Compare Auth0 vs. F5 BIG-IP Access Policy Manager (APM)

Cancel
You must select at least 2 products to compare!
Top Review
Find out what your peers are saying about Auth0 vs. F5 BIG-IP Access Policy Manager (APM) and other solutions. Updated: September 2021.
535,919 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"It has improved our organization by providing login authentication for a mobile app.""The most valuable feature is that it is simple to integrate, irrespective of your codebase.""The valuable features are that it is extremely secure and that it's developer-friendly."

More Auth0 Pros »

"Our customers have never complained about the stability""This is a product that is easy to install and integrate, and it is simple to use.""The solution is stable and reliable."

More F5 BIG-IP Access Policy Manager (APM) Pros »

Cons
"The product could use a more flexible administration structure""This is a costly solution and the price of it should be reduced.""In the past, there was an issue with the multi-tenant where there wasn't the ability to manage them."

More Auth0 Cons »

"Cloud services are something that F5 Access Policy Manager could do better""The price of this product can be improved.""The solution is quite costly."

More F5 BIG-IP Access Policy Manager (APM) Cons »

Pricing and Cost Advice
Information Not Available
"Recently, they have simplified the licensing"

More F5 BIG-IP Access Policy Manager (APM) Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Access Management solutions are best for your needs.
535,919 professionals have used our research since 2012.
Questions from the Community
Ask a question

Earn 20 points

Top Answer: The solution is stable and reliable.
Top Answer: The solution is expensive. It's not a cheap product. You do need to pay extra for certain features and services.
Top Answer: The solution is pretty technical. The initial setup is complex. The solution is quite costly. The solution could offer better reporting. The management aspect of the solution needs improvement.
Ranking
7th
out of 28 in Access Management
Views
5,413
Comparisons
4,338
Reviews
3
Average Words per Review
437
Rating
8.0
11th
out of 28 in Access Management
Views
676
Comparisons
531
Reviews
2
Average Words per Review
388
Rating
8.5
Comparisons
Also Known As
F5 Access Policy Manager
Learn More
Overview
You can easily and quickly connect your apps, choose identity providers, add users, set up rules, customize your login page and access analytics from your Auth0 dashboard. It really is identity made simple for developers.

F5® BIG-IP® Access Policy Manager® (APM) is an access management proxy solution for managing global access to the enterprise networks, cloud providers, applications, and application programming interfaces (APIs). Through a single management interface, BIG-IP APM consolidates remote, mobile, network, virtual, and web access. BIG-IP APM can also serve as a bridge between modern and classic authentication and authorization protocols and methods. For applications which are unable to support modern authentication and authorization protocols, like SAML and OAuth with OIDC, but which do support classic authentication methods, BIG-IP APM converts user credentials to the appropriate authentication standard supported by the application.

Key features of BIG-IP APM are (but not limited to):

• Support for Identity Aware Proxy (IAP) enabling Zero Trust application access
• Context-based authorization with dynamic L4/L7 ACLs
• Integration with third-party MFA solutions
• DTLS 2.0 mode for delivering and securing applications
• SAML 2.0 identity federation support
• Support for OAuth 2.0 authorization protocol
• SSO support for classic authentication (Kerberos, header- based, etc.), credential caching, OAuth 2.0, SAML 2.0, and FIDO2 (U2F)
• AAA server authentication and high-availability
• Integration with leading IAM vendor products (Microsoft, Okta, Ping Identity)
• BIG IP Edge Client and F5 Access integrate with VMware Horizon ONE (AirWatch), Microsoft Intune and IBM MaaS360
• Risk-based access leveraging third-party UEBA and risk engines (HTTP Connector)

Offer
Learn more about Auth0
Learn more about F5 BIG-IP Access Policy Manager (APM)
Sample Customers
JetPrivilege, Safari, Schneider Electric
City Bank, Ricacorp Properties, Miele, American Systems, Bangladesh Post Office
Top Industries
VISITORS READING REVIEWS
Comms Service Provider26%
Computer Software Company25%
Financial Services Firm6%
Media Company5%
VISITORS READING REVIEWS
Computer Software Company23%
Comms Service Provider19%
Energy/Utilities Company7%
Educational Organization6%
Find out what your peers are saying about Auth0 vs. F5 BIG-IP Access Policy Manager (APM) and other solutions. Updated: September 2021.
535,919 professionals have used our research since 2012.

Auth0 is ranked 7th in Access Management with 3 reviews while F5 BIG-IP Access Policy Manager (APM) is ranked 11th in Access Management with 3 reviews. Auth0 is rated 8.0, while F5 BIG-IP Access Policy Manager (APM) is rated 8.6. The top reviewer of Auth0 writes "Provides login authentication for mobile apps and has good stability ". On the other hand, the top reviewer of F5 BIG-IP Access Policy Manager (APM) writes "A robust platform that enables our clients to do almost anything". Auth0 is most compared with Amazon Cognito, Okta Workforce Identity, OneLogin Workforce Identity, Azure Active Directory and Cloudflare Access, whereas F5 BIG-IP Access Policy Manager (APM) is most compared with IBM Security Access Manager, CyberArk Privileged Access Manager, ForgeRock, Azure Active Directory and WSO2 Identity Server. See our Auth0 vs. F5 BIG-IP Access Policy Manager (APM) report.

See our list of best Access Management vendors.

We monitor all Access Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.