CA SSO Competitors and Alternatives

Read reviews of CA SSO competitors and alternatives
Real User
Middleware Specialist at a tech vendor with 10,001+ employees
Mar 07 2017

What is most valuable?

From my experience, most of the product features are meant for specific purpose(s) of its own demand and need. Implementing the feature depends on case to case, considering the organization's enterprise/middleware infrastructure design. TAM... more»

How has it helped my organization?

It applies access controls on an organization's web space while running on its components independently, while being highly available. We can isolate our organization infrastructure from security considerations, as we have our entire... more»

What needs improvement?

Older TAM versions are not compatible for connecting to a DB. I'm not sure if it is available in iSAM 8/9. However, since iSAM 9 was released as an appliance model, I don't think having a DB as a TAM database directly makes any difference for... more»
Okta
Consultant
Consultant with 201-500 employees
Jun 04 2018

What do you think of Okta?

Primary Use Case We used this solution for provisioning more than one and a half LAC users and integrating more than 300 applications. SSO and MFA has been implemented on almost all applications. MFA options used: RSA token, Okta Verify, etc. • Improvements to My Organization Integrating more than 300 applications is quite tough. With the help of Okta and its outstanding user friendly UI, things went fairly easily. • Valuable Features The ease of JIT provisioning. Wide range of MFA options. I prefer "Okta Verify" out of them all. Last, but not least, the ease of writing rules. • Room for Improvement RESTful Web Service calls and their response seem a bit slow. • Use of Solution Less than one year.
Consultant
Customer Relations at a tech vendor with 11-50 employees
Jan 15 2018

What is most valuable?

Pretty robust dynamic HTTP Header Responses Stateful session management, enabling server-side session termination and/or prevention of concurrent logins.

How has it helped my organization?

I was able to use the new SAML Service Provider capability to consume a federated token and exchange it for an OAM token for subsequent session requests across multiple applications.

What needs improvement?

The ADF UI is clunky, IMO The session URL redirects have to be accounted for network-wise. Default is client talking to OAM Server (PDP) in middle tier, which is not realistic. Need separate load balancer/VIP just for this. Identity... more»

Sign Up with Email