We performed a comparison between Fortinet FortiAuthenticator and IBM Tivoli Access Manager [EOL] based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Cisco, Auth0 and others in Single Sign-On (SSO)."Two valuable features of Omada Identity are the ability to discover accounts and link them to identities, and the automatic disabling of inactive accounts or identities."
"The support response time and the freedom from strange bugs and strange things happening in the software are valuable."
"The thing that I find most valuable is that Omada consists of building blocks, which means that you can configure almost anything you want without using custom code, making it pretty easy to do. It's possible to connect to multiple target systems and to create one role that consists of different permissions in the different target systems. So one role in Omada can make sure that you have an account in three different systems."
"Omada offers a technical solution that addresses both our needs."
"Its best feature is definitely the process design. It is quite easy and straightforward to design a process."
"You can make resources. You can import them from Azure or Active Directory and put them in an application. For example, if there is an application that uses a lot of Active Directory groups, you can make the groups available for people. If they need to access that application, you can tell them the resource groups you have for that application. People can do everything by themselves. They do not need anybody else. They can just go to the Omada portal, and they can do it all by themselves. That is terrific."
"The most valuable feature for us is the ability to set up connectors to various IT systems and offer a wide range of supported connectors."
"It has a very user-friendly interface compared to what we are used to, and it is highly configurable. In the old solution, when we needed to do something, we had to have a programmer sitting next to us, whereas, in Omada Identity, everything is configurable."
"The solution is easy to learn and makes it easy for our users to add FortiToken. It's very easy to integrate if you have other Fortinet devices."
"Features the addition and removal of access as needed for the VPN."
"The ease of use is really nice. Using Authenticator, I've been able to actually work better on my authentication due to the fact that I have a single fabric to authenticate control from my firewall and on my access points. Authentication takes place from this area."
"Intuitive interface and easy to deploy."
"Enables easy integration, allowing for 2FA with our VPN."
"The product is stable and reliable."
"The solution's most valuable aspect is that it easy to install. The user experience is very good."
"The product's initial setup phase was easy. It is also easy to deploy."
"OAuth 2 is now the de facto standard for API protection and scoped authorized delegation. IBM TAM now supports OAuth 2 and can act as fully compliant OAuth 2 authorization server."
"SAML 2.0."
"The Verify feature: A push method which customers are going for."
"The integration effort with the end application is quite straightforward and easy."
"Single Sign-On functionality is valuable because the core purpose of the product is to allow universal (or bespoke) SSO for application suites."
"The Omada Identity SaaS version doesn't provide all the features Omada Identity on-premise provides."
"We are still on Omada on-prem, but I understand that when Omada is in the cloud, you cannot send an attachment via email. We have some emails with attachments for new employees because we have to explain to them how to register and do their multi-factor authentication. All that information is in the attachment. People have to do that before they are in our system. We cannot give them a link to our Intranet and SharePoint because they do not yet have access. They have to register before that, so I need to send the attachments, but this functionality is not there in the cloud."
"The user interface could be improved. The interface between Omada and the user is mainly text-based."
"The solution should be made more agile for customers to own or configure."
"Functionality and usability could be improved."
"Omada Identity has a steep learning curve."
"Omada Identity has two main issues that need to be solved or improved the most. One is its setup or installation process because it's complex and cumbersome. I'm talking about the process for on-premises deployment because I've never tried the cloud version of Omada Identity. Setting up the cloud version should be much easier. The second area for improvement in Omada Identity is that it's piggybacking on Microsoft's complex way of having all kinds of add-ons, extensions, or setups, whether small or large, such as the new SQL Server, and it's cumbersome to make sure that everything works. Omada Identity is a complex solution and could still be improved."
"Its flexibility is both a good thing and a bad thing. Because it is very flexible, it also becomes too complex. This is common for most of the products we evaluated. Its scalability should be better. It had a few scalability issues."
"There is room for improvement in stability and support."
"There is a room for improvement. The log is a bit difficult to access, and searching the log codes is also a bit difficult. So it would be much better if, when we open a log, it could provide detailed information about errors, reasons for failure, and such."
"They could expand FortiAuthenticator's capabilities to accommodate a broader range of environments."
"Other features that would improve the product are a single sign-on where people can use their Gmail ID to log-in, etc."
"The product must provide full support for third-party FIDO security keys."
"The customization capability of Fortinet FortiAuthenticator is not very flexible."
"I don't have any issues with this solution, but it may need a better, more user-friendly interface or better design of the platform."
"It can not use SQL to query FortiAnalyzer directly."
"Looking at their roadmap, they have a broad grasp of the security features which the industry needs."
"Multi-factor authentication with social integration needs to improve."
"An Amazon Machine Image (AMI) for the newer appliance versions for hosting the virtual appliances on AWS will help."
"The self-service portal needs improvement."
"The profiling element is incredibly robust, but also equally as complex, it requires an off-site course to be able to understand the context or the plethora of options available."
More IBM Tivoli Access Manager [EOL] Pricing and Cost Advice →
Earn 20 points
Fortinet FortiAuthenticator is ranked 5th in Single Sign-On (SSO) with 52 reviews while IBM Tivoli Access Manager [EOL] doesn't meet the minimum requirements to be ranked in Single Sign-On (SSO). Fortinet FortiAuthenticator is rated 8.0, while IBM Tivoli Access Manager [EOL] is rated 8.0. The top reviewer of Fortinet FortiAuthenticator writes "A reasonably priced solution that can be scaled toward different functionalities and offers flexible SMS messaging". On the other hand, the top reviewer of IBM Tivoli Access Manager [EOL] writes "Reverse proxy means applications need only minimal changes to support SSO with ISAM". Fortinet FortiAuthenticator is most compared with Cisco ISE (Identity Services Engine), Fortinet FortiToken, Fortinet FortiNAC, Microsoft Entra ID and Cisco Duo, whereas IBM Tivoli Access Manager [EOL] is most compared with .
See our list of best Single Sign-On (SSO) vendors and best Identity Management (IM) vendors.
We monitor all Single Sign-On (SSO) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.