtime. It has worked smoothly since it went into production."
- "The performance could be better. I also think One Identity could improve its documentation for developers. Many of One Identity's features aren't fully documented. We don't have enough information on how to use them."
What is our primary use case?
What needs improvement?
The performance could be better. I also think One Identity could improve its documentation for developers. Many of One Identity's features aren't fully documented. We don't have enough information on how to use them.
For how long have I used the solution?
I have used One Identity Manager for the past six years.
What do I think about the stability of the solution?
I rate One Identity nine out of 10 for stability. We haven't seen any downtime. It has worked smoothly since it went into production.
Buyer's Guide
One Identity Manager
November 2024
Learn what your peers think about One Identity Manager. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
How was the initial setup?
Deploying One Identity can be straightforward or complex depending on the environment. The time needed to deploy varies with the scope of the project.
We typically have some meetings with the client to understand what they need to integrate with One Identity. We develop custom connectors and move to the production stage if everything is working.
What other advice do I have?
I rate One Identity Manager eight out of 10. My recommendation to new users is to be patient because it's hard to understand without adequate documentation. It gets easier with time and practice.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
IIMB expert at a tech services company with 1,001-5,000 employees
Stable, has a large number of connectors, doesn't require a lot of maintenance, and provides quick and accurate support for major incidents
Pros and Cons
- "In terms of what the most valuable feature of One Identity Manager is, that would be hard to say because the tool is great overall. There's not really one feature you'd prefer over other features, but what's really great, in my opinion, is the fact that the provisioning is really stable and accurate, and it's a process my company trusts. This means that without a lot of maintenance, I can be pretty sure that as soon as my alternative source gives a new identity or gives new information about a particular identity, everything will be transformed and executed the right way. My company has tried other solutions and there's always a struggle with the provisioning system in terms of knowing what systems work, but with One Identity Manager, this issue doesn't happen. It's also a stable system which I like."
- "Having new features for web developers in the One Identity Manager shop is an area for improvement. Another area for improvement in the tool is its ServiceNow connection as ServiceNow is a major ITSM system player, but the current out-of-the-box feature proposed by One Identity Manager can only make simple incident requests to the system. My company is now in full ICL design, so it prefers for all concerns or requests to be sent properly to ServiceNow, so my company can have better control over the incident requests and be able to sort those out. The tool fits all my needs today, except for the ServiceNow connector. That's the only additional feature I'd like to see in the next release of One Identity Manager."
What is our primary use case?
My company has a lot of use cases for One Identity Manager. In my previous company, I've been maintaining the tool, so I used to go to clients who needed improvements and support in terms of provisioning, and I provided those services. Now, in my current company, I'm in the Identity Management team, and my company is using its old Identity system with One Identity Manager, particularly for provisioning, access management, compliance, and certification, apart from identity management.
What is most valuable?
In terms of what the most valuable feature of One Identity Manager is, that would be hard to say because the tool is great overall. There's not really one feature you'd prefer over other features, but what's really great, in my opinion, is the fact that the provisioning is really stable and accurate, and it's a process my company trusts. This means that without a lot of maintenance, I can be pretty sure that as soon as my alternative source gives a new identity or gives new information about a particular identity, everything will be transformed and executed the right way. My company has tried other solutions and there's always a struggle with the provisioning system in terms of knowing what systems work, but with One Identity Manager, this issue doesn't happen. It's also a really stable system which I like.
What needs improvement?
Having new features for web developers in the One Identity Manager shop is an area for improvement. Another area for improvement in the tool is its ServiceNow connection as ServiceNow is a major ITSM system player, but the current out-of-the-box feature proposed by One Identity Manager can only make simple incident requests to the system. My company is now in full ICL design, so it prefers for all concerns or requests to be sent properly to ServiceNow, so my company can have better control over the incident requests and be able to sort those out.
The tool fits all my needs today, except for the ServiceNow connector. That's the only additional feature I'd like to see in the next release of One Identity Manager.
For how long have I used the solution?
I've been using One Identity Manager for three and a half years.
What do I think about the stability of the solution?
Stability is one of the main qualities of One Identity Manager. It could run even if people go on a holiday for weeks, and nobody would be worried about the tool breaking down. One Identity Manager could work for months even if you don't look at it or check it. It's a well-designed tool.
What do I think about the scalability of the solution?
One Identity Manager is a scalable tool and its scalability is one of the reasons why my company chose it. The tool is capable of evaluation, and it has a lot of different connectors that come out of the box, so as soon as you know what you're doing, it's easy to extend the parameter and add new target systems to it. With One Identity Manager, you can have systems ready for future use. My company has never reached a point where it says: "Okay. There's nothing more you can do with this tool."
How are customer service and support?
I've contacted the support team for One Identity Manager several times. For level one support, particularly when something is broken and I need help, the team's been really quick and accurate. Most of the time, I get the first answer or first contact resolution in less than half an hour as written in the contract, and the support team has really found a quick solution. Every time I face an incident, the team finds a solution to it within an hour. Sometimes it could take a few hours to resolve which is when the One Identity Manager support team provides new patches to implement, for example, the issue started at seven at night and patching would be done at eight in the morning the next day.
For major incidents, I would rate support a five out of five, but if it's just a little incident that does very little harm and is in development, issue resolution would take longer. The support team for One Identity Manager handles major incidents perfectly, so I have no complaints, but if you just have a little incident that appears on your development system and is not really that important, it could take days and days before a technician is sent onsite. This is why my company prefers to work with a partner that is more open to decision, and though the One Identity support team is really there to save your life, it's not there for every incident or situation that you come across.
Which solution did I use previously and why did I switch?
My company decided to use One Identity Manager because of the large variety of connectors available that lets you connect everything you need, even for future use, as well as the reputation of One Identity Manager in terms of stability. Another reason for choosing the tool is the online forum and YouTube channel that allow engineers to learn more about One Identity Manager without the need to ask a partner each time, so you can be independent of the vendor or partner. The support you get is also another reason my company went with the tool.
How was the initial setup?
Whether the initial setup for One Identity Manager is easy or difficult is hard to say because of other systems that have less functionality but are easier to deploy, and you won't face the same challenges that you'd face when setting up One Identity Manager. It's recommended for you to have knowledgeable engineers who can support you during the setup, especially if you don't have the knowledge on how to set the tool up. Setting up the tool may not be as easy, but considering all the things One Identity Manager can do for you, it's not such a big deal.
If you just want to basic features to be up and running with One Identity Manager, deployment could take a few weeks, for example, if you just want to use an authoritative source and have provisioning, active directory, exchange, and other basic features set up in your company. For a company that has really stable jobs to provision, with role mining that isn't difficult, the tool could be ready and working within a few weeks, but for a large company with a really, really large variety of jobs and regulations, deployment of One Identity Manager could take a few months.
What was our ROI?
You can get ROI from One Identity Manager. It's worth the money because my company wants to be agile, and if tomorrow, the head of the company says, "Okay, let's open a new area," with One Identity Manager, I can say, "Okay. If you say there'll be three hundred people, tomorrow, I'm able to create accounts with the rules needed for those to work, and it won't be a mess."
With One Identity Manager, even inexperienced people in the team can easily understand how each role works, and if you have a great conception of each role, you can just hire or transfer within days without being worried about whether or not each person has everything he needs to work.
What's my experience with pricing, setup cost, and licensing?
I'm unable to discuss licensing costs for One Identity Manager.
What other advice do I have?
I'm using the latest version of One Identity Manager.
In my company, the tool is still in the deployment stage, but within a few months, all people in the company will be users of One Identity Manager, particularly the portal. There'll be about five thousand users of the tool within my company.
My advice to anyone using One Identity Manager for the first time is to make an audit on your company with an independent partner to be sure if you need the tool because One Identity Manager won't be worth it for every company. You have to match it to your needs, or else you'll never get your money's worth. For example, in a stable company or one that has similar jobs, the tool won't be used a lot. If you have three to ten job types and all of those would be the same after many years, One Identity Manager won't be the tool you need. You can just go for a cheaper tool that can do the job for you, but if you have a complex company and you have to face a lot of regulations, and if you want to adapt more quickly, One Identity Manager is a good choice.
I'm rating One Identity Manager nine out of ten because it fits my need, and though it's complex, it's a learnable product. It also helps my company become more agile and also helps it face new challenges. One Identity Manager is the tool I need, and I like it. The tool helps my company and also helped the previous company I worked for, so I have no complaints about it. It's a tool I like working with.
I didn't give One Identity Manager a perfect score because the connection with ServiceNow isn't there yet, so that's an area for improvement. When you send in an incident or put in a request that's not a standard request on One Identity Manager, you have to make an exception in the way your company should work, and this is another area for improvement in the tool that I also don't like. My company came up with a workaround or a solution to this, but a company such as One Identity should be able to propose a solution out-of-the-box.
My company is both a customer and a partner of One Identity Manager. I say partner because a representative from One Identity comes to my company every two months and listens to feedback about the pros and cons of the tool. I say customer because my company pays for the One Identity Manager license, and if there's an issue, my company makes a request and lets the support team know what makes us unhappy.
Disclosure: My company has a business relationship with this vendor other than being a customer: customer/ partner
Buyer's Guide
One Identity Manager
November 2024
Learn what your peers think about One Identity Manager. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
Our users now have just one digital identity
Pros and Cons
- "It gives the best user experience, enabling us an overview of all user entitlements."
- "This solution is better on the IT personnel, because now they spend less (or almost no time) managing user rights."
- "The initial setup was complex. We have a lot of different systems. The journey from implementing to joining all the systems was difficult."
- "The performance could use improvement. Sometimes synchronizations take too long."
What is our primary use case?
We had several tools over time to try to gain control of IAM, but none of them were capable enough for our needs. We simply had too many systems to work with. We wanted one digital identity for each user and a comprehensive view of each user’s entitlements.
How has it helped my organization?
Before the implementation, it was necessary to create user accounts to give access to every single information system and application. A lot of resources were needed for development, implementation, support and control of identities and their entitlements. Employees had up to ten credentials for various applications. Now, our users have just one digital identity for all of our systems.
One Identity Manager provides one digital identity for each of the university’s 20,000 users. It also unifies and automates all processes in staff’s and student’s lifecycle by interfacing with other university systems. IAM is now more transparent to IT, students and staff, and helps reduce risk by automatically controlling access according to a user’s status.
This new approach to IAM has created huge efficiencies for IT, especially when it comes to managing more than 300,000 rights. Compared to the situation we had before, IT staff now spend less or almost no time for managing identities and rights.
We are located in Europe, so GDPR is a must for us. So, One Identity solution is helping with this topic too.
What is most valuable?
- It gives the best user experience, enabling us total transparency in user access rights.
- We unified business processes for students and staff at enrollment/hiring/graduation/termination of contract in all organizational units of the university.
- It reduced risks by granting adequate access rights to users.
- The best feature is that HR finally took responsibility of it, so not everything is on IT.
- The policy and role management features are important for identity management.
What needs improvement?
Improve the implementation of additional One Identity Manager’s features. This we are going to focus on after an upgrade to release 8.1 will be finished.
For how long have I used the solution?
6 years
What do I think about the stability of the solution?
Generally speaking, the solution has great stability, modularity and scalability. We have not had many stability issues until now. However, my opinion is there is still some space to improve performance. Sometimes synchronizations take too long.
Which solution did I use previously and why did I switch?
We had several tools over time to try to gain control of user accounts and their privileges. But none of the solutions were capable enough to cover all our our needs. We simply had too many disparate systems to work with. We wanted one digital identity for each user and a comprehensive view of each user’s entitlements. Plus, we needed to ensure we could control those entitlements easily.
We noticed that One Identity Manager was positioned well in Gartner’s Magic Quadrant for User Administration and Provisioning, based on its evaluation of One Identity Manager.
How was the initial setup?
The initial setup was complex. We have a lot of different systems. But, we started step by step with connecting active directory for employees to the IAM system and with data and business processes consolidation. Then, we used the same approach for all our students’ identities and related processes. Many processes we had to redesign, but the main benefit is the processes are much more simplified now. Yes, the journey from introducing One Identity Manager solution to joining all the systems was difficult, but we have reached our final goal.
What about the implementation team?
We have a valuable partner located in Slovenia, who is helping us with analysis and architecture. They advise us with many best practices and are responsible for the implementation and technical aspects of the solution.
What was our ROI?
This solution helped us to reduce help desk calls. Before the implementation, people were calling because they didn't have access to some systems, etc. After the implementation, we implemented the application access metrics - authenticated users may conduct only previously authorized transactions. Now, all our users have access to these applications when they get their digital identity. Thus, there are no more calls to help desk.
What other advice do I have?
While our journey to find a solution was tiring and we invested a lot of work and knowledge, our expectations have been reached and even exceeded. It's really good to invest time and money in a solution which offers you something that all users, not just IT, can use.
Sometimes, the solution is flexible. However, the customer should sometimes be flexible to the solution, as well.
Those who worked on this implementation now spend less time on user rights, etc. While it lowered their workload with this solution, they are now working on something else.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Lead Technology Manager at a financial services firm with 10,001+ employees
Enables us to customize the user interface and the workflow processes
Pros and Cons
- "Its flexibility is the most valuable feature, the way we can customize the user interface and the workflow processes."
- "The support for DevOps could be improved with quick delivery cycles and multiple delivery streams."
What is our primary use case?
We use it for meeting compliance requirements.
How has it helped my organization?
We were able to clear up some audit actions by providing evidence we have a proper, controlled approval process.
In addition, One Identity Manager has helped to increase employee productivity when it comes to provisioning users and systems.
What is most valuable?
Its flexibility is the most valuable feature, the way we can customize the user interface and the workflow processes. It helps us set up the correct approval processes.
What needs improvement?
Better support for version control and multi-threaded development would be helpful additional features.
The support for DevOps could be improved with quick delivery cycles and multiple delivery streams.
What do I think about the stability of the solution?
We do have performance problems, but outside of that, it seems stable.
What do I think about the scalability of the solution?
We have some performance problems, so pushing to scale is a challenge.
How are customer service and technical support?
The technical support is acceptable. We get responses when we raise queries, but maybe not as fast as we'd like.
What about the implementation team?
We worked with a third-party vendor, TCS. Our experience with them was okay but it was difficult to get skilled resources.
What was our ROI?
We have seen return on investment.
What other advice do I have?
Think about what the out-of-the-box features are in the product and how those map into your business requirements. Perhaps look at revisiting the business requirements to better fit with the product.
We integrated the solution with SAP, given that we already had a significant SAP deployment for our financial services. Because I wasn't involved in that I can't comment on how that process went.
In terms of our cloud strategy, One Identity Manager hasn't impacted it. The solution will fit within that strategy.
I would rate it at eight out of ten. It meets most of our business requirements. We can deliver functionality the users want, but it does need some improvements, in the performance and support for a DevOps-type quick SOC release.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior IT Consultant at a tech consulting company with 51-200 employees
A portal for user requests and authorizations which can be customized to display corporate logos and color schemes.
What is most valuable?
The out-of-the-box connectors (SAP, LDAP, MS Active Directory, CSVs, etc.), and the one-stop-shop portal for user requests and authorizations which can be customized to display corporate logos and color schemes.
Additionally, certain “out-of-the-box” features can be configured to not be displayed or affect specific behaviors through the Project Configurator.
Additional customization requiring coding is possible, but requires additional planning, coding, and testing and is out of scope for this project.
In D1IM there are different ways of connecting with targeted systems. Out-of-the-box Connectors could be with:
- Connected system modules which allow interaction between D1IM and third party systems, with their specific schema extensions, dedicated synchronization templates and business logic. They allow deeper out-of-the-box target system management.
- Connectors which are predefined synchronization interfaces, developed by Dell, and are highly configurable but cannot be customized!
Interfaces are developed during IdM projects as an additional, customer specific feature of D1IM. This enables the connection of more proprietary or less common systems. Interfaces are easily changed in their functional behavior and implementation.
How has it helped my organization?
With this tool, you can easily orchestrate automation user access provisioning and implement multiple layers of authorizations (4 eyes or 6 eyes principles).
What needs improvement?
- Implementation of skip logic in user access request forms - this topic cannot been explained easily because it requires a deep dive within the functionality of the Web Portal.
- Lack of integration with RestAPI - the lack of out-of-the-box RestApi connectors creates some difficulties in integration running infrastructure as code, with DevOps operation (CI, CD, VCS etc.) and managing On Premise and external clouds.
For how long have I used the solution?
We have been using this solution since 2006.
What do I think about the stability of the solution?
We have not encountered any stability issues. The system is rock solid.
What do I think about the scalability of the solution?
We have not encountered any scalability issues.
How are customer service and technical support?
The Dell technical support is good enough.
Which solution did I use previously and why did I switch?
The D1IM gives a rare opportunity to integrate multiple authorizations and authentication platforms into a single portal.
How was the initial setup?
The configuration is complex and requires a good understanding of your existing infrastructure and related protocols for communications.
What's my experience with pricing, setup cost, and licensing?
We have no specific advice about licensing issues.
Which other solutions did I evaluate?
We evaluated Ping One Identity, SAP IDM, Oracle Access Manager, Net IQ Identity Manager, and RSA Access Manager.
What other advice do I have?
Clarify what level of automation is needed in a user access request. Authorization and provisioning is achievable while comparing company needs and objectives.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
One Identity Developer at Wipro Limited
Stable, efficient and easy to use but can be slow with a large number of users
Pros and Cons
- "It is easy to use and handle."
- "It is particularly slow if you are using it in a large organization."
What is our primary use case?
We use the solution for creating and completing enhancements and other features. Personally, I have experience working as a .NET developer and working with the SQL server database. When I joined Wipro, I worked mainly with One Identity Manager tool as a developer. In addition, I do web design and object browsers, job queues, and use other tools.
What is most valuable?
The best feature is the security of the solution.
What needs improvement?
The solution can be improved from a front-end point of view. It slows the portal down. The tool is too customized in our organization, and we face many challenges with the portal. We were able to make some improvements performance-wise to the portal slowness. It is particularly slow if you are using it in a large organization.
For how long have I used the solution?
We have been using this solution for more than two years. We are currently using version eight, which is deployed in cloud.
What do I think about the stability of the solution?
This solution is stable when we are using all its features. However, when we customize the solution, it becomes difficult to use.
What do I think about the scalability of the solution?
This solution is scalable.
How are customer service and support?
When we cannot resolve issues with the tool, the technical support team assists us by proposing solutions based on the tool requirements. They consistently respond to us and help us resolve any issues we encounter while using the tool. I rate the technical support a ten out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup process was easy. However, it took between 30 to 60 minutes to deploy the solution.
What's my experience with pricing, setup cost, and licensing?
One Identity Manager is very efficient for a limited amount of users. It is easy to use and handle. The license price is based on user capacity. However, I cannot speak about the exact costs.
Which other solutions did I evaluate?
Our company takes on projects for different types of clients, so we chose this solution because our clients had this solution implemented. Therefore, selecting this option made managing things more efficient.
What other advice do I have?
I rate this solution a six out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Lead Solution Architect at Tieto Sweden AB
You can scale it quite big, which is good, and it has good sizing
Pros and Cons
- "It brings simplicity into complex matters."
- "You can scale it quite big, which is good. It has good sizing."
- "It is a large solution where you need to learn how to work in a certain way for it to provide the best benefit."
- "I would like some access management features to be added. We have some customers with a small need to do authentication as a service, and there are other solutions on the market which offer this."
What is our primary use case?
We using it internally. We are also offering it to our customers as a managed service.
How has it helped my organization?
I have heard that the overall security is much better, although we still have slow processes going on within the company. Internally, this is what I have heard, since I work more on the customer side.
Since we are ISO 27001 compliant and GDPR compliant, the product has probably helped with this.
What is most valuable?
It brings simplicity into complex matters.
What needs improvement?
I would like some access management features to be added. We have some customers with a small need to do authentication as a service, and there are other solutions on the market which offer this.
It is a large solution where you need to learn how to work in a certain way for it to provide the best benefit. On the other hand, it's really a structured way so you should work in a structure way, as it is a compliant to other frameworks.
What do I think about the stability of the solution?
I haven't heard any complaints regarding stability.
There was some slowness when we implemented it, but I haven't heard anything since.
What do I think about the scalability of the solution?
You can scale it quite big, which is good. It has good sizing.
We have some smaller customers where the solution is too big, but that is an IAM world issue.
We have 15,000 people working for us.
How are customer service and technical support?
I've been happy with the technical support. When I previously worked in another company implementing One Identity Manager, I was pretty happy with support.
How was the initial setup?
The initial setup for us is quite simple, and we have done some measures internally to make it even easier.
What about the implementation team?
We have used other partners to help with our own implementation.
What was our ROI?
We're using it to monitor the customer environments, which has helped us increase employee productivity when it comes to provisioning users and systems.
It has helped to reduce help desk calls quite a lot, since not we are using the Access Manager which looks into our web services.
What other advice do I have?
I think it's one of the best solutions on the market.
It is a big task to implement alone, so ask a lot of questions if looking to implement.
You can see and do a quite a lot. It is really open in that way, but going out and trying to do stuff which it isn't meant to do, that's much harder. I wouldn't go there. However, it's gives you a good framework to work and build on.
The policy and role management features work. They are getting better all the time. I don't really have a better experience from other solutions.
I am just learning the privileged account governance features and how they work.
We don't have SAP internally. We offer it as a service, as a company, to our customers, but we don't use it.
We are managed service providers, so we cannot have our own private cloud.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
Service Owner Identity & Access Management at a financial services firm with 10,001+ employees
Workflow feature is key for us, but the solution needs to improve on integration
Pros and Cons
- "Workflow management is an important feature. With other identity management products, there was no workflow management so we had to build it ourselves."
- "I would like to see a lot more integration with our platforms, more on the connector side."
What is our primary use case?
We use it to give the right access to the right resources.
How has it helped my organization?
It has made us much more effective and efficient in providing access to users and in managing certain processes. It has definitely helped to increase employee productivity when it comes to provisioning users and systems. It's difficult to estimate how much their productivity has increased because we already had some identity management systems. I don't know how much this solution has helped us compared to the other systems, but it has definitely helped.
What is most valuable?
Workflow management is an important feature. With other identity management products, there was no workflow management so we had to build it ourselves. That's one of the reasons we selected One Identity.
We have also found the solution to be flexible. We can customize a lot of things and arrange most things within the product.
It has also definitely helped simplify compliance.
What needs improvement?
I would like to see a lot more integration with our platforms, more on the connector side. We are still using version 7.1. There are a lot of new features in 8.1, so we will look forward to using that.
What do I think about the stability of the solution?
The product is good, it's stable.
What do I think about the scalability of the solution?
I'm relatively new in this role and I haven't figured out how scalable it is. That's one of the use cases I'm working on with my engineers right now.
How are customer service and technical support?
Technical support is good.
Which solution did I use previously and why did I switch?
We were using several solutions for access and we finally selected One Identity as the best solution for our purposes. We had a home-grown identity management solution, but because of the complexity of it we selected One Identity Manager as our future-looking identity management product.
How was the initial setup?
The setup was complex but it was mostly because of our environment. We have a very complex environment. We have a lot of ancient systems.
Which other solutions did I evaluate?
All the big ones were on our list. We chose One Identity because of the possibilities that were already present in the system. There were more than in the other ones.
What other advice do I have?
It's a good product which provides great opportunities.
Regarding the policy and role management features, I hear they're good. I don't know that part as well, but I have heard from the engineers they're pretty okay.
We have integrated One Identity Manager with SAP, but we're moving from SAP as an HR system to the Workday system. We're in the middle of that integration right now. The original integration with SAP was done before I started using the product, but I from what I heard it was pretty okay. But you have to have a lot of knowledge of One Identity Manager before you can start implementing it, and knowledge of it is a bit of a problem.
The solution hasn't yet impacted our cloud strategy because we are not working hard on cloud strategy right. We're thinking about moving some pieces but we have not yet implemented it.
We know that version 8 is much better than the version 7 we use. But the version we use is about a seven out of ten because we have had some real difficulties with the integration part, from the old systems.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free One Identity Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Popular Comparisons
Microsoft Entra ID
SailPoint Identity Security Cloud
Omada Identity
Fortinet FortiAuthenticator
ForgeRock
Microsoft Identity Manager
Oracle Identity Governance
SAP Identity Management
OneLogin by One Identity
NetIQ Identity Manager
EVOLVEUM midPoint
Symantec Identity Governance and Administration
RSA Identity Governance and Lifecycle
OpenIAM Identity Governance
Buyer's Guide
Download our free One Identity Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which one is best: Quest One Identity Manager or Forgerock Identity Management
- Looking for an Identity and Access Management product for an energy and utility organization
- Which Identity and Access Management solution do you use?
- Sailpoint IdentityIQ vs Oracle identity Governance
- OpenIAM vs Ping identity
- Which is the best legacy IDM solution for SAP GRC?
- What are some tips for effective identity and access management to prevent insider data breaches?
- What are your best practices for Identity and Access Management (IAM) in the Cloud?
- How to convince a client that Identity and Access Management (IdAM) is essential for risk elimination?
- What access management tools would you recommend to help with GDPR compliance?