Top 8 Customer Identity and Access Management Tools
ForgeRockAuth0Omada IdentityWSO2 Identity ServerSalesforce IdentityOkta Customer IdentitySAP Customer Identity and Access ManagementPingOne
Their access management solution, OpenAM, is most valuable because it meets the needs of a lot of users.
I like the intelligent authentication feature.
The valuable features are that it is extremely secure and that it's developer-friendly.
The most valuable feature is that it is simple to integrate, irrespective of your codebase.
It has a lot of out-of-the-box features. It is flexible, and there are a lot of possibilities to configure and extend it. It is user-friendly. It has an interface that is end-user or business-user friendly.
It's very easy to implement everything.
I would rate the solution's stability eight or nine out of ten.
The user experience was great because it had all the features that the client needed. It was fully customized for the client, and it was very simple. It was the best solution at that time.
There is no password hash saved on the cloud, which is the part that I like the most.
The most valuable feature of this solution for most customers is access management.
The most valuable aspect of the product is the provisioning of a lot of SAP systems. It offers automated provisioning.
Advice From The CommunityRead answers to top Customer Identity and Access Management questions. 501,818 professionals have gotten help from our community of experts.
See more Customer Identity and Access Management questions »
Evgeny BelenkyDirector of Community at IT Central Station
Dear IT Central Station community, What advice can you share with the community (especially with enterprise users) on Password Day 2021? Thanks, IT Central Station Community Team
Rony_SklarCommunity Manager at IT Central Station
Question: What are some tips for effective identity and access management to prevent insider data breaches?
Insider data breaches can be a real problem in businesses. One way to address this issue is by implementing an identity and access management solution. What tips do you have for ensuring that one's identity and access management solution is effective?