I like the intelligent authentication feature.
Even though we have very small business interests with them today, they see that we plan on growing drastically over the next two years. Therefore, we have excellent support and we are now at a point where we are not calling tech support. We pick up a phone and call the Account Manager and they'll get everything resolved for us. We don't have to queue along with everybody else and go through a long process.
The valuable features are that it is extremely secure and that it's developer-friendly.
The most valuable feature is that it is simple to integrate, irrespective of your codebase.
It's very easy to implement everything.
I would rate the solution's stability eight or nine out of ten.
Our customers have benefited from Omada Identity automating the certification process. Most of our customers were using manual methods for user access certification. With Omada Identity, you can automate almost all of it, which means that certification now becomes on demand. You don't have to wait for two or three months to execute a certification timeframe. Instead, you can do certifications as often as you want.
There is no password hash saved on the cloud, which is the part that I like the most.
The most valuable feature of this solution for most customers is access management.
The most valuable features are the pipeline management, being able to track the pipeline anytime, and the ability to get in touch with our high management team or board members.
The most valuable aspect of the product is the provisioning of a lot of SAP systems. It offers automated provisioning.
Advice From The CommunityRead answers to top Customer Identity and Access Management questions. 464,757 professionals have gotten help from our community of experts.
See more Customer Identity and Access Management questions »
Rony_SklarCommunity Manager at IT Central Station
Question: What are some tips for effective identity and access management to prevent insider data breaches?
Insider data breaches can be a real problem in businesses. One way to address this issue is by implementing an identity and access management solution. What tips do you have for ensuring that one's identity and access management solution is effective?