We use it to make requests and show the information that the users have, as well as for attestation.
Systems Specialist at a financial services firm with 501-1,000 employees
Flexible solution you can customize by creating scripts or modifying the schema
Pros and Cons
- "For me, personally, the automation is the most valuable feature. I don't have to do things manually, like creating user accounts and provisioning them to the target systems."
- "The system role manager, or some of the roles that are inside Identity Manager, are limited to one user. It would be more flexible if these responsibility roles could be attached to many people."
What is our primary use case?
How has it helped my organization?
It saves us time and has increased employee productivity when it comes to provisioning users or systems. It has changed the way things are done, and people who had been doing manual work are doing something else at the moment.
We now have standard processes, the whole flow when a new user comes in; what happens and when. It's always done in exactly the same way. We know that it goes from start to finish in a certain way and we can be sure that it's done in the correct way when it's automated. The master data is always used in the same way.
It has also impacted our cloud IT strategy because we have to be there to manage the user accounts and all, in that environment. That's on-going work at the moment. We haven't implemented or started any processes in production yet.
In addition, it has helped to reduce helpdesk calls, according to the information that we have seen.
What is most valuable?
For me, personally, the automation is the most valuable feature. I don't have to do things manually, like creating user accounts and provisioning them to the target systems.
We are familiar with the policy and role management features and we are using some of them. They are very hard to define, but they are also very powerful in a way. You have to define them clearly before you start using them.
One Identity Manager is also flexible. If it doesn't have a feature that you want, out-of-the-box, you can customize it by creating scripts or modifying the schema. But you usually need consultants to do the job.
What needs improvement?
This is getting at really detailed functionality, but the system role manager, or some of the roles that are inside Identity Manager, are limited to one user. It would be more flexible if these responsibility roles could be attached to many people. That's an issue for us at the moment.
I would like the ability to have different user accounts and to have a flexible way to order things. For example, if you have a domain with a lot of sub-domains, for the end-user it should be easy to order to these other environments. But you would have to have sub-identities. We have tried to create different kinds of solutions for this.
Buyer's Guide
One Identity Manager
March 2025

Learn what your peers think about One Identity Manager. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
845,040 professionals have used our research since 2012.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
This version, version 8 has been working fine. Version 6 was horrible for us. The performance wasn't good at all, but our experience now with performance and stability is good. We are happy now.
What do I think about the scalability of the solution?
When it comes to adding other users or a growing environment we haven't had any issues. At the moment, at least, we have been able to add features and functionality, and everything has worked fine.
How are customer service and support?
We have only used technical support through our partner/consultant company. We haven't been in direct contact with One Identity. Everything has been okay.
Which solution did I use previously and why did I switch?
We had a solution that was built in-house before we migrated to One Identity. The old solution didn't have the automation features and provisioning features the way that this product does. The old solution was more manual with a lot of built-in scripts. It was hard to maintain or to create extra features.
How was the initial setup?
Our initial setup was about three years ago, but we did the migration from version 6 to 8. That was almost the same. It was a really big project, or it felt like it.
The initial go-live for the product overall was over one weekend, but the work before that took a year. There were ten people involved during that weekend. We had some time-outs during that year though, because there were some other big projects.
The setup was complex because we did a lot of things. It wasn't only our project, because it was HR and the organization. It was not only the technical part, "next, next, next." It included changing the processes and standards in the company overall.
In terms of our implementation strategy, we added a totally new HR program, to get the master data up and running and correct. And then, of course, we had to work on how the organization is defined and have master data for that, and the roles to be used and the master data for that. And we had to get overall processes standardized.
There are two-and-a-half people working on the solution now, doing daily maintenance.
What about the implementation team?
We had a partner, Infragen, do the integration. Our experience with them was good. They did good work and we had good cooperation, overall.
What was our ROI?
The managers are satisfied when things are automated, when people are coming in or going out, because they don't have to do the work. They just contact HR and it's automated from there. People know that it's one place where you can do everything: make the request, the attestation side, and compliance is also automated and in one place. That's what people want.
Which other solutions did I evaluate?
Microsoft was one of the solutions we looked at, as well as some small Finnish companies. We went with One Identity because of the features. Somebody had already made the stuff that we needed, the functionality that we needed was there and didn't require so much customization. And the partner that was able to give us the solution was also a factor in our decision to go with One Identity.
What other advice do I have?
Keep the scope small in the beginning, so you don't do too much. Go live and then add more features on the way because, otherwise, it can go on for years, and you never get anything done. Also, don't start to customize features too much. Try to use what comes out-of-the-box and try to implement it that way. Somebody has thought of these things already. In most companies, a lot of these things are probably done in the same way.
I would rate One Identity Manager at eight out of ten. There's always room for improvement, but I'm pretty satisfied.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.

Product Specialist at a retailer with 10,001+ employees
The solution is stable, but slow
Pros and Cons
- "We have seen a slight reduction in help desk calls, as this solution is a self-service product."
- "The initial setup was complex. It is an extremely complicated thing to replace an entire self-built solution."
- "The tool to develop the web portal needs improvement."
What is our primary use case?
The primary use case is to handle identities.
How has it helped my organization?
We have seen a slight reduction in help desk calls, as this solution is a self-service product.
What is most valuable?
- To get an overview.
- To get a good structure.
- To get a good automation process.
What needs improvement?
The tool to develop the web portal needs improvement.
We are pushing out a cloud strategy, but running this on-premise solution, and do not know what steps to take.
For how long have I used the solution?
Still implementing.
What do I think about the stability of the solution?
The stability depends a lot on the infrastructure, but it is pretty slow. For us, it is stable, but slow.
How are customer service and technical support?
I haven't used the technical support yet.
Which solution did I use previously and why did I switch?
We are using a self-built solution. It would cost too much to get that up to the standard of what we need. In the long-term, it is cheaper to buy a solution that has what we need. Though, we are still running the previous solution, as we are still in the implementation phase. One Identity Manager is very limited in what we have live; we are not using it fully yet.
How was the initial setup?
The initial setup was complex. It is an extremely complicated thing to replace an entire self-built solution.
What about the implementation team?
We are using an implementer for the deployment.
What other advice do I have?
Think through what is most important and your strategy, especially your cloud strategy. Look at the different competitors in the market, including this one.
Our cloud strategy is impacting what we decide to roll out.
We have not implemented the privileged account governance features yet.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
One Identity Manager
March 2025

Learn what your peers think about One Identity Manager. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
845,040 professionals have used our research since 2012.
Principal Consultant at a tech services company with 1,001-5,000 employees
It has many features which can be combined and configured in a great way
Pros and Cons
- "It has many features which can be combined and configured in a great way, then put together in projects and ways that developers didn't think were possible, which has been great."
- "The UI and user experience side of things needs improvement."
What is our primary use case?
We implement One Identity Manager for our customers.
How has it helped my organization?
It has helped to simplify compliance. We have multiple customers who now have a full overview of their accounts and users. They can use the reporting for GDPR compliance or accounts retention.
What is most valuable?
Flexibility: It has many features which can be combined and configured in a great way, then put together in projects and ways that developers didn't think were possible, which has been great.
The policy and role management features are very powerful and useful for our customers. You can do anything there.
The privileged account governance features are great from the overall governance look, the things which you can do with it, and the results that you can achieve from it.
What needs improvement?
The UI and user experience side of things needs improvement.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
It is very stable. It has been running for years (for our customers). Even if it bugs up at some point, it is rather fast to fix and easy to get going again.
What do I think about the scalability of the solution?
The scalability is very good. It scales well for companies, from small companies to very big ones worldwide.
How are customer service and technical support?
The German technical support is great. We are a German partner, and we find them knowledgeable and fast, as they do their thing.
How was the initial setup?
The complexity of the initial setup depends. While it's fast and easy to set up initially, the complexity can come once the solution starts to grow.
What about the implementation team?
We have implement the following for our customers:
- SAP
- Cloud IT strategy.
What other advice do I have?
Compare all the solutions and all the things that you can do on them: How easy you can set it up and how fast it can grow. Because identity management will grow with you, and you have to have a product which can grow with your organization.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
Founder at a marketing services firm with 11-50 employees
Customizable, stable, and has synchronization and process orchestration features
Pros and Cons
- "In terms of the most valuable feature of One Identity Manager, it's not like one feature is useful without the other features. It's not a tool, but it's more an overall integrated solution that is helpful and not specifically one solution on its own. The best points of One Identity Manager would be its process orchestration and synchronization manager."
- "The philosophy behind One Identity Manager has always been that there's not one way of working and that you can set it up according to your own identity and access management philosophy, but what would make it better is by shortening the setup time and the learning curve time. If the team could create some best practices with a wizard to set the solution up within companies, that would be a killer feature and would help make identity access management more approachable. That would also help companies that don't have the resources or a dedicated team to set up One Identity Manager. What I'd like to see in the next release of the solution is the addition of just released application governance parts. That would sound promising. It would also be interesting if the team sets up best practice startup wizards, so you could set up One Identity Manager according to selectable best practice wizards instead of setting it up completely by yourself."
What is our primary use case?
One Identity Manager is a central identity provider and authorization provider, and I've been using it for multiple customers who use it as a central identity provider.
What is most valuable?
In terms of the most valuable feature of One Identity Manager, it's not like one feature is useful without the other features. It's not a tool, but it's more an overall integrated solution that is helpful and not specifically one solution on its own. The best points of One Identity Manager would be its process orchestration and synchronization manager.
What needs improvement?
The philosophy behind One Identity Manager has always been that there's not one way of working and that you can set it up according to your own identity and access management philosophy, but what would make it better is by shortening the setup time and the learning curve time. If the team could create some best practices with a wizard to set the solution up within companies, that would be a killer feature and would help make identity access management more approachable. That would also help companies that don't have the resources or a dedicated team to set up One Identity Manager.
What I'd like to see in the next release of the solution is the addition of just released application governance parts. That would sound promising. It would also be interesting if the team sets up best practice startup wizards, so you could set up One Identity Manager according to selectable best practice wizards instead of setting it up completely by yourself.
For how long have I used the solution?
I've been working with One Identity Manager and its predecessor Quest since 2014.
What do I think about the stability of the solution?
One Identity Manager is a stable solution, although like any vendor bugs occur. It is frustrating there's no bug tracker available of known issues. It would be very helpful to know what bugs are currently acknowledged to prevent continuity issues and wasted troubleshooting time.
What do I think about the scalability of the solution?
In terms of the scalability of One Identity Manager, I mostly had experience with companies that had five to ten thousand identities in place, and now, I've been working with a setup in a larger enterprise environment with tens of thousands of users, and my impression is that everything is going much slower than what I was used to on the smaller scale, but I'm not completely familiar how it was set up. I know too little about the setup to judge the scalability of One Identity Manager.
How are customer service and support?
I've contacted the technical support team for One Identity Manager multiple times. Sometimes support is excellent, and sometimes, it's just okay. Support asks for a lot of information that's not always necessary.
How would you rate customer service and support?
Neutral
How was the initial setup?
Installing One Identity Manager nowadays is getting more and more straightforward, but in terms of configuration and setup, that's complex.
The time it takes to deploy the solution would depend on the organization. I've been involved in multiple projects and there were projects where One Identity Manager was deployed faster than others, so deployment time would depend a bit on the complexity of the organization and internal processes, but in theory, you could set it up within a week. Mostly it would take companies months to get the solution up and running.
What's my experience with pricing, setup cost, and licensing?
I'm aware there's a license cost for One Identity Manager, but I'm not part of the team who handles licensing, so I'm unable to give pricing information.
What other advice do I have?
I'm a freelancer, so I work for multiple customers and I work for three customers that are using One Identity Manager, so I can't give the exact number of users, but big teams use it.
I'm using One Identity Manager because it's what my customers selected.
My advice to anyone looking into using One Identity Manager is to start playing around on the virtual setup to get familiar with it, in particular, make a small domain, set some target systems up, and get familiar with the setup.
I would rate One Identity Manager eight out of ten because it's very stable and very customizable. For the last two years, the solution has improved and cut back on technical depth, and it can stand on its own two feet, but there's still space to improve. Overall, One Identity Manager is one of the best in the market.
I'm an identity and access management consultant, so I'm not a partner or a reseller of One Identity Manager.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Software tech lead at 1DConsulting
It's a highly stable solution for deep provisioning
Pros and Cons
- "I rate One Identity nine out of 10 for stability. We haven't seen any downtime. It has worked smoothly since it went into production."
- "The performance could be better. I also think One Identity could improve its documentation for developers. Many of One Identity's features aren't fully documented. We don't have enough information on how to use them."
What is our primary use case?
We are tech consultants who deploy One Identity for our clients. Our clients use One Identity for provisioning and deep provisioning users. It is also used for the recertification process and access review. We have integrated One Identity for 15 to 20 clients. Soon, we expect to deploy it for another five to 10.
What needs improvement?
The performance could be better. I also think One Identity could improve its documentation for developers. Many of One Identity's features aren't fully documented. We don't have enough information on how to use them.
For how long have I used the solution?
I have used One Identity Manager for the past six years.
What do I think about the stability of the solution?
I rate One Identity nine out of 10 for stability. We haven't seen any downtime. It has worked smoothly since it went into production.
How was the initial setup?
Deploying One Identity can be straightforward or complex depending on the environment. The time needed to deploy varies with the scope of the project.
We typically have some meetings with the client to understand what they need to integrate with One Identity. We develop custom connectors and move to the production stage if everything is working.
What other advice do I have?
I rate One Identity Manager eight out of 10. My recommendation to new users is to be patient because it's hard to understand without adequate documentation. It gets easier with time and practice.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
COO at a comms service provider with 11-50 employees
There is a lot less help desk paperwork, which has increased employee productivity
Pros and Cons
- "We no longer keep users who shouldn't exist."
- "It is flexible with APIs and the customizing of a portal."
- "I would like to have more extensive out-of-the-box reports."
What is our primary use case?
We have this process of provisioning and non-provisioning users, depending on our SAP HR database.
How has it helped my organization?
The most important thing is that we don't have bad users in our systems anymore.
What is most valuable?
We no longer keep users who shouldn't exist.
It is flexible with APIs and the customizing of a portal.
What needs improvement?
I would like to have more extensive out-of-the-box reports.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
The stability is great. We haven't had any problems. It keeps on working.
What do I think about the scalability of the solution?
We can expand as much as possible. It will meet our needs going forward. We have already expanded a lot of times. The only issue with expansion is the cost of licensing.
How are customer service and technical support?
I have only had one experience with the technical support, and it was okay.
Which solution did I use previously and why did I switch?
We were not using another solution prior to this one (not in this scope).
How was the initial setup?
The initial setup is mostly straightforward, but you still need to customize some things.
What was our ROI?
It has helped to reduce the paperwork of the help desk. There is a lot less paperwork, which has increased employee productivity, allowing them to be assigned to additional projects.
Which other solutions did I evaluate?
We were also looking at the Microsoft Identity Manager. However, we decided on One Identity Manager because it has a wider coverage of different products.
What other advice do I have?
Implementation and integration with SAP went well from the Identity side, but we have had internal problems with the data. However, we have been solving that for four years now.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security Consultant at a financial services firm with 10,001+ employees
Good integration and lots of capabilities but performance can be slow
Pros and Cons
- "The most valuable features are that it has a lot of capabilities, can integrate with a lot of systems, including automated onboarding like CyberArk, and allows you to integrate different entities."
- "One area that could be improved is the speed of performance - it's often a bit slower because of the size of its database."
What is our primary use case?
This solution creates the roles for the NDSS, including onboarding of accounts. It's an end-to-end solution in that the customer will request some permissions, and it will enter treatment for that user, then push the data or automatically onboard admin accounts for that user.
What is most valuable?
The most valuable features are that it has a lot of capabilities, can integrate with a lot of systems, including automated onboarding like CyberArk, and allows you to integrate different entities.
What needs improvement?
One area that could be improved is the speed of performance - it's often a bit slower because of the size of its database.
For how long have I used the solution?
I've been using this solution since 2017.
What do I think about the stability of the solution?
It's a stable solution.
What do I think about the scalability of the solution?
OIM can be scaled.
How are customer service and support?
We subscribe to premium support from Dell IBM. It's pretty good but can take a while to respond with a solution, sometimes up to a week if it's a major issue.
How was the initial setup?
It depends on the expectations and scope, but OIM is easy to deploy and can be completed for a medium organization in six months to a year.
What about the implementation team?
I used a consultant integrator for deployment.
What's my experience with pricing, setup cost, and licensing?
Licenses are available on a three or five-year basis.
What other advice do I have?
I would recommend OIM to other users and would score it seven out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Technical Support Analyst at a financial services firm with 1,001-5,000 employees
Secure solution that helps us complete tasks in the least amount of time
Pros and Cons
- "The most valuable feature for me is the built-in security, which is the best that I have seen."
- "A feature that I would like to see is a mobile app that provides users the ability to make changes or add users to the Active Directory, on the fly."
What is our primary use case?
Our primary use case is to control access to our open source Unix and the app store games. This is a banking organization, so you don't want to give all of the rights to one person.
How has it helped my organization?
Using this solution means that our engineers do not need to log in to a domain controller as frequently. Rather, they can log in using One Identity and perform all of the administrative tasks. This is beneficial from a security perspective, and also helps to complete the task in the least amount of time.
It provides Authentication services and integrates Active Directory for open source operating systems.
What is most valuable?
The most valuable feature for me is the built-in security, which is the best that I have seen. The interface is also very good.
What needs improvement?
My only complaint about this solution is the price, as I think that the cost of the full user license is a little high.
A feature that I would like to see is a mobile app that provides users the ability to make changes or add users to the Active Directory on the fly.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
I would rate the stability of this product a nine out of ten. This is the only tool that will comfortably help you work with Active Directory in other solutions.
What do I think about the scalability of the solution?
It is scalable across infrastructures. It works with Windows, open source operating systems, and covers almost everything that you need. We have more than 4,000 users in this solution. Our organization keeps growing, so our base will forever be increasing.
How are customer service and technical support?
To this point, we have not had to reach out to the solution's technical support.
Which solution did I use previously and why did I switch?
Prior to using this solution, everything was done manually. Security was at risk of breach and we thought that we needed to be compliant.
How was the initial setup?
The setup of this solution was simple and straightforward. Any admin can do it by looking at the whitepaper.
The process of deployment took approximately one month. However, that is not because the process is complicated or time-consuming. In our case, being in banking, there are a lot of policies and processes that have to be followed before implementing a new solution.
One Identity does what we need it to do, so we do not require any other plugins or packs to run our solution.
What about the implementation team?
One Identity sells everything that is required to deploy. We directly deal with them and do not use a vendor or a consultant.
What's my experience with pricing, setup cost, and licensing?
There is a one-time licensing cost, and there is also a yearly subscription fee. The fee is related to the number of users and is perhaps $6 or $7 per license per month.
Which other solutions did I evaluate?
We did look at other options, but it boiled down to choosing One Identity with no second thought.
What other advice do I have?
My advice is to try this product first and then decide. In organizations with a large footprint of open source operating systems, such as Unix or Linux, security for them is a bigger concern, especially for banking. They should take advantage of using the evaluation version.
Overall, I would rate this product eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free One Identity Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2025
Popular Comparisons
Microsoft Entra ID
SailPoint Identity Security Cloud
Omada Identity
Fortinet FortiAuthenticator
ForgeRock
Microsoft Identity Manager
SAP Identity Management
Oracle Identity Governance
OneLogin by One Identity
NetIQ Identity Manager
EVOLVEUM midPoint
Symantec Identity Governance and Administration
RSA Identity Governance and Lifecycle
OpenIAM Identity Governance
Buyer's Guide
Download our free One Identity Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which one is best: Quest One Identity Manager or Forgerock Identity Management
- Looking for an Identity and Access Management product for an energy and utility organization
- Which Identity and Access Management solution do you use?
- What are your best practices for Identity and Access Management (IAM) in the Cloud?
- What are some tips for effective identity and access management to prevent insider data breaches?
- Which is the best legacy IDM solution for SAP GRC?
- Sailpoint IdentityIQ vs Oracle identity Governance
- OpenIAM vs Ping identity
- When evaluating Identity and Access Management, what aspect do you think is the most important to look for?
- What access management tools would you recommend to help with GDPR compliance?