We performed a comparison between Fortinet FortiAuthenticator and One Identity Manager based on real PeerSpot user reviews.
Find out in this report how the two Identity Management (IM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The benefits of Omada Identity include a holistic way of viewing access, the ability to give people access, and automation."
"The identity lifecycle support is definitely valuable because we are a complex organization, and there is a lot of onboarding, movement, and offboarding in our organization. We have 31,000 users, and there are a lot of users who are constantly onboarding, offboarding, and moving. So, we need to make sure that these activities are supported. In old times, we used to do everything manually. Everyone was onboarded, offboarded, or moved manually. So, from a business point of view and an economics point of view, identity lifecycle is most valuable. From a security point of view, access review is the most important feature for us."
"It has a lot of out-of-the-box features. It is flexible, and there are a lot of possibilities to configure and extend it. It is user-friendly. It has an interface that is end-user or business-user friendly."
"The most valuable feature is the automatic provisioning and reconciliation of things like the Active Directory groups and memberships."
"For me, the best feature of Omada Identity is its web interface because it's really easy for users to understand."
"The thing that I find most valuable is that Omada consists of building blocks, which means that you can configure almost anything you want without using custom code, making it pretty easy to do. It's possible to connect to multiple target systems and to create one role that consists of different permissions in the different target systems. So one role in Omada can make sure that you have an account in three different systems."
"It scales in terms of numbers and types of identities. It can govern the on-premise applications as well as the cloud applications. So, it can manage hybrid environments with all types of identities and various load amounts."
"You can make resources. You can import them from Azure or Active Directory and put them in an application. For example, if there is an application that uses a lot of Active Directory groups, you can make the groups available for people. If they need to access that application, you can tell them the resource groups you have for that application. People can do everything by themselves. They do not need anybody else. They can just go to the Omada portal, and they can do it all by themselves. That is terrific."
"Simple to deploy, simple to use, and user-friendly."
"The initial setup is very easy."
"The current version is stable...Scalability-wise, it is a fine solution"
"The first valuable feature is being able to see everything on one platform. This includes logs and authentication failure."
"The most valuable feature is the OTP on the mobile phone."
"The ease of use is really nice. Using Authenticator, I've been able to actually work better on my authentication due to the fact that I have a single fabric to authenticate control from my firewall and on my access points. Authentication takes place from this area."
"The solution's most valuable aspect is that it easy to install. The user experience is very good."
"The product's on-premise version doesn't have recurring costs."
"We have reduced about 60% of our help desk calls, especially for onboarding and simple tasks that do One Identity automation."
"In terms of what I found most valuable in One Identity Manager, it's the only product where the workflow and the catalog can be configured on roles or by business people. You don't need to know the technology at all to configure that, so this is the product's biggest advantage as well as its strongest feature. One Identity Manager is also business-oriented and IAM administrator-oriented."
"The solution offers good integration with other environments such as SAP and Active Directory, et cetera."
"There are a lot of valuable features, including connectors, attestations, and workflow."
"The most valuable features are centralized Identity Management, robust Access Governance, and One Identity Manager workflow automation."
"This solution helps with compliance by having a way of controlling an audit trail, knowing how things are done, and knowing how to control who has access to what."
"The biggest improvement has been the auditing. Now we have a record of what the users have, what the users have requested and when, and when things were approved. It's all in the same system."
"We have seen a slight reduction in help desk calls, as this solution is a self-service product."
"Its flexibility is both a good thing and a bad thing. Because it is very flexible, it also becomes too complex. This is common for most of the products we evaluated. Its scalability should be better. It had a few scalability issues."
"One thing that we are not so happy about is the user interface. It is a bit dated. I know that they are working on that, but the user interface is quite dated. Currently, it is a little bit difficult to customize the user interface to the need of the business, which is a little bit disappointing. It needs it to be a little bit easier to operate, and it should have a better user interface."
"We are trying to use Omada's standards and to adapt our processes. But we have had some trouble with the bad documentation. This is something that they could improve on. It has not been possible for us to analyze some of the problems so far, based on the documentation. We always need consultants. The documentation should include some implementation hints and some guidelines for implementing the processes."
"If I had to name one thing, it would be the user interface (UI)."
"Omada could communicate better with us about the product roadmap. We haven't gotten any updates about it. The user interface is often a bit difficult to understand. It isn't optimized for small screens, so it doesn't display all of the information clearly, so users need to scroll a lot."
"When making a process, you should be able to use some coding to do some advanced calculations. The calculations you can currently do are too basic. I would also like some additional script features."
"I would like to search on date fields, which is not possible now."
"The web GUI can be improved."
"I would like to see more ways to authenticate, such as adding facial recognition to the two-factor, where you log into your phone or another device."
"The user interface and clustering are areas with shortcomings that need improvement."
"It can not use SQL to query FortiAnalyzer directly."
"I don't have any issues with this solution, but it may need a better, more user-friendly interface or better design of the platform."
"It would be helpful to receive a code by yourself for authentication instead of it registered to a phone."
"We would like to see Linux-based operating systems be able to integrate with FortiAuthenticator to get two-factor authentication running on them. as well. This is a shortcoming that I have faced a few times already."
"The solution could be more automated. It should be able to let me automate a lot of things so that what normally is done as a matter of manual processes can be handled quicker. Slow integrations can be taken up/out if there was more automation."
"The integration with other products, for example, some SAML authentications, would make it more flexible."
"Having new features for web developers in the One Identity Manager shop is an area for improvement. Another area for improvement in the tool is its ServiceNow connection as ServiceNow is a major ITSM system player, but the current out-of-the-box feature proposed by One Identity Manager can only make simple incident requests to the system. My company is now in full ICL design, so it prefers for all concerns or requests to be sent properly to ServiceNow, so my company can have better control over the incident requests and be able to sort those out. The tool fits all my needs today, except for the ServiceNow connector. That's the only additional feature I'd like to see in the next release of One Identity Manager."
"Their technical support's attitude is a bit strange. Quite often, we have to prove that there is a problem with the product rather than having them prove that there is not a problem with the product."
"A feature that I would like to see is a mobile app that provides users the ability to make changes or add users to the Active Directory, on the fly."
"The philosophy behind One Identity Manager has always been that there's not one way of working and that you can set it up according to your own identity and access management philosophy, but what would make it better is by shortening the setup time and the learning curve time. If the team could create some best practices with a wizard to set the solution up within companies, that would be a killer feature and would help make identity access management more approachable. That would also help companies that don't have the resources or a dedicated team to set up One Identity Manager. What I'd like to see in the next release of the solution is the addition of just released application governance parts. That would sound promising. It would also be interesting if the team sets up best practice startup wizards, so you could set up One Identity Manager according to selectable best practice wizards instead of setting it up completely by yourself."
"It would be nice to have more functionality in terms of connecting SAP systems, provisioning user accounts through SAP systems, and provisioning additional attributes."
"The initial setup was complex. We have a lot of different systems. The journey from implementing to joining all the systems was difficult."
"[Regarding] their upgrades, we're going to 8.12 right now and everything is running very smoothly but this is actually the first upgrade that has gone off well. Even the other "dots" have taken us six months or longer to get through QA testing."
"One of the things we would like is the ability to have more than one system role manager. That would be nice. For example, when people are on vacation, sometimes it gets a little hard to administrate system roles."
Fortinet FortiAuthenticator is ranked 8th in Identity Management (IM) with 50 reviews while One Identity Manager is ranked 3rd in Identity Management (IM) with 74 reviews. Fortinet FortiAuthenticator is rated 8.0, while One Identity Manager is rated 8.0. The top reviewer of Fortinet FortiAuthenticator writes "A reasonably priced solution that can be scaled toward different functionalities and offers flexible SMS messaging". On the other hand, the top reviewer of One Identity Manager writes "The JML is customizable but the support team isn't strong". Fortinet FortiAuthenticator is most compared with Cisco ISE (Identity Services Engine), Fortinet FortiToken, Microsoft Entra ID, Fortinet FortiNAC and Cisco Duo, whereas One Identity Manager is most compared with SailPoint IdentityIQ, Oracle Identity Governance, Cisco ISE (Identity Services Engine), EVOLVEUM midPoint and RSA Identity Governance and Lifecycle. See our Fortinet FortiAuthenticator vs. One Identity Manager report.
See our list of best Identity Management (IM) vendors.
We monitor all Identity Management (IM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.