Try our new research platform with insights from 80,000+ expert users
Dr. Deepanjan Saha - PeerSpot reviewer
Principal Cybersecurity Architect at a tech vendor with 10,001+ employees
MSP
Top 5
Oct 1, 2025
Good identity and access management but still needs better visibility
Pros and Cons
  • "I consider their support to be very standard, relying on an email-based system."
  • "Mapping roles to users is a seamless experience that offers a lot of leverage in terms of speed and compliance, making it a very useful feature."
  • "One Identity Manager could incorporate dynamic dashboarding to predict attack vectors and compromises."
  • "The tool did not allow beyond a specific level of visibility; it provided visibility at the user level, not at the level of nested entitlements, resulting in an inaccurate depiction from the asset manager's point of view."

What is our primary use case?

The use cases for One Identity Manager include multiple aspects of identity and access management. One of the most interesting features I wanted to utilize was the user's access review, UAR module. The idea was to create a quarterly review process to review the entitlements and the access and controls in place, initially targeted towards Active Directory and later extended to other local systems. One Identity Manager can connect SAP accounts to employee identities under governance. It is possible to map company structures for application provisioning through dynamic application provisioning using role-based access control. Mapping roles to users is a seamless experience that offers a lot of leverage in terms of speed and compliance, making it a very useful feature.

What is most valuable?

The use cases for One Identity Manager include multiple aspects of identity and access management. One of the most interesting features I wanted to utilize was the user's access review, UAR module. The tool can onboard applications such as SAP, which is standard, and the APIs do not present challenges. One Identity Manager can connect SAP accounts under governance, and mapping roles offers leverage in speed and compliance. This functionality is crucial for compliance and governance.

What needs improvement?

The tool did not allow beyond a specific level of visibility; it provided visibility at the user level, not at the level of nested entitlements, resulting in an inaccurate depiction from the asset manager's point of view. This necessitated manually inputting data into the One Identity Manager user access review module. When it comes to privileged access management, we need to know who has access to what, which is the central problem we want to solve. However, for One Identity Manager, the visibility could be a lot better, especially given we are dealing with many data visibility products in the market.

Aspects such as reporting and dashboarding could be improved; I've seen tools doing better in those areas. One Identity Manager does not deliver specialized workflows for SAP; it offers very standard workflows. However, there are some modules that can be imported, and certain custom workflows need to be created. 

Customizing the solution for particular needs is very subjective. It does provide a lot of customizability, though there's room for improvement. One Identity Manager helps minimize gaps in governance coverage, but effectiveness depends on the organization. Ultimately, while One Identity Manager can solve problems, the tool must be combined with good people and a sound strategy for maximum effectiveness.

For how long have I used the solution?

I have used One Identity Manager for more than ten years.

Buyer's Guide
One Identity Manager
March 2026
Learn what your peers think about One Identity Manager. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,873 professionals have used our research since 2012.

What do I think about the stability of the solution?

For single-site installations, it performs adequately, however, multi-tenant setups present challenges demanding significant improvements.

What do I think about the scalability of the solution?

For single-site installations, it performs adequately. Multi-tenant setups present challenges demanding significant improvements.

How are customer service and support?

I have contacted their technical and customer support. I consider their support to be very standard, relying on an email-based system. My support engineers have received solutions to their inquiries. However, a tailor-made, dedicated support would significantly enhance user experience, especially for organizations that do not want to wait in queues.

How was the initial setup?

I would rate the initial setup at a seven out of ten. The reason for this rating is the critical nature of multi-tenant applications; compliance is heavily influenced by multi-tenancy, so a lot of engineering improvements could enhance the product.

Ideally, One Identity Manager as a SaaS tool handles maintenance; however, this depends on the specific maintenance discussed.

What about the implementation team?

I had partners who helped set up the whole process, and they were familiar with implementing the tool. Some were contractors, and they did a pretty good job in terms of delivery, respecting timelines. When I was working with one company, my team was based in Nice, France, consisting of internal employees and contractors. They implemented the solution fairly well. However, I had to provide a lot of unnecessary reporting and overhead when connecting the tool with our production environment, providing data that could compromise internal security despite getting the right approvals. Overall, it was an okay experience with One Identity Manager.

What's my experience with pricing, setup cost, and licensing?

We use multiple tools in tandem for better security. The procurement and licensing process can indeed be complex. My experience was decent, with no major problems during procurement or licensing; it was a mostly seamless experience.

What other advice do I have?

With respect to privileged accounts, I would say One Identity Manager can improve; for privileged accounts, a lot needs improvement, and it is not best practice to depend on one tool. 

One Identity Manager could incorporate dynamic dashboarding to predict attack vectors and compromises.  

I would rate One Identity Manager seven out of ten since it can improve on many aspects.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Oct 1, 2025
Flag as inappropriate
PeerSpot user
Divya-Mohan - PeerSpot reviewer
Founder and Principal Architect at dmj.one
Real User
Mar 24, 2026
Comprehensive identity workflows have transformed governance and now support secure access control
Pros and Cons
  • "From what I heard, everyone said that before One Identity Manager, they had many workflows and loopholes, and after starting to use it, those issues were addressed, creating a very positive experience for the customer."
  • "High pricing remains a notable drawback, driving potential clients towards alternate IAM solutions."

What is our primary use case?

I was also involved in deploying workflows, and the deployment part was handled by senior developers, especially when dealing with orchestration challenges tied to Kerberos delegation and VM issues.

What is most valuable?

One Identity Manager was utilized for governance, provisioning, compliance, and audit management. Even though I had limited access to certain parts, such as IGA, it played a critical role in large-scale access management by offering impressive provisioning and deprovisioning systems. It is an intuitive product for users, as I was able to learn and deploy workflows within a timeframe of two months. The documentation it provides was crucial for the learning curve.

In terms of customization, the ecosystem One Identity Manager offers includes a variety of workflows and extensions, although this comes with high costs. It is highly configurable, allowing dynamic application provisioning through process chains involving IAM and IAG related workflows.

What needs improvement?

One Identity Manager could enhance its trial offering to support custom workflows and VB.NET codes, which would help learners. Improved documentation organization can benefit newcomers, requiring less external searching. A self-check mechanism for file integrity, particularly for missing DLLs, can prevent developer frustrations.

High pricing remains a notable drawback, driving potential clients towards alternate IAM solutions. Additionally, incorporating AI-driven updates could enhance its competitive edge in the evolving market.

For how long have I used the solution?

I have used the solution for two months from June to August last year.

What do I think about the stability of the solution?

Regarding stability, I would rate One Identity Manager as 8, 9, 8.

What do I think about the scalability of the solution?

My clients were enterprise level, and I would rate the scalability of One Identity Manager as hyper-scalable, 10.

How are customer service and support?

They had premier support, but I never used any of it.

What was our ROI?

From what I heard, everyone said that before One Identity Manager, they had many workflows and loopholes. After starting to use it, those issues were addressed, creating a very positive experience for the customer.

What's my experience with pricing, setup cost, and licensing?

Regarding pricing, I find One Identity Manager to be expensive. On a scale where one is cheap and ten is expensive, I would say 10, which is what clients have communicated.

Which other solutions did I evaluate?

From my experience with other solutions, such as SailPoint, Saviynt, and Omada, the UI is the only aspect where I think One Identity Manager faces challenges. However, I believe One Identity Manager is performing exceptionally well.

What other advice do I have?

I always try to recommend One Identity Manager. The only drawback is the price, which is so high that clients try to use other IAM platforms. However, for those with a good budget, the ecosystem One Identity Manager provides is one of the best.

I highly recommend One Identity Manager. The documentation can be categorized for better learning phases. A self-check for file integrity could help, as a missing DLL once caused frustration.

Several areas for improvement include providing a more elaborate trial version for custom workflows and improving documentation categorization. A self-check mechanism for file integrity would also be beneficial.

I rate One Identity Manager overall as an 8 or 9, with 9 being my final answer.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Mar 24, 2026
Flag as inappropriate
PeerSpot user
Buyer's Guide
One Identity Manager
March 2026
Learn what your peers think about One Identity Manager. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
884,873 professionals have used our research since 2012.
Joshua Fellers - PeerSpot reviewer
Manager, Application Development at a tech services company with 201-500 employees
Real User
Top 10
Dec 4, 2025
Platform has unified complex identity governance and has improved customization for diverse projects
Pros and Cons
  • "I am a strong advocate for One Identity Manager because it provides a single platform for enterprise-level administration and governance of users, data, and privileged accounts."
  • "One Identity Manager's documentation is something they can improve, and I believe much of this is related to translation since it is a German company."

What is our primary use case?

I use One Identity Manager in a few different projects for the Air Force, and I have also used it for the commercial business that I currently work for, covering both government and commercial environments.

I do not use One Identity Manager to help me manage SAP.

I don't use One Identity Manager for IGA regarding the difficult-to-manage aspects of T-codes, profiles, and rules.

I do not use One Identity Manager to extend governance to cloud applications through custom interfaces.

What is most valuable?

The most valuable aspect of One Identity Manager is how customizable it is compared to alternatives, which is the most obvious and biggest differentiator for me.

I am a strong advocate for One Identity Manager because it provides a single platform for enterprise-level administration and governance of users, data, and privileged accounts. The tool is fantastic for what it does. However, in version eight and below, the UIs to perform all that functionality were terrible and even worse when customizing. The newer version nine is significantly better. I haven't had much experience with the latest version since we are still on version eight, though the UI to manage and perform governance could be better, but I know version nine has definitely improved in this regard.

One Identity Manager has helped me minimize gaps in governance covering test, dev, and production servers. We have two instances of One Identity Manager, and one instance doesn't necessarily allow us to manage test, dev, and prod all together, but separate instances of One Identity do.

What needs improvement?

One Identity Manager's documentation is something they can improve, and I believe much of this is related to translation since it is a German company. Access to documentation and finding answers on how things work is extraordinarily difficult.

One Identity Manager has not helped application owners or line of business managers make application decisions without involving IT. Regarding the elimination of the help desk's need to govern access to applications because of One Identity Manager, managers can go in and find the roles their employees need and dynamically assign permissions through One Identity Manager. However, I'm uncertain about what is meant by application governance decisions in this context.

One Identity Manager could help me achieve an identity-centric Zero Trust Model, but we haven't necessarily designed it to do so in any of my environments.

For how long have I used the solution?

I have been using One Identity Manager for approximately eight years.

What do I think about the stability of the solution?

One Identity Manager is very stable. I haven't seen any major instability such as lagging, crashing, or downtime.

What do I think about the scalability of the solution?

Considering that One Identity Manager runs off a database, as long as you can scale your database, the scalability is great because you can even set up multiple job servers.

How are customer service and support?

I have contacted customer support or technical support for One Identity Manager, mostly because we are trying to customize things and need that next-level engineering support, not because of problems with the product.

The quality and speed of One Identity Manager's support were terrible years ago, but in the last few years it has gotten significantly better. I would rate the support currently as pretty good.

On a scale from one to ten for the support of this product, I would give it a nine. For the support recently, I would say seven.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial deployment of One Identity Manager when I first started was pretty easy with no major hurdles.

The first time I deployed One Identity Manager was eight years ago, which isn't a fair comparison, but regarding the most recent experience, I had it installed in under an hour, though I have also done it a few times.

What about the implementation team?

One person can deploy One Identity Manager, so you don't need an entire team.

One Identity Manager requires pretty straightforward maintenance regarding the installation sustainment. However, for governing the system for a decent-sized corporation, you would want a couple of full-time people to govern all the functions. For day-to-day IT system administration, it doesn't really require much.

Which other solutions did I evaluate?

I did look into alternatives to One Identity Manager, specifically ForgeRock at one point, and there was something else we looked into, but I cannot remember the name of it.

What other advice do I have?

I would give this product a review rating of nine out of ten.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Last updated: Dec 4, 2025
Flag as inappropriate
PeerSpot user
Kalpesh Pawar - PeerSpot reviewer
Technical Head Cloud Services at Softcell Technologies Limited
Real User
Top 5Leaderboard
Jan 20, 2026
Automated onboarding has reduced errors and improves compliance across multiple client environments
Pros and Cons
  • "Since implementing this product, we have reduced manual provisioning errors by thirty percent, cut down onboarding and offboarding time by forty percent, and completed our access reviews faster than twenty percent, which has improved our compliance reporting and freed our team to focus on proactive security tasks across multiple client environments."
  • "The customer support needs to be improved because the response time for complex issues is quite high."

What is our primary use case?

One Identity Manager serves as our centralized identity and access management solution across multiple customer environments. We use it to provision and de-provision users, enforce role-based access control, manage permissions across on-premises and cloud systems, and ensure compliance with security policies efficiently.

We leverage One Identity Manager to automate user onboarding for new client projects. When a new employee is added, the system automatically provisions access to the right servers, cloud applications, and internal tools based on their role and sends approval notifications to the manager. This reduces manual errors, speeds up access provisioning, and ensures compliance across multiple customer environments.

Additionally, we use One Identity Manager for periodic access reviews and certification, ensuring users only retain the permissions they need. It also helps automate deprovisioning when an employee leaves or changes roles, reducing security risk and maintaining compliance across all customer environments.

What is most valuable?

One Identity Manager offers excellent features including automated user provisioning and de-provisioning, role-based access control, access certifications and reviews, centralized identity governance, self-service password reset, and workflow automation.

The most valuable feature for us is automated user provisioning and de-provisioning. It ensures that employees and contractors receive the right access immediately and that access is removed promptly when users change roles or leave the organization. This reduces manual error, improves security, and saves significant administrative time across multi-client environments.

One Identity Manager has streamlined identity and access management across our multiple client environments. It has reduced manual provisioning errors, improved compliance through automated access review, and accelerated onboarding and offboarding, allowing our team to focus on higher-value security tasks.

Since implementing this product, we have reduced manual provisioning errors by thirty percent. We have cut down onboarding and offboarding time by forty percent and completed our access reviews faster than twenty percent. This has improved our compliance reporting and freed our team to focus on proactive security tasks across multiple client environments.

What needs improvement?

One Identity Manager could be improved with more modern features such as artificial intelligence or faster workflow configuration for complex environments, expanded out-of-the-box integration with cloud applications, and enhanced automation for multi-tenant setups. It would also help to reduce administrative overhead.

Additionally, it should provide better examples of workflows for multi-client environments, which would help new users set up their systems more quickly. Faster support response time for complex issues from the support team would also be beneficial.

One Identity Manager has greatly improved our automated provisioning, access governance, and compliance across multiple client environments, which has saved our time and reduced our manual errors. I did not rate it a ten because the workflow setup can be complex, cloud integrations are limited, and the support response time needs improvement. There is still room for improvement in this product.

For how long have I used the solution?

I have been using One Identity Manager for two and a half years.

What do I think about the stability of the solution?

One Identity Manager is stable.

What do I think about the scalability of the solution?

One Identity Manager's scalability is good.

How are customer service and support?

The customer support needs to be improved because the response time for complex issues is quite high.

How would you rate customer service and support?

Which solution did I use previously and why did I switch?

We were previously using a mix of manual processes, spreadsheets, and standalone AIM tools. We switched to One Identity Manager because it provides centralized identity and access management, automated provisioning and de-provisioning, and compliance reporting in a single platform.

What was our ROI?

We have seen a clear return on investment with One Identity Manager. Automating user provisioning and de-provisioning across multi-client environments has cut our onboarding and offboarding time by forty percent and has reduced manual errors by thirty percent, which lowers risk and frees our team to focus on more proactive security tasks rather than repetitive administrative tasks. This has also accelerated our compliance audits. Both the time and operational costs have been saved.

What's my experience with pricing, setup cost, and licensing?

The licensing and setup cost is on the higher side, but it is delivering more features. The pricing is worth it.

Which other solutions did I evaluate?

We evaluated other solutions such as Okta and Microsoft Identity Manager. We chose One Identity Manager because it offered the most comprehensive automation and compliance reporting, which is critical for managing multiple clients across hybrid cloud environments.

What other advice do I have?

I would take full advantage of automated provisioning, role-based access control, and access certification to reduce errors and improve compliance. I rate One Identity Manager nine out of ten overall.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Jan 20, 2026
Flag as inappropriate
PeerSpot user
Daksh Yamal - PeerSpot reviewer
Senior Software Engineer at Infosys
MSP
Top 5Leaderboard
Feb 3, 2026
Identity automation has reduced help desk load and has improved security and compliance visibility
Pros and Cons
  • "Since we started using One Identity Manager in my organization, we have seen operational efficiency gains, including faster onboarding and de-provisioning, help desk cost reduction, and improved compliance and audit efficiency."
  • "One Identity Manager can be improved because implementation and administration require specialized knowledge, and deployment efforts can be significant."

What is our primary use case?

One Identity Manager's main value to my organization is its flexibility and depth of customization, as it seamlessly integrates with a wide range of on-premises and cloud systems and supports strong automation for joiner, mover, and leaver processes. The automation features I use help to reduce manual effort, improve consistency, and strengthen our overall security posture. I also appreciate the reporting and auditing tools, which are particularly strong, provide clear visibility into access rights, and support compliance initiatives.

A specific example of how I use the automation features and reporting tools in my day-to-day work is through configurable workflows that reduce manual effort, improve efficiency, and ensure consistency in access management processes. One Identity Manager provides detailed reports and dashboards for visibility into identities, access rights, and compliance status.

One Identity Manager is used to centrally manage digital identities and access rights across my organization.

What is most valuable?

The best features One Identity Manager offers include identity lifecycle management, access provisioning, role-based access control, compliance reporting, and auditing across IT systems. Out of these features, I find myself relying on user lifecycle management the most because it helps automate joiner, mover, and leaver processes by provisioning, modifying, and de-provisioning user accounts across connected systems.

Regarding access provisioning and de-provisioning, it manages access request approvals and enforces access policies for applications, databases, directories, and cloud services. For privileged access governance, it governs access to high-risk or privileged accounts by enforcing approval workflows and monitoring usage.

I also appreciate the integration across IT systems where One Identity Manager integrates seamlessly with on-premises and cloud platforms such as Active Directory, Azure AD, SAP, databases, and custom applications.

When it comes to reporting and auditing, One Identity Manager provides detailed reports and dashboards for visibility into identities, access rights, and compliance status, which helps us make data-driven decisions easily.

Since we started using One Identity Manager in my organization, we have seen operational efficiency gains, including faster onboarding and de-provisioning, help desk cost reduction, and improved compliance and audit efficiency. We have also seen a reduction in security risk. The help desk cost has been reduced greatly, as automating password resets, self-service access requests, and lifecycle events cuts down on help desk tickets and support labor by fifty percent. One Identity Manager has reduced risk through strong identity governance that helps prevent over-privileged access and orphaned accounts, lowering the likelihood of data breaches. We have been able to save a lot of money—over the past four years, we have saved approximately one hundred thousand dollars.

What needs improvement?

One Identity Manager can be improved because implementation and administration require specialized knowledge, and deployment efforts can be significant.

The user interface prioritizes functionality over simplicity, and effective use of the platform typically depends on well-defined processes and trained administrators.

For how long have I used the solution?

I have been using One Identity Manager for four years.

What other advice do I have?

For any organization that is looking for frequent reporting improvement in efficiency, lowering error rates, and faster compliance outcomes, I advise that you should consider One Identity Manager, which delivers measurable financial value.

Since we started using One Identity Manager, it has been truly helpful. It has led to fewer help desk tickets and faster service delivery in my organization, enhanced security and compliance, reduced risk and audit burden for IT, and improved time to productivity for our employees. I would rate this product a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Feb 3, 2026
Flag as inappropriate
PeerSpot user
Business Analyst at tcs
Real User
Top 20
Sep 8, 2025
Provides security, compliance, and visibility
Pros and Cons
  • "One Identity Manager simplifies user operations and provides security features, including automatic blocking of inactive accounts and timely access revocation."
  • "Perhaps support could be improved. The knowledge base articles and wiki resources we currently use may not be applicable in every situation, as they often depend on the specific inputs or problems presented by users."

How has it helped my organization?

One Identity Manager simplifies user operations and provides security features, including automatic blocking of inactive accounts and timely access revocation.

My user experience with One Identity Manager involves using Identity Access Management to provide security, compliance, and visibility. We have implemented RBAC, where we define roles and responsibilities based on job functions or permissions. We have SoD (segregation of duties), ensuring that no single user has permissions that could lead to conflicts or fraud. The benefits include reduced security risks, lower costs with SSO solutions, enhanced user experience compared to other solutions, and improved compliance with regulations.

Customization for One Identity Manager is based on client inputs. We can detail and break down the inputs for customization, including user interface customization, where we include manager and launch pad features. For example, we implemented the Genesys application for the service desk, where we can monitor daily calls, frequency, and agent performance. This implementation helps showcase to customers our multiple checks and background processes internally. We provide recording sessions to users for review and daily improvement. Configuration parameters come under several aspects based on system behavior. One Identity Manager provides default parameters for particular solutions, allowing an overview of the tool.

What is most valuable?

In my experience, the best features in One Identity Manager are under SSO (single sign-on), where we can save passwords and don't need to authenticate each time when accessing applications. This extends to the creation of privileged IDs and account creation in AD. 

What needs improvement?

Perhaps support could be improved. The knowledge base articles and wiki resources we currently use may not be applicable in every situation, as they often depend on the specific inputs or problems presented by users.

For how long have I used the solution?

I have been using One Identity Manager for six years.

What do I think about the stability of the solution?

It is stable. 

What do I think about the scalability of the solution?

We provide solutions for enhancing access governance with One Identity Manager, including identity verification and improving system security procedures. This includes designing and implementing IAM solutions for legacy systems, cloud migrations, and multifactor authentications. We implement MFA solutions for applications with larger audiences. We manage roles and responsibilities in IAM technology and conduct risk assessments to identify potential vulnerabilities. The identity verification process comes as an automatic solution, streamlining user onboarding and offboarding in the organization.

Our clients are enterprises. We have more than 50 specialists.

How are customer service and support?

We use their regular support. I would rate their support an eight out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

For identity access management, we have used multiple tools. When I was working on a banking project, we used a right modeling tool and Sphere and AD to create users in AD and Nsphere, which is an internal tool of a particular project. Whatever we handle in AD and the right modeling tool reflects in Nsphere, which serves as a portal where all users are displayed, and we can see which level of access is required for a particular application. Being in the banking sector, we have an N-3 approval format. Based on approvals, such as line manager approval, we make changes accordingly. We worked with privileged IDs where particular users want different sets of privileges for their accounts. For example, with my particular account in the banking sector, I can give third-party users access to my entire bank for read, write, and edit capabilities. For some users, I can give only read access, allowing me to segregate the privileged IDs and privileges for users who can access my application or banking portal.

In another project for insurance, we used applications in SAML and OIDC. For OIDC applications, we asked the end user to provide the client ID and based on that, we shared the configuration directly to their email IDs. They could copy-paste the same configuration to make the portal easily accessible. With SSO and One Identity Manager implementing that configuration for OIDC applications, they can easily access their portal without multiple authentications. Through single sign-on, users can sign in once and access the portal without passwords.

From my knowledge, One Identity Manager makes customer operations easier compared to other solutions. When customers have different applications or solutions but want to migrate to One Identity Manager, it's because of enhanced security and the convenience of the SSO process.

How was the initial setup?

The setup is somewhat tricky because providing on-premises ID access requires following specific justifications and naming conventions, with different sets of servers to be added for users. We must be conscious while providing access to servers. For instance, if a user requests access to 10 servers, we need to evaluate whether they truly need all server access and can segregate permissions for cost and security reasons after consulting with line managers.

What's my experience with pricing, setup cost, and licensing?

The cost is handled by customers, but it doesn't seem to be very expensive. It seems fairly priced.

What other advice do I have?

We use One Identity Manager for business roles, implementation capabilities, SSO bypass, and automation deployment with guidelines. The licensing helps consolidate procurement when generating audit reports. We follow basic steps such as end-user satisfaction and improvement in regulatory functions to reduce business risk. We implement changes according to the system lifecycle and role-based access control. 

Privileged users receive separate access, enabling them to access cloud applications. With a privileged ID account, users can access CyberArk, Entra, and Office 365 to manage licenses. One Identity Manager provides good security through SSO and MFA implementations. While there can be dependencies during new configuration creation, we work to provide better user satisfaction and support. 

I would rate One Identity Manager a ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. partner
Last updated: Sep 8, 2025
Flag as inappropriate
PeerSpot user
reviewer2686281 - PeerSpot reviewer
Identity & Access Management Manager at a insurance company with 5,001-10,000 employees
Real User
Top 20
Apr 5, 2025
Automation capabilities streamline access management and reduce costs
Pros and Cons
  • "I like the solution since it is very flexible, and I can basically do everything that I like and need with it."
  • "I like the solution since it is very flexible, and I can basically do everything that I like and need with it."
  • "In regards to the front end, the portal that is offered to our users needs improvement."
  • "In regards to the front end, the portal that is offered to our users needs improvement. There is room for improvement on that side, particularly in user experience."

What is our primary use case?

We use One Identity Manager for workforce identity and access management. We have implemented basic controls like joiner, mover, and leaver processes for our employees. 

We are integrating our most critical and important business systems and applications into it, handling the access management to those systems using One Identity Manager

What is most valuable?

I like the solution since it is very flexible, and I can basically do everything that I like and need with it. 

I appreciate its automation capabilities a lot. Through automation, we have been able to reduce the number of service requests and tickets to our vendor. We have also managed to reduce the cost quite drastically in that sense. 

Additionally, by automating the access reviews, we have saved considerable time for our business leaders, even talking about several full-time equivalent savings concerning access review automation.

It works well at an enterprise level. We use it as a centralized platform for the whole identity.

It is a flexible system and we can customize it the way we want.

We use the business roles to map company structure for dynamic application provisioning. This is a very important aspect of the solution. 

We use the solution to extend governance to cloud apps and this is very useful for us.

Through automation, we have been able to reduce the number of service requests and service tickets towards our vendor, and we have been able to reduce the cost quite drastically. By automating access reviews, we've been able to save quite a lot of time - up to several FTEs. When we launched the system, we had quite a wide scope and saw results immediately. 

The solution helps us achieve an identity-centric zero-trust model. As you are getting your identity only through a centralized system and also getting all the accesses attached to that identity and all the accounts attached to that identity through one system, then it is possible. We also handle access to any system through that one solution. When we do that, we have a full picture of the identities and what kind of accounts and entitlements they have. Having the full picture and having the governance of the whole entity when it comes to access management allows security to be tight. Also, the controls that we have in place then, for example, joiner, mover, leaver, that helps in maintaining that zero trust principle.

What needs improvement?

In regards to the front end, the portal that is offered to our users needs improvement. There is room for improvement on that side, particularly in user experience. It is not as intuitive as I would like. If there is something to improve in One Identity Manager, it is the end-user experience. 

The database structure is quite complicated. I don't know if it can be improved or if it can. It will probably be a long journey. The most important thing is to think of our customers, and then the user interface is the part of the system that needs some improvement.

We can customize it, however, we need skilled resources to do so. There aren't as many skilled people in the market.

For how long have I used the solution?

We launched it in October 2023. However, we started implementing it in 2021.

How are customer service and support?

We rely on vendor support, and I would rate it as ten. We mainly receive support through their partner. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did quite a large comparison when we chose this system, and I see that there are systems in the market which offer the same functionality. However, there are also a lot of systems that are more restricted in the functionality they offer. There are maybe a couple as large and with as many capabilities as One Identity Manager. One Identity Manager is one of the top systems in terms of capability offering. That's the reason why we chose it for our company's purpose.

How was the initial setup?

Our experience was complex, however, it was not due to the system. It was due to the wrongly chosen partner who didn't have the needed skills to implement it properly. 

It also depends on the scope of what needs or is wanted to be implemented as the minimum viable product. I wouldn't say that it's complex, however, maybe not easy either, so maybe something in between.

What about the implementation team?

We implemented via a partner. They are the ones doing the customization if we do any currently. Our partner organized the training, however, the training was given by One Identity itself.

What was our ROI?

We have been reducing costs and saving several full-time equivalents by using automation.

What other advice do I have?

I would rate the solution overall as eight out of ten based on the bad user interface.

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Service Delivery Manager at a tech vendor with 10,001+ employees
Reseller
Top 20
Feb 19, 2026
Governance has improved and complex approval workflows manage identity processes efficiently
Pros and Cons
  • "One Identity Manager is a complete governance tool, but its pricing remains reasonable when measured against other vendors."
  • "I find that the user experience and intuitiveness of One Identity Manager are quite confusing."

What is our primary use case?

My use cases for One Identity Manager are mainly related to JML processes, Joiner Mover Leaver processes, similar to other standard IAM systems. I see that since One Identity Manager provides an on-premises setup, it is selling more in the market compared to One Identity Manager cloud solution, which I observe is rarely used.

The use cases we see often require segregation of duties, especially within the SAP module, which One Identity Manager handles well, allowing for compliance rules and multi-step approval workflows for critical roles.

I did use it for managing SAP and had a good experience overall, but there were instances when roles did not get assigned and I had to troubleshoot rigorously. My experience was not completely flawless, especially during audits where certain roles were missing or were unexplainable.

Managing profiles in SAP is not an issue, but synchronization of derived roles has been problematic.

What is most valuable?

One Identity Manager includes a history database, but it lacks a proper dashboard for visibility, making it difficult during audits to determine who triggered role assignments or clarify issues.

As a practitioner, I see that One Identity Manager handles segregation of duties within the SAP module well, allowing for compliance rules and multi-step approval workflows.

One Identity Manager provides an on-premises setup, which is selling more in the market compared to One Identity Manager cloud solution.

One Identity Manager is a complete governance tool, but its pricing remains reasonable when measured against other vendors.

What needs improvement?

What I dislike most about One Identity Manager is the upgrade process. For instance, if I'm migrating from one version to another, I've experienced issues where old hotfixes break. Unlike Microsoft which smoothly integrates hotfixes, One Identity Manager requires me to redeploy older hotfixes even after applying a new upgrade. Another challenge is seeing many clients still using older versions that rely on the deprecated Web Designer. Migrating to the latest versions is complicated due to the complete overhaul required.

There is also a lack of clear communication or documentation from One Identity Manager regarding upgrades and deprecations, which complicates the process further.

I believe that One Identity Manager is not currently providing all-in-one capabilities effectively. It does have options for privileged account management and categorizing human identities, but it lacks visibility for non-human identities and CI/CD pipelines or cloud workloads.

I find that the user experience and intuitiveness of One Identity Manager are quite confusing. The navigation is not straightforward and requires assistance from someone experienced with the tool. Configuration settings are scattered across different areas, which complicates things and contributes to a steep learning curve, especially for new users. The documentation lacks clarity and thoroughness, making it difficult to follow procedures without proper guidance.

For how long have I used the solution?

I have worked on One Identity Manager since the year 2022.

What do I think about the stability of the solution?

I see technical challenges with the cloud version, the SaaS version, especially in a hybrid setup because I often encounter issues connecting to on-premises devices. It is often more stable to have a solution on-premises that can send data to the cloud.

How are customer service and support?

I have contacted technical support multiple times and found their emergency coverage reliable. They respond promptly for severity one issues. However, after an upgrade, without involving their paid support, resolving issues can proceed at a slow pace.

How would you rate customer service and support?

Negative

Which solution did I use previously and why did I switch?

Since the start of my career, I have worked in the identity and access management domain, with experience in various products from Microsoft to SailPoint and Saviynt.

How was the initial setup?

The initial deployment is not easy.

What about the implementation team?

It requires specialized knowledge. As a techno-manager, my team has engineers familiar with the tool due to extensive experience. However, training someone to deploy in a short time can be challenging as they often require support from SMEs who know the tool.

What's my experience with pricing, setup cost, and licensing?

When it comes to pricing, I find it relatively cheaper compared to competitors in the IGA space.

What other advice do I have?

There are pros and cons to One Identity Manager as a product. From a strategic partner perspective, there are always pros without cons. My team functions both as integrators and sellers, as we have our managed service, allowing us to sell it to our customers. 

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Last updated: Feb 19, 2026
Flag as inappropriate
PeerSpot user
Buyer's Guide
Download our free One Identity Manager Report and get advice and tips from experienced pros sharing their opinions.
Updated: March 2026
Buyer's Guide
Download our free One Identity Manager Report and get advice and tips from experienced pros sharing their opinions.