We performed a comparison between Microsoft Entra ID and Tools4ever HelloID based on real PeerSpot user reviews.
Find out in this report how the two Identity and Access Management as a Service (IDaaS) (IAMaaS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It is one of those costs where you can't really quantify a return on investment. In the grand scheme of things, if we didn't have it, we would probably have a lot more breaches. It would be a lot harder to detect issues because we would have people using static usernames and passwords for various sites, making us open to a lot more attacks. The amount of security and benefit that we get out of it is not quantifiable but the return of investment from a qualitative point of view is much higher than not having it."
"It's multi-tenant, residing in multiple locations. The authentication happens quickly. Irrespective of whether I'm in Australia, the US, India, or Africa, I don't see any latency. Those are the good features that I rely on."
"It can be used to grant access at a granular level. It provides secure access and many ways to offer security to your user resources. It provides a good level of security for any access on Azure. It gives you options like multi-factor authentication where apart from your password, you can use other factors for authentication, such as a code is sent to your phone or the authenticator app that you can use login."
"The central authentication server is most valuable. GPOs are useful for user and computer policies."
"The single sign-on across multiple platforms is really the true advantage here. That gives you one ID and password for access to all your systems. You don't need to manage a plethora of different user IDs and passwords to all the systems that you're going to access."
"It's a very intuitive platform. It's easy to create groups and add people."
"The security features, multi-factor authentication, and service management features are valuable."
"It's an easy product to maintain."
"The Single Sign-On capabilities are endless and we haven't found a single app so far that couldn't be set up for SSO."
"Now we can easily control who has access to which client or client application."
"You don't need to be a specialist in Identity and Access Management solutions to understand the software and configure it."
"The most valuable feature is the option to use SSO from different sources such as Microsoft AD, ADFS, Azure AD, SAML, form-based, etc."
"I want to see more features to improve security, such as integrated user behavior analysis."
"Azure AD provides two types of features. One is Azure AD Excel and is already B2C. Out of both versions, Azure B2C requires some improvement, in terms of user management and role management, et cetera."
"My problem with Azure AD is that it's designed for medium to large systems, and we're not that large."
"The role-based access control can be improved. Normally, the role-based access control has different privileges. Each role, such as administrator or user, has different privileges, and the setup rules for them should be defined automatically rather than doing it manually."
"The conditional access rules are a little limiting. There's greater scope for the variety of rules and conditions you could put in that rules around a more factual authentication for other users. If you have an Azure AD setup, you can then connect to other people's Azure AD, but you don't have a huge amount of control in terms of what you can do. Greater control over guest users and guest access would be better. It's pretty good as it is but that could be improved."
"From an admin perspective, I would like to see improvement in the Microsoft Graph API."
"Initially, we wanted to exclude specific users from MSA. So, we had a condition policy, which forces MSA for all the users. So we wanted to exclude users who are using an NPS extension. So it was not listed, as a NPS extension was not listed outside an application, in actual, so, we go back and were not able to exclude users using NPS extension from MSA. So that was one limitation that we found and we had to work around that."
"The documentation, and the way that people are notified of updates, are things that can be improved. I'm a big fan of Microsoft products but the way they document is not that great."
"Sometimes it generates a username that is not unique, but at the time of this writing, it is not possible to generate a new one that is unique."
"When something needs to be changed with the sign-on policies, we have to apply this manually to every client environment that we have."
"Integration with other Tools4ever applications such as SSRPM and IAM would be nice."
"I would like to have the built-in provisioning module improved."
Earn 20 points
Microsoft Entra ID is ranked 1st in Identity and Access Management as a Service (IDaaS) (IAMaaS) with 190 reviews while Tools4ever HelloID is ranked 27th in Identity and Access Management as a Service (IDaaS) (IAMaaS). Microsoft Entra ID is rated 8.6, while Tools4ever HelloID is rated 9.8. The top reviewer of Microsoft Entra ID writes "Saves us time and money and features Conditional Access policies, SSPR, and MFA". On the other hand, the top reviewer of Tools4ever HelloID writes "A flexible solution for application management, and facilitated centralization of our IAM". Microsoft Entra ID is most compared with Microsoft Intune, Google Cloud Identity, CyberArk Privileged Access Manager, Ping Identity Platform and Okta Workforce Identity, whereas Tools4ever HelloID is most compared with Imprivata OneSign, Okta Workforce Identity and Microsoft Entra External ID. See our Microsoft Entra ID vs. Tools4ever HelloID report.
See our list of best Identity and Access Management as a Service (IDaaS) (IAMaaS) vendors and best Single Sign-On (SSO) vendors.
We monitor all Identity and Access Management as a Service (IDaaS) (IAMaaS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.