# Best Cloud Directory Services

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Cloud directory services are a modern implementation of identity management and directory solutions delivered through the cloud. These products help companies store information about individual identities and manage their lifecycles. Companies use these tools as they transition away from on-premise or locally operating identity management software. Part of the toolbox for IAM admins and other user access admins, they can be used to build identity systems from scratch or extend existing LDAP services to the cloud. Cloud directory services solutions provide many simple integrations to help expedite identity management operations across different networks and applications.

There is some overlap between cloud directory services and other traditional [identity management software](https://www.g2.com/categories/identity-management) in their functionality. But cloud directory services solutions are differentiated by their managed service delivery model and scalability.

To qualify for inclusion in the Cloud Directory Services category, a product must:

- Facilitate identity lifecycle management
- Provide functionality for user provisioning and governance
- Support migration of LDAP services 
- Provide a cloud-based directory service





## Category Overview

**Total Products under this Category:** 35


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 7,900+ Authentic Reviews
- 35+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.


## Best Cloud Directory Services At A Glance

- **Leader:** [JumpCloud](https://www.g2.com/products/jumpcloud/reviews)
- **Highest Performer:** [Rippling IT](https://www.g2.com/products/rippling-it/reviews)
- **Easiest to Use:** [Microsoft Entra ID](https://www.g2.com/products/microsoft-entra-id/reviews)
- **Top Trending:** [Rippling IT](https://www.g2.com/products/rippling-it/reviews)
- **Best Free Software:** [JumpCloud](https://www.g2.com/products/jumpcloud/reviews)


---

**Sponsored**

### Rippling IT

Transform your organization’s IT operations with Rippling’s unified platform for identity, device, access, and security management. Centralize every IT workflow, from provisioning apps and laptops to enforcing security policies, in a single dashboard. Seamlessly manage the entire employee lifecycle, automatically granting and revoking app access, configuring devices, and maintaining least-privilege controls. Enforce compliance with real-time monitoring, automated patching, and integrated endpoint protection. Streamline offboarding with instant lockouts and secure device recovery. Gain full visibility across hardware, software, and user risk without the complexity of multiple tools. Rippling helps your business cut costs, eliminate manual work, and strengthen security, so your team can move faster. Experience the power of unified IT management with Rippling today.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=1869&amp;secure%5Bdisplayable_resource_id%5D=1869&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=1869&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=1640029&amp;secure%5Bresource_id%5D=1869&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fcloud-directory-services%2Fmid-market&amp;secure%5Btoken%5D=4808405d7cbf5dead3c6f9d21bc4a7f179c5054c94a58df09cc44219b00743a5&amp;secure%5Burl%5D=https%3A%2F%2Fwww.rippling.com%2Flp%2Fpaid-identity-access%3Futm_source%3Dg2crowd_cpc%26utm_medium%3Daffiliate%26utm_program%3Devergreen-conversion%26utm_term%3Didentity-access%26utm_campaign%3DUS-G2-PPC-IT%26utm_product%3Dit&amp;secure%5Burl_type%5D=custom_url&amp;secure%5Bvisitor_segment%5D=180)

---

## Top-Rated Products (Ranked by G2 Score)
### 1. [JumpCloud](https://www.g2.com/products/jumpcloud/reviews)
  JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 3,815

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.0/10)
- **On-premise identity repositories supported:** 8.4/10 (Category avg: 8.7/10)
- **Role Management:** 8.8/10 (Category avg: 8.8/10)
- **Partner Access:** 8.3/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [JumpCloud Inc.](https://www.g2.com/sellers/jumpcloud-inc)
- **Company Website:** https://jumpcloud.com/
- **Year Founded:** 2012
- **HQ Location:** Louisville, CO
- **Twitter:** @JumpCloud (36,482 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/jumpcloud/ (959 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, System Administrator
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 53% Mid-Market, 36% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (879 reviews)
- Device Management (663 reviews)
- Security (519 reviews)
- Integrations (481 reviews)
- Features (430 reviews)

**Cons:**

- Missing Features (381 reviews)
- Improvement Needed (301 reviews)
- Limited Features (235 reviews)
- Limitations (177 reviews)
- Learning Curve (155 reviews)

### 2. [Microsoft Entra ID](https://www.g2.com/products/microsoft-entra-id/reviews)
  Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID, you get: • Secure adaptive access with multi-factor authentication and Conditional Access policies • Seamless user experience with single sign-on, passwordless and user portal • Unified identity management that connect all internal and external users to all apps and devices. • Simplified Identity Governance with provisioning, access packages, and access reviews. Microsoft Entra is our new product family that encompasses all of Microsoft’s identity and access capabilities. The Entra family includes Microsoft Entra ID, as well as two new product categories: Cloud Infrastructure Entitlement Management (CIEM) and decentralized identity. The products in the Entra family will help provide secure access to everything for everyone, by providing identity and access management, cloud infrastructure entitlement management, and identity verification.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 864

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.0/10)
- **On-premise identity repositories supported:** 8.7/10 (Category avg: 8.7/10)
- **Role Management:** 9.1/10 (Category avg: 8.8/10)
- **Partner Access:** 8.6/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,114,353 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, System Engineer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 39% Mid-Market, 36% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (129 reviews)
- Security (122 reviews)
- Single Sign-On (90 reviews)
- Identity Management (89 reviews)
- Integrations (80 reviews)

**Cons:**

- Complexity (56 reviews)
- Expensive (53 reviews)
- Complex Administration (42 reviews)
- Difficult Learning (38 reviews)
- Complex Setup (37 reviews)

### 3. [Okta](https://www.g2.com/products/okta/reviews)
  Okta, Inc. is The World’s Identity Company™. We secure AI, machine, and human identity so everyone is free to safely use any technology. Our customer and workforce solutions empower businesses and developers to protect their AI agents, users, employees, and partners while driving security, efficiencies, and innovation. Learn why the world’s leading brands trust Okta for authentication, authorization, and more at okta.com.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 1,191

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 9.0/10)
- **On-premise identity repositories supported:** 9.4/10 (Category avg: 8.7/10)
- **Role Management:** 9.3/10 (Category avg: 8.8/10)
- **Partner Access:** 9.3/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Okta](https://www.g2.com/sellers/okta)
- **Company Website:** https://okta.com
- **Year Founded:** 2009
- **HQ Location:** San Francisco, California
- **Twitter:** @okta (42,734 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/926041/ (7,230 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, Account Executive
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 51% Mid-Market, 39% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (207 reviews)
- Security (158 reviews)
- Authentication Security (153 reviews)
- Single Sign-On (143 reviews)
- Easy Access (140 reviews)

**Cons:**

- Authentication Issues (77 reviews)
- Login Issues (64 reviews)
- Expensive (46 reviews)
- Complex Setup (44 reviews)
- Frequent Authentication (39 reviews)

### 4. [AWS Directory Service](https://www.g2.com/products/aws-directory-service/reviews)
  AWS Directory Service is a fully managed service that enables organizations to run Microsoft Active Directory (AD) in the AWS Cloud without the need to deploy and maintain their own infrastructure. It simplifies the integration of AD-dependent applications and services, allowing users to access AWS resources using their existing AD credentials. Key Features and Functionality: - Managed Microsoft Active Directory: AWS Directory Service offers a native Microsoft AD environment, eliminating the need for data synchronization or replication from on-premises directories. - High Availability: The service deploys domain controllers across multiple Availability Zones, ensuring resilience and continuous operation. - Seamless Integration: It integrates with various AWS services, including Amazon EC2, Amazon RDS for SQL Server, and Amazon WorkSpaces, facilitating the deployment of directory-aware workloads. - Security and Compliance: AWS Directory Service provides end-to-end encryption and meets compliance standards such as SOC, PCI, HIPAA, and FedRAMP. - Scalability: The service supports organizations of different sizes, offering Standard, Enterprise, and Hybrid editions to meet varying needs. Primary Value and Solutions Provided: AWS Directory Service addresses the challenges of managing and scaling Active Directory infrastructure by offering a fully managed, secure, and scalable solution in the cloud. It enables organizations to: - Simplify Cloud Migration: Easily migrate AD-dependent workloads to AWS without modifying existing applications or user credentials. - Enhance Security: Leverage AWS&#39;s robust security measures to protect directory data and meet regulatory compliance requirements. - Reduce Operational Overhead: Offload routine maintenance tasks such as patching, monitoring, and backups to AWS, allowing IT teams to focus on strategic initiatives. - Ensure High Availability: Benefit from a highly available directory service that spans multiple Availability Zones, providing resilience against failures. By utilizing AWS Directory Service, organizations can seamlessly extend their on-premises AD to the cloud, maintain a consistent user experience, and efficiently manage access to AWS resources.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 17

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.0/10)
- **Role Management:** 10.0/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Amazon Web Services (AWS)](https://www.g2.com/sellers/amazon-web-services-aws-3e93cc28-2e9b-4961-b258-c6ce0feec7dd)
- **Year Founded:** 2006
- **HQ Location:** Seattle, WA
- **Twitter:** @awscloud (2,225,864 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/amazon-web-services/ (156,424 employees on LinkedIn®)
- **Ownership:** NASDAQ: AMZN

**Reviewer Demographics:**
  - **Company Size:** 60% Mid-Market, 20% Small-Business


### 5. [Managed Microsoft AD](https://www.g2.com/products/managed-microsoft-ad/reviews)
  Use a highly available, hardened service running actual Microsoft¬Æ Active Directory (AD).


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 29

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 9.0/10)
- **On-premise identity repositories supported:** 7.6/10 (Category avg: 8.7/10)
- **Role Management:** 8.7/10 (Category avg: 8.8/10)
- **Partner Access:** 7.9/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Google](https://www.g2.com/sellers/google)
- **Year Founded:** 1998
- **HQ Location:** Mountain View, CA
- **Twitter:** @google (31,910,461 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1441/ (336,169 employees on LinkedIn®)
- **Ownership:** NASDAQ:GOOG

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 41% Small-Business, 38% Mid-Market


### 6. [Amazon Cloud Directory](https://www.g2.com/products/amazon-cloud-directory/reviews)
  Amazon Cloud Directory is a managed cloud-native directory service, designed to enable users to build flexible cloud-native directories for organizing hierarchies of data along multiple dimensions.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 12

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 9.0/10)
- **On-premise identity repositories supported:** 9.2/10 (Category avg: 8.7/10)
- **Role Management:** 9.0/10 (Category avg: 8.8/10)
- **Partner Access:** 8.6/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Amazon Web Services (AWS)](https://www.g2.com/sellers/amazon-web-services-aws-3e93cc28-2e9b-4961-b258-c6ce0feec7dd)
- **Year Founded:** 2006
- **HQ Location:** Seattle, WA
- **Twitter:** @awscloud (2,225,864 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/amazon-web-services/ (156,424 employees on LinkedIn®)
- **Ownership:** NASDAQ: AMZN

**Reviewer Demographics:**
  - **Company Size:** 54% Small-Business, 38% Enterprise


### 7. [Rippling IT](https://www.g2.com/products/rippling-it/reviews)
  Transform your organization’s IT operations with Rippling’s unified platform for identity, device, access, and security management. Centralize every IT workflow, from provisioning apps and laptops to enforcing security policies, in a single dashboard. Seamlessly manage the entire employee lifecycle, automatically granting and revoking app access, configuring devices, and maintaining least-privilege controls. Enforce compliance with real-time monitoring, automated patching, and integrated endpoint protection. Streamline offboarding with instant lockouts and secure device recovery. Gain full visibility across hardware, software, and user risk without the complexity of multiple tools. Rippling helps your business cut costs, eliminate manual work, and strengthen security, so your team can move faster. Experience the power of unified IT management with Rippling today.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 1,007

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 9.0/10)
- **On-premise identity repositories supported:** 9.1/10 (Category avg: 8.7/10)
- **Role Management:** 9.2/10 (Category avg: 8.8/10)
- **Partner Access:** 9.1/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Rippling](https://www.g2.com/sellers/rippling)
- **Company Website:** https://www.rippling.com
- **Year Founded:** 2016
- **HQ Location:** San Francisco, CA
- **Twitter:** @Rippling (12,205 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/17988315/ (6,941 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, CEO
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 60% Mid-Market, 27% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (670 reviews)
- Intuitive (467 reviews)
- Simple (413 reviews)
- Easy Access (374 reviews)
- User Interface (361 reviews)

**Cons:**

- Missing Features (165 reviews)
- Limited Features (112 reviews)
- Improvement Needed (89 reviews)
- Learning Curve (75 reviews)
- Poor Customer Support (73 reviews)

### 8. [Oracle Identity Management](https://www.g2.com/products/oracle-identity-management/reviews)
  Oracle Identity Management is a comprehensive suite of identity and access management (IAM) solutions designed to help organizations manage the entire lifecycle of user identities and access privileges across enterprise resources, both on-premises and in the cloud. By automating user provisioning, enforcing security policies, and ensuring compliance with regulatory requirements, Oracle Identity Management enhances operational efficiency and strengthens security postures. Key Features and Functionality: - Identity Governance: Manages user provisioning and deprovisioning, enforces access policies, and provides actionable identity intelligence for rapid remediation of high-risk entitlements. - Access Management: Delivers risk-aware, end-to-end multifactor authentication (MFA) and single sign-on (SSO) capabilities, integrating identities and systems across cloud and on-premises environments. - Directory Services: Offers scalable and flexible directory solutions that support growth without unnecessary over-provisioning, facilitating seamless expansion without impacting existing services. - User Provisioning: Automates the creation and assignment of user accounts, reducing administrative overhead and minimizing human error. - Identity Analytics: Utilizes machine learning to detect and prevent suspicious identity activities, enhancing security through proactive monitoring. - Single Sign-On (SSO): Consolidates user credentials behind a single account with strong password policies, simplifying access to services and improving user experience. - Multifactor Authentication (MFA): Implements secondary authentication controls to verify user identities, reducing exposure from stolen credentials. - Risk-Based Authentication: Employs algorithms to assess the risk of user actions, blocking or reporting activities with high-risk scores. - Identity Governance and Administration (IGA): Controls entitlements to reduce risks associated with excessive access and privileges. Primary Value and Solutions Provided: Oracle Identity Management addresses critical security challenges by ensuring consistent user access rules and policies across an organization, thereby reducing the risk of data breaches and unauthorized access. By automating identity-related processes, it enhances operational efficiency, reduces administrative costs, and ensures compliance with regulatory standards. The suite&#39;s comprehensive approach to identity governance and access management enables organizations to securely manage user identities, enforce security policies, and respond swiftly to evolving security threats, ultimately safeguarding sensitive data and maintaining trust in business operations.


  **Average Rating:** 3.7/5.0
  **Total Reviews:** 51

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 6.9/10 (Category avg: 9.0/10)
- **On-premise identity repositories supported:** 8.3/10 (Category avg: 8.7/10)
- **Role Management:** 8.3/10 (Category avg: 8.8/10)
- **Partner Access:** 7.5/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Oracle](https://www.g2.com/sellers/oracle)
- **Year Founded:** 1977
- **HQ Location:** Austin, TX
- **Twitter:** @Oracle (827,868 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1028/ (199,301 employees on LinkedIn®)
- **Ownership:** NYSE:ORCL

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Telecommunications
  - **Company Size:** 66% Enterprise, 21% Mid-Market


#### Pros & Cons

**Pros:**

- Access Control (1 reviews)
- Access Management (1 reviews)
- Customer Support (1 reviews)
- Customization (1 reviews)
- Device Management (1 reviews)

**Cons:**

- Error Handling (1 reviews)
- Performance Issues (1 reviews)
- Poor Interface Design (1 reviews)
- Poor UI (1 reviews)
- Technical Errors (1 reviews)

### 9. [CyberArk Workforce Identity](https://www.g2.com/products/cyberark-workforce-identity/reviews)
  CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security, and credential management. Identity Management capabilities include lifecycle management, identity orchestration, and identity governance. With CyberArk Identity, organizations can secure workforce access to applications, endpoints, and infrastructure and protect themselves from the leading cause of data breaches – compromised credentials. CyberArk Identity is part of the CyberArk Identity Security Platform. Built for the dynamic enterprise, CyberArk Identity Security Platform secures access for any identity to any resource or environment from anywhere using any device. The CyberArk Identity Security Platform enables operational efficiencies with a single admin portal, streamlines meeting compliance requirements with unified audit capabilities, and delivers Identity Security Intelligence for continuous identity threat detection and protection. Workforce Access solutions: • CyberArk Single Sign-On (SSO) is an easy-to-manage solution for one-click access to your cloud, mobile, and legacy apps. CyberArk SSO enables a secure and frictionless sign-in experience for both internal and external users that adjusts based on risk. • CyberArk App Gateway is an add-on to our Single Sign-On solution that enables VPN-less access to legacy applications. It allows companies to set up per-application, per-user access to individual legacy applications hosted on-premises. • CyberArk Adaptive Multi-Factor Authentication (MFA) helps strengthen security and prevent attacks involving compromised credentials by requiring users to present multiple forms of evidence to gain access to your applications. Unlike traditional MFA solutions, CyberArk Adaptive MFA uses AI-powered behavioral analytics and contextual information to determine which authentication factors to apply to a particular user in a specific situation. • CyberArk Secure Web Sessions is a cloud-based service that enables organizations to monitor, record, and audit end-user activity within high-risk and high-value web applications. Security and compliance specialists can use Secure Web Sessions to search recorded sessions using free text input and quickly filter events by users, dates, and actions. • CyberArk Workforce Password Management is an enterprise-focused password manager providing a user-friendly solution to store business application credentials in a centralized vault and securely share them with other users in the organization. Identity Management Services: • CyberArk Identity Lifecycle Management provides an easy way to route application access requests, create application accounts, manage entitlements for those accounts, and revoke access when necessary. • CyberArk Identity Flows is an identity orchestration solution that improves security, efficiency, and productivity by automating identity data and events. With Identity Flows, organizations can orchestrate complex identity management processes and synchronize identity data across diverse applications, directory stores, and repositories. • CyberArk Identity Compliance solution continuously discovers access, streamlines access certifications, and provides comprehensive identity analytics. Identity Compliance automates manually intensive, error-prone administrative processes, ensuring all workforce and privileged access rights are properly assigned and continually certified across enterprises.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 126

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [CyberArk](https://www.g2.com/sellers/cyberark)
- **Year Founded:** 1999
- **HQ Location:** Newton, MA
- **Twitter:** @CyberArk (17,749 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/26630/ (2,893 employees on LinkedIn®)
- **Ownership:** NASDAQ:CYBR

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 48% Enterprise, 48% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (14 reviews)
- Access Management (6 reviews)
- Intuitive (6 reviews)
- Customer Support (5 reviews)
- Access Control (4 reviews)

**Cons:**

- Missing Features (4 reviews)
- Integration Issues (2 reviews)
- Lack of Automation (2 reviews)
- Lack of Features (2 reviews)
- Browser Extension Issues (1 reviews)

### 10. [ManageEngine ADManager Plus](https://www.g2.com/products/manageengine-admanager-plus/reviews)
  ADManager Plus is an identity governance and administration (IGA) solution that simplifies identity management, ensures security, and improves compliance. With ADManager Plus, manage the user life cycle from provisioning to deprovisioning, run access certification campaigns, orchestrate identity management across enterprise applications, and protect data on your enterprise platforms with regular backups. The solution provides comprehensive identity risk assessment and proactive management of your organization&#39;s risk exposure by highlighting potential security vulnerabilities and visualizing attack paths to privileged entities. This enables IT teams to prioritize remediation efforts and strengthen their security posture before threats can be exploited. Use over 200 reports to gain valuable insights into identities and their access rights, and leverage customizable dashboards and scheduled report generation for continuous monitoring. The platform supports compliance frameworks including the GDPR and HIPAA through automated audit trails and detailed access reviews. Improve the efficiency of your IGA operations with workflows, automations, and role-based access control policies. Built-in templates streamline common tasks while multi-stage approval workflows ensure proper oversight of critical changes. ADManager Plus&#39; Android and iOS applications help with on-the-go AD and Microsoft Entra ID management, enabling administrators to respond quickly to urgent requests.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 79

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.1/10 (Category avg: 9.0/10)
- **On-premise identity repositories supported:** 9.0/10 (Category avg: 8.7/10)
- **Role Management:** 9.0/10 (Category avg: 8.8/10)
- **Partner Access:** 8.1/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Zoho](https://www.g2.com/sellers/zoho-b00ca9d5-bca8-41b5-a8ad-275480841704)
- **Year Founded:** 1996
- **HQ Location:** Austin, TX
- **Twitter:** @Zoho (137,378 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/38373/ (30,531 employees on LinkedIn®)
- **Phone:** +1 (888) 900-9646 

**Reviewer Demographics:**
  - **Top Industries:** Government Administration, Information Technology and Services
  - **Company Size:** 55% Mid-Market, 38% Enterprise


#### Pros & Cons

**Pros:**

- Automation (1 reviews)
- Ease of Use (1 reviews)
- Efficiency (1 reviews)
- Efficiency Optimization (1 reviews)
- Functionality (1 reviews)

**Cons:**

- Complex Interface (1 reviews)
- Complexity (1 reviews)
- Complex Reporting (1 reviews)
- Complex Usability (1 reviews)
- Learning Curve (1 reviews)

### 11. [OneLogin](https://www.g2.com/products/onelogin/reviews)
  OneLogin simpliﬁes identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin enables IT identity policy enforcement and instantly disables app access for employees who leave or change roles in real-time by removing them from Active Directory. Take control over application access, quickly on- and off-board team members, and provide end-users with easy access to all their applications on every device. Extend your on-premises security model to the cloud in minutes. Eliminate the pain and expense of extensive identity policy management. OneLogin reduces identity infrastructure costs and complex integration projects for each new app and efficiently extends identity policies to the cloud. OneLogin eliminates the need for lengthy integration and provisioning projects, manual de-provisioning, protracted on- and off-boarding processes, username and password resets, and Shadow IT.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 272

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 9.0/10)
- **On-premise identity repositories supported:** 9.0/10 (Category avg: 8.7/10)
- **Role Management:** 8.9/10 (Category avg: 8.8/10)
- **Partner Access:** 8.7/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [One Identity](https://www.g2.com/sellers/one-identity)
- **HQ Location:** Aliso Viejo, CA
- **Twitter:** @OneIdentity (7,868 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/one-identity (667 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Account Manager
  - **Top Industries:** Computer Software, Education Management
  - **Company Size:** 49% Mid-Market, 40% Enterprise


#### Pros & Cons

**Pros:**

- Single Sign-On (8 reviews)
- SSO (Single Sign-On) (8 reviews)
- Ease of Use (7 reviews)
- SSO (6 reviews)
- Security (5 reviews)

**Cons:**

- Service Interruptions (5 reviews)
- Connection Issues (4 reviews)
- Bugs (3 reviews)
- Error Handling (3 reviews)
- Limited Features (3 reviews)

### 12. [Red Hat Directory Server](https://www.g2.com/products/red-hat-directory-server/reviews)
  Red Hat Directory Server is an operating system-independent, network-based registry that lets administrators centrally store user identity and application information.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 10

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 7.2/10 (Category avg: 9.0/10)
- **On-premise identity repositories supported:** 7.2/10 (Category avg: 8.7/10)
- **Role Management:** 6.9/10 (Category avg: 8.8/10)
- **Partner Access:** 7.3/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Red Hat](https://www.g2.com/sellers/red-hat)
- **Year Founded:** 1993
- **HQ Location:** Raleigh, NC
- **Twitter:** @RedHat (300,026 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3545/ (19,305 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 50% Small-Business, 40% Mid-Market


### 13. [Apache Directory](https://www.g2.com/products/apache-directory/reviews)
  The Apache Directory Project provides directory solutions entirely written in Java. These include a directory server, which has been certified as LDAP v3 compliant by the Open Group (ApacheDS), and Eclipse-based directory tools (Apache Directory Studio).


  **Average Rating:** 3.8/5.0
  **Total Reviews:** 13

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 7.8/10 (Category avg: 9.0/10)
- **On-premise identity repositories supported:** 8.1/10 (Category avg: 8.7/10)
- **Role Management:** 7.5/10 (Category avg: 8.8/10)
- **Partner Access:** 7.4/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [The Apache Software Foundation](https://www.g2.com/sellers/the-apache-software-foundation)
- **Year Founded:** 1999
- **HQ Location:** Wakefield, MA
- **Twitter:** @TheASF (66,154 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/215982/ (2,408 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software
  - **Company Size:** 69% Mid-Market, 31% Small-Business


### 14. [Azure Compute](https://www.g2.com/products/azure-compute/reviews)
  Azure compute is an on-demand computing service for running cloud-based applications.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 11

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.0/10)
- **On-premise identity repositories supported:** 10.0/10 (Category avg: 8.7/10)
- **Role Management:** 10.0/10 (Category avg: 8.8/10)
- **Partner Access:** 10.0/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,114,353 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Reviewer Demographics:**
  - **Company Size:** 42% Enterprise, 42% Small-Business


### 15. [HelloID](https://www.g2.com/products/helloid/reviews)
  HelloID is a complete, cloud-based IDaaS solution that streamlines user provisioning, self-service, and single sign-on processes within your organization or educational institution. Automate the entire user lifecycle process with HelloID by connecting your HR/SIS data to all your downstream systems. Account details and usage rights are automatically kept up-to-date, which reduces human error and increases security. HelloID puts the power of IDM into your hands to meet current and future needs.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 31

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.6/10 (Category avg: 9.0/10)
- **On-premise identity repositories supported:** 9.6/10 (Category avg: 8.7/10)
- **Role Management:** 9.8/10 (Category avg: 8.8/10)
- **Partner Access:** 9.7/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Tools4ever](https://www.g2.com/sellers/tools4ever)
- **Year Founded:** 1999
- **HQ Location:** Lynbrook, New York
- **Twitter:** @Tools4ever (330 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/124368/ (65 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Primary/Secondary Education, Education Management
  - **Company Size:** 59% Mid-Market, 38% Enterprise


### 16. [PingDirectory](https://www.g2.com/products/pingdirectory/reviews)
  PingDirectory is a high-performance, scalable directory service designed to securely store and manage identity and profile data for millions of users. It serves as a centralized repository, acting as the single source of truth for customer, partner, and employee identities. Organizations rely on PingDirectory to ensure maximum uptime and data availability, even during peak usage periods. Key Features and Functionality: - High Performance and Scalability: PingDirectory delivers exceptional speed and can handle large-scale deployments, making it suitable for organizations with extensive user bases. - Data Synchronization: It offers bidirectional, real-time synchronization with various data stores, including Microsoft Active Directory, LDAPv3, SCIM 2.0, RDBMS, MDM, and CRM systems. - Flexible Data Storage: Supports both structured and unstructured user data, allowing organizations to augment existing user profiles with application-specific attributes. - Developer-Friendly APIs: Provides REST APIs for seamless integration and access to unified user profiles. - Integrated Proxy Services: Features built-in load balancing, rate limiting, and data transformation capabilities to optimize server performance and ensure data availability at scale. Primary Value and Problem Solved: PingDirectory addresses the critical need for a reliable and secure identity data store in modern enterprises. By acting as a centralized, authoritative source of identity information, it enables organizations to: - Ensure Data Consistency: Maintain a unified and accurate view of user identities across various systems and applications. - Enhance Security: Securely store sensitive identity data with advanced encryption and access controls. - Improve Performance: Handle high volumes of identity data transactions efficiently, ensuring quick response times and minimal downtime. - Facilitate Integration: Easily integrate with existing infrastructure and applications through comprehensive synchronization and API support. By implementing PingDirectory, organizations can effectively manage and protect their identity data, leading to improved operational efficiency and enhanced user experiences.


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 8

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.0/10)
- **On-premise identity repositories supported:** 7.2/10 (Category avg: 8.7/10)
- **Role Management:** 7.2/10 (Category avg: 8.8/10)
- **Partner Access:** 7.2/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Ping Identity](https://www.g2.com/sellers/ping-identity)
- **Year Founded:** 2002
- **HQ Location:** Denver, CO
- **Twitter:** @pingidentity (42,120 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/21870/ (2,319 employees on LinkedIn®)
- **Phone:** 1.303.468.2900

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 64% Enterprise, 36% Mid-Market


#### Pros & Cons

**Pros:**

- Security (2 reviews)
- Scalability (1 reviews)
- Security Management (1 reviews)

**Cons:**

- Limitations (1 reviews)

### 17. [miniOrange Identity &amp; Access Management](https://www.g2.com/products/miniorange-identity-access-management/reviews)
  miniOrange IAM trusted platform offers frictionless solutions like - Single Sign-On, Multi-Factor Authentication, User lifeCycle Management, Passwordless Authentication, and much more. miniOrange’s ultimate goal is to balance security for the enterprises and provide seamless access to their Workforce, Customer and partners to the exact dedicated resources so that they can focus on what&#39;s important. We trust in building a highly customizable solution which has support for both On-premise and Cloud deployment options like identity-as-a-service (IDaaS), which can be used by both IT and Developer teams. By harnessing the power of the IAM cloud, miniOrange allows people to access applications on any device at any time, while still enforcing strong security policies. It directly integrates with an organization&#39;s existing directories and identity systems, helping to implement the service quickly at large scale and low total cost. Safeguarding billions of login transactions each month for 5000+ organizations, miniOrange delivers convenience, privacy, and security so that customers can focus on innovation, work faster, boost revenue and stay secure. For more information, visit https://www.miniorange.com/ or Snapshot- Visit our site : www.miniorange.com Year Founded: 2012 Locations : Pune, India | New York, NY | SAN JOSE, CA Phone No. : USA: +1 978 658 9387 India: +91 97178 45846 Email : info@xecurify.com


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 27

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [miniOrange](https://www.g2.com/sellers/miniorange)
- **Year Founded:** 2012
- **HQ Location:** Pune, India
- **Twitter:** @miniOrange_it (28 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/miniorange/about (541 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software
  - **Company Size:** 41% Small-Business, 30% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (7 reviews)
- MFA (Multi-Factor Authentication) (6 reviews)
- Security (6 reviews)
- Single Sign-On (6 reviews)
- Authentication (5 reviews)

**Cons:**

- Integration Issues (2 reviews)
- Poor Customer Support (2 reviews)
- System Delays (2 reviews)
- Active Directory Issues (1 reviews)
- Complex Configuration (1 reviews)

### 18. [Apache Fortress](https://www.g2.com/products/apache-fortress/reviews)
  Apache Fortress is an open source project of the Apache Software Foundation and a subproject of the Apache Directory.


  **Average Rating:** 3.8/5.0
  **Total Reviews:** 2

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.0/10)
- **On-premise identity repositories supported:** 8.3/10 (Category avg: 8.7/10)
- **Role Management:** 8.3/10 (Category avg: 8.8/10)
- **Partner Access:** 8.3/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [The Apache Software Foundation](https://www.g2.com/sellers/the-apache-software-foundation)
- **Year Founded:** 1999
- **HQ Location:** Wakefield, MA
- **Twitter:** @TheASF (66,154 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/215982/ (2,408 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 50% Enterprise, 50% Small-Business


### 19. [Entrust Identity as a Service](https://www.g2.com/products/entrust-identity-as-a-service/reviews)
  Entrust Identity as a Service is a cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). Entrust Identity as a Service secures access to devices, applications, and resources with an analyst top-rated identity solution that has been proven across critical banking, government and healthcare infrastructures for more than 25 years. Point-and-click provisioning and out-of-the-box integrations with a variety of on-premises and cloud applications make Entrust Identity as a Service easy to deploy, so you can be up and running in under 30 minutes. Features include: • User self service - password reset, authenticators • VPN remote access • SSO portal • AD sync • Office 365 (SAML integration) • Additional SAML applications (e.g. SDFC, WebEx) • Mobile soft token and push notifications • SMS/Email OTP, KBA, Google Auth, FIDO2, Grid • Native device biometrics • Email, web &amp; telephone support: Mon-Fri 8am-8pm EST • Adaptive/risk-based policy engine • System for Cross-Domain Identity Management (SCIM) • Desktop login (via Desktop Agent) • On-prem application integrations (OAM, Netsuite, IIS) • Azure Active Directory (AD) sync • OpenID Connect applications integration • Azure AD CAC • SIEM integration (Splunk) • Auth API (Custom web / mobile apps) • Admin API (users / groups / policies) • Cross-platform facial biometrics • LDAP database sync • OAuth 2.0 URL/API protection • Mobile smart credential/bluetooth login


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 11

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Entrust, Inc.](https://www.g2.com/sellers/entrust-inc)
- **Year Founded:** 1969
- **HQ Location:** Minneapolis, MN
- **Twitter:** @Entrust_Corp (6,417 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/entrust/ (3,737 employees on LinkedIn®)
- **Phone:** 1-888-690-2424

**Reviewer Demographics:**
  - **Company Size:** 64% Enterprise, 36% Mid-Market


### 20. [Identity Management and Migrations](https://www.g2.com/products/identity-management-and-migrations/reviews)
  IAM Cloud is an identity management and migrations cloud platform that centralises the control, security and implementation of IT within an organisation it has a intelligent identity management, enterprise single sign-on, automated Microsoft licensing, multi-factor authentication, self-service password reset, cloud drive mapping, email and Active Directory migrations, full identity integration with MIS like WorkDay and Capita SIMS, session timeout control, enterprise communications, Alumni services and more.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 2

**User Satisfaction Scores:**

- **On-premise identity repositories supported:** 10.0/10 (Category avg: 8.7/10)
- **Role Management:** 10.0/10 (Category avg: 8.8/10)
- **Partner Access:** 10.0/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [IAM Cloud](https://www.g2.com/sellers/iam-cloud)
- **Year Founded:** 2012
- **HQ Location:** UK / Global, GB
- **LinkedIn® Page:** https://www.linkedin.com/company/iam-cloud-limited (47 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 50% Enterprise, 50% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (1 reviews)
- Identity Management (1 reviews)

**Cons:**

- Complexity (1 reviews)
- Limitations (1 reviews)
- Poor Documentation (1 reviews)

### 21. [EmpowerID](https://www.g2.com/products/empowerid/reviews)
  The award-winning all-in-one Identity Management and Cloud Security platform offering IGA, IAM, and PAM capabilities on-premise, hybrid, and SaaS. Built as a unified identity fabric for manageability and scalability, EmpowerID ships with a powerful API, the most extensive list of deep system connectors in the market (incl. market-leading integrations with Azure, SAP, and ServiceNow), and is driven by sophisticated RBAC/ABAC/PBAC and workflow engines with over 1,000 ready-to-use workflows for rapid deployment.


  **Average Rating:** 3.4/5.0
  **Total Reviews:** 8

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [EmpowerID](https://www.g2.com/sellers/empowerid)
- **Year Founded:** 2005
- **HQ Location:** Dublin, US
- **Twitter:** @EmpowerID (385 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/empowerid/ (88 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 38% Mid-Market, 38% Enterprise


#### Pros & Cons

**Pros:**

- Authentication (1 reviews)
- Cloud Services (1 reviews)
- Customer Support (1 reviews)
- Device Management (1 reviews)
- Ease of Implementation (1 reviews)

**Cons:**

- Difficult Integration (1 reviews)
- Integration Difficulty (1 reviews)
- Integration Issues (1 reviews)

### 22. [OpenText NetIQ AD Bridge](https://www.g2.com/products/opentext-netiq-ad-bridge/reviews)
  Leverage existing investments in AD and privilege, delegation, and policy management tools to better manage and secure your Linux resources. Our centralized server and user management unifies the environment like never before, enables the enforcement of AD security policies within Linux, and drives consistency in audit logs and reporting.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1

**User Satisfaction Scores:**

- **On-premise identity repositories supported:** 8.3/10 (Category avg: 8.7/10)
- **Role Management:** 8.3/10 (Category avg: 8.8/10)
- **Partner Access:** 10.0/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [OpenText](https://www.g2.com/sellers/opentext)
- **Year Founded:** 1991
- **HQ Location:** Waterloo, ON
- **Twitter:** @OpenText (21,586 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2709/ (23,339 employees on LinkedIn®)
- **Ownership:** NASDAQ:OTEX

**Reviewer Demographics:**
  - **Company Size:** 100% Enterprise


### 23. [Zoho Directory](https://www.g2.com/products/zoho-directory/reviews)
  Zoho Directory is a unified workforce identity and access management (IAM) solution that helps businesses of all sizes centrally manage user identities, application access, connected devices, and networks — all from a single console, on the cloud. Whether your organization runs entirely on cloud apps or still relies on on-premises directories, Zoho Directory unifies identity management across both worlds. With Directory Stores, you can sync existing identities from legacy systems and extend access controls to over 500 pre-integrated cloud applications, plus any custom or in-house apps your business depends on. Designed to reduce IT overhead while strengthening security, Zoho Directory gives admins the tools to automate the full employee lifecycle — from day-one provisioning to offboarding — and gives employees a frictionless, secure login experience across every app and device they use. Key features Single Sign-On (SSO): One secure password for Zoho apps, third-party SaaS, and custom business apps — eliminating password fatigue and reducing reset requests. Directory Stores: Import and sync identities from existing directories (like Active Directory) and manage cloud and on-prem users from one place. User Provisioning &amp; Lifecycle Management: Automate app access from day one, update permissions as roles change, and instantly revoke access when employees leave. Device Authentication: Enroll and manage Linux, Mac, and Windows devices, reset passwords, and reassign systems directly from the admin console. Conditional Access: Set context-aware login policies based on location, time, IP, and device and deny, allow, or allow access only after MFA verification from Zoho Directory. Multi-Factor Authentication (MFA): Add an extra layer of verification to employee logins with OTPs, push notifications, biometrics, and passwordless methods via Zoho OneAuth. Routing Policies: Choose how employees verify their first factor — password, passwordless, social sign-in, or external identity providers. Cloud RADIUS : Set up enterprise Wi-Fi network authentication and ensure access is granted only to verified users. Cloud LDAP: Authenticate LDAP-based resources, including legacy applications, printers, and Wi-Fi networks and VPNs, using a cloud-hosted LDAP service, eliminating the need to maintain on-premises LDAP infrastructure. Smart Groups: Automate group assignment to user groups by department, role, or attribute so access scales seamlessly as your team grows. Anomaly Detection: Flag unusual login behavior such as access from unexpected locations or time zones, before it becomes a breach. Audit Logs: Maintain a detailed history of every admin action, with full traceability for security investigations and audits. Bring Your Own Key (BYOK): Encrypt organizational data with your own key from an external key manager, for full control over data security. Compliance: Built to support HIPAA, SOC 2, and ISO 27001 requirements, with reports that simplify audit preparation. With Zoho Directory, IT teams get automation and centralized control, employees get a seamless login experience, and business leaders get a complete view of workforce identity — all in one secure platform.


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 2


**Seller Details:**

- **Seller:** [Zoho](https://www.g2.com/sellers/zoho-b00ca9d5-bca8-41b5-a8ad-275480841704)
- **Year Founded:** 1996
- **HQ Location:** Austin, TX
- **Twitter:** @Zoho (137,378 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/38373/ (30,531 employees on LinkedIn®)
- **Phone:** +1 (888) 900-9646 

**Reviewer Demographics:**
  - **Company Size:** 100% Small-Business


### 24. [Authen2cate Directory](https://www.g2.com/products/authen2cate-directory/reviews)
  Authen2cate provides a number of directory-related services to meet our clients’ needs. We can act as the primary directory in the cloud for all your enabled applications or leverage your internal directory (LDAP or AD) as the primary source for user identities. Whether you are hosting your own directory services, searching for a reliable company to host them, or a combination of both, Authen2cate has a solution that’s right for you.




**Seller Details:**

- **Seller:** [Authen2cate](https://www.g2.com/sellers/authen2cate)
- **Year Founded:** 2011
- **HQ Location:** Rochester Hills, US
- **Twitter:** @authen2cate (6,560 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/authen2cate-llc-/ (1 employees on LinkedIn®)



### 25. [C2 Identity](https://www.g2.com/products/c2-identity/reviews)
  C2 Identity is one of Synology’s all-new cloud-based directory service that administers your entire organization’s Windows and macOS workstations and provisions new devices from a centralized console. C2 Identity allows IT admins to accomplish a centralized account, IT resource, and device management from a directory server instead of storing and managing credentials and permissions on each device. Unlike other pure-cloud solutions, C2 Identity has integrated Synology’s existing competencies by introducing a hybrid cloud architecture where it works with on-premises LDAP-compatible services through a local Synology NAS or through a Docker container, enabling a fast and secure way to streamline all the user authentication processes.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.0/10)


**Seller Details:**

- **Seller:** [Synology C2](https://www.g2.com/sellers/synology-c2)
- **Year Founded:** 2000
- **HQ Location:** New Taipei City , TW
- **Twitter:** @Synology (67,486 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/synology (986 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 100% Enterprise




## Parent Category

[Identity Management Software](https://www.g2.com/categories/identity-management)



## Related Categories

- [Single Sign-On (SSO) Solutions](https://www.g2.com/categories/single-sign-on-sso)
- [User Provisioning and Governance Tools](https://www.g2.com/categories/user-provisioning-and-governance-tools)
- [Identity and Access Management (IAM) Software](https://www.g2.com/categories/identity-and-access-management-iam)



---

## Buyer Guide

### Learn More About Cloud Directory Services

Cloud directory services are cloud-based identity management and directory systems. Companies use these systems to store information about, and manage the lifecycle of, individual identities. The tools also authenticate users across devices and applications. Information stored within a cloud directory service may include usernames, passwords, user preferences, and information about devices.&amp;nbsp;

Cloud directories can also provide [single sign-on](https://www.g2.com/articles/what-is-single-sign-on) (SSO) features, making it easy for end users to access multiple [operating systems](https://www.g2.com/glossary/operating-system-definition) with just one set of credentials. This, in turn, improves security and limits the costs associated with identity management.

### Common features of cloud directory services

The following are some core features of cloud-based directory services that&amp;nbsp;organizations use to manage access control, user identities, and endpoint access management.&amp;nbsp;

Note that specific features may vary between different products.

- User and group management: This component allows admins to create, modify, and delete user accounts, permissions, and groups, controlling access to various resources and information. These tools can also categorize users for easier management and access control.
- Authentication and authorization: Cloud directory services often include features for verifying users and confirming their access to specific applications or data.
- [Single sign-on (SSO)](https://www.g2.com/glossary/single-sign-on-definition): SSO lets users log in once to access multiple applications without having to re-enter their login credentials several times.
- [Multi-factor authentication (MFA)](https://www.g2.com/articles/multi-factor-authentication): Thanks to MFA, cloud director services also require users to provide verification beyond a password. This often includes elements like an email address, the answer to a security question, birthday, or fingerprint.&amp;nbsp;
- [Application programming interfaces (APIs](https://www.g2.com/glossary/api-definition)) for automation: APIs automate directory-related tasks and integrate them with other applications, workflows, and services.
- Device management: This type of software lets users manage devices that connect to the network, which enforces security policies and ensures compliance.
- Automated provisioning and de-provisioning: This refers to the ability to create and manage accounts across various platforms automatically as a user&#39;s status or role changes within an organization.
- [Scalability](https://www.g2.com/glossary/scalability): Cloud directories can scale as an organization grows, changes its priorities, or hires more employees.
- [Self-service password reset](https://www.g2.com/categories/self-service-password-reset-sspr): Users can reset their passwords on their own, which reduces the administrative overhead and downtime associated with lost or forgotten codes.
- Cross-platform support: Cloud directories often have support for various operating systems and platforms, including Mac, Windows, Linux, and apps on mobile devices.

### What are the types of directory services?

There are two types of directory services a company can choose.

- **On-premise directories:** As the name suggests, an on-premise directory is installed on the servers of the business network. This type is often used by companies who want full control over their identity management system.
- **Cloud directories:** This cloud-based solution provides businesses with a scalable and secure identity management system that operates solely in the cloud.&amp;nbsp;

### What are the benefits of cloud directories?&amp;nbsp;

Companies may choose to use cloud directory services instead of, or in addition to, traditional on-premise directories for several reasons. Some key advantages to doing so are discussed here.

- **Cost efficiency:** Companies that use cloud directories reduce costs thanks to lower upfront expenses compared to the [hardware, software](https://www.g2.com/articles/hardware-vs-software), and licensing fees required for on-premises solutions. Typically, they typically operate on a subscription model, which includes updates and maintenance, offering improved cost predictability.
- **Scalability:** Cloud-based services can be easily scaled up or down based on the organization&#39;s needs, budget, and number of employees. This allows companies to pay solely for what they use and quickly adjust resources as they grow or as demand fluctuates.
- **Disaster recovery:** Cloud directories help companies come back from unexpected catastrophes because they usually include built-in redundancy and [backup](https://www.g2.com/articles/what-is-backup) procedures, ensuring that directory data is safeguarded against loss from hardware failure, natural disasters, or other disruptive events.
- **Security:** Cloud directory solutions invest heavily in security, often more than what some organizations could afford for their on-prem solutions. They usually offer a range of security features like MFA, [encryption](https://www.g2.com/articles/what-is-encryption), and routine security audits.
- **Reduced IT overhead:** Managing an on-premises directory requires significant effort and expertise. Cloud directories offload this burden to the service provider, which then frees IT resources to focus on other tasks and initiatives.
- **Simple integration:** These tools provide connectors and APIs that link with other cloud applications and services in addition to on-site systems.
- **Enhanced collaboration:** Since cloud directory services have centralized access to resources and tools across an organization, they also offer improved collaboration for employees and their various workloads.
- **Usability:** Users can access their cloud directory from anywhere, at any time, making it more convenient for companies that have a hybrid or remote-first staff.

### Cloud directory services vs. identity and access management software

Sometimes, cloud directory services and [identity and access management (IAM) software](https://www.g2.com/categories/identity-and-access-management-iam)are confused with each other, but the two have key differences. Despite both being crucial components to any company’s security strategy, IAM manages identities and controls access to data, systems, and applications. IAM encompasses everything from user provisioning, access control, auditing, authentication, authorization, and lifecycle management.

A cloud directory service is a library where companies can store all identity cards for their employees, and IAM software verifies identity, grants access based on specific permissions, and tracks library movements.

### Who uses Cloud Directory Services?

Various roles within an organization may use cloud directory services.&amp;nbsp;

- **IT administrators** are responsible for managing and maintaining the organization’s infrastructure. They often coordinate a network’s user accounts, groups, and permissions. Cloud computing directories also allow IT admins to modify, create, and delete user accounts to ensure the directory stays secure.
- **Application developers** integrate the directory with their applications for user authentication and authorization. They also use directory services to manage user access to various applications and VPNs.
- **Security teams** utilize directory features for access control and identity governance. Monitoring user activities, looking into security incidents, and complying with the company’s security policies all fall under the purview of this department. The security team also configures certain elements, like MFA, to enhance overall security.
- **Project managers** determine who has access to project resources and who can collaborate with team members through the directory.
- **System administrators** often use cloud directory services for tasks related to device management, including registering and managing devices that access the network and enforcing security policies.
- **Human resources professionals** interact with cloud directory services during the [onboarding](https://www.g2.com/glossary/onboarding-definition) and [offboarding](https://www.g2.com/articles/offboarding) processes. They use a cloud directory service to manage user accounts, update employee information, and make sure access aligns with each role.

### Cloud directory services pricing factors

Price ranges for cloud directory services will depend and vary from vendor to vendor. It’ll also depend on the size and scale of an organization. The total cost of this type of&amp;nbsp;software is determined by how many employees an organization has, plus the cost of the ongoing management of the services. In addition to the provider and the number of users, prices also fluctuate based on features and storage.

Organizations looking for the right cloud directory service should always compare prices from different providers. Additionally, start with a free tier if one is available. It’s important to choose a plan that meets both a company’s current needs and allows for future growth.

### Challenges with Cloud Directory services

While cloud directory services are a valuable tool for storing information, users should understand the challenges they may encounter.&amp;nbsp;

- **Synchronization issues:** Delays or inconsistencies in syncing user data across the cloud and on-premises systems can cause frustration and access problems.
- **Compatibility issues:** Integrating the directory service with various applications and on-premises systems might require complex configurations, causing obstacles to compatibility.
- **Integration problems:** Organizations often use multiple cloud services and applications. When this occurs, users may experience challenges when integrating cloud directory services with other applications, especially if there are compatibility issues or misconfigurations.
- **Data breaches and compromised accounts:** If there are inadequate cybersecurity controls or if user negligence happens, a directory could undergo a [data breach](https://www.g2.com/articles/data-breach), compromising sensitive information and impacting user trust.
- **Compliance challenges:** Depending on an organization’s industry, meeting regulations and data privacy laws like [GDPR](https://www.g2.com/glossary/gdpr-definition) or HIPAA requires careful configuration and ongoing maintenance of the directory service.
- **Scalability constraints:** It’s important that an organization choose a directory service that can handle future growth in user volume or data storage, which helps avoid performance bottlenecks or service disruptions.

### Which companies should invest in cloud directory services?

While cloud service directories are great for several types of businesses, specific companies benefit more than others from investing in these tools.&amp;nbsp;

- **Healthcare organizations:** Complying with [HIPAA](https://www.g2.com/glossary/hipaa-definition) regulations and securing patient data require strong identity management and access controls.
- [SaaS](https://www.g2.com/glossary/software-as-a-service-saas-definition) **providers:** Managing customer identities and access to specific applications requires a cloud directory service.
- **Enterprise organizations:** Large companies that need to manage large-scale user identities and complex access needs require a centralized and scalable solution like cloud directory services in their tech stack.
- **Educational institutions:** Being able to securely manage student and faculty identities and access to learning resources is a must for schools, colleges, and universities.
- **Financial institutions:** Banks and other types of financial organizations must guarantee secure access to financial data and applications, which requires cloud directory services.
- **Startups:** Companies just starting out should implement flexible and scalable cloud directory services for rapid growth and collaboration.
- **Remote or hybrid organizations:** Organizations with remote, hybrid, or distributed employees can use cloud directory services to provide secure access to resources for employees working from different offices, locations, and time zones.

### How to Choose a Cloud Directory Service

The following explains the step-by-step process buyers can use to find suitable cloud directory services for their businesses.&amp;nbsp;

#### Identify business needs and priorities

Businesses should identify their specific needs for the service. For example, companies may find it challenging to manage user accounts and permissions across multiple applications and systems, which can be time-consuming and lead to errors, especially as a company grows. The right cloud directory service supplies a single source of truth for user identities and streamlines user provisioning, de-provisioning, and access updates.

Implementing a cloud directory service can improve efficiency, reduce administrative overhead, and increase consistency in user access.

#### Choose the necessary technology and features

Next, companies ought to narrow down the features and functionality they need most. Some essential technology and features a company may be looking for are as follows.

- **Identity management:** User creation, modification, and deletion with specific access control capabilities.
- **Group management:** Defining and managing user groups for smooth access control and authorization.
- **Authentication:** SSO for simplified access to multiple applications with minimal login prompts and attempts.
- **Encryption:** Data [encryption](https://www.g2.com/articles/what-is-encryption) to protect sensitive user information.
- **Compliance:** Support for industry regulations like GDPR, HIPAA, and SOC 2 for data privacy and security compliance.

Once buyers short-list services based on their requirements and must-have functionalities, it’s easier to determine which options best suit their needs.

#### Review vendor vision, roadmap, viability, and support

In this stage, buyers should start vetting selected vendors and conducting demos to determine if the cloud directory service does what they need it to do. Ideally, buyers should share detailed requirements in advance so vendors know which features to showcase.

Below are some questions buyers should ask vendors during the demo.

- Which user management features are available?
- Which security measures are in place to protect user data?&amp;nbsp;
- Do you offer disaster recovery and failover options?
- What are your capabilities for integrating with existing applications and systems?
- Do you support device management or mobile device integration?
- How do you handle incident response and data breaches?
- How can your service accommodate our current and future user base?
- Can your service scale quickly to handle peak traffic or sudden growth?

#### Evaluate the deployment and purchasing model

Once buyers have received answers and are ready to move on to the next stage, they loop in key stakeholders, at least one member of the IT department, and at least one employee from other departments that will use the software.

The final evaluation should also consider end-users feedback on workflow integration, usability, and departmental requirements of must-have features.&amp;nbsp;

#### Put it all together

After getting buy-in from everyone on the selection committee, including end-users, the buyer makes a final decision. This buy-in is essential for bringing everyone to the same page regarding the implementation and usage of the cloud directory service.

### Software and services related to cloud directories

Some software and services can be used along with cloud directories. The most&amp;nbsp;common are discussed here.&amp;nbsp;

- **Identity and access management:** Identity and access management software helps companies protect systems and networks from unauthorized access or misuse by only allowing authenticated, authorized users – typically employees – based on job roles, to access specific platforms and information.&amp;nbsp;
- [User provisioning and governance tools:](https://www.g2.com/categories/user-provisioning-and-governance-tools) User provisioning and governance tools deliver a single point of maintenance to manage user access of IT applications. Companies often make use of these programs to maintain organized records of user information, like account histories or application credentials.&amp;nbsp;

### Cloud directory services trends

- [Zero trust network access (ZTNA)](https://www.g2.com/categories/zero-trust-networking) **:** Cloud directory service will move away from perimeter-based security and toward granular access control based on identity and context.
- **Advanced authentication methods:** Cloud directory services may go beyond multi-factor authentication and explore continuous authentication and context-aware authorization.
- [Artificial intelligence](https://www.g2.com/categories/artificial-intelligence) **and machine learning:** Consumers can expect cloud directory services to employ AI to detect anomalies and suspicious behavior in user access patterns.
- **More pay-as-you-go models:** Cost-effective and flexible pricing based on actual usage and resource consumption will increase.




