We performed a comparison between Okta Workforce Identity, Symantec Siteminder, and Tools4ever HelloID based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Cisco, Auth0 and others in Single Sign-On (SSO)."Its simplicity and its integration with various vendor-agnostic platforms are the most valuable features."
"We can automate the process of adding users to Okta if they are activated in Active Directory, or if they are added to the database of applications or Active Directory in the last couple of days."
"The feature that is most valuable to me is the automated user provisioning that we set up using Okta as a major part of that process."
"Okta integrates well with other solutions. Once you have integrated an application into Okta and onboarded a user, they will be onboarded for just-in-time provisioning."
"It is dependent on the evolution of your user base. It depends on usage per user, so the more sign-ins there are, the more expensive it becomes, so it works best for smaller companies from a financial perspective."
"Its integration components are most valuable. It integrates with everything in some way. There are some products, such as O365 or AD, with which it completely and 100% integrates. So, you can seamlessly create accounts across the board with some of these products. For some of the products with which it doesn't completely integrate, you can do some kind of interfacing."
"The provisioning functionality has been the most valuable. This solution has good performance, fast integration and is very responsive."
"We find the solution to be reliable for our customers and it is nice that it is cloud-based and can be accessed from anywhere."
"We almost never have outages nor see slowdowns."
"It is very scalable. We have a very large customer base: 75 million customers."
"It has considerably reduced the amount of time that new users would take to join into the organization. Previously, it was a lengthy, manual process because it's a very secure environment, where they need to verify the user before they can actually grant him a user-ID and password. Integrating with the built-in custom application, and exposing CA Single Sign On to the internet, we were able to get the employees onboard. The time that we gained was: previously it would generally take from four to eight weeks for each employee, we brought it to one to two days."
"IWA is an out-of-the-box feature. The SAML-based federation is standard for all tools. However, CA Single Sign-On has made the federation configuration way too simple and handy to set up and use."
"It's quite scalable."
"Authentication & Authorization are important because all the sites need authentication for security purposes. That has been handled pretty well all these years with SSO."
"Ease of use is very good, for administrating it. It's very well known."
"Right now, federation that comes out-of-the-box with single sign-on is the most valuable feature that we have, and also scalability."
"You don't need to be a specialist in Identity and Access Management solutions to understand the software and configure it."
"Now we can easily control who has access to which client or client application."
"The most valuable feature is the option to use SSO from different sources such as Microsoft AD, ADFS, Azure AD, SAML, form-based, etc."
"The Single Sign-On capabilities are endless and we haven't found a single app so far that couldn't be set up for SSO."
"The product does not offer enough integration capabilities."
"They also have single sign-on (SSO). When we bought Okta Workforce Identity a year and a half ago, I was also looking at SSO, but not much documentation was available for SSO. The documentation for SSO should be a little more robust for somebody who is implementing it for the first time."
"Okta Workforce Identity can improve by having more features in governance."
"The solution should have greater on-premises availability, not just cloud and more package customization in its processing."
"It can have more API integrations."
"In my country, there's a lot of stealing of mobile phones, and mobile phones are the authentication device through the Okta application. If someone should steal my mobile phone, which is very common in my country, he or she might have access to my company account. That's my concern."
"They should focus on improving them to provide top-notch team access management while still offering those typical features."
"The guest user access could be improved."
"The tech support has not been very good for us so we don't use them anymore. We have had some issues. Nobody is perfect."
"An area Siteminder could improve on is that there are a few limitations, in terms of new protocols for OpenID. If I want to have different scopes, the features are limited. They also do not have APIs exposed, which is a major drawback. API is a feature I would like to see included in the next release."
"They need to make configurations easier, and not have the engineer having to guess what will happen when he changes a particular setting."
"If the reporting feature can be integrated into SSO itself that will be an icing on the cake."
"All the problems that we reported actually have never been resolved. We could not capture enough information for CA to be able to debug the problem."
"The main thing is we do not have the traceability and good monitoring that CA can provide us to capture problems when they occur."
"To add more value to this solution it needs to be more user-friendly."
"We would like to the OAuth be more stable, more issues being fixed rather than not."
"Integration with other Tools4ever applications such as SSRPM and IAM would be nice."
"When something needs to be changed with the sign-on policies, we have to apply this manually to every client environment that we have."
"Sometimes it generates a username that is not unique, but at the time of this writing, it is not possible to generate a new one that is unique."
"I would like to have the built-in provisioning module improved."
Earn 20 points
Earn 20 points