We performed a comparison between One Identity Manager and RSA Identity Governance and Lifecycle based on real PeerSpot user reviews.
Find out in this report how the two Identity Management (IM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."What I like most is that we can always find a solution, and we can also find the cause when something goes wrong. I like that the most because everything is in one way or another traceable. That is what I like most. I like its reliability."
"The most valuable aspects of Omada Identity for me are the automation capabilities."
"The Governance and self-service that can be set up so you can use them yourself to work in the system are the most valuable features. End users can be enabled to help themselves."
"The administrative features and SoD are valuable."
"The support response time and the freedom from strange bugs and strange things happening in the software are valuable."
"Omada's most valuable aspect is its usability."
"As an administrator, we benefit from a lot of functionality that is available out of the box, but it is also configurable to meet our specific needs."
"Our customers have benefited from Omada Identity automating the certification process. Most of our customers were using manual methods for user access certification. With Omada Identity, you can automate almost all of it, which means that certification now becomes on demand. You don't have to wait for two or three months to execute a certification timeframe. Instead, you can do certifications as often as you want."
"It's very flexible. You can customize it to the fullest extent. You can use it for almost every situation for every customer."
"Among the most valuable features of One Identity Manager are administration from Active Directory and Azure Active Directory, as well as administration from Exchange. These features enable us to have fully automated processes to create new accounts and new mailboxes. The most valuable option is the ability to design an automated route to give our customers permissions."
"There are a lot of valuable features, including connectors, attestations, and workflow."
"The most valuable feature is the JML. Unlike other identity manager tools, the JML is more customizable, making it easier to find."
"We no longer keep users who shouldn't exist."
"It has many features which can be combined and configured in a great way, then put together in projects and ways that developers didn't think were possible, which has been great."
"It brings simplicity into complex matters."
"The best part of One Identity Manager is that it provides wholesome features. Most of the things required for identity management are given out of the box in One Identity Manager. You can just define your use cases, take this tool, and right away implement the solution."
"With the tool in place, you need to hire fewer people to provide access, and you have control over your processes."
"RSA Identity Governance and lifecycles are good for the access certification and auditing sections."
"Roles, connectors for provisioning and re-accreditation or reviews help greatly to govern user access."
"The most valuable feature is the security, in particular, the One Time Password support."
"The data collection is excellent and easy to do. It does not require a lot of configuration nor does it require rules to be written like other competitors do."
"We are trying to use Omada's standards and to adapt our processes. But we have had some trouble with the bad documentation. This is something that they could improve on. It has not been possible for us to analyze some of the problems so far, based on the documentation. We always need consultants. The documentation should include some implementation hints and some guidelines for implementing the processes."
"If you're running Omada on a cloud service, you may have some issues deploying the newest release. Sometimes, the latest release doesn't adapt to the processes we have already installed. Identity Access Management is a critical system for our organization, and we need to ensure that everyone has the same access as they did before the release."
"Omada's performance could be better because we had some latency issues. Still, it's difficult to say how much of that is due to Omada versus the resources used by our other vendors in our on-prem environment. Considering the resources we have invested into making it run well, it's slightly slower than we would expect."
"The user interface should have a more flexible design, where you can change it to your requirement."
"Documentation can be improved. I have already filed a few suggestions to make documentation more clear and more representative of reality."
"Omada Identity has two main issues that need to be solved or improved the most. One is its setup or installation process because it's complex and cumbersome. I'm talking about the process for on-premises deployment because I've never tried the cloud version of Omada Identity. Setting up the cloud version should be much easier. The second area for improvement in Omada Identity is that it's piggybacking on Microsoft's complex way of having all kinds of add-ons, extensions, or setups, whether small or large, such as the new SQL Server, and it's cumbersome to make sure that everything works. Omada Identity is a complex solution and could still be improved."
"When you do a recalculation of an identity, it's hard to understand what was incorrect before you started the recalculation, and which values are actually updated... all you see are all the new fields that are provisioned, instead of seeing only the fields that are changed."
"Omada could make it a bit more convenient to send emails based on events automatically. Having that functionality is critical for us to maintain transparency."
"One Identity Manager can be made more user-friendly for end users."
"The user interface needs to improve."
"The UI and user experience side of things needs improvement."
"The philosophy behind One Identity Manager has always been that there's not one way of working and that you can set it up according to your own identity and access management philosophy, but what would make it better is by shortening the setup time and the learning curve time. If the team could create some best practices with a wizard to set the solution up within companies, that would be a killer feature and would help make identity access management more approachable. That would also help companies that don't have the resources or a dedicated team to set up One Identity Manager. What I'd like to see in the next release of the solution is the addition of just released application governance parts. That would sound promising. It would also be interesting if the team sets up best practice startup wizards, so you could set up One Identity Manager according to selectable best practice wizards instead of setting it up completely by yourself."
"The support team could be improved on. The first level of support essentially looks up knowledge base articles and often can't provide the answer needed."
"End-user UI customization is difficult and requires some knowledge of proprietary Angular technology. Every time a customer asks us: "Hey, can we modify this form in the UI?" or "Can we integrate a new form?" it's difficult to do. It's possible and we usually do it, but coding form changes typically takes two to four weeks, depending on the changes."
"One of the things we would like is the ability to have more than one system role manager. That would be nice. For example, when people are on vacation, sometimes it gets a little hard to administrate system roles."
"I would like it to have an easier integration with phones."
"Every connector that you have in the product needs to be custom-built, so there are not a lot of standard connectors available in the product, because of which there are a lot of hidden consultancy costs."
"This product is missing a lot of features which other competitors are providing. One of the key features that are missing right now is risk scoring. Additionally, there is not much scope for customization - everything is hard-coded and predefined, so it does not allow the developers to make many modifications."
"There are scalability issues. This product does not scale very well. It is not a good product for load balancing / active–active architecture."
"If you use the appliance version then it won't handle a huge database volume."
"RSA Identity Governance and Lifecycle could improve out-of-the-box customization."
"Technical support in Pakistan can be improved."
"The user interface and workflow need improvement, and more connectors would help."
More RSA Identity Governance and Lifecycle Pricing and Cost Advice →
One Identity Manager is ranked 3rd in Identity Management (IM) with 77 reviews while RSA Identity Governance and Lifecycle is ranked 23rd in Identity Management (IM) with 9 reviews. One Identity Manager is rated 8.0, while RSA Identity Governance and Lifecycle is rated 6.8. The top reviewer of One Identity Manager writes "The JML is customizable but the support team isn't strong". On the other hand, the top reviewer of RSA Identity Governance and Lifecycle writes "Lacking customization, poor support, but useful auditing". One Identity Manager is most compared with SailPoint Identity Security Cloud, Oracle Identity Governance, EVOLVEUM midPoint, Cisco ISE (Identity Services Engine) and Ping Identity Platform, whereas RSA Identity Governance and Lifecycle is most compared with SailPoint Identity Security Cloud and Saviynt. See our One Identity Manager vs. RSA Identity Governance and Lifecycle report.
See our list of best Identity Management (IM) vendors.
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.