Try our new research platform with insights from 80,000+ expert users
reviewer1319967 - PeerSpot reviewer
Middleware System Engineer at a insurance company with 11-50 employees
Real User
Provides centralized and secure policy management on a large scale
Pros and Cons
  • "Symantec Siteminder Is both scalable and stable."
  • "Some of the new protocols, like OAuth 2.0, could be improved."

What is our primary use case?

We use Siteminder to protect our portal site subscribers. In our case, this refers to people who have dental insurance.

We're a dental insurance company and we've got millions of subscribers.

We have thousands of dentists. We have millions of subscribers who use our dental insurance. There are a couple hundred thousand providers (dentists) in the network. 

How has it helped my organization?

SSO affords us the opportunity to have a federated connection between our members, groups, and companies. 

We have a trusting partnership with everyone involved. This solution helps us in that aspect. In summary, it protects our applications, relating to benefits and eligibility, etc. 

It gives providers (or dentists, in our case) the ability to transpose across the different Delta Dentals without having to authenticate more than once. With Siteminder, We don't have to log into every site with a different user name and password — It's one identity for all sites.

What needs improvement?

Some of the new protocols, like OAuth 2.0, could be improved.

It would be nice to see a better cloud-based solution that's both easy and accessible for all organizations.

For how long have I used the solution?

I have been using Siteminder since 2011.

Buyer's Guide
Symantec Siteminder
May 2025
Learn what your peers think about Symantec Siteminder. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
854,338 professionals have used our research since 2012.

What do I think about the scalability of the solution?

Symantec Siteminder Is both scalable and stable. If you need to add more groups of members, it's just a matter of adding another web agent. It's very scalable.

How are customer service and support?

I work with the technical support guys all of the time. They are excellent. 

How was the initial setup?

Since I've been doing it for years, it's hard for me to say it was complex. You have to set up the realms, domains, ACOs, access control, configure the objects, and set up the databases. Speaking as a technical person, I think it could be a little more simplistic, but on a technical level, it's about even with the other solutions available.

What's my experience with pricing, setup cost, and licensing?

Symantec Siteminder is expensive; they could definitely do better on the price.

What other advice do I have?

If you're thinking about implementing this solution, make sure you have the proper infrastructure. Also, try to negotiate the cost.

On a scale from one to ten, I would give Symantec Siteminder a rating of eight. If they fixed some of the issues I mentioned, I would give them a higher rating. There's a lot of players out there that are only doing half of what Siteminder does, but they do it with the more advanced protocols.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Project Manager at a financial services firm with 1,001-5,000 employees
Real User
Easy to use, reliable, and scalable
Pros and Cons
  • "The solution is easy to use for our managers."
  • "The technical support could be better."

What is our primary use case?

We use this solution for applications and portals for a bank in Colombia.

How has it helped my organization?

The solution has saved our company from a lot of problems.

What is most valuable?

The solution is easy to use for our managers.

What do I think about the stability of the solution?

We did not have any issues with the stability of this solution. We have approximately 5,000 clients using the solution.

What do I think about the scalability of the solution?

The solution has been scalable.

How are customer service and technical support?

The technical support could be better.

What's my experience with pricing, setup cost, and licensing?

The licensing is fair for this solution.

What other advice do I have?

I rate Symantec Siteminder an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Symantec Siteminder
May 2025
Learn what your peers think about Symantec Siteminder. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
854,338 professionals have used our research since 2012.
reviewer1266123 - PeerSpot reviewer
Assistant General Manager at a computer software company with 10,001+ employees
Real User
Good SSO functionality with what appears to be a simple setup and deployment
Pros and Cons
  • "The single sign-on is the solution's most valuable feature"
  • "We're currently unable to find information about if the solution can do a full implementation with SQL. Some better and more accessible documentation for new users or those curious about the product would be helpful."

What is our primary use case?

We primarily want to use the solution to implement our SSO, Single Sign-On solution.

What is most valuable?

The single sign-on is the solution's most valuable feature.

What needs improvement?

Since we're in the early stages of examining the solution, it's hard to predict what might be lacking.

We're currently unable to find information about if the solution can do a full implementation with SQL. Some better and more accessible documentation for new users or those curious about the product would be helpful.

We want to implement a simple application. Currently, from what we're finding, we're not sure if it would work the way we need it to.

For how long have I used the solution?

The solution is quite new to us and I only really started looking at it about two or three weeks ago. We're in the testing phase.

How are customer service and technical support?

We've never contacted technical support.

Which solution did I use previously and why did I switch?

For a long time, we used SiteMinder, We're currently looking into what might be a better solution for SSO. That's why we're currently evaluating CA SSO. We'd been using the previous solution for two or three years but it hasn't been able to provide us with what we needed. Currently, we're trying to implement CA on servers for IPMP.

How was the initial setup?

The initial setup seems straightforward, but we're curious about the aspect of SSO for SQL servers. We're also investigating from the net side to see what requirements are needed. We haven't implemented or deployed it yet.

What about the implementation team?

We have our own in-house team that will handle the implementation.

What other advice do I have?

I'm an implementor, so I help clients implement the solution for their companies.

We're still in the process of testing the solution. We're currently not providing services on it as we are still in the testing phase.

So far, with a simple implementation of the SSO, I'd rate the solution eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Implementer
PeerSpot user
reviewer1011396 - PeerSpot reviewer
Cyber Security Specialist at a manufacturing company with 11-50 employees
Real User
Stable, scalable, integrates well with Active Directory, but needs to be more user friendly
Pros and Cons
  • "The most valuable feature is the integration with the Active Directory."
  • "To add more value to this solution it needs to be more user-friendly."

What is our primary use case?

The primary use case of this solution is a single sign-on to gain access to users and servers.

The security from the logistics team has required us to have a single sign-on solution. We implemented several single sign-on servers and we integrated them into one. The users would use it as a jump server. They would connect to it and from there, they would access the main server.

What is most valuable?

The most valuable feature is the integration with the Active Directory.

What needs improvement?

To add more value to this solution it needs to be more user-friendly. This is what is really needed in the next release of this product.

For how long have I used the solution?

I have been using this solution for two years. My experience with this solution is as an end-user.

What do I think about the stability of the solution?

The stability is fine, we have not had any issues.

What do I think about the scalability of the solution?

This solution is scalable.

We have more than 100 users who are made up of engineers and administrators.

How are customer service and technical support?

I have not been in touch with technical support.

Which solution did I use previously and why did I switch?

Previously, I used Arcon as a bridge to build access management. Arcon is different from CA SSO single sign-on.

I changed jobs and in this new location, Arcon was deployed.

How was the initial setup?

The initial setup was not a problem. I would rate the difficulty a seven out of ten.

We have a large network with several servers and it took more than six months for the initial implementation.

We had a team of three engineers to deploy this solution on-premises. They were responsible for the administration of the single sign-on.

What about the implementation team?

We implemented this solution with the help of one of the partners.

What other advice do I have?

My advice to anybody considering this solution is to always create their use cases so that they can do a complete and thorough POC before purchasing this solution.

Do not force the implementation of these types of solutions. It was forced by the management without proper planning. I have learned that proper planning works best for these types of solutions because you have to integrate with different components of the network, in order to be successful.

I would rate this solution a seven out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Sr. Manager at Duroob Technology
Video Review
Real User
The flexibility helped us meet the requirements of our customer
Pros and Cons
  • "The most valuable feature is that it meets the requirements of the customer. You have a lot of features in the product. Every product has them, but the question is, are these products going to meet the requirement of the customer?"
  • "CA has reporting at the moment. With the reporting, every particular segmented product has a reporting engine. I would like to see centralized reporting for all of them together."

What is our primary use case?

Customer was looking for initially an automated self user registration through a secure channel. Apparently it looks like a very easy going requirements but if you look in the detail they want to authenticate before registration process. A user came to create an Identity and customer wants to authenticate and securly takes the same data. 

Another issue was localization and reporting 

How has it helped my organization?

If I describe what actually happened, a little bit of the business case, that will help you to understand what it was like. The customer is the kind of customer that really doesn't want to share anything. When a person joins that organization, he has to pass through a couple of security levels, the scrutiny, before the ID is given to him. They used to use a manual process. Whenever a person joined the organization, they used to take his details; they used to write on a piece of paper; then this paper used to go to one of the departments; then it goes to another department; and so on. It wasn’t just a matter of going from one building to another; it was going from region to region.

Finally, this paper goes through a couple of scrutiny procedures. Then, it used to come back to the IT department, and finally, they do their security check and they create the ID and give it to them in an envelope. That was a kind of long procedure that sometimes took 2-4 months to create the ID; just an ID for a person. It was a challenge for the customer for the last 20 years.

We were doing that project and during that project, we found that the project owner wasn’t trusted. The project sponsor wasn’t trusted to just change this overall but they had this security constraint. What they actually wanted was that when they create the ID, they want this person to be authenticated. Generally, this is not the case in any organization, that somebody joins an office and he doesn't have any ID. So, how are you going to authenticate it?

What happened was that what we've been told, “Will you guys do this? Authenticate through a national database? We want, when a person is going to join us and he will request an ID, he should be authenticated through a biometric and that fingerprint will take him to the national database, where he will check in and it will come back to their IDP, their identity provider. They have it internally, and then, we will pass it through our system.”

Now, this was a challenge because in CA Identity Management, when you have a self-user registration page, this page was open so anybody could go and open it. We needed to protect that page, and on top of that, this information had to be protected to a third party. What we did is, we brought a couple of products in the middle of it: CA Federation, CA Single Sign-On, and CA Identity Management.

What happened when the user got authenticated with his fingerprint, it comes to the IDP, we have federation through CA Federation and then, once it passes through it, we have CA SSO, which is protecting the identity management page. Once it gets past this information, it comes to the self-user registration page, but here's another challenge: You've been authenticated but now you have a page which is open. I can authenticate myself and put someone else through the system. That could be a possibility, so we had a problem.

What we did is, we just pulled the data out from the third-party, national database and brought them to the CA identity page, to the self-user registration page, and all his names, IDs, and phone numbers, come in automatically. Then, it goes through several approval processes. Finally, the ID is transmitted over his mobile number that is in the national database.

That kind of work we have done. There are other challenges, as well.

What is most valuable?

The most valuable feature is that it meets the requirements of the customer. You have a lot of features in the product. Every product has them, but the question is, are these products going to meet the requirement of the customer? Because, if you meet the requirements of the customer, then it's way too easy to get inside the customer. We met the requirements of the customer and that's why I believe that this product has value.

What needs improvement?

I think the future release is, if you ask me, I think they have done a lot in the new release, especially the front end. The front end was not as good. CA did a good job in doing it, especially when I look at the new identity suite. They have done a good job in changing the overall look and feel. This is actually what the customer was looking for. The look and feel was not good in the earlier product. It's a journey, so we just completed one of the requirements for the customer.

CA has reporting at the moment. With the reporting, every particular segmented product has a reporting engine. I would like to see centralized reporting for all of them together. If an enterprise customer has all of these three or four modules for security, he will get consolidated reporting.

A problem we had with the customer was, at the moment, we were asked, “Are you able to integrate these products together?” Were we able to get the requirement done for the customer, as a business requirement? The reporting side we were unable to do it out-of-the-box. If CA consolidates the reporting for all three together, it may be easier. I'm not sure, but it may be easier.

For how long have I used the solution?

More than five years.

What do I think about the stability of the solution?

No at all.

What do I think about the scalability of the solution?

We are changing the architecture to scale it.

How are customer service and technical support?

Customer Service:

An eight out of 10.

Technical Support:

A seven out of 10

Which solution did I use previously and why did I switch?

No.

How was the initial setup?

It's one of most complex requirements as explained earlier.

What about the implementation team?

CA Partner implemented it

What was our ROI?

Time value and money.

What's my experience with pricing, setup cost, and licensing?

CA solutions.. Are generally expensive but for the customer the ROI is big.

Which other solutions did I evaluate?

Yes

What other advice do I have?

When you are looking for a security solution, products are there in the market, but you really don't want to go for a product that looks very beautiful from the front but has very bad stuff in the back end. One good thing is that CA has, I believe, that is has an edge. It allows me do a lot of what the customer is looking for, beyond the customer; beyond the product boundaries. They are certain things that we would not be able to do if this CA solution didn’t have this flexibility, and it's highly secure. It is a highly reliable solution to work with.

We implemented the solution almost a year and a half ago and up until now, there has been no downtime. It is reliable; it is good; it is open for customization; it is open for integration.

From my experience working with CA for almost 13 years, it’s a company. I'm not saying it’s specific to a solution. I'm talking about CA in general. It's a company with a solution and the company with the right solutions.

I have explained the journey of how these solutions (not specifically CA SSO only, but their entire security suite, including Federated Identity Management) met the requirements:

  • The customer was looking to have a self registration and password reset portal for their organization but they don't want to leave this portal open and accessible to everyone without been authenticated. This was only challenge, which I have mentioned it.
  • Second solution, open for customization for security from different datasources.
  • Thirdly, localization of this solution. Eventually, if these solutions have only listed features and it works only what they present. For sure, we wouldn't be able to achieve it.

There are critics and these critics help CA to build their good solutions.

Extraordinary product; extraordinary flexibility to explore and meet the requirements of the customer.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
PeerSpot user
Systems-Engineer at a tech services company with 10,001+ employees
Real User
You can quickly deploy the entire product with a basic config. However, the GUIs are not very clear.
Pros and Cons
  • "I liked the debugging part. There are only two files (trace file and log file) that you need to look into while performing debugging, and the logs give you the exact info on where and what needs to be fixed."
  • "You can quickly deploy the entire product with a basic config within couple of hours."
  • "The GUIs are not very clear, especially when integrating with other products from CA."

What is our primary use case?

Our primary use is for client demo on authentication/authorization, federation, and ease of use.

How has it helped my organization?

The product was just for client demo purposes. There was no deployment onsite.

What is most valuable?

  • This is the only access management product that I have come across which configures end-to-end and hosts resources. 
  • This product is very easy to deploy. I just strictly needed to follow the user-guide.
  • The CA directory services is something that I found to be cool. 
  • I liked the debugging part. There are only two files (trace file and log file) that you need to look into while performing debugging, and the logs give you the exact info on where and what needs to be fixed. 
  • You can quickly deploy the entire product with a basic config within couple of hours.

What needs improvement?

  • The GUIs are not very clear, especially when integrating with other products from CA. 
  • Like CA IDM, there can be challenges. One needs to know that they have great hands-on on their app servers to understand the logic and deploy it accordingly.
  • There were challenges with version compatibility, and this is something that I did not like. This all happened during the second phase while trying out various integrations.

For how long have I used the solution?

Less than one year.

What do I think about the stability of the solution?

No stability issues.

What do I think about the scalability of the solution?

No scalability issues.

How is customer service and technical support?

Technical support by CA Technologies is wonderful. I used to post my queries and get quick responses. The CA forum is something I would recommend to follow if you are dealing with any CA product. I appreciate their timely and effective responses.

How was the initial setup?

Although it is straightforward, for someone new to access management, it is always a challenge to understand what is done and why. That is where I struggled initially, since I was very new to the domain. Domain knowledge is more important when you are new to a product.

What's my experience with pricing, setup cost, and licensing?

I recommend conducting a PoC on every available product before choose one.

Which other solutions did I evaluate?

Not applicable.

What other advice do I have?

Be sure to get your doubts clear on any product features, integration with other CA products, and other security products.

I recently came across Okta, which also has cool features.

Before implementing, ask a CA manager to provide you a list of use cases, which can help you in building/offering what you have in mind.

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
IT Security Consultant at Duroob Technology
Consultant
The Federation feature is customizable and easily integrated with a customer application
Pros and Cons
  • "It has considerably reduced the amount of time that new users would take to join into the organization. Previously, it was a lengthy, manual process because it's a very secure environment, where they need to verify the user before they can actually grant him a user-ID and password. Integrating with the built-in custom application, and exposing CA Single Sign On to the internet, we were able to get the employees onboard. The time that we gained was: previously it would generally take from four to eight weeks for each employee, we brought it to one to two days."
  • "The most valuable feature is the Federation part of Single Sign On, which is customizable and is easily integrated with any customer application or any third party application."
  • "The Federation part of CA Single Sign On, it's a bit complex to implement because it involves the SSL certificates, exchange of certificates, and lot of technical details. The documentation misses some important parts of this, so that's the reason it took some time for us to go live."

What is our primary use case?

The client has a biometric identification module. We integrated that with the CA Single Sign On for new user registration, and it works perfectly fine for us.

How has it helped my organization?

It has considerably reduced the amount of time that new users would take to join into the organization. Previously, it was a lengthy, manual process because it's a very secure environment, where they need to verify the user before they can actually grant him a user-ID and password.

Integrating with the built-in custom application, and exposing CA Single Sign On to the internet, we were able to get the employees onboard. The time that we gained was: previously it would generally take from four to eight weeks for each employee, we brought it to one to two days.

What is most valuable?

The Federation part of Single Sign On, which is customizable and is easily integrated with any customer application or any third party application.

What needs improvement?

Maybe they could improve on the Federation part, and Federation with the apps. Not only for the websites, but with the apps also.

What do I think about the stability of the solution?

It's a very stable product.

Once we experienced a crash, the main policy engine of Single Sign On crashed, but CA gave us a fix for that.

What do I think about the scalability of the solution?

Scalability-wise it's good. It's built into the product.

How is customer service and technical support?

The support could improve in its response times, and in the understanding of the customers' problems.

How was the initial setup?

It was complex. The Federation part of CA Single Sign On, it's a bit complex to implement because it involves the SSL certificates, exchange of certificates, and lot of technical details. The documentation misses some important parts of this, so that's the reason it took some time for us to go live.

What other advice do I have?

When we're looking to select a vendor for a product, what's most important for a client like ours is the security; the product should be really secure. The next most important is the stability.

I rate it an eight out of 10 because, once we implemented it and the Federation part was working fine, we haven't faced any problems, except for that one instance where the policy was crashing.

I would definitely suggest going for CA Single Sign On.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
PeerSpot user
it_user778593 - PeerSpot reviewer
Manager with 10,001+ employees
Real User
Federation enables us to integrate with multiple third-party vendors
Pros and Cons
  • "Federation is valuable, for sure, because we have a lot of third-party vendors that we need to integrate with, and this is a turnkey solution in some ways."
  • "The Directory is secure. It's our user store, and it's important to keep our members safe. The product does well with that."
  • "I think they need to integrate some of the newer types of authentication into the product. I'm not seeing the innovation when it comes to biometrics in the product."
  • "They need to make configurations easier, and not have the engineer having to guess what will happen when he changes a particular setting."
  • "The initial setup was complex, painful. But that is to be expected of any new setup. When you're a big bank like us, any kind of migration to a new product is hard. I expect it to be painful, and it was painful. But it's not something that you can avoid."

What is our primary use case?

It is our authentication system for access to online and mobile banking.

Its performance has been good. It works well for us.

How has it helped my organization?

It keeps our members safe, that's a benefit for us. It's important.

What is most valuable?

Federation, for sure, because we have a lot of third-party vendors that we need to integrate with, and this is a turnkey solution in some ways.

The Directory is secure. It's our user store, and it's important to keep our members safe. The product does well with that.

What needs improvement?

I think they need to integrate some of the newer types of authentication into the product. I'm not seeing the innovation when it comes to biometrics in the product.

Also, easier integration with third-party partners to OpenID Connect because username/passwords are a thing of the past. People are going to be using facial recognition. Apple has gone that way. There are other companies like Daon that are doing this. CA SSO will be left behind if they don't have it yet. There's some innovation being done, but it's not there.

Improvement is being made all the time. I just came out of a session here at the CA World conference where they showed how you set up Federation partners is being improved, through more APIs. Making life easier for the engineer is always important because we are lazy in general. So improvements are being made in that space. There's more to be done, like how to make configurations easier, and not have the engineer having to guess what will happen when he changes a particular setting.

For how long have I used the solution?

More than five years.

What do I think about the stability of the solution?

If I had answered this question four years back I would have said "poor." But over the last four years they've done a lot of work to make it stable and it's reasonably stable right now.

It still goes down once in a while. But that's not the product's problem, it's probably how it's configured in our environment. So the product is pretty stable.

What do I think about the scalability of the solution?

It is scalable. It depends on where it's running, and on where it's deployed, and how it's configured. In our case, it is scalable. 

Some parts are scalable, not all parts. We do have some customized pieces within the product itself that we paid CA to build for us. Some of those things are not scalable.

How are customer service and technical support?

Technical support is good. We're a large scale customer for CA, so we do have Premium Support from them. We had a problem about three years back with the stability and we were going down all the time. We actually got somebody in-house from CA, to come to our office within a few hours, and the person stayed on until the problem was fixed.

Which solution did I use previously and why did I switch?

We had no choice. We were growing too big. We had a homegrown solution in place six years back, and our CTO at that point made a conscious decision to go towards this approach. And it worked.

I think CA had a pre-existing relationship with our company. And our CTO had used a CA SSO product before, and the recommendation was made at that point. So I don't know whether it was a full evaluation that was done, or whether it was the fact that, "Hey, it is a product that had worked before in other places, and we're talking about a straightforward use case here. So let's just go for it."

In terms of advice to someone looking for a similar solution, this one has worked for us, so think of whether it fits into your space. It may be best-in-class for doing a particular type of function, but that doesn't mean it fits in your ecosystem. So think of that first before you pick something which is best-in-class.

How was the initial setup?

Complex, painful. But that is to be expected of any new setup. When you're a big bank like us, any kind of migration to a new product is hard. I expect it to be painful, and it was painful. But it's not something that you can avoid.

What other advice do I have?

One thing that recently surprised me about CA is how big it is. The product I'm talking about in that context is not a CA product, it's an acquisition that CA made a few years back. I was used to working with the other company. Once we knew that CA bought it, I was surprised to see how big CA is. Just the product suite itself is pretty large. So just that was surprising.

As for the most important criteria when selecting a vendor, technical support is clearly one of them. Vendors tend to sell us something and then walk away, and we're left holding the bag. So tech support is clearly important. Apart from that, in terms of products, we don't care much about best-in-class. We just need to make sure it fits within any kind of technology ecosystem that you have. You could come and sell me a product that is best-in-class for doing a particular thing. But if it doesn't fit into my current stack, than it's useless.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Symantec Siteminder Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2025
Buyer's Guide
Download our free Symantec Siteminder Report and get advice and tips from experienced pros sharing their opinions.