The use cases for One Identity Manager include multiple aspects of identity and access management. One of the most interesting features I wanted to utilize was the user's access review, UAR module. The idea was to create a quarterly review process to review the entitlements and the access and controls in place, initially targeted towards Active Directory and later extended to other local systems. One Identity Manager can connect SAP accounts to employee identities under governance. It is possible to map company structures for application provisioning through dynamic application provisioning using role-based access control. Mapping roles to users is a seamless experience that offers a lot of leverage in terms of speed and compliance, making it a very useful feature.
Principal Cybersecurity Architect at a tech vendor with 10,001+ employees
Good identity and access management but still needs better visibility
Pros and Cons
- "I consider their support to be very standard, relying on an email-based system."
- "Mapping roles to users is a seamless experience that offers a lot of leverage in terms of speed and compliance, making it a very useful feature."
- "One Identity Manager could incorporate dynamic dashboarding to predict attack vectors and compromises."
- "The tool did not allow beyond a specific level of visibility; it provided visibility at the user level, not at the level of nested entitlements, resulting in an inaccurate depiction from the asset manager's point of view."
What is our primary use case?
What is most valuable?
The use cases for One Identity Manager include multiple aspects of identity and access management. One of the most interesting features I wanted to utilize was the user's access review, UAR module. The tool can onboard applications such as SAP, which is standard, and the APIs do not present challenges. One Identity Manager can connect SAP accounts under governance, and mapping roles offers leverage in speed and compliance. This functionality is crucial for compliance and governance.
What needs improvement?
The tool did not allow beyond a specific level of visibility; it provided visibility at the user level, not at the level of nested entitlements, resulting in an inaccurate depiction from the asset manager's point of view. This necessitated manually inputting data into the One Identity Manager user access review module. When it comes to privileged access management, we need to know who has access to what, which is the central problem we want to solve. However, for One Identity Manager, the visibility could be a lot better, especially given we are dealing with many data visibility products in the market.
Aspects such as reporting and dashboarding could be improved; I've seen tools doing better in those areas. One Identity Manager does not deliver specialized workflows for SAP; it offers very standard workflows. However, there are some modules that can be imported, and certain custom workflows need to be created.
Customizing the solution for particular needs is very subjective. It does provide a lot of customizability, though there's room for improvement. One Identity Manager helps minimize gaps in governance coverage, but effectiveness depends on the organization. Ultimately, while One Identity Manager can solve problems, the tool must be combined with good people and a sound strategy for maximum effectiveness.
For how long have I used the solution?
I have used One Identity Manager for more than ten years.
Buyer's Guide
One Identity Manager
April 2026
Learn what your peers think about One Identity Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
893,221 professionals have used our research since 2012.
What do I think about the stability of the solution?
For single-site installations, it performs adequately, however, multi-tenant setups present challenges demanding significant improvements.
What do I think about the scalability of the solution?
For single-site installations, it performs adequately. Multi-tenant setups present challenges demanding significant improvements.
How are customer service and support?
I have contacted their technical and customer support. I consider their support to be very standard, relying on an email-based system. My support engineers have received solutions to their inquiries. However, a tailor-made, dedicated support would significantly enhance user experience, especially for organizations that do not want to wait in queues.
How was the initial setup?
I would rate the initial setup at a seven out of ten. The reason for this rating is the critical nature of multi-tenant applications; compliance is heavily influenced by multi-tenancy, so a lot of engineering improvements could enhance the product.
Ideally, One Identity Manager as a SaaS tool handles maintenance; however, this depends on the specific maintenance discussed.
What about the implementation team?
I had partners who helped set up the whole process, and they were familiar with implementing the tool. Some were contractors, and they did a pretty good job in terms of delivery, respecting timelines. When I was working with one company, my team was based in Nice, France, consisting of internal employees and contractors. They implemented the solution fairly well. However, I had to provide a lot of unnecessary reporting and overhead when connecting the tool with our production environment, providing data that could compromise internal security despite getting the right approvals. Overall, it was an okay experience with One Identity Manager.
What's my experience with pricing, setup cost, and licensing?
We use multiple tools in tandem for better security. The procurement and licensing process can indeed be complex. My experience was decent, with no major problems during procurement or licensing; it was a mostly seamless experience.
What other advice do I have?
With respect to privileged accounts, I would say One Identity Manager can improve; for privileged accounts, a lot needs improvement, and it is not best practice to depend on one tool.
One Identity Manager could incorporate dynamic dashboarding to predict attack vectors and compromises.
I would rate One Identity Manager seven out of ten since it can improve on many aspects.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Oct 1, 2025
Flag as inappropriateFounder and Principal Architect at dmj.one
Comprehensive identity workflows have transformed governance and now support secure access control
Pros and Cons
- "From what I heard, everyone said that before One Identity Manager, they had many workflows and loopholes, and after starting to use it, those issues were addressed, creating a very positive experience for the customer."
- "High pricing remains a notable drawback, driving potential clients towards alternate IAM solutions."
What is our primary use case?
I was also involved in deploying workflows, and the deployment part was handled by senior developers, especially when dealing with orchestration challenges tied to Kerberos delegation and VM issues.
What is most valuable?
One Identity Manager was utilized for governance, provisioning, compliance, and audit management. Even though I had limited access to certain parts, such as IGA, it played a critical role in large-scale access management by offering impressive provisioning and deprovisioning systems. It is an intuitive product for users, as I was able to learn and deploy workflows within a timeframe of two months. The documentation it provides was crucial for the learning curve.
In terms of customization, the ecosystem One Identity Manager offers includes a variety of workflows and extensions, although this comes with high costs. It is highly configurable, allowing dynamic application provisioning through process chains involving IAM and IAG related workflows.
What needs improvement?
One Identity Manager could enhance its trial offering to support custom workflows and VB.NET codes, which would help learners. Improved documentation organization can benefit newcomers, requiring less external searching. A self-check mechanism for file integrity, particularly for missing DLLs, can prevent developer frustrations.
High pricing remains a notable drawback, driving potential clients towards alternate IAM solutions. Additionally, incorporating AI-driven updates could enhance its competitive edge in the evolving market.
For how long have I used the solution?
I have used the solution for two months from June to August last year.
What do I think about the stability of the solution?
Regarding stability, I would rate One Identity Manager as 8, 9, 8.
What do I think about the scalability of the solution?
My clients were enterprise level, and I would rate the scalability of One Identity Manager as hyper-scalable, 10.
How are customer service and support?
They had premier support, but I never used any of it.
What was our ROI?
From what I heard, everyone said that before One Identity Manager, they had many workflows and loopholes. After starting to use it, those issues were addressed, creating a very positive experience for the customer.
What's my experience with pricing, setup cost, and licensing?
Regarding pricing, I find One Identity Manager to be expensive. On a scale where one is cheap and ten is expensive, I would say 10, which is what clients have communicated.
Which other solutions did I evaluate?
From my experience with other solutions, such as SailPoint, Saviynt, and Omada, the UI is the only aspect where I think One Identity Manager faces challenges. However, I believe One Identity Manager is performing exceptionally well.
What other advice do I have?
I always try to recommend One Identity Manager. The only drawback is the price, which is so high that clients try to use other IAM platforms. However, for those with a good budget, the ecosystem One Identity Manager provides is one of the best.
I highly recommend One Identity Manager. The documentation can be categorized for better learning phases. A self-check for file integrity could help, as a missing DLL once caused frustration.
Several areas for improvement include providing a more elaborate trial version for custom workflows and improving documentation categorization. A self-check mechanism for file integrity would also be beneficial.
I rate One Identity Manager overall as an 8 or 9, with 9 being my final answer.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Mar 24, 2026
Flag as inappropriateBuyer's Guide
One Identity Manager
April 2026
Learn what your peers think about One Identity Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
893,221 professionals have used our research since 2012.
Network Security Engineer at DigitalTrack Solutions Pvt Ltd
Centralized identity hub has automated user onboarding and reduced manual work dramatically
Pros and Cons
- "One Identity Manager is working well for our organization, and I do not believe there is a need for improvement because it is a really perfect solution."
What is our primary use case?
One Identity Manager serves as our central identity hub. Our main use case is to sync user identity from Active Directory or the HR system and automatically manage access across our applications. User accounts are created automatically in One Identity Manager, and a sync occurs from Active Directory or the HR system. Based on the role, access is assigned or granted, and accounts are created in target systems. No manual work is needed.
What is most valuable?
The best feature of One Identity Manager is automatic sync, meaning user changes reflect automatically without needing to update multiple systems. It also has multi-system support, working with Active Directory, databases, and cloud applications. One Identity Manager is a very good solution for an enterprise network, providing consistency and accuracy with the same data across all systems and no duplicate users.
The multi-system support and consistency save time and reduce human error. There is no manual user creation on multiple systems, enabling us to onboard users faster than before.
One Identity Manager has positively impacted our organization. It has helped us manage the identity of users from a centralized console, pulling user data from Active Directory, the HR system, and other connected applications. Everything is working well in our organization and really helping our engineers and the users.
We have seen fewer access-related issues with One Identity Manager. The tickets have been reduced by 70 to 80%, and our teams are now able to focus on other things.
What needs improvement?
The initial deployment of One Identity Manager could be more simplified to make the deployment smoother for the initial phase.
For how long have I used the solution?
I have been using One Identity Manager for two years.
What do I think about the stability of the solution?
One Identity Manager is stable.
What do I think about the scalability of the solution?
The scalability of One Identity Manager is good. There is no issue, and everything works centrally.
How are customer service and support?
If we have any technical issues with One Identity Manager, customer support quickly resolves the issues.
Which solution did I use previously and why did I switch?
From the beginning, we have been using One Identity Manager and did not previously use a different solution.
What was our ROI?
We have seen a return on investment with One Identity Manager because we do not have to do the manual work. Manual work has been reduced by 70 to 80% compared to before, and onboarding time has also decreased.
What's my experience with pricing, setup cost, and licensing?
My team handles the pricing, setup costs, and licensing.
Which other solutions did I evaluate?
We did not evaluate other options before choosing One Identity Manager.
What other advice do I have?
One Identity Manager is working well for our organization, and I do not believe there is a need for improvement because it is a really perfect solution.
I highly recommend One Identity Manager because it really helps to onboard users and with the central management of users. This will really help the organization in many aspects and will save time in onboarding, 70 to 80%, and potentially 90% on onboarding or offboarding. No additional IT resources are needed, so I will recommend it highly. I have given One Identity Manager a rating of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Apr 10, 2026
Flag as inappropriateManager, Application Development at a tech services company with 201-500 employees
Platform has unified complex identity governance and has improved customization for diverse projects
Pros and Cons
- "I am a strong advocate for One Identity Manager because it provides a single platform for enterprise-level administration and governance of users, data, and privileged accounts."
- "One Identity Manager's documentation is something they can improve, and I believe much of this is related to translation since it is a German company."
What is our primary use case?
I use One Identity Manager in a few different projects for the Air Force, and I have also used it for the commercial business that I currently work for, covering both government and commercial environments.
I do not use One Identity Manager to help me manage SAP.
I don't use One Identity Manager for IGA regarding the difficult-to-manage aspects of T-codes, profiles, and rules.
I do not use One Identity Manager to extend governance to cloud applications through custom interfaces.
What is most valuable?
The most valuable aspect of One Identity Manager is how customizable it is compared to alternatives, which is the most obvious and biggest differentiator for me.
I am a strong advocate for One Identity Manager because it provides a single platform for enterprise-level administration and governance of users, data, and privileged accounts. The tool is fantastic for what it does. However, in version eight and below, the UIs to perform all that functionality were terrible and even worse when customizing. The newer version nine is significantly better. I haven't had much experience with the latest version since we are still on version eight, though the UI to manage and perform governance could be better, but I know version nine has definitely improved in this regard.
One Identity Manager has helped me minimize gaps in governance covering test, dev, and production servers. We have two instances of One Identity Manager, and one instance doesn't necessarily allow us to manage test, dev, and prod all together, but separate instances of One Identity do.
What needs improvement?
One Identity Manager's documentation is something they can improve, and I believe much of this is related to translation since it is a German company. Access to documentation and finding answers on how things work is extraordinarily difficult.
One Identity Manager has not helped application owners or line of business managers make application decisions without involving IT. Regarding the elimination of the help desk's need to govern access to applications because of One Identity Manager, managers can go in and find the roles their employees need and dynamically assign permissions through One Identity Manager. However, I'm uncertain about what is meant by application governance decisions in this context.
One Identity Manager could help me achieve an identity-centric Zero Trust Model, but we haven't necessarily designed it to do so in any of my environments.
For how long have I used the solution?
I have been using One Identity Manager for approximately eight years.
What do I think about the stability of the solution?
One Identity Manager is very stable. I haven't seen any major instability such as lagging, crashing, or downtime.
What do I think about the scalability of the solution?
Considering that One Identity Manager runs off a database, as long as you can scale your database, the scalability is great because you can even set up multiple job servers.
How are customer service and support?
I have contacted customer support or technical support for One Identity Manager, mostly because we are trying to customize things and need that next-level engineering support, not because of problems with the product.
The quality and speed of One Identity Manager's support were terrible years ago, but in the last few years it has gotten significantly better. I would rate the support currently as pretty good.
On a scale from one to ten for the support of this product, I would give it a nine. For the support recently, I would say seven.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial deployment of One Identity Manager when I first started was pretty easy with no major hurdles.
The first time I deployed One Identity Manager was eight years ago, which isn't a fair comparison, but regarding the most recent experience, I had it installed in under an hour, though I have also done it a few times.
What about the implementation team?
One person can deploy One Identity Manager, so you don't need an entire team.
One Identity Manager requires pretty straightforward maintenance regarding the installation sustainment. However, for governing the system for a decent-sized corporation, you would want a couple of full-time people to govern all the functions. For day-to-day IT system administration, it doesn't really require much.
Which other solutions did I evaluate?
I did look into alternatives to One Identity Manager, specifically ForgeRock at one point, and there was something else we looked into, but I cannot remember the name of it.
What other advice do I have?
I would give this product a review rating of nine out of ten.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Last updated: Dec 4, 2025
Flag as inappropriateNetwork Security Engineer at a outsourcing company with 501-1,000 employees
Automated onboarding has transformed access governance and now simplifies compliance reviews
Pros and Cons
- "One Identity Manager has had a strong positive impact on my organization, especially in terms of security, efficiency, and compliance."
- "One Identity Manager has several areas where it can be improved, including the user interface and usability, performance, setup and complexity, documentation and learning curve, integration, and modernization."
What is our primary use case?
One Identity Manager's main use case is identity lifecycle management, including creating users, assigning access, modifying roles, and revoking access when users leave.
When a new joiner needs to be onboarded, the system automatically creates their accounts and assigns access based on their role while ensuring compliance. One Identity Manager automates the entire onboarding process, resulting in very little manual work. This includes user creation, role-based access provisioning across systems, policy and compliance checks, and workflow management.
Apart from onboarding, I use One Identity Manager regularly for managing the full identity lifecycle.
What is most valuable?
The best features of One Identity Manager are mainly around governance and centralized user access.
Several features stand out to me in One Identity Manager. Onboarding and access provisioning are very convenient. Another important feature is centralized access governance, which gives a clear view of who has access to what, which is very useful for security and compliance. The access review and certification feature would also be very useful in One Identity Manager.
One Identity Manager has had a strong positive impact on my organization, especially in terms of security, efficiency, and compliance. Onboarding a new user is now automated with accounts created and access assigned instantly instead of taking hours manually. It has improved overall security, reduced manual work through automation, and made compliance and access review much easier.
What needs improvement?
One Identity Manager has several areas where it can be improved, including the user interface and usability, performance, setup and complexity, documentation and learning curve, integration, and modernization.
One challenge I faced with One Identity Manager is related to the user interface and navigation. While testing workflows or checking user access, it can take time to find the exact module or setting because the UI has multiple layers and tools. It is powerful but not very intuitive at first.
Apart from what I mentioned earlier, there are several more areas where One Identity Manager can be improved, regarding reporting flexibility, real-time monitoring and alerts, workflow simplification, and cloud-native features.
For how long have I used the solution?
I have been using One Identity Manager for six months.
What do I think about the stability of the solution?
In my experience, One Identity Manager has proven to be stable and reliable. It performs consistently with minimal crashes or downtime.
What do I think about the scalability of the solution?
One Identity Manager is highly scalable and built for large enterprise environments. It can handle a growing number of users, systems, and applications without major performance issues.
How are customer service and support?
Customer support for One Identity Manager is generally good, but it can vary depending on the support level. The support team is very knowledgeable and experienced with IAM concepts.
Which solution did I use previously and why did I switch?
Before One Identity Manager, I was mainly using manual processes and basic directory-based management, such as Microsoft Active Directory. User provisioning and access changes were mostly manual and time-consuming. There was limited visibility into who had access to what. Compliance and audit processes were difficult and required a lot of manual reports. That is why I switched to One Identity Manager.
How was the initial setup?
One Identity Manager is a powerful and feature-rich solution with strong automation and governance, but the complexity, UI, and initial setup prevent it from being a perfect score.
What was our ROI?
I have definitely seen a return on investment after implementing One Identity Manager, mainly in terms of time saving, reduced manual effort, and improved security. Around 50 to 70 percent reduction in manual efforts has been noticed.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing and licensing for One Identity Manager is that it follows a custom enterprise pricing model.
Which other solutions did I evaluate?
Before selecting One Identity Manager, I evaluated several other identity governance solutions available in the market, including SailPoint Identity Security, Oracle Identity Governance, and Omada Identity.
What other advice do I have?
For someone considering One Identity Manager, my advice is to focus on planning and process before jumping into implementation. Start with clear requirements and business goals, and define roles, access policies, and workflows before implementation. I have rated this review an eight out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Apr 26, 2026
Flag as inappropriateTechnical Support Executive at Digitaltrack
Automation has transformed identity lifecycles and now streamlines compliant access control
Pros and Cons
- "After implementing One Identity Manager, onboarding and provisioning time is reduced by around fifty percent, and manual access-related errors decrease significantly due to automation and approval workflows."
- "Customer support for One Identity Manager is generally good, especially for identity governance and integration-related issues. However, complex cases or advanced customizations can sometimes take longer to resolve."
What is our primary use case?
My main use case for One Identity Manager is identity lifecycle management, user provisioning, access governance, and automating joiner, mover, leaver processes using this product.
When a new employee joins, I use One Identity Manager to automatically provision accounts, assign roles, and grant the required access based on department or job role.
It also helps centralize identity governance and ensures access request approvals and compliance processes are handled in a more automated and controlled way using this product.
What is most valuable?
The best features One Identity Manager offers are automated provisioning, role-based access control, identity lifecycle management, approval workflows, compliance reporting, and access governance.
I rely most on the automated provisioning and identity lifecycle management feature in One Identity Manager. It makes daily operations easier by automatically creating, updating, and disabling accounts based on user role or status changes, which saves time and reduces manual errors.
One Identity Manager has positively impacted my organization by improving efficiency through automating identity management tasks, strengthening access control, reducing manual errors, and helping improve compliance and audit readiness across the organization.
After implementing One Identity Manager, onboarding and provisioning time is reduced by around fifty percent, and manual access-related errors decrease significantly due to automation and approval workflows. It also improves audit readiness because access changes and approvals are tracked centrally.
What needs improvement?
One Identity Manager could be improved by simplifying the user interface, reducing the learning curve for new administrators, and making customization and reporting easier.
Better documentation, clearer troubleshooting guidance, and simpler integration setup for complex environments would also improve the overall experience with One Identity Manager.
For how long have I used the solution?
I have been using One Identity Manager for around one year.
What do I think about the stability of the solution?
One Identity Manager is generally stable and reliable for enterprise identity management. Occasionally, complex customizations or large-scale integrations may require tuning, but overall stability is good.
What do I think about the scalability of the solution?
One Identity Manager is highly scalable and suitable for large enterprises, making it easy to manage thousands of users, roles, and connected systems. It handles hybrid environments and complex identity governance requirements quite well when properly configured.
How are customer service and support?
Customer support for One Identity Manager is generally good, especially for identity governance and integration-related issues. However, complex cases or advanced customizations can sometimes take longer to resolve.
Which solution did I use previously and why did I switch?
Before One Identity Manager, I mainly relied on native Active Directory tools and manual identity management processes. I switched to One Identity Manager for better automation, centralized identity governance, approval workflows, and improved compliance management.
How was the initial setup?
My experience with pricing and licensing for One Identity Manager has been moderate to high, mainly because it is an enterprise-focused solution. The initial setup requires planning and skilled resources, but the automation and governance capabilities provide good long-term value.
What about the implementation team?
My advice would be to clearly define identity governance processes and access policies before implementing One Identity Manager. Start with core automation use cases first, invest in proper planning and training, and avoid overcomplicating customizations during the initial deployment.
What was our ROI?
I have seen a good return on investment with One Identity Manager. User provisioning and access management tasks become around fifty percent faster, manual errors reduce significantly, and the same admin team can manage more identities without increasing staff. Automation and centralized governance also reduce audit preparation effort and improve compliance efficiency.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing and licensing for One Identity Manager has been moderate to high, mainly because it is an enterprise-focused solution.
Which other solutions did I evaluate?
I evaluated solutions such as SailPoint IdentityIQ, Microsoft Identity Manager, and Okta before selecting One Identity Manager. I chose it mainly for its strong identity governance, automation, and hybrid environment support.
What other advice do I have?
I would rate this review an eight out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: May 7, 2026
Flag as inappropriatePenetration Tester at Essen Vision Software
Automated identity governance has streamlined onboarding and standardized access controls
Pros and Cons
- "Overall, One Identity Manager has been a solid platform for improving identity governance and automation, especially in large environments where centralized access management and compliance visibility are important."
- "One Identity Manager is a powerful platform, but the UI could be more intuitive, and some advanced configurations and customizations have a fairly steep learning curve."
What is our primary use case?
One Identity Manager is primarily used for identity lifecycle management, access governance, provisioning, and automating joining, joiner, mover, and leaver processes across different systems.
One Identity Manager automatically provisions accounts and assigns the right access when a new employee joins, and it removes or adjusts permissions automatically when someone changes roles or leaves the company.
One Identity Manager has been integrated with Active Directory, HR systems, and a few business applications, so identity changes flow automatically across multiple platforms from a single process.
What is most valuable?
The best features One Identity Manager offers are identity lifecycle automation, access governance, role-based provisioning, approval workflows, and the store, auditing, and compliance reporting capabilities.
Identity lifecycle automation is the feature relied upon most in day-to-day work because it reduces a lot of manual provisioning work and keeps access changes consistent across connected systems.
One Identity Manager has positively impacted the organization by improving access governance, reducing manual identity management tasks, and helping standardize onboarding, role changes, and offboarding processes across the organization.
Since using One Identity Manager, strong outcomes have been achieved such as faster onboarding and access provisioning, and fewer access-related errors because approvals and role assignments are automated and standardized across systems.
Overall, One Identity Manager has been a solid platform for improving identity governance and automation, especially in large environments where centralized access management and compliance visibility are important.
What needs improvement?
One Identity Manager is a powerful platform, but the UI could be more intuitive, and some advanced configurations and customizations have a fairly steep learning curve.
Reporting customization and troubleshooting complex workflows can sometimes be a particular pain point for my team, so better visibility and simpler administration tools would help significantly.
For how long have I used the solution?
One Identity Manager has been in use for approximately two years.
What do I think about the stability of the solution?
One Identity Manager is very stable.
What do I think about the scalability of the solution?
One Identity Manager scales very well for large enterprise environments, especially when managing multiple directories, hybrid infrastructures, and high volumes of provisioning and governance workflows. The platform's modular architecture helps when scaling across multiple domains and millions of identities, although larger deployments usually need careful performance tuning and infrastructure planning.
How are customer service and support?
Customer support for One Identity Manager is great and helpful. Every time support is contacted, they always try to resolve issues as quickly as possible.
Which solution did I use previously and why did I switch?
Before using One Identity Manager, manual processes and native AD tools with some custom scripts were mainly relied upon. The switch to One Identity Manager was made to get better automation, centralized governance, and strong compliance controls.
How was the initial setup?
One Identity Manager requires proper planning because implementation and customization can take time in complex environments.
What was our ROI?
A return on investment with One Identity Manager has been achieved mainly through reduced manual identity management work and faster onboarding and offboarding processes. Tasks that previously took hours across multiple teams are now mostly automated, which has improved efficiency and reduced access-related errors.
What's my experience with pricing, setup cost, and licensing?
One Identity Manager pricing, setup cost, and licensing are definitely enterprise-focused and can get expensive depending on the number of managed identities and integrations. However, the automation and the governance capabilities justify the investment in larger environments.
Which other solutions did I evaluate?
Before choosing One Identity Manager, SailPoint, Saviynt, and Microsoft Entra ID Governance were evaluated, mainly because strong hybrid identity governance and flexible provisioning workflows were needed.
What other advice do I have?
One Identity Manager should be chosen with the clarity that identity governance processes and role models are well-defined before implementation because the platform is very powerful but works best when the workflows and access policies are well planned from the beginning. The overall review rating given to One Identity Manager is 8 out of 10.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: May 7, 2026
Flag as inappropriateAssistant Manager at DigitalTrack Solutions Pvt Ltd
Centralized governance has reduced manual access work and improves security oversight
Pros and Cons
- "It has really reduced the workload of the IT team by almost 40 to 60 percent."
What is our primary use case?
Our main use case for One Identity Manager is to manage the access request and approvals through the workflows. It really helps us to enforce the RBAC control and ensures proper authentication and security. This reduces the unauthorized access risk.
A user can request access through the portal. Approvals are handled through workflows. This ensures proper authentication and validation before they are getting access to the application. It improves accountability and visibility.
What is most valuable?
The best features One Identity Manager offers are its strong governance and compliance features. It provides great visibility into access control and approvals. It supports the audit requirement and also provides the identity lifecycle process, which really reduces manual efforts and improves accuracy. It also integrates well with multiple systems such as AD and enterprise applications, making it suitable for any hybrid environment of the company.
Because our organization has a hybrid environment, it really helps us to integrate all those systems from a central unified console or portal. This smooths our process and improves efficiency to enforce the security policies.
One Identity Manager has positively impacted our organization by improving the security through proper access control and approval. It has also reduced the manual workload for the IT engineers, making the operations more efficient in our environment.
It has really reduced the workload of the IT team by almost 40 to 60 percent. It provides great visibility and has great security features. The manual tasks have been reduced with the positive impact.
I can see that the workload has been reduced, and it is saving our engineers time, which allows them to handle more work in the same time.
What needs improvement?
As far as we are using this solution, we don't see that anything is lacking. It's great working in our environment as per our requirement. I don't see anything that needs to be improved.
I don't wish to add any improvement needed as of now because it's working well for our organization, and we are happy with this.
For how long have I used the solution?
It's been more than four years since I'm using One Identity Manager.
What do I think about the stability of the solution?
Stability has been satisfactory.
What do I think about the scalability of the solution?
Scalability-wise, there is no issue. It works very well.
How are customer service and support?
Excellent support is provided by the vendor support team. They are ready to address any kind of issue or any technical matters.
I had a great experience with the sales team of the vendor. They provided great pricing for the setup cost and the licensing. We are very happy with the sales team as they provided great support on the procurement of the solution.
What's my experience with pricing, setup cost, and licensing?
I had a great experience with the sales team of the vendor. They provided great pricing for the setup cost and the licensing.
What other advice do I have?
I will advise that this solution is very highly recommended and it's a great fit for any organization. Use a phased deployment approach and begin with the core features, expanding step-by-step. This will really help reduce the complexity of deployment. I have rated this solution a 9 out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Apr 7, 2026
Flag as inappropriateBuyer's Guide
Download our free One Identity Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2026
Product Categories
Identity Governance Administration (IGA) User Provisioning Software Identity Management (IM)Popular Comparisons
Microsoft Entra ID
SailPoint Identity Security Cloud
Omada Identity
Saviynt Identity Cloud
Fortinet FortiAuthenticator
OneLogin
CyberArk Identity
ForgeRock
One Identity Active Roles
Microsoft Entra ID Protection
Oracle Identity Governance
IBM Security Verify Access
Symantec Identity Governance and Administration
Microsoft Identity Manager
SAP Identity Management
Buyer's Guide
Download our free One Identity Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:


















