We performed a comparison between Microsoft Entra ID and Symantec Siteminder based on real PeerSpot user reviews.
Find out in this report how the two Single Sign-On (SSO) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It's definitely both stable and scalable."
"Privilege identity management is the most valuable feature."
"It is a central point where we provide the cloud lock-in for our company. We focus the multi-factor authentication within Azure AD before jumping to other clouds or software as a service offerings. So, it is the central point when you need to access something for our company within the cloud. You go to Azure AD and can authenticate there, then you move from there to the target destination or the single sign-on."
"Azure AD has features that have helped improve our security posture."
"It's not intuitive and we use it mainly for our Office 365 files. The integration between the two is interesting. However, the learning curve is high."
"Microsoft Entra ID Protection and Microsoft Sentinel are both excellent monitoring features for Microsoft Entra ID."
"As an end-user, the access to shared resources that I get from using this product is very helpful."
"It has given us the ability to be able to establish single sign-on identities in which we can establish credentials no matter where we are, whether it is on-premises or in the cloud, in a hybrid cloud, or in an additional connection from another cloud where we share equipment or host."
"The single sign-on is the solution's most valuable feature"
"As our identity model continues to mature, probably the Federation is most valueable."
"It has the ability to authenticate and authorize users. It is the main feature for our security."
"The most valuable feature is the Federation part of Single Sign On, which is customizable and is easily integrated with any customer application or any third party application."
"IWA is an out-of-the-box feature. The SAML-based federation is standard for all tools. However, CA Single Sign-On has made the federation configuration way too simple and handy to set up and use."
"The Directory is secure. It's our user store, and it's important to keep our members safe. The product does well with that."
"I liked the debugging part. There are only two files (trace file and log file) that you need to look into while performing debugging, and the logs give you the exact info on where and what needs to be fixed."
"The most valuable feature is the integration with the Active Directory."
"Generally, everything works pretty well, but sometimes, Azure Active Directory has outages on the Microsoft side of things. These outages really have a very big impact on the users, applications, and everything else because they are closely tied to the Azure AD ecosystem. So, whenever there is an outage, it is really difficult because all things start failing. This happens very rarely, but when it happens, there is a big impact."
"Some of the features that they offer, e.g., customized emails, are not available with B2C. You are stuck with whatever email template they give you, and it is not the best user experience. For B2C, that is a bit of a negative thing."
"Microsoft needs to add a single setup, so whenever resources join the company or are leaving the company, all of the changes can be made with a single click."
"Technical support could be faster."
"Azure AD needs to be more in sync. The synchronization can be time-consuming."
"Initially, we wanted to exclude specific users from MSA. So, we had a condition policy, which forces MSA for all the users. So we wanted to exclude users who are using an NPS extension. So it was not listed, as a NPS extension was not listed outside an application, in actual, so, we go back and were not able to exclude users using NPS extension from MSA. So that was one limitation that we found and we had to work around that."
"The integration between the Azure active directory and the traditional active directory could be improved upon."
"I want to see more features to improve security, such as integrated user behavior analysis."
"The initial setup was complex, painful. But that is to be expected of any new setup. When you're a big bank like us, any kind of migration to a new product is hard. I expect it to be painful, and it was painful. But it's not something that you can avoid."
"Better documentation. I went through some sessions on single sign-on for version 12.7."
"To add more value to this solution it needs to be more user-friendly."
"We are finding some compatibility issues. We're still working with CA on them."
"The tech support has not been very good for us so we don't use them anymore. We have had some issues. Nobody is perfect."
"The Federation part of CA Single Sign On, it's a bit complex to implement because it involves the SSL certificates, exchange of certificates, and lot of technical details. The documentation misses some important parts of this, so that's the reason it took some time for us to go live."
"The main thing is we do not have the traceability and good monitoring that CA can provide us to capture problems when they occur."
"I would prefer to see their SAML integration be a more streamlined and easier interface."
Microsoft Entra ID is ranked 1st in Single Sign-On (SSO) with 190 reviews while Symantec Siteminder is ranked 13th in Single Sign-On (SSO) with 69 reviews. Microsoft Entra ID is rated 8.6, while Symantec Siteminder is rated 8.0. The top reviewer of Microsoft Entra ID writes "Saves us time and money and features Conditional Access policies, SSPR, and MFA". On the other hand, the top reviewer of Symantec Siteminder writes "Easy to implement and customize and very stable". Microsoft Entra ID is most compared with Microsoft Intune, Google Cloud Identity, CyberArk Privileged Access Manager, Ping Identity Platform and Okta Workforce Identity, whereas Symantec Siteminder is most compared with Ping Identity Platform, ForgeRock, Okta Workforce Identity, Auth0 and Red Hat Single Sign On. See our Microsoft Entra ID vs. Symantec Siteminder report.
See our list of best Single Sign-On (SSO) vendors and best Access Management vendors.
We monitor all Single Sign-On (SSO) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.