We performed a comparison between Microsoft Entra ID and Yubico YubiKey based on real PeerSpot user reviews.
Find out in this report how the two Authentication Systems solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature is the ability to set up conditional access, where you can enforce users to connect using multifactor authentication."
"With Azure Active Directory we were able to manage with different options the access for different users."
"Azure Active Directory provides access to resources in a very secure manner. We can detect which user is logging in to access resources on the cloud. It gives us a comprehensive audit trace in terms of from where a user signed in and whether a sign-in is a risky sign-in or a normal sign-in. So, there is a lot of security around the access to resources, which helps us in realizing that a particular sign-in is not a normal sign-in. If a sign-in is not normal, Azure Active Directory automatically blocks it for us and sends us an email, and unless we allow that user, he or she won't be able to log in. So, the User Identity Protection feature is the most liked feature for me in Azure Active Directory."
"Azure Active Directory features have helped improve our security posture. The remote working has been a massive help during the pandemic."
"I would say that Azure AD's pricing is very reasonable because of the structure and in terms of the solution."
"It has made our work easier in that it’s simplified everything for us."
"It is a very straightforward implementation."
"The most valuable feature is the ease of scalability."
"The most valuable feature of Yubico YubiKey is security."
"It's small and lightweight. Like a phone, it doesn't run out of battery. It also doesn't have to be unlocked. It doesn't break. Moreover, they're very durable and it's very convenient."
"The solution is simple to use and we have installed it in our clients' endpoints. The tool is just plug-and-play for the end user. The end user can just put in the key to the security computer and log in without any hassle. The solution is efficient, user-friendly, and easy to use."
"YubiKey is a hardware security device with advanced security features."
"I think the documentation and configuration are both areas that need improvement."
"A nice feature that is not currently present, would be if they had some visualization tools."
"We have a custom solution now running to tie all those Azure ADs together. We use the B2B functionality for that. Improvements are already on the roadmap for Azure AD in that area. I think they will make it easier to work together between two different tenants in Azure AD, because normally one tenant is a security boundary. For example, company one has a tenant and company two has a tenant, and then you can do B2B collaboration between those, but it is still quite limited. For our use case, it is enough currently. However, if we want to extend the collaboration even further, then we need an easier way to collaborate between two tenants, but I think that is already on the roadmap of Azure AD anyway."
"Sometimes, what one customer may like, another may not like it. We have had customers asking, "Why is Microsoft forcing us to do this?" For example, when you use Exchange Server on-premise, then you can customize it for your company and these customizations are unlimited. However, if you use Exchange Online or with Microsoft 365, then your ability to make modifications is limited. So, only the cloud versus is limited."
"At first, it was a bit challenging to come up with a workaround that would get authentication to work."
"Allowing for more customization would be very useful. There is a limited metadata capability. When you look at a user, there are only six pieces of information you can see, but organizations are way more complex, so having that metadata available and being able to use that for dynamic user groups and other policies would be very helpful."
"It would be ideal if the solution moved to a passwordless type of environment. It's the future of authentification. It's also more secure and convenient."
"Some systems do not integrate very well with Azure AD. We thought of going for Okta, but later on we were able to achieve it, but not the way we wanted. It was not as easy as we thought it would be. The integration was not very seamless."
"It would be better if the product can come up with a serial number for the keys. It would be nice if they had a numbering system as a configuration identity that would help the IT and technical teams to identify the keys because they look all the same. It would be more like putting a tag on them."
"It's a hardware device, so it isn't cost-effective to use for all your accounts. You might have a hard time getting budget approval. It's better to take a strategic approach and use it only for critical accounts. You can use other forms of authentication for the rest."
"Currently, an area where the product lacks is in addressing service needs."
"Yubico YubiKey is inconvient. No one likes the idea of having to put a USB device into the system, having to remember to take it out, and having passwords. It may be very good for security but it is not great for people to use."
Microsoft Entra ID is ranked 1st in Authentication Systems with 190 reviews while Yubico YubiKey is ranked 7th in Authentication Systems with 4 reviews. Microsoft Entra ID is rated 8.6, while Yubico YubiKey is rated 8.8. The top reviewer of Microsoft Entra ID writes "Saves us time and money and features Conditional Access policies, SSPR, and MFA". On the other hand, the top reviewer of Yubico YubiKey writes " A tool that is compact, lightweight, stable scalable and durable". Microsoft Entra ID is most compared with Microsoft Intune, Google Cloud Identity, CyberArk Privileged Access Manager, Ping Identity Platform and Auth0, whereas Yubico YubiKey is most compared with RSA SecurID, Cisco Duo, Fortinet FortiToken, Thales Authenticators and Fortinet FortiAuthenticator. See our Microsoft Entra ID vs. Yubico YubiKey report.
See our list of best Authentication Systems vendors.
We monitor all Authentication Systems reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.