We compared Auth0 and Microsoft Entra ID based on our user's reviews in several parameters.
Auth0 stands out for its robust security measures, customizable authentication options, and extensive support for various platforms. Users appreciate its comprehensive documentation and responsive customer service. In comparison, Microsoft Entra ID is valued for its user-friendly interface, efficient authentication process, and seamless integration. Customers praise its exceptional customer service and support. Auth0 users suggest improvements in UI and scalability, while Microsoft Entra ID users seek enhancements in UI design, usability, customization options, and security features.
Features: Auth0's valuable features include easy integration, robust security measures, seamless single sign-on, and customizable authentication. Users appreciate its scalability, platform support, documentation, and customer support. Microsoft Entra ID offers a user-friendly interface, efficient authentication, seamless integration, and easy navigation. Users appreciate its reliability and convenience across platforms.
Pricing and ROI: Auth0's setup cost is deemed fairly priced, with a simple and straightforward setup process. Additionally, users appreciate the flexibility and clarity of Auth0's licensing options. On the other hand, Microsoft Entra ID's pricing is seen as affordable and competitive. Users find the setup process to be efficient and hassle-free, and appreciate the flexibility and options available for licensing. Overall, both products have positive user feedback regarding pricing, setup cost, and licensing., Auth0's ROI is attributed to its reliability, integration, and secure authentication. Users value its ease of implementation and time-saving features. Microsoft Entra ID focuses on cost savings, efficiency, process streamlining, and productivity improvement.
Room for Improvement: Auth0 could benefit from improving its user interface design and making it more intuitive. Better documentation and clearer instructions are needed for setup and integration processes. In contrast, Microsoft Entra ID requires enhancements in user interface design, optimization for different devices, usability, sign-up process simplification, customization options, and advanced security features.
Deployment and customer support: The user reviews indicate that the time required for implementing a new tech solution with Auth0 can vary, ranging from three months for deployment to a week for setup. In contrast, users of Microsoft Entra ID reported spending three months on deployment and an additional week on setup, or just a week for both deployment and setup. The specific circumstances and context should be taken into account when evaluating the duration required for establishing a new tech solution., Customers who have used Auth0 have commended its customer service team for their prompt and helpful assistance. On the other hand, Microsoft Entra ID's customer service has been praised for being exceptional, efficient, and reliable, with users appreciating the effective communication and seamless problem resolution.
The summary above is based on 101 interviews we conducted recently with Auth0 and Microsoft Entra ID users. To access the review's full transcripts, download our report.
"The most important thing for me is compliance. Everything that they have developed in Auth0 is already certified by many regulators such as ISO. So, we do not need to take care of that. We have the shared responsibility model to share assets with other products we are using in the cloud."
"The most valuable feature of the product is scalability."
"The most valuable feature is interface application integration, but we haven't fully used it yet. We'll need it in the future for a few potential clients."
"It has improved our organization by providing login authentication for a mobile app."
"It is easily connected and easy to put our app in single sign-on."
"It's a very powerful platform. It has the ability to do the usual stuff, according to modern protocols, like OIDC and OAuth 2. But the real benefit of using the platform comes from its flexibility to enhance it with rules and, now, with what they call authentication pipelines. That is the most significant feature, as it allows you to customize everything regarding the authentication and authorization process."
"The valuable features are that it is extremely secure and that it's developer-friendly."
"It is very scalable because it provides a new environment for companies based on their number of users and other factors. The tool can take a lot of users."
"Azure AD has features that have helped improve our security posture."
"The most valuable feature is the conditional access policies. This gives us the ability to restrict who can access which applications or the portal in specific ways."
"The security and infrastructure management features are the most valuable ones for us."
"For some applications, it's not only working for authentication but it's also being used to apply roles for users. From the management perspective, it's much better to have this because in the past we constantly needed to go into the console of the different solutions and create or delete users or modify their roles and permissions. Now, with Azure Active Directory, we can do that from a single point. That makes our management model much easier."
"The most valuable feature of this solution is that is easy to use."
"Installation is straightforward. It only took a couple of hours to set everything up."
"It enhances security, especially for unregistered devices. It 1000% has security features that help to improve our security posture. It could be irritating at times, but improving the security posture is exactly what the Authenticator app does."
"As an end-user, the access to shared resources that I get from using this product is very helpful."
"The Management API could be improved so it's easier to get user information."
"There are indeed areas where the product could improve. For instance, Okta offers various application configurations, enabling access management, which the tool could consider implementing."
"There could be easy integration with IoT devices for the product."
"The tool's price should be improved."
"The product could use a more flexible administration structure"
"In the past, there was an issue with the multi-tenant where there wasn't the ability to manage them."
"I think they can do a better job in explaining what you're supposed to do next in order to correctly follow an idiomatic approach to using the solution beyond simply passing a JWT token to a server and having the server check then signature to validate the token."
"This is a costly solution and the price of it should be reduced."
"If somebody is using an IdP or an identity solution other than Active Directory, that's where you have to start jumping through some hoops... I don't think the solution is quite as third-party-centric as Okta or Auth0."
"I want to be able to identify the audiences effectively and manage them."
"When you fix the rules and permissions, working directly on the manifest, you really need to have in-depth knowledge. If there were a graphical user interface to update the manifest, that would be good."
"Azure Active Directory could benefit by adding the capability for identity life cycle for the on-premise solution. For example, an HR solution, which is built on-premise or, in general, better on-premise capable solutions."
"We have a custom solution now running to tie all those Azure ADs together. We use the B2B functionality for that. Improvements are already on the roadmap for Azure AD in that area. I think they will make it easier to work together between two different tenants in Azure AD, because normally one tenant is a security boundary. For example, company one has a tenant and company two has a tenant, and then you can do B2B collaboration between those, but it is still quite limited. For our use case, it is enough currently. However, if we want to extend the collaboration even further, then we need an easier way to collaborate between two tenants, but I think that is already on the roadmap of Azure AD anyway."
"I hope, in the roadmap, Microsoft eventually offers the same features as Okta. It will take some more time to mature."
"The product needs to improve its support."
"The thing that is a bit annoying is the inability to nest groups. Because we run an Azure hybrid model, we have nested groups on-premise which does not translate well. So, we have written some scripts to kind of work around that. This is a feature request that we have put in previously to be able to use a group that is nested in Active Directory on-premise and have it handled the same way in Azure."
Auth0 is ranked 5th in Single Sign-On (SSO) with 14 reviews while Microsoft Entra ID is ranked 1st in Single Sign-On (SSO) with 190 reviews. Auth0 is rated 8.2, while Microsoft Entra ID is rated 8.6. The top reviewer of Auth0 writes "Has good documentation but improvement is needed in MFA and application configurations ". On the other hand, the top reviewer of Microsoft Entra ID writes "Saves us time and money and features Conditional Access policies, SSPR, and MFA". Auth0 is most compared with Amazon Cognito, Frontegg, Cloudflare Access, ForgeRock and Okta Workforce Identity, whereas Microsoft Entra ID is most compared with Microsoft Intune, Google Cloud Identity, CyberArk Privileged Access Manager, Ping Identity Platform and SailPoint Identity Security Cloud. See our Auth0 vs. Microsoft Entra ID report.
See our list of best Single Sign-On (SSO) vendors and best Access Management vendors.
We monitor all Single Sign-On (SSO) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.