We compared Auth0 and Microsoft Entra ID based on our user's reviews in several parameters.
Auth0 stands out for its robust security measures, customizable authentication options, and extensive support for various platforms. Users appreciate its comprehensive documentation and responsive customer service. In comparison, Microsoft Entra ID is valued for its user-friendly interface, efficient authentication process, and seamless integration. Customers praise its exceptional customer service and support. Auth0 users suggest improvements in UI and scalability, while Microsoft Entra ID users seek enhancements in UI design, usability, customization options, and security features.
Features: Auth0's valuable features include easy integration, robust security measures, seamless single sign-on, and customizable authentication. Users appreciate its scalability, platform support, documentation, and customer support. Microsoft Entra ID offers a user-friendly interface, efficient authentication, seamless integration, and easy navigation. Users appreciate its reliability and convenience across platforms.
Pricing and ROI: Auth0's setup cost is deemed fairly priced, with a simple and straightforward setup process. Additionally, users appreciate the flexibility and clarity of Auth0's licensing options. On the other hand, Microsoft Entra ID's pricing is seen as affordable and competitive. Users find the setup process to be efficient and hassle-free, and appreciate the flexibility and options available for licensing. Overall, both products have positive user feedback regarding pricing, setup cost, and licensing., Auth0's ROI is attributed to its reliability, integration, and secure authentication. Users value its ease of implementation and time-saving features. Microsoft Entra ID focuses on cost savings, efficiency, process streamlining, and productivity improvement.
Room for Improvement: Auth0 could benefit from improving its user interface design and making it more intuitive. Better documentation and clearer instructions are needed for setup and integration processes. In contrast, Microsoft Entra ID requires enhancements in user interface design, optimization for different devices, usability, sign-up process simplification, customization options, and advanced security features.
Deployment and customer support: The user reviews indicate that the time required for implementing a new tech solution with Auth0 can vary, ranging from three months for deployment to a week for setup. In contrast, users of Microsoft Entra ID reported spending three months on deployment and an additional week on setup, or just a week for both deployment and setup. The specific circumstances and context should be taken into account when evaluating the duration required for establishing a new tech solution., Customers who have used Auth0 have commended its customer service team for their prompt and helpful assistance. On the other hand, Microsoft Entra ID's customer service has been praised for being exceptional, efficient, and reliable, with users appreciating the effective communication and seamless problem resolution.
The summary above is based on 101 interviews we conducted recently with Auth0 and Microsoft Entra ID users. To access the review's full transcripts, download our report.
"It supports identity federation, FSO and multi-tenancy."
"The most valuable feature is interface application integration, but we haven't fully used it yet. We'll need it in the future for a few potential clients."
"The most important thing for me is compliance. Everything that they have developed in Auth0 is already certified by many regulators such as ISO. So, we do not need to take care of that. We have the shared responsibility model to share assets with other products we are using in the cloud."
"It has improved our organization by providing login authentication for a mobile app."
"The most valuable feature is that it is simple to integrate, irrespective of your codebase."
"The most valuable feature of the product is scalability."
"It is very scalable because it provides a new environment for companies based on their number of users and other factors. The tool can take a lot of users."
"I simply use the JWT from the client on the server side to process requests and push updated profile data to a database/queue as needed and end the process without having to persist data in the web server (sessions)."
"One of the most important is the Conditional Access. It helps affect a Zero Trust strategy positively."
"The solution adds an extra layer of security."
"The most valuable feature is Identity and Access Management. As an IT administrator, this feature allows me to manage access for users and groups."
"It's an easy product to maintain."
"Don't delay implementing this solution, it's the best thing you can do for your identity protection."
"The most valuable feature is the ability to set up conditional access, where you can enforce users to connect using multifactor authentication."
"Privileged Identity Management and Privileged Identity Management make controlling access considerably easier and ensure that authorized access is achieved."
"The security features are great. They will report in advance to you in the case of suspicious activity."
"There is a possibility to improve the machine-to-machine authentication flow. This part of Auth0 is not really well documented, and we could really gain some additional knowledge on that."
"The tool's price should be improved."
"The Management API could be improved so it's easier to get user information."
"There could be easy integration with IoT devices for the product."
"The product support for multi-tenancy could be improved."
"When they introduced the Organizations feature they did support different login screens per organization. However, they introduced a dependency between this feature and another called the New Universal Login Experience. The New Experience is a more lightweight login screen, but it is much less customizable. For example, today, we are able to fully customize our login screen and even control the background image according to the time of day. We have code to do that. But we are not able to write code anymore in the New Experience."
"In the past, there was an issue with the multi-tenant where there wasn't the ability to manage them."
"This is a costly solution and the price of it should be reduced."
"Microsoft Authenticator can improve their notifications because sometimes, my team doesn't receive notifications about app updates and authentication failures."
"I think the solution can improve by making the consumption of that data easier for our customers."
"The Azure AD Application Proxy, which helps you publish applications in a secure way, has room for improvement. We are moving from another solution into the Application Proxy and it's quite detailed. Depending on the role you're signing in as, you can end up at different websites, which wasn't an issue with our old solution."
"Lacks integration between applications and phones."
"Certain aspects of the user interface can be rather clunky and slow. It can sometimes be circular in terms of clicking a link for a risky user sign-in and seeing what the risky login attempts were. It takes you in a circle back to where you started, so drilling down into details, especially if you are not in it every day and it is one of many tools that you use, can be difficult. It can be difficult to track down the source of an issue."
"On-premise capabilities for information and identity management need improvement."
"They can improve how people manage their accounts. They can simplify and provide more information about adding or updating a phone number or email id in the MSA account. A lot of time users do get confused about where to go. For example, if I've changed my mobile number, where do I go and change my mobile number in the MSA account? A lot of time, employees think if they change the phone number in the HR database, it'll automatically get changed on the MSA account, which is not the case. Microsoft can simplify that and add these questions in the FAQ documents as well."
"The solution has certain limitations. For example, it has very little governance functionality."
Auth0 is ranked 5th in Single Sign-On (SSO) with 14 reviews while Microsoft Entra ID is ranked 1st in Single Sign-On (SSO) with 190 reviews. Auth0 is rated 8.2, while Microsoft Entra ID is rated 8.6. The top reviewer of Auth0 writes "Has good documentation but improvement is needed in MFA and application configurations ". On the other hand, the top reviewer of Microsoft Entra ID writes "Saves us time and money and features Conditional Access policies, SSPR, and MFA". Auth0 is most compared with Amazon Cognito, Frontegg, Cloudflare Access, ForgeRock and Microsoft Entra Verified ID, whereas Microsoft Entra ID is most compared with Microsoft Intune, Google Cloud Identity, CyberArk Privileged Access Manager, Ping Identity Platform and RSA SecurID. See our Auth0 vs. Microsoft Entra ID report.
See our list of best Single Sign-On (SSO) vendors and best Access Management vendors.
We monitor all Single Sign-On (SSO) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.