When evaluating Access Management, what aspect do you think is the most important to look for?

Let the community know what you think. Share your opinions now!

33 Answers

author avatar

The SINGULAR issue about access management is that AM never took into consideration to prove the identity of the user. All they were able to prove was the initial assertion of the user attempting to access. So AM is actually of no use, even dangerous unless the identity of the end-user is correctly proven, then thereafter manage the user once in the network

Another aspect to look for is proof of user identity.

author avatar

The most important point is that identification and authentication must be checked in the real endpoint system, not in the gateway. because there are too many ways to access endpoint system like "server to server access" after gateway access control system.

author avatar

I'd point you back to your use cases. There is no point in looking at Functional/Non Functional requirements as differentiating elements in selecting tools or services if you don't know what use cases/user journeys, in particular, you're putting AM in to manage.

Find out what your peers are saying about Okta, Microsoft, Oracle and others in Access Management. Updated: November 2020.
448,542 professionals have used our research since 2012.