One Identity Manager serves as our central identity hub. Our main use case is to sync user identity from Active Directory or the HR system and automatically manage access across our applications. User accounts are created automatically in One Identity Manager, and a sync occurs from Active Directory or the HR system. Based on the role, access is assigned or granted, and accounts are created in target systems. No manual work is needed.
Network Security Engineer at DigitalTrack Solutions Pvt Ltd
Centralized identity hub has automated user onboarding and reduced manual work dramatically
Pros and Cons
- "One Identity Manager is working well for our organization, and I do not believe there is a need for improvement because it is a really perfect solution."
What is our primary use case?
What is most valuable?
The best feature of One Identity Manager is automatic sync, meaning user changes reflect automatically without needing to update multiple systems. It also has multi-system support, working with Active Directory, databases, and cloud applications. One Identity Manager is a very good solution for an enterprise network, providing consistency and accuracy with the same data across all systems and no duplicate users.
The multi-system support and consistency save time and reduce human error. There is no manual user creation on multiple systems, enabling us to onboard users faster than before.
One Identity Manager has positively impacted our organization. It has helped us manage the identity of users from a centralized console, pulling user data from Active Directory, the HR system, and other connected applications. Everything is working well in our organization and really helping our engineers and the users.
We have seen fewer access-related issues with One Identity Manager. The tickets have been reduced by 70 to 80%, and our teams are now able to focus on other things.
What needs improvement?
The initial deployment of One Identity Manager could be more simplified to make the deployment smoother for the initial phase.
For how long have I used the solution?
I have been using One Identity Manager for two years.
Buyer's Guide
One Identity Manager
April 2026
Learn what your peers think about One Identity Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
890,088 professionals have used our research since 2012.
What do I think about the stability of the solution?
One Identity Manager is stable.
What do I think about the scalability of the solution?
The scalability of One Identity Manager is good. There is no issue, and everything works centrally.
How are customer service and support?
If we have any technical issues with One Identity Manager, customer support quickly resolves the issues.
Which solution did I use previously and why did I switch?
From the beginning, we have been using One Identity Manager and did not previously use a different solution.
What was our ROI?
We have seen a return on investment with One Identity Manager because we do not have to do the manual work. Manual work has been reduced by 70 to 80% compared to before, and onboarding time has also decreased.
What's my experience with pricing, setup cost, and licensing?
My team handles the pricing, setup costs, and licensing.
Which other solutions did I evaluate?
We did not evaluate other options before choosing One Identity Manager.
What other advice do I have?
One Identity Manager is working well for our organization, and I do not believe there is a need for improvement because it is a really perfect solution.
I highly recommend One Identity Manager because it really helps to onboard users and with the central management of users. This will really help the organization in many aspects and will save time in onboarding, 70 to 80%, and potentially 90% on onboarding or offboarding. No additional IT resources are needed, so I will recommend it highly. I have given One Identity Manager a rating of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Apr 10, 2026
Flag as inappropriateManager, Application Development at a tech services company with 201-500 employees
Platform has unified complex identity governance and has improved customization for diverse projects
Pros and Cons
- "I am a strong advocate for One Identity Manager because it provides a single platform for enterprise-level administration and governance of users, data, and privileged accounts."
- "One Identity Manager's documentation is something they can improve, and I believe much of this is related to translation since it is a German company."
What is our primary use case?
I use One Identity Manager in a few different projects for the Air Force, and I have also used it for the commercial business that I currently work for, covering both government and commercial environments.
I do not use One Identity Manager to help me manage SAP.
I don't use One Identity Manager for IGA regarding the difficult-to-manage aspects of T-codes, profiles, and rules.
I do not use One Identity Manager to extend governance to cloud applications through custom interfaces.
What is most valuable?
The most valuable aspect of One Identity Manager is how customizable it is compared to alternatives, which is the most obvious and biggest differentiator for me.
I am a strong advocate for One Identity Manager because it provides a single platform for enterprise-level administration and governance of users, data, and privileged accounts. The tool is fantastic for what it does. However, in version eight and below, the UIs to perform all that functionality were terrible and even worse when customizing. The newer version nine is significantly better. I haven't had much experience with the latest version since we are still on version eight, though the UI to manage and perform governance could be better, but I know version nine has definitely improved in this regard.
One Identity Manager has helped me minimize gaps in governance covering test, dev, and production servers. We have two instances of One Identity Manager, and one instance doesn't necessarily allow us to manage test, dev, and prod all together, but separate instances of One Identity do.
What needs improvement?
One Identity Manager's documentation is something they can improve, and I believe much of this is related to translation since it is a German company. Access to documentation and finding answers on how things work is extraordinarily difficult.
One Identity Manager has not helped application owners or line of business managers make application decisions without involving IT. Regarding the elimination of the help desk's need to govern access to applications because of One Identity Manager, managers can go in and find the roles their employees need and dynamically assign permissions through One Identity Manager. However, I'm uncertain about what is meant by application governance decisions in this context.
One Identity Manager could help me achieve an identity-centric Zero Trust Model, but we haven't necessarily designed it to do so in any of my environments.
For how long have I used the solution?
I have been using One Identity Manager for approximately eight years.
What do I think about the stability of the solution?
One Identity Manager is very stable. I haven't seen any major instability such as lagging, crashing, or downtime.
What do I think about the scalability of the solution?
Considering that One Identity Manager runs off a database, as long as you can scale your database, the scalability is great because you can even set up multiple job servers.
How are customer service and support?
I have contacted customer support or technical support for One Identity Manager, mostly because we are trying to customize things and need that next-level engineering support, not because of problems with the product.
The quality and speed of One Identity Manager's support were terrible years ago, but in the last few years it has gotten significantly better. I would rate the support currently as pretty good.
On a scale from one to ten for the support of this product, I would give it a nine. For the support recently, I would say seven.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial deployment of One Identity Manager when I first started was pretty easy with no major hurdles.
The first time I deployed One Identity Manager was eight years ago, which isn't a fair comparison, but regarding the most recent experience, I had it installed in under an hour, though I have also done it a few times.
What about the implementation team?
One person can deploy One Identity Manager, so you don't need an entire team.
One Identity Manager requires pretty straightforward maintenance regarding the installation sustainment. However, for governing the system for a decent-sized corporation, you would want a couple of full-time people to govern all the functions. For day-to-day IT system administration, it doesn't really require much.
Which other solutions did I evaluate?
I did look into alternatives to One Identity Manager, specifically ForgeRock at one point, and there was something else we looked into, but I cannot remember the name of it.
What other advice do I have?
I would give this product a review rating of nine out of ten.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Last updated: Dec 4, 2025
Flag as inappropriateBuyer's Guide
One Identity Manager
April 2026
Learn what your peers think about One Identity Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
890,088 professionals have used our research since 2012.
Network Security Engineer at a outsourcing company with 501-1,000 employees
Automated onboarding has transformed access governance and now simplifies compliance reviews
Pros and Cons
- "One Identity Manager has had a strong positive impact on my organization, especially in terms of security, efficiency, and compliance."
- "One Identity Manager has several areas where it can be improved, including the user interface and usability, performance, setup and complexity, documentation and learning curve, integration, and modernization."
What is our primary use case?
One Identity Manager's main use case is identity lifecycle management, including creating users, assigning access, modifying roles, and revoking access when users leave.
When a new joiner needs to be onboarded, the system automatically creates their accounts and assigns access based on their role while ensuring compliance. One Identity Manager automates the entire onboarding process, resulting in very little manual work. This includes user creation, role-based access provisioning across systems, policy and compliance checks, and workflow management.
Apart from onboarding, I use One Identity Manager regularly for managing the full identity lifecycle.
What is most valuable?
The best features of One Identity Manager are mainly around governance and centralized user access.
Several features stand out to me in One Identity Manager. Onboarding and access provisioning are very convenient. Another important feature is centralized access governance, which gives a clear view of who has access to what, which is very useful for security and compliance. The access review and certification feature would also be very useful in One Identity Manager.
One Identity Manager has had a strong positive impact on my organization, especially in terms of security, efficiency, and compliance. Onboarding a new user is now automated with accounts created and access assigned instantly instead of taking hours manually. It has improved overall security, reduced manual work through automation, and made compliance and access review much easier.
What needs improvement?
One Identity Manager has several areas where it can be improved, including the user interface and usability, performance, setup and complexity, documentation and learning curve, integration, and modernization.
One challenge I faced with One Identity Manager is related to the user interface and navigation. While testing workflows or checking user access, it can take time to find the exact module or setting because the UI has multiple layers and tools. It is powerful but not very intuitive at first.
Apart from what I mentioned earlier, there are several more areas where One Identity Manager can be improved, regarding reporting flexibility, real-time monitoring and alerts, workflow simplification, and cloud-native features.
For how long have I used the solution?
I have been using One Identity Manager for six months.
What do I think about the stability of the solution?
In my experience, One Identity Manager has proven to be stable and reliable. It performs consistently with minimal crashes or downtime.
What do I think about the scalability of the solution?
One Identity Manager is highly scalable and built for large enterprise environments. It can handle a growing number of users, systems, and applications without major performance issues.
How are customer service and support?
Customer support for One Identity Manager is generally good, but it can vary depending on the support level. The support team is very knowledgeable and experienced with IAM concepts.
Which solution did I use previously and why did I switch?
Before One Identity Manager, I was mainly using manual processes and basic directory-based management, such as Microsoft Active Directory. User provisioning and access changes were mostly manual and time-consuming. There was limited visibility into who had access to what. Compliance and audit processes were difficult and required a lot of manual reports. That is why I switched to One Identity Manager.
How was the initial setup?
One Identity Manager is a powerful and feature-rich solution with strong automation and governance, but the complexity, UI, and initial setup prevent it from being a perfect score.
What was our ROI?
I have definitely seen a return on investment after implementing One Identity Manager, mainly in terms of time saving, reduced manual effort, and improved security. Around 50 to 70 percent reduction in manual efforts has been noticed.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing and licensing for One Identity Manager is that it follows a custom enterprise pricing model.
Which other solutions did I evaluate?
Before selecting One Identity Manager, I evaluated several other identity governance solutions available in the market, including SailPoint Identity Security, Oracle Identity Governance, and Omada Identity.
What other advice do I have?
For someone considering One Identity Manager, my advice is to focus on planning and process before jumping into implementation. Start with clear requirements and business goals, and define roles, access policies, and workflows before implementation. I have rated this review an eight out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Apr 26, 2026
Flag as inappropriateCyber Security Analyst at Digitaltrack
Automation has reduced manual access tasks and ensures users receive correct roles on time
Pros and Cons
- "One Identity Manager is a reliable solution that really helps with automation and access management, and once it is properly set up, it makes day-to-day operations much smoother."
- "The main improvement for One Identity Manager would be around the initial setup; it can feel a bit complex and needs proper planning."
What is our primary use case?
My main use case for One Identity Manager is for user provisioning and de-provisioning and managing access across different systems. Day-to-day, it helps automate user lifecycle tasks and ensure the right access is given based on a role.
When a new employee joins, I assign a role in the system, and it automatically creates their account and gives them access to required applications. Similarly, if someone changes departments, their access gets updated automatically, and we save a lot of manual effort.
Overall, it has been very useful in automating access and reducing manual work.
What is most valuable?
The best features of One Identity Manager are automation of the user lifecycle, role-based access control, and strong identity governance. It helps ensure users get the right access at the right time, reduces manual work, and improves overall security and compliance.
I rely on automation the most because it handles most of the repetitive tasks like user onboarding and access changes. It saves time and also reduces the chances of manual errors. Overall, it makes things much smoother.
The features work well together, and once everything is set up properly, it makes managing users and access a lot more efficient.
One Identity Manager has had a positive impact on my organization, mainly by reducing manual work and making access management more streamlined. It also improves security because users get the right access at the right time and unnecessary access is removed automatically.
What needs improvement?
The main improvement for One Identity Manager would be around the initial setup. It can feel a bit complex and needs proper planning. Also, some integrations, especially with cloud environments, could be faster and smoother.
The UI can feel a bit complex at times and could be more user-friendly. Also, the reporting is good but could be more flexible and easier to customize. Apart from that, everything works fine.
For how long have I used the solution?
I have been working in my current field for one year plus.
What do I think about the stability of the solution?
One Identity Manager is quite stable. We have not faced many major issues or downtime in our environment.
What do I think about the scalability of the solution?
One Identity Manager scales well. We have been able to handle more users and systems without any issues.
How are customer service and support?
Customer support is good, responsive, and helpful when needed.
Which solution did I use previously and why did I switch?
We did not use any other solution before switching to One Identity Manager. This is our first identity management tool.
How was the initial setup?
I suggest planning the implementation properly and defining rules clearly from the start. Once it is set up well, it really helps automate access and makes management much easier.
What about the implementation team?
We also have a partner relationship with the vendor, apart from being a customer.
What was our ROI?
We have seen a return on investment. Manual work has been reduced by around 40%, and access requests are processed much faster.
What's my experience with pricing, setup cost, and licensing?
The pricing felt reasonable compared to other tools. The setup cost was manageable, though it does require some planning. The licensing is flexible, but you need to size it properly based on users and requirements.
Which other solutions did I evaluate?
We looked at a few options like Okta, but we chose One Identity Manager because it fit our requirements better in terms of automation and cost.
What other advice do I have?
One Identity Manager is a reliable solution that really helps with automation and access management. Once it is properly set up, it makes day-to-day operations much smoother. I would rate this solution an 8 out of 10.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Apr 20, 2026
Flag as inappropriateSystem administrator at Digitaltrack soluctions Pvt. ltd
Automated identity control has streamlined audits and reduces manual provisioning work
Pros and Cons
- "One Identity Manager has positively impacted my organization by significantly reducing the time required for audit preparation and completion, improving compliance by ensuring all access is properly approved and tracked, increasing security, and creating a compliance-ready environment with improved efficiency, with the time for audit completion reduced by almost seventy to eighty percent."
What is our primary use case?
One Identity Manager serves as my primary solution for user lifecycle management, role-based access control, HR-driven identity management, and provisioning and de-provisioning. When a new employee joins, One Identity Manager automatically creates the account and access. When they leave, the access is removed automatically, which maintains security effectively. Role-based access control assigns access based on employee roles and responsibilities rather than manually assigning permissions, which simplifies access management for large environments. Automated provisioning ensures that user accounts and access are provisioned automatically, with access removed or granted based on requirements, reducing manual work significantly.
What is most valuable?
The best features One Identity Manager offers include central identity management where all user access is managed from a simple and unified platform, reducing complexity and providing great visibility. Strong automation based on user provisioning, onboarding, and de-boarding of employees is another valuable feature. One Identity Manager also provides an audit and compliance-ready environment with detailed logs and reports that help during audit times, which we are using for auditing purposes.
One Identity Manager has positively impacted my organization by significantly reducing the time required for audit preparation and completion. It has improved compliance by ensuring all access is properly approved and tracked. Security has increased, and we now have a compliance-ready environment with improved efficiency. The time for audit completion has been reduced by almost seventy to eighty percent.
What needs improvement?
One Identity Manager currently offers comprehensive features and is working well for us, providing great features with security and visibility. In some areas, customization could be improved so that clients can customize features based on their business needs.
For how long have I used the solution?
I have been using One Identity Manager for more than four years.
What do I think about the stability of the solution?
One Identity Manager is stable.
What do I think about the scalability of the solution?
One Identity Manager's scalability is excellent with no challenges.
How are customer service and support?
The customer support for One Identity Manager is supportive and good in their technical expertise.
Which solution did I use previously and why did I switch?
I have only used One Identity Manager.
How was the initial setup?
I have had an extremely positive experience with the pricing, setup cost, and licensing because we are receiving very good support from the vendor team.
What about the implementation team?
We are a partner with this vendor.
What was our ROI?
For return on investment with One Identity Manager, we have seen less effort needed in managing user provisioning or de-provisioning, reducing manual effort by fifty to sixty percent and saving significant time for the IT team. Our audit completion time has also been reduced.
What's my experience with pricing, setup cost, and licensing?
I have had an extremely positive experience with the pricing, setup cost, and licensing because we are receiving very good support from the vendor team.
Which other solutions did I evaluate?
I did not evaluate other options before choosing One Identity Manager.
What other advice do I have?
One Identity Manager is a reliable solution that is working perfectly for us. My advice for others considering One Identity Manager is to ensure you have a skilled implementation solution resource involved in the project. The solution is powerful and requires proper configuration and understanding, so good planning is key to success in solution deployment. I would rate One Identity Manager eight out of ten overall.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Apr 15, 2026
Flag as inappropriateSenior software engineer at Infosys
Identity automation has reduced help desk load and has improved security and compliance visibility
Pros and Cons
- "Since we started using One Identity Manager in my organization, we have seen operational efficiency gains, including faster onboarding and de-provisioning, help desk cost reduction, and improved compliance and audit efficiency."
- "One Identity Manager can be improved because implementation and administration require specialized knowledge, and deployment efforts can be significant."
What is our primary use case?
One Identity Manager's main value to my organization is its flexibility and depth of customization, as it seamlessly integrates with a wide range of on-premises and cloud systems and supports strong automation for joiner, mover, and leaver processes. The automation features I use help to reduce manual effort, improve consistency, and strengthen our overall security posture. I also appreciate the reporting and auditing tools, which are particularly strong, provide clear visibility into access rights, and support compliance initiatives.
A specific example of how I use the automation features and reporting tools in my day-to-day work is through configurable workflows that reduce manual effort, improve efficiency, and ensure consistency in access management processes. One Identity Manager provides detailed reports and dashboards for visibility into identities, access rights, and compliance status.
One Identity Manager is used to centrally manage digital identities and access rights across my organization.
What is most valuable?
The best features One Identity Manager offers include identity lifecycle management, access provisioning, role-based access control, compliance reporting, and auditing across IT systems. Out of these features, I find myself relying on user lifecycle management the most because it helps automate joiner, mover, and leaver processes by provisioning, modifying, and de-provisioning user accounts across connected systems.
Regarding access provisioning and de-provisioning, it manages access request approvals and enforces access policies for applications, databases, directories, and cloud services. For privileged access governance, it governs access to high-risk or privileged accounts by enforcing approval workflows and monitoring usage.
I also appreciate the integration across IT systems where One Identity Manager integrates seamlessly with on-premises and cloud platforms such as Active Directory, Azure AD, SAP, databases, and custom applications.
When it comes to reporting and auditing, One Identity Manager provides detailed reports and dashboards for visibility into identities, access rights, and compliance status, which helps us make data-driven decisions easily.
Since we started using One Identity Manager in my organization, we have seen operational efficiency gains, including faster onboarding and de-provisioning, help desk cost reduction, and improved compliance and audit efficiency. We have also seen a reduction in security risk. The help desk cost has been reduced greatly, as automating password resets, self-service access requests, and lifecycle events cuts down on help desk tickets and support labor by fifty percent. One Identity Manager has reduced risk through strong identity governance that helps prevent over-privileged access and orphaned accounts, lowering the likelihood of data breaches. We have been able to save a lot of money—over the past four years, we have saved approximately one hundred thousand dollars.
What needs improvement?
One Identity Manager can be improved because implementation and administration require specialized knowledge, and deployment efforts can be significant.
The user interface prioritizes functionality over simplicity, and effective use of the platform typically depends on well-defined processes and trained administrators.
For how long have I used the solution?
I have been using One Identity Manager for four years.
What other advice do I have?
For any organization that is looking for frequent reporting improvement in efficiency, lowering error rates, and faster compliance outcomes, I advise that you should consider One Identity Manager, which delivers measurable financial value.
Since we started using One Identity Manager, it has been truly helpful. It has led to fewer help desk tickets and faster service delivery in my organization, enhanced security and compliance, reduced risk and audit burden for IT, and improved time to productivity for our employees. I would rate this product a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Feb 3, 2026
Flag as inappropriateBusiness Analyst at tcs
Provides security, compliance, and visibility
Pros and Cons
- "One Identity Manager simplifies user operations and provides security features, including automatic blocking of inactive accounts and timely access revocation."
- "Perhaps support could be improved. The knowledge base articles and wiki resources we currently use may not be applicable in every situation, as they often depend on the specific inputs or problems presented by users."
How has it helped my organization?
One Identity Manager simplifies user operations and provides security features, including automatic blocking of inactive accounts and timely access revocation.
My user experience with One Identity Manager involves using Identity Access Management to provide security, compliance, and visibility. We have implemented RBAC, where we define roles and responsibilities based on job functions or permissions. We have SoD (segregation of duties), ensuring that no single user has permissions that could lead to conflicts or fraud. The benefits include reduced security risks, lower costs with SSO solutions, enhanced user experience compared to other solutions, and improved compliance with regulations.
Customization for One Identity Manager is based on client inputs. We can detail and break down the inputs for customization, including user interface customization, where we include manager and launch pad features. For example, we implemented the Genesys application for the service desk, where we can monitor daily calls, frequency, and agent performance. This implementation helps showcase to customers our multiple checks and background processes internally. We provide recording sessions to users for review and daily improvement. Configuration parameters come under several aspects based on system behavior. One Identity Manager provides default parameters for particular solutions, allowing an overview of the tool.
What is most valuable?
In my experience, the best features in One Identity Manager are under SSO (single sign-on), where we can save passwords and don't need to authenticate each time when accessing applications. This extends to the creation of privileged IDs and account creation in AD.
What needs improvement?
Perhaps support could be improved. The knowledge base articles and wiki resources we currently use may not be applicable in every situation, as they often depend on the specific inputs or problems presented by users.
For how long have I used the solution?
I have been using One Identity Manager for six years.
What do I think about the stability of the solution?
It is stable.
What do I think about the scalability of the solution?
We provide solutions for enhancing access governance with One Identity Manager, including identity verification and improving system security procedures. This includes designing and implementing IAM solutions for legacy systems, cloud migrations, and multifactor authentications. We implement MFA solutions for applications with larger audiences. We manage roles and responsibilities in IAM technology and conduct risk assessments to identify potential vulnerabilities. The identity verification process comes as an automatic solution, streamlining user onboarding and offboarding in the organization.
Our clients are enterprises. We have more than 50 specialists.
How are customer service and support?
We use their regular support. I would rate their support an eight out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
For identity access management, we have used multiple tools. When I was working on a banking project, we used a right modeling tool and Sphere and AD to create users in AD and Nsphere, which is an internal tool of a particular project. Whatever we handle in AD and the right modeling tool reflects in Nsphere, which serves as a portal where all users are displayed, and we can see which level of access is required for a particular application. Being in the banking sector, we have an N-3 approval format. Based on approvals, such as line manager approval, we make changes accordingly. We worked with privileged IDs where particular users want different sets of privileges for their accounts. For example, with my particular account in the banking sector, I can give third-party users access to my entire bank for read, write, and edit capabilities. For some users, I can give only read access, allowing me to segregate the privileged IDs and privileges for users who can access my application or banking portal.
In another project for insurance, we used applications in SAML and OIDC. For OIDC applications, we asked the end user to provide the client ID and based on that, we shared the configuration directly to their email IDs. They could copy-paste the same configuration to make the portal easily accessible. With SSO and One Identity Manager implementing that configuration for OIDC applications, they can easily access their portal without multiple authentications. Through single sign-on, users can sign in once and access the portal without passwords.
From my knowledge, One Identity Manager makes customer operations easier compared to other solutions. When customers have different applications or solutions but want to migrate to One Identity Manager, it's because of enhanced security and the convenience of the SSO process.
How was the initial setup?
The setup is somewhat tricky because providing on-premises ID access requires following specific justifications and naming conventions, with different sets of servers to be added for users. We must be conscious while providing access to servers. For instance, if a user requests access to 10 servers, we need to evaluate whether they truly need all server access and can segregate permissions for cost and security reasons after consulting with line managers.
What's my experience with pricing, setup cost, and licensing?
The cost is handled by customers, but it doesn't seem to be very expensive. It seems fairly priced.
What other advice do I have?
We use One Identity Manager for business roles, implementation capabilities, SSO bypass, and automation deployment with guidelines. The licensing helps consolidate procurement when generating audit reports. We follow basic steps such as end-user satisfaction and improvement in regulatory functions to reduce business risk. We implement changes according to the system lifecycle and role-based access control.
Privileged users receive separate access, enabling them to access cloud applications. With a privileged ID account, users can access CyberArk, Entra, and Office 365 to manage licenses. One Identity Manager provides good security through SSO and MFA implementations. While there can be dependencies during new configuration creation, we work to provide better user satisfaction and support.
I would rate One Identity Manager a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. partner
Last updated: Sep 8, 2025
Flag as inappropriateSr. Product Specialist at Softcell Technologies Limited
Automated lifecycle management has streamlined access governance and improves compliance
Pros and Cons
- "We have seen a 40 to 60 percent reduction in provisioning time and significantly fewer manual errors due to automation and role-based access controls."
- "One Identity Manager could improve in UI/UX simplicity, as configuration and navigation can be complex for new users."
What is our primary use case?
One Identity Manager's main use case in our organization is identifying lifecycle management, including automated user provisioning, de-provisioning, and role-based access control across systems. It helps us enforce governance and compliance by managing access policies, approvals, and audit trails in multi-customer environments.
When a new user is onboarded in AD or HR system, roles are auto-assigned based on department, triggering automated provisioning to applications like email, VPN, and business systems. For access control, any role change automatically revokes old access and grants new permissions, ensuring least privilege and compliance without manual intervention.
Additionally, we use access certification and periodic reviews to ensure users only retain required privileges, supporting compliance. One Identity Manager helps with segregation of duties enforcement and audit readiness, which is critical in multi-customer regulated environments.
What is most valuable?
Some of the best features of One Identity Manager are its automated identity lifecycle management and role-based access control, which streamline provisioning and enforce least privilege access.
Automated lifecycle management removes manual provisioning tasks, ensuring users get correct access instantly during joiner, mover, and leaver events. Role-based access control standardizes permissions, reducing errors and tickets while improving compliance and speeding up day-to-day operations.
One Identity Manager offers strong access certifications and audit reporting, which simplifies compliance and reduces manual audit effort.
One Identity Manager has improved our operation efficiency by automating provisioning and reducing manual access management efforts across multiple systems. It has also strengthened security and compliance through better visibility, access governance, and audit readiness, helping reduce risk in multi-customer environments.
We have seen a 40 to 60 percent reduction in provisioning time and significantly fewer manual errors due to automation and role-based access controls. Audit readiness improved with near-zero critical findings and faster certification cycles. Access-related tickets have been reduced by 20 to 30 percent, improving overall service efficiency.
What needs improvement?
One Identity Manager could improve in UI/UX simplicity, as configuration and navigation can be complex for new users. Additionally, faster cloud-native integrations and simplified customization of workflow design would help reduce implementation efforts and improve agility in dynamic environments.
One improvement would be to benefit from better out-of-the-box connectors for modern SaaS or cloud applications to reduce customization effort.
For how long have I used the solution?
I have been using One Identity Manager for three years.
What other advice do I have?
For anyone looking to adopt One Identity Manager, I would recommend clearly defining roles, access policies, and governance model upfront to avoid complex rework later. It is important to plan for implementation effort, customization, and training, and leverage automations early to maximize efficiency and compliance benefits. I would rate this product nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Mar 30, 2026
Flag as inappropriateBuyer's Guide
Download our free One Identity Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2026
Product Categories
Identity Governance Administration (IGA) User Provisioning Software Identity Management (IM)Popular Comparisons
Microsoft Entra ID
SailPoint Identity Security Cloud
Omada Identity
Saviynt Identity Cloud
Fortinet FortiAuthenticator
OneLogin
CyberArk Identity
ForgeRock
One Identity Active Roles
Microsoft Entra ID Protection
Oracle Identity Governance
IBM Security Verify Access
Symantec Identity Governance and Administration
Microsoft Identity Manager
SAP Identity Management
Buyer's Guide
Download our free One Identity Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:

















