  # Best Enterprise User Provisioning and Governance Tools

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Products classified in the overall User Provisioning and Governance Tools category are similar in many regards and help companies of all sizes solve their business problems. However, enterprise business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Enterprise Business User Provisioning and Governance Tools to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2&#39;s buying advisors to find the right solutions within the Enterprise Business User Provisioning and Governance Tools category.

In addition to qualifying for inclusion in the User Provisioning and Governance Tools category, to qualify for inclusion in the Enterprise Business User Provisioning and Governance Tools category, a product must have at least 10 reviews left by a reviewer from an enterprise business.




  ## How Many User Provisioning and Governance Tools Products Does G2 Track?
**Total Products under this Category:** 189

  
## How Does G2 Rank User Provisioning and Governance Tools Products?

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 14,100+ Authentic Reviews
- 189+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.

  
  
---

**Sponsored**

### JumpCloud

JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=paid_promo&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=255&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=36316&amp;secure%5Bresource_id%5D=255&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fuser-provisioning-and-governance-tools%2Fenterprise&amp;secure%5Btoken%5D=6637b6b36fe5bc235a5be0ef921e466c791386b0411dd60b89eb4a09d83f679e&amp;secure%5Burl%5D=https%3A%2F%2Fjumpcloud.com%2Fuse-cases%2Fcompliance&amp;secure%5Burl_type%5D=paid_promos)

---

  ## What Are the Top-Rated User Provisioning and Governance Tools Products in 2026?
### 1. [Okta](https://www.g2.com/products/okta/reviews)
  Okta, Inc. is The World’s Identity Company™. We secure AI, machine, and human identity so everyone is free to safely use any technology. Our customer and workforce solutions empower businesses and developers to protect their AI agents, users, employees, and partners while driving security, efficiencies, and innovation. Learn why the world’s leading brands trust Okta for authentication, authorization, and more at okta.com.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 1,196
**How Do G2 Users Rate Okta?**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 9.0/10)
- **Mobile App:** 8.9/10 (Category avg: 7.5/10)
- **APIs:** 9.1/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 9.0/10 (Category avg: 8.6/10)

**Who Is the Company Behind Okta?**

- **Seller:** [Okta](https://www.g2.com/sellers/okta)
- **Company Website:** https://okta.com
- **Year Founded:** 2009
- **HQ Location:** San Francisco, California
- **Twitter:** @okta (42,783 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/926041/ (7,230 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** Software Engineer, Account Executive
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 51% Mid-Market, 39% Enterprise


#### What Are Okta's Pros and Cons?

**Pros:**

- Ease of Use (207 reviews)
- Security (158 reviews)
- Authentication Security (153 reviews)
- Single Sign-On (143 reviews)
- Easy Access (140 reviews)

**Cons:**

- Authentication Issues (77 reviews)
- Login Issues (64 reviews)
- Expensive (46 reviews)
- Complex Setup (44 reviews)
- Frequent Authentication (39 reviews)

### 2. [SailPoint](https://www.g2.com/products/sailpoint/reviews)
  SailPoint is the leader in identity security for the modern enterprise. Harnessing the power of AI and machine learning, SailPoint automates the management and control of access, delivering only the required access to the right identities and technology resources at the right time. Our sophisticated identity platform seamlessly integrates with existing systems and workflows, providing the singular view into all identities and their access. We meet customers where they are with an intelligent identity solution that matches the scale, velocity and environmental needs of the modern enterprise. SailPoint empowers the most complex enterprises worldwide to build a security foundation grounded in identity security.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 170
**How Do G2 Users Rate SailPoint?**

- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 9.0/10)
- **Mobile App:** 5.9/10 (Category avg: 7.5/10)
- **APIs:** 7.4/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 7.9/10 (Category avg: 8.6/10)

**Who Is the Company Behind SailPoint?**

- **Seller:** [SailPoint](https://www.g2.com/sellers/sailpoint)
- **Company Website:** https://www.sailpoint.com
- **Year Founded:** 2004
- **HQ Location:** Austin, TX
- **Twitter:** @SailPoint (15,035 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/47456/ (3,441 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** Software Engineer
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 75% Enterprise, 18% Mid-Market


#### What Are SailPoint's Pros and Cons?

**Pros:**

- Ease of Use (36 reviews)
- Features (30 reviews)
- Security (24 reviews)
- Identity Management (21 reviews)
- Integrations (21 reviews)

**Cons:**

- Improvement Needed (17 reviews)
- Poor Customer Support (16 reviews)
- Missing Features (14 reviews)
- Expensive (12 reviews)
- Difficult Learning (11 reviews)

### 3. [Microsoft Entra ID](https://www.g2.com/products/microsoft-entra-id/reviews)
  Entra ID is a complete identity and access management solution with integrated security that connects people to their apps, devices, and data and helps protect from identity compromise. With Entra ID, you get: • Secure adaptive access with multi-factor authentication and Conditional Access policies • Seamless user experience with single sign-on, passwordless and user portal • Unified identity management that connect all internal and external users to all apps and devices. • Simplified Identity Governance with provisioning, access packages, and access reviews. Microsoft Entra is our new product family that encompasses all of Microsoft’s identity and access capabilities. The Entra family includes Microsoft Entra ID, as well as two new product categories: Cloud Infrastructure Entitlement Management (CIEM) and decentralized identity. The products in the Entra family will help provide secure access to everything for everyone, by providing identity and access management, cloud infrastructure entitlement management, and identity verification.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 868
**How Do G2 Users Rate Microsoft Entra ID?**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.0/10)
- **Mobile App:** 8.4/10 (Category avg: 7.5/10)
- **APIs:** 8.9/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 8.7/10 (Category avg: 8.6/10)

**Who Is the Company Behind Microsoft Entra ID?**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,105,638 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Who Uses This Product?**
  - **Who Uses This:** Software Engineer, System Engineer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 39% Mid-Market, 36% Enterprise


#### What Are Microsoft Entra ID's Pros and Cons?

**Pros:**

- Ease of Use (129 reviews)
- Security (122 reviews)
- Single Sign-On (90 reviews)
- Identity Management (89 reviews)
- Integrations (80 reviews)

**Cons:**

- Complexity (56 reviews)
- Expensive (53 reviews)
- Complex Administration (42 reviews)
- Difficult Learning (38 reviews)
- Complex Setup (37 reviews)

### 4. [JumpCloud](https://www.g2.com/products/jumpcloud/reviews)
  JumpCloud® delivers a unified identity, device, and access management platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 3,830
**How Do G2 Users Rate JumpCloud?**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.0/10)
- **Mobile App:** 7.4/10 (Category avg: 7.5/10)
- **APIs:** 8.3/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 8.5/10 (Category avg: 8.6/10)

**Who Is the Company Behind JumpCloud?**

- **Seller:** [JumpCloud Inc.](https://www.g2.com/sellers/jumpcloud-inc)
- **Company Website:** https://jumpcloud.com/
- **Year Founded:** 2012
- **HQ Location:** Louisville, CO
- **Twitter:** @JumpCloud (36,469 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/jumpcloud/ (959 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** IT Manager, System Administrator
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 53% Mid-Market, 36% Small-Business


#### What Are JumpCloud's Pros and Cons?

**Pros:**

- Ease of Use (881 reviews)
- Device Management (664 reviews)
- Security (519 reviews)
- Integrations (482 reviews)
- Features (431 reviews)

**Cons:**

- Missing Features (382 reviews)
- Improvement Needed (301 reviews)
- Limited Features (235 reviews)
- Limitations (177 reviews)
- Learning Curve (156 reviews)

### 5. [Saviynt](https://www.g2.com/products/saviynt-saviynt/reviews)
  Saviynt helps organizations transform their organization with identity security. Our AI-first platform enables enterprises to secure every identity — human, non-human, and AI — within any application and in any environment. With Saviynt, organizations strengthen their identity security posture, streamline operations, and ensure that every user has the right access at the right time. The Saviynt Identity Platform unifies identity governance (IGA), application access, cloud security, and privileged account management into a single, end-to-end platform. And, with our AI-powered recommendation engine, application onboarding, and more, users are empowered to make faster, smarter, data-driven decisions. In turn, organizations enjoy lower risk, complete visibility and governance, reduced total cost of ownership, and much more throughout their entire identity security program.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 77
**How Do G2 Users Rate Saviynt?**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.0/10)
- **Mobile App:** 5.9/10 (Category avg: 7.5/10)
- **APIs:** 7.6/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 8.1/10 (Category avg: 8.6/10)

**Who Is the Company Behind Saviynt?**

- **Seller:** [Saviynt](https://www.g2.com/sellers/saviynt)
- **Company Website:** https://www.saviynt.com
- **Year Founded:** 2010
- **HQ Location:** El Segundo, US
- **Twitter:** @saviynt (1,234 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/saviynt (1,579 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Oil &amp; Energy
  - **Company Size:** 80% Enterprise, 5% Mid-Market


#### What Are Saviynt's Pros and Cons?

**Pros:**

- Ease of Use (29 reviews)
- Features (23 reviews)
- Easy Setup (13 reviews)
- Customer Support (11 reviews)
- Integrations (11 reviews)

**Cons:**

- Difficult Learning (9 reviews)
- Lack of Features (9 reviews)
- Limited Features (9 reviews)
- Poor Interface Design (9 reviews)
- Complexity (8 reviews)

### 6. [tenfold](https://www.g2.com/products/tenfold-tenfold/reviews)
  tenfold is a no-code solution for Identity Governance &amp; Administration (IGA), ensuring that the right people have access to the right resources at the right time. Thanks to its off-the-shelf plugins and streamlined setup, tenfold is fully operational in weeks - helping you avoid long &amp; costly setup phases. Go from access risks to full control over IT privileges with tenfold&#39;s comprehensive IGA toolset: - User Lifecycle Management - Role-based Access - End User Self-Service - Approval Workflows - Data Access Governance - User Access Reviews - Separation of Duties


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 98
**How Do G2 Users Rate tenfold?**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.0/10)
- **APIs:** 8.3/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 9.3/10 (Category avg: 8.6/10)

**Who Is the Company Behind tenfold?**

- **Seller:** [tenfold](https://www.g2.com/sellers/tenfold-ad9249a1-71b8-4729-a21c-e658c72f4248)
- **Company Website:** https://www.tenfold-security.com
- **HQ Location:** New York, US
- **LinkedIn® Page:** https://www.linkedin.com/company/tenfold-software-gmbh (22 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services
  - **Company Size:** 50% Mid-Market, 42% Enterprise


#### What Are tenfold's Pros and Cons?

**Pros:**

- Ease of Use (5 reviews)
- Intuitive (5 reviews)
- Solutions (5 reviews)
- Time-saving (4 reviews)
- Automation (3 reviews)

**Cons:**

- Missing Features (4 reviews)
- Poor UI (2 reviews)
- Difficult Learning (1 reviews)
- Difficult Navigation (1 reviews)
- Difficult Setup (1 reviews)

### 7. [CyberArk Workforce Identity](https://www.g2.com/products/cyberark-workforce-identity/reviews)
  CyberArk Identity Overview CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security, and credential management. Identity Management capabilities include lifecycle management, identity orchestration, and identity governance. With CyberArk Identity, organizations can secure workforce access to applications, endpoints, and infrastructure and protect themselves from the leading cause of data breaches – compromised credentials. CyberArk Identity is part of the CyberArk Identity Security Platform. Built for the dynamic enterprise, CyberArk Identity Security Platform secures access for any identity to any resource or environment from anywhere using any device. The CyberArk Identity Security Platform enables operational efficiencies with a single admin portal, streamlines meeting compliance requirements with unified audit capabilities, and delivers Identity Security Intelligence for continuous identity threat detection and protection. Workforce Access solutions: • CyberArk Single Sign-On (SSO) is an easy-to-manage solution for one-click access to your cloud, mobile, and legacy apps. CyberArk SSO enables a secure and frictionless sign-in experience for both internal and external users that adjusts based on risk. • CyberArk App Gateway is an add-on to our Single Sign-On solution that enables VPN-less access to legacy applications. It allows companies to set up per-application, per-user access to individual legacy applications hosted on-premises. • CyberArk Adaptive Multi-Factor Authentication (MFA) helps strengthen security and prevent attacks involving compromised credentials by requiring users to present multiple forms of evidence to gain access to your applications. Unlike traditional MFA solutions, CyberArk Adaptive MFA uses AI-powered behavioral analytics and contextual information to determine which authentication factors to apply to a particular user in a specific situation. • CyberArk Secure Web Sessions is a cloud-based service that enables organizations to monitor, record, and audit end-user activity within high-risk and high-value web applications. Security and compliance specialists can use Secure Web Sessions to search recorded sessions using free text input and quickly filter events by users, dates, and actions. • CyberArk Workforce Password Management is an enterprise-focused password manager providing a user-friendly solution to store business application credentials in a centralized vault and securely share them with other users in the organization. Identity Management Services: • CyberArk Identity Lifecycle Management provides an easy way to route application access requests, create application accounts, manage entitlements for those accounts, and revoke access when necessary. • CyberArk Identity Flows is an identity orchestration solution that improves security, efficiency, and productivity by automating identity data and events. With Identity Flows, organizations can orchestrate complex identity management processes and synchronize identity data across diverse applications, directory stores, and repositories. • CyberArk Identity Compliance solution continuously discovers access, streamlines access certifications, and provides comprehensive identity analytics. Identity Compliance automates manually intensive, error-prone administrative processes, ensuring all workforce and privileged access rights are properly assigned and continually certified across enterprises.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 126
**How Do G2 Users Rate CyberArk Workforce Identity?**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.0/10)
- **Mobile App:** 6.9/10 (Category avg: 7.5/10)
- **APIs:** 7.7/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 8.4/10 (Category avg: 8.6/10)

**Who Is the Company Behind CyberArk Workforce Identity?**

- **Seller:** [CyberArk](https://www.g2.com/sellers/cyberark)
- **Year Founded:** 1999
- **HQ Location:** Newton, MA
- **Twitter:** @CyberArk (17,751 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/26630/ (2,893 employees on LinkedIn®)
- **Ownership:** NASDAQ:CYBR

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 48% Enterprise, 48% Mid-Market


#### What Are CyberArk Workforce Identity's Pros and Cons?

**Pros:**

- Ease of Use (14 reviews)
- Access Management (6 reviews)
- Intuitive (6 reviews)
- Customer Support (5 reviews)
- Access Control (4 reviews)

**Cons:**

- Missing Features (4 reviews)
- Integration Issues (2 reviews)
- Lack of Automation (2 reviews)
- Lack of Features (2 reviews)
- Browser Extension Issues (1 reviews)

### 8. [CoreView](https://www.g2.com/products/coreview/reviews)
  CoreView is the leading SaaS platform for Microsoft 365 Tenant Resilience. Trusted by enterprises worldwide, CoreView secures the configuration, identity, and access layers of Microsoft 365—hardening tenants against attack, reducing privilege and blast radius, detecting configuration tampering, and restoring security posture after incidents. By protecting Microsoft 365 &amp; Entra at the tenant level, CoreView ensures organisations can prevent compromise, withstand intrusion, and recover with confidence from cyber threats and operational disruption. Use Cases: 1. Tenant Resilience for Microsoft 365 2. Complex Microsoft 365 tenant management 3. Enforce governance and lifecycle management for Microsoft 365


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 116
**How Do G2 Users Rate CoreView?**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.0/10)
- **Mobile App:** 5.7/10 (Category avg: 7.5/10)
- **APIs:** 7.9/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 7.9/10 (Category avg: 8.6/10)

**Who Is the Company Behind CoreView?**

- **Seller:** [CoreView](https://www.g2.com/sellers/coreview)
- **Company Website:** https://www.coreview.com
- **Year Founded:** 2014
- **HQ Location:** Washington, DC
- **Twitter:** @CoreViewHQ (1,046 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/5200159/ (192 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Construction
  - **Company Size:** 51% Enterprise, 32% Mid-Market


#### What Are CoreView's Pros and Cons?

**Pros:**

- Automation (12 reviews)
- Ease of Use (11 reviews)
- Time-saving (7 reviews)
- Productivity Improvement (6 reviews)
- Centralized Management (5 reviews)

**Cons:**

- Steep Learning Curve (6 reviews)
- Navigation Issues (5 reviews)
- Limited Features (4 reviews)
- Insufficient Training (3 reviews)
- Slow Performance (3 reviews)

### 9. [BetterCloud](https://www.g2.com/products/bettercloud/reviews)
  BetterCloud is a comprehensive SaaS management platform designed to assist IT teams in effectively managing and optimizing their software-as-a-service (SaaS) applications. This solution focuses on automating essential processes such as onboarding, offboarding, mid-lifecycle changes, give you greater control and insight into your SaaS apps, thousands of forward-thinking organizations rely on BetterCloud to transform employee experience, optimize software spend, and strengthen overall security. By leveraging BetterCloud, organizations can significantly reduce the manual workload associated with SaaS management, achieving up to a 78% reduction in operational tasks. Targeted primarily at IT departments and SaaS operations teams, BetterCloud addresses the challenges faced by organizations that utilize multiple SaaS applications. As businesses increasingly adopt cloud-based solutions, the complexity of managing user access, security policies, and application lifecycles grows. BetterCloud provides a centralized platform that streamlines these processes, ensuring that IT teams can maintain control and compliance while enhancing overall operational efficiency. Key features of BetterCloud include automated user lifecycle management, which simplifies the onboarding and offboarding of employees, ensuring that access rights are promptly granted or revoked as needed. Additionally, the platform offers robust security policy management, allowing organizations to enforce compliance and protect sensitive data across their SaaS ecosystem. BetterCloud also supports mid-lifecycle changes, enabling IT teams to adapt user access as roles and responsibilities evolve within the organization. The benefits of using BetterCloud extend beyond mere automation. By reducing the time spent on repetitive tasks, IT teams can focus on strategic initiatives that drive business growth and innovation. Furthermore, the platform&#39;s ability to provide insights into application usage and security posture empowers organizations to make informed decisions about their SaaS investments. With a strong reputation in the industry, backed by over a decade of experience and recognition from leading analyst firms, BetterCloud stands out as a trusted partner for organizations looking to optimize their SaaS operations. In summary, BetterCloud is not just a tool for managing SaaS applications; it is a strategic solution that transforms the way organizations handle their cloud-based software. By automating critical processes and providing valuable insights, BetterCloud enables IT teams to enhance productivity, improve security, and ultimately drive better business outcomes in a rapidly evolving digital landscape.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 474
**How Do G2 Users Rate BetterCloud?**

- **Has the product been a good partner in doing business?:** 9.1/10 (Category avg: 9.0/10)
- **Mobile App:** 6.0/10 (Category avg: 7.5/10)
- **APIs:** 8.1/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 7.8/10 (Category avg: 8.6/10)

**Who Is the Company Behind BetterCloud?**

- **Seller:** [CORESTACK](https://www.g2.com/sellers/corestack)
- **Company Website:** https://www.corestack.io/
- **Year Founded:** 2016
- **HQ Location:** Bellevue, WA
- **Twitter:** @corestack (1,019 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/corestack (208 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** IT Manager, Systems Administrator
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 60% Mid-Market, 28% Enterprise


#### What Are BetterCloud's Pros and Cons?

**Pros:**

- Automation (47 reviews)
- Ease of Use (42 reviews)
- Onboarding (31 reviews)
- Time-saving (27 reviews)
- Offboarding Process (25 reviews)

**Cons:**

- Limited Features (28 reviews)
- Integration Issues (21 reviews)
- Missing Features (19 reviews)
- Access Limitations (13 reviews)
- Lacking Features (13 reviews)

### 10. [Fastpath](https://www.g2.com/products/fastpath/reviews)
  Fastpath is a cloud-based access orchestration platform. It allows organizations to manage and automate the processes around access governance and security, quickly and efficiently. Customizable, quick to implement and deploy means you get value right away. And it works with all major enterprise software in multi-site, multi-application environments. Fastpath helps to identify, quantify and manage data access risk, so you can be confident that the right people are accessing the right information for the right reasons. Make informed strategic business decisions confidently, knowing your organization is secure and compliant. **Unrivalled Integrations** Fastpath integrates out-of-the-box, working across multi-application environments and custom-made software to deliver insight into your security risks. **Rapid Time to Value** We’re easy to implement and quick to deploy, and with no expensive customization required, you can immediately reap ROI. **Frictionless Automation** Effortlessly automate processes like onboarding, testing and proving controls to continuously identify, quantify, and eliminate risk. **Improved Efficiency** Ease of use and out-of-the-box content allow security teams to get up to speed fast, focus on what matters, and save valuable time.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 106
**How Do G2 Users Rate Fastpath?**

- **Has the product been a good partner in doing business?:** 9.6/10 (Category avg: 9.0/10)
- **Mobile App:** 6.4/10 (Category avg: 7.5/10)
- **APIs:** 8.0/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 8.3/10 (Category avg: 8.6/10)

**Who Is the Company Behind Fastpath?**

- **Seller:** [Delinea](https://www.g2.com/sellers/delinea)
- **Year Founded:** 2004
- **HQ Location:** San Francisco
- **Twitter:** @DelineaInc (883 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/delinea/ (1,232 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 55% Enterprise, 43% Mid-Market


#### What Are Fastpath's Pros and Cons?

**Pros:**

- Ease of Use (20 reviews)
- Customer Support (18 reviews)
- Helpful (10 reviews)
- Reporting (10 reviews)
- Reporting Features (10 reviews)

**Cons:**

- Missing Features (6 reviews)
- Poor Reporting (5 reviews)
- Learning Curve (4 reviews)
- Poor Customer Support (4 reviews)
- Inadequate Reporting (3 reviews)

### 11. [SAP Access Control](https://www.g2.com/products/sap-access-control/reviews)
  SAP Access Control is a comprehensive solution designed to help organizations manage and enforce user access policies across SAP and third-party systems. By automating user provisioning, conducting real-time risk analyses, and ensuring compliance with regulatory requirements, it enables businesses to grant employees the necessary applications and services without exposing sensitive data and processes to unauthorized use. Key Features and Functionality: - Access Risk Analysis: Identifies and remediates violations of segregation of duties and critical access through embedded risk analysis, ensuring that no single user can perform conflicting tasks that could lead to fraud or errors. - User Access Management: Automates user access assignments across SAP and third-party systems, streamlining the provisioning and deprovisioning processes while maintaining compliance. - Role-Based Access Control: Defines and maintains compliance roles in business-friendly terms, allowing organizations to standardize and streamline the role creation and maintenance process. - Regular Reviews: Conducts periodic user-access reviews to ensure compliance with segregation of duties rules and other access policies, facilitating continuous compliance monitoring. - Emergency Access Management: Grants temporary super-user status with &quot;firefighter&quot; login IDs in a controlled, auditable environment, allowing for emergency access without compromising security. Primary Value and Problem Solved: SAP Access Control addresses the critical need for secure and compliant user access management within organizations. By automating access provisioning, enforcing compliance checks, and providing tools for risk analysis and mitigation, it helps businesses prevent unauthorized access, reduce the risk of fraud, and ensure adherence to regulatory requirements. This comprehensive approach not only enhances security but also improves operational efficiency by reducing the administrative burden associated with manual access management processes.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 30
**How Do G2 Users Rate SAP Access Control?**

- **Has the product been a good partner in doing business?:** 8.0/10 (Category avg: 9.0/10)
- **Mobile App:** 3.3/10 (Category avg: 7.5/10)
- **APIs:** 5.0/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 5.0/10 (Category avg: 8.6/10)

**Who Is the Company Behind SAP Access Control?**

- **Seller:** [SAP](https://www.g2.com/sellers/sap)
- **Year Founded:** 1972
- **HQ Location:** Walldorf
- **Twitter:** @SAP (297,214 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/sap/ (141,341 employees on LinkedIn®)
- **Ownership:** NYSE:SAP

**Who Uses This Product?**
  - **Company Size:** 45% Mid-Market, 42% Enterprise


#### What Are SAP Access Control's Pros and Cons?

**Pros:**

- Customer Management (3 reviews)
- Data Management (3 reviews)
- Ease of Use (2 reviews)
- Features (2 reviews)
- Integrations (2 reviews)

**Cons:**

- Complexity (3 reviews)
- Complexity Issues (3 reviews)
- Complex Setup (2 reviews)
- Lack of Customization (2 reviews)
- Learning Curve (2 reviews)

### 12. [Oracle Identity Management](https://www.g2.com/products/oracle-identity-management/reviews)
  Oracle Identity Management is a comprehensive suite of identity and access management (IAM) solutions designed to help organizations manage the entire lifecycle of user identities and access privileges across enterprise resources, both on-premises and in the cloud. By automating user provisioning, enforcing security policies, and ensuring compliance with regulatory requirements, Oracle Identity Management enhances operational efficiency and strengthens security postures. Key Features and Functionality: - Identity Governance: Manages user provisioning and deprovisioning, enforces access policies, and provides actionable identity intelligence for rapid remediation of high-risk entitlements. - Access Management: Delivers risk-aware, end-to-end multifactor authentication (MFA) and single sign-on (SSO) capabilities, integrating identities and systems across cloud and on-premises environments. - Directory Services: Offers scalable and flexible directory solutions that support growth without unnecessary over-provisioning, facilitating seamless expansion without impacting existing services. - User Provisioning: Automates the creation and assignment of user accounts, reducing administrative overhead and minimizing human error. - Identity Analytics: Utilizes machine learning to detect and prevent suspicious identity activities, enhancing security through proactive monitoring. - Single Sign-On (SSO): Consolidates user credentials behind a single account with strong password policies, simplifying access to services and improving user experience. - Multifactor Authentication (MFA): Implements secondary authentication controls to verify user identities, reducing exposure from stolen credentials. - Risk-Based Authentication: Employs algorithms to assess the risk of user actions, blocking or reporting activities with high-risk scores. - Identity Governance and Administration (IGA): Controls entitlements to reduce risks associated with excessive access and privileges. Primary Value and Solutions Provided: Oracle Identity Management addresses critical security challenges by ensuring consistent user access rules and policies across an organization, thereby reducing the risk of data breaches and unauthorized access. By automating identity-related processes, it enhances operational efficiency, reduces administrative costs, and ensures compliance with regulatory standards. The suite&#39;s comprehensive approach to identity governance and access management enables organizations to securely manage user identities, enforce security policies, and respond swiftly to evolving security threats, ultimately safeguarding sensitive data and maintaining trust in business operations.


  **Average Rating:** 3.8/5.0
  **Total Reviews:** 52
**How Do G2 Users Rate Oracle Identity Management?**

- **Has the product been a good partner in doing business?:** 7.0/10 (Category avg: 9.0/10)
- **Mobile App:** 7.1/10 (Category avg: 7.5/10)
- **APIs:** 7.0/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 7.7/10 (Category avg: 8.6/10)

**Who Is the Company Behind Oracle Identity Management?**

- **Seller:** [Oracle](https://www.g2.com/sellers/oracle)
- **Year Founded:** 1977
- **HQ Location:** Austin, TX
- **Twitter:** @Oracle (827,981 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1028/ (199,301 employees on LinkedIn®)
- **Ownership:** NYSE:ORCL

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Telecommunications
  - **Company Size:** 65% Enterprise, 21% Mid-Market


#### What Are Oracle Identity Management's Pros and Cons?

**Pros:**

- Access Control (1 reviews)
- Access Management (1 reviews)
- Customer Support (1 reviews)
- Customization (1 reviews)
- Device Management (1 reviews)

**Cons:**

- Error Handling (1 reviews)
- Performance Issues (1 reviews)
- Poor Interface Design (1 reviews)
- Poor UI (1 reviews)
- Technical Errors (1 reviews)

### 13. [ManageEngine ADManager Plus](https://www.g2.com/products/manageengine-admanager-plus/reviews)
  ADManager Plus is an identity governance and administration (IGA) solution that simplifies identity management, ensures security, and improves compliance. With ADManager Plus, manage the user life cycle from provisioning to deprovisioning, run access certification campaigns, orchestrate identity management across enterprise applications, and protect data on your enterprise platforms with regular backups. The solution provides comprehensive identity risk assessment and proactive management of your organization&#39;s risk exposure by highlighting potential security vulnerabilities and visualizing attack paths to privileged entities. This enables IT teams to prioritize remediation efforts and strengthen their security posture before threats can be exploited. Use over 200 reports to gain valuable insights into identities and their access rights, and leverage customizable dashboards and scheduled report generation for continuous monitoring. The platform supports compliance frameworks including the GDPR and HIPAA through automated audit trails and detailed access reviews. Improve the efficiency of your IGA operations with workflows, automations, and role-based access control policies. Built-in templates streamline common tasks while multi-stage approval workflows ensure proper oversight of critical changes. ADManager Plus&#39; Android and iOS applications help with on-the-go AD and Microsoft Entra ID management, enabling administrators to respond quickly to urgent requests.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 79
**How Do G2 Users Rate ManageEngine ADManager Plus?**

- **Has the product been a good partner in doing business?:** 9.1/10 (Category avg: 9.0/10)
- **Mobile App:** 7.6/10 (Category avg: 7.5/10)
- **APIs:** 8.3/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 8.8/10 (Category avg: 8.6/10)

**Who Is the Company Behind ManageEngine ADManager Plus?**

- **Seller:** [Zoho](https://www.g2.com/sellers/zoho-b00ca9d5-bca8-41b5-a8ad-275480841704)
- **Year Founded:** 1996
- **HQ Location:** Austin, TX
- **Twitter:** @Zoho (137,412 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/38373/ (30,531 employees on LinkedIn®)
- **Phone:** +1 (888) 900-9646 

**Who Uses This Product?**
  - **Top Industries:** Government Administration, Information Technology and Services
  - **Company Size:** 55% Mid-Market, 38% Enterprise


#### What Are ManageEngine ADManager Plus's Pros and Cons?

**Pros:**

- Automation (1 reviews)
- Ease of Use (1 reviews)
- Efficiency (1 reviews)
- Efficiency Optimization (1 reviews)
- Functionality (1 reviews)

**Cons:**

- Complex Interface (1 reviews)
- Complexity (1 reviews)
- Complex Reporting (1 reviews)
- Complex Usability (1 reviews)
- Learning Curve (1 reviews)

### 14. [Zluri](https://www.g2.com/products/zluri/reviews)
  Zluri is a next-gen Identity Governance and Administration (IGA) platform that enables IT and security teams to discover identities and applications, streamline access management, and automate access reviews, all from a single, intuitive interface. Zluri helps organizations automate critical access controls mandated by SOX, HIPAA, SOC 2, and more, ensuring the right people have the right access to the right applications at the right time, with minimal time and manual effort.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 174
**How Do G2 Users Rate Zluri?**

- **Has the product been a good partner in doing business?:** 9.6/10 (Category avg: 9.0/10)
- **Mobile App:** 9.2/10 (Category avg: 7.5/10)
- **APIs:** 8.3/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 8.9/10 (Category avg: 8.6/10)

**Who Is the Company Behind Zluri?**

- **Seller:** [Zluri](https://www.g2.com/sellers/zluri)
- **Company Website:** https://www.zluri.com/
- **Year Founded:** 2020
- **HQ Location:** San Franscisco, California
- **Twitter:** @zluri_hq (225 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/zluri/ (270 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** IT Manager
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 66% Mid-Market, 23% Enterprise


#### What Are Zluri's Pros and Cons?

**Pros:**

- Automation (12 reviews)
- Ease of Use (12 reviews)
- Time-saving (11 reviews)
- Customer Support (9 reviews)
- Features (9 reviews)

**Cons:**

- Limited Integrations (8 reviews)
- Integration Issues (7 reviews)
- Limited Features (7 reviews)
- Missing Features (5 reviews)
- Small Business Challenges (5 reviews)

### 15. [OneLogin](https://www.g2.com/products/onelogin/reviews)
  OneLogin simpliﬁes identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin enables IT identity policy enforcement and instantly disables app access for employees who leave or change roles in real-time by removing them from Active Directory. Take control over application access, quickly on- and off-board team members, and provide end-users with easy access to all their applications on every device. Extend your on-premises security model to the cloud in minutes. Eliminate the pain and expense of extensive identity policy management. OneLogin reduces identity infrastructure costs and complex integration projects for each new app and efficiently extends identity policies to the cloud. OneLogin eliminates the need for lengthy integration and provisioning projects, manual de-provisioning, protracted on- and off-boarding processes, username and password resets, and Shadow IT.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 272
**How Do G2 Users Rate OneLogin?**

- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 9.0/10)
- **Mobile App:** 8.3/10 (Category avg: 7.5/10)
- **APIs:** 8.4/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 8.9/10 (Category avg: 8.6/10)

**Who Is the Company Behind OneLogin?**

- **Seller:** [One Identity](https://www.g2.com/sellers/one-identity)
- **HQ Location:** Aliso Viejo, CA
- **Twitter:** @OneIdentity (7,865 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/one-identity (667 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** Account Manager
  - **Top Industries:** Computer Software, Education Management
  - **Company Size:** 49% Mid-Market, 40% Enterprise


#### What Are OneLogin's Pros and Cons?

**Pros:**

- Single Sign-On (8 reviews)
- SSO (Single Sign-On) (8 reviews)
- Ease of Use (7 reviews)
- SSO (6 reviews)
- Security (5 reviews)

**Cons:**

- Service Interruptions (5 reviews)
- Connection Issues (4 reviews)
- Bugs (3 reviews)
- Error Handling (3 reviews)
- Limited Features (3 reviews)

### 16. [1Password](https://www.g2.com/products/1password/reviews)
  The Most Used Enterprise Password Manager, trusted by over 180,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure every sign-in by integrating 1Password with your existing IAM infrastructure. Enforce strong, integrated security policies at scale, be proactive about cybersecurity threats to reduce risk, and quickly and easily generate detailed reports on password security posture.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 1,767
**How Do G2 Users Rate 1Password?**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.0/10)
- **Mobile App:** 9.0/10 (Category avg: 7.5/10)
- **APIs:** 8.3/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 9.2/10 (Category avg: 8.6/10)

**Who Is the Company Behind 1Password?**

- **Seller:** [1Password](https://www.g2.com/sellers/1password)
- **Company Website:** https://1password.com/
- **Year Founded:** 2005
- **HQ Location:** Ontario
- **Twitter:** @1Password (139,665 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1password/ (2,911 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** Software Engineer, CEO
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 54% Small-Business, 32% Mid-Market


#### What Are 1Password's Pros and Cons?

**Pros:**

- Ease of Use (333 reviews)
- Security (271 reviews)
- Password Management (182 reviews)
- Intuitive (144 reviews)
- Easy Access (134 reviews)

**Cons:**

- Password Management (95 reviews)
- Expensive (91 reviews)
- Login Issues (69 reviews)
- Autofill Issues (64 reviews)
- Cost (60 reviews)

### 17. [IBM Verify CIAM](https://www.g2.com/products/ibm-verify-ciam/reviews)
  A centralized solution for managing customer and workforce identity and access including capabilities such as single-sign-on, multifactor authentication, adaptive AI-based access, passwordless access, and lifecycle and consent management. IBM Verify is a single-stack cloud-based, on premises, or hybrid-cloud solution for all identity and access needs listed above. Other advantages it presents are a way to integrate with legacy access and CRM applications, reverse proxies to help increase performance, reliability, and security, and a way to migrate from on-premises to cloud, not only from an application standpoint, but also in unifying directories. IBM Verify is available on AWS Marketplace. If data residency is a top concern, when combined with AWS, the vendor states that IBM Verify has the broadest tenancy, and can be delivered using a rapid deployment model that has already been put to the test in several critical situations. IBM further states they continue to invest in achieving and maintaining all the pertinent certifications such as SOC 2, ISO 27001, and PCI DSS, plus full FedRAMP authorization. IBM Verify is not just a solution IBM provides to clients for identity and access, but it is used it to establish a zero-trust posture for over 25 million of the company&#39;s own internal and external end-users, supporting 5,000 applications, more than 600 federated client companies and their workforces, and over 150,000 authorization groups, plus Mac, iOS, Android, Windows, Linux, and Z (mainframe) operating systems, which they state includes one of the world’s largest Apple deployments, and one of the largest Linux deployments.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 169
**How Do G2 Users Rate IBM Verify CIAM?**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 9.0/10)
- **Mobile App:** 8.9/10 (Category avg: 7.5/10)
- **APIs:** 6.9/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 7.5/10 (Category avg: 8.6/10)

**Who Is the Company Behind IBM Verify CIAM?**

- **Seller:** [IBM](https://www.g2.com/sellers/ibm)
- **Company Website:** https://www.ibm.com/us-en
- **Year Founded:** 1911
- **HQ Location:** Armonk, NY
- **Twitter:** @IBM (709,298 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1009/ (324,553 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 54% Enterprise, 39% Mid-Market


#### What Are IBM Verify CIAM's Pros and Cons?

**Pros:**

- Security (61 reviews)
- Ease of Use (48 reviews)
- Authentication (38 reviews)
- Features (29 reviews)
- MFA Authentication (29 reviews)

**Cons:**

- Complex Setup (38 reviews)
- Complexity (35 reviews)
- Difficult Learning (33 reviews)
- Difficult Setup (31 reviews)
- Complex Administration (30 reviews)

### 18. [Hire2Retire](https://www.g2.com/products/hire2retire/reviews)
  RoboMQ’s Hire2Retire is a comprehensive workforce lifecycle management solution that manages the entire JML lifecycle events, such as hiring, department transfers, terminations, and long-term leaves. It is an Identity and Access Management platform that synchronizes HR with IT infrastructure, including Active Directory(AD), Okta, and Google Workspace. Hire2Retire enables organisations to effectively manage employee access and privileges throughout their work cycle.   Hire2Retire integrates with 27 HR and ATS systems, identity providers (IdP) like Active Directory, Entra ID, Okta, and Google Workspace, along with 10+ leading Service Management platforms like ServiceNow, Salesforce, SolarWinds, and FreshService. Hire2Retire has 100’s of connectors to auto-provision access to third-party applications based on profile-driven employee privileges. Hire2Retire benefits mid to large fast-growing enterprises that face challenges in manual workforce lifecycle management. Traditional onboarding and offboarding processes can be tedious, slow, and error-prone, leading to security and compliance risks. It can also lead to poor employee experience and wasted costs and resources. Hire2Retire, by enabling onboarding and offboarding automation, ensures businesses spend less time in workforce lifecycle management and more time in strategic initiatives. Customers prefer the Hire2Retire workforce lifecycle management and identity provisioning solution from RoboMQ for: - Significant reduction in cost through elimination of tedious and repetitive tasks of costly sysadmin resources - Better new hire experience by providing a superior “First Day at Work” experience. It ensures that employee email, AD profile, and role-based access to systems and tools are in place when the new hire walks in - Manages and controls access and privileges to systems and data based on employee roles - Prevents security and reputation risks by ensuring timely removal of access on termination and change of roles


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 73
**How Do G2 Users Rate Hire2Retire?**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.0/10)
- **Mobile App:** 5.8/10 (Category avg: 7.5/10)
- **APIs:** 8.0/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 8.1/10 (Category avg: 8.6/10)

**Who Is the Company Behind Hire2Retire?**

- **Seller:** [RoboMQ](https://www.g2.com/sellers/robomq)
- **Company Website:** https://www.robomq.io/
- **Year Founded:** 2012
- **HQ Location:** Vienna, VA
- **Twitter:** @robomq (267 Twitter followers)
- **LinkedIn® Page:** https://in.linkedin.com/company/robomq-io (94 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Non-Profit Organization Management, Manufacturing
  - **Company Size:** 79% Mid-Market, 15% Enterprise


#### What Are Hire2Retire's Pros and Cons?

**Pros:**

- Customer Support (15 reviews)
- Ease of Use (13 reviews)
- Easy Integrations (10 reviews)
- Implementation Ease (10 reviews)
- Automation (9 reviews)

**Cons:**

- Implementation Difficulty (6 reviews)
- Difficult Setup (3 reviews)
- Error Handling (3 reviews)
- Steep Learning Curve (3 reviews)
- Integration Issues (2 reviews)

### 19. [Orchestry](https://www.g2.com/products/orchestry/reviews)
  Orchestry is a Microsoft 365 management and automation platform that accelerates cost savings, storage reduction, sprawl prevention and risk remediation. Our platform is purpose-built with an emphasis on user experience and actionability so you can implement and start making an impact in days, not weeks. Orchestry streamlines workspace provisioning and lifecycle management, automates manual governance tasks, identifies and prioritizes potential risks, and consolidates data into centralized reports and dashboards. It goes beyond native capabilities so you can get control of your tenant, prevent future issues, scale with confidence, and get ready for AI fast.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 98
**How Do G2 Users Rate Orchestry?**

- **Has the product been a good partner in doing business?:** 9.9/10 (Category avg: 9.0/10)
- **Mobile App:** 7.5/10 (Category avg: 7.5/10)
- **APIs:** 8.6/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 9.3/10 (Category avg: 8.6/10)

**Who Is the Company Behind Orchestry?**

- **Seller:** [Orchestry Software Inc.](https://www.g2.com/sellers/orchestry-software-inc)
- **Company Website:** https://www.orchestry.com/
- **Year Founded:** 2020
- **HQ Location:** Vancouver, British Columbia
- **Twitter:** @OrchestrySoft (458 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/orchestry (41 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** Senior Consultant
  - **Top Industries:** Information Technology and Services, Consulting
  - **Company Size:** 45% Small-Business, 43% Mid-Market


#### What Are Orchestry's Pros and Cons?

**Pros:**

- Ease of Use (20 reviews)
- Time-saving (9 reviews)
- User Interface (8 reviews)
- Workflow Management (8 reviews)
- Solutions (7 reviews)

**Cons:**

- Steep Learning Curve (7 reviews)
- Learning Curve (5 reviews)
- User Difficulty (5 reviews)
- Difficult Setup (4 reviews)
- Poor UI (4 reviews)

### 20. [Avatier Identity Anywhere](https://www.g2.com/products/avatier-identity-anywhere/reviews)
  Modernize your digital workforce with Avatier Identity Anywhere integrated Identity Access Governance featuring push notification workflow across all your favorite platforms, and a modern cross-platform SSO solution to connect to all your SAML, oAuth, OpenID, and webform apps. Discover unrivaled self-service IT experience enabling collaboration across the entire enterprise without compromising privacy and security. Avatier native mobile experience for iOS and Android includes real-time collaboration support with mobile push notification and improved security with mobile biometric authentication. Introducing Avatier Identity Anywhere which integrates with the leading MFA solutions in the industry to provide a true-passwordless secure Identity Governance and Administration (IGA) experience. Leverage Avatier OTP SMS/Email or phoneless MFA, Duo Security, Google Authenticator, Okta Verify, Ping Identity, Radius, RSA SecureID, Symantec VIP, and many other FIDO2 WebAuthn compliant solutions. Discover all you can do with Avatier for Microsoft Teams &amp; Outlook, ServiceNow (coming soon), Slack, Chrome Extension, iOS, Andriod, chatbot, and of course web and REST API: \* Avatier Self-Service Group Management with integrated Access Governance. Microsoft/Azure group membership is paramount as it controls your role in the company, access to files, and even cloud application access via leading SSO solutions like Avatier. Avatier allows self-service group membership requests with push notification for workflow approval and access certification campaigns. Now you can request creation, deletion, renaming, and even group ownership conveniently from any platform. \* Avatier Access Governance. Verifying workforce fine-grain user access has never been this easy. Avatier ensures access governance is continuously being met by empowering managers to approve, deny, allow an exception, return to campaign owner, or re-assign certifications to a co-worker. \* Avatier User Lifecycle Management. Turn your IT department into an IT Store allowing your workforce to request fine-grain access, roles, and even assets through a familiar shopping cart experience. Optionally, hook Avatier up to your favorite HR system and automate all of your onboarding and offboarding needs. Never panic when its time to disable or delete user access. Avatier allows you can request disabling user access now and schedule deleting the user later. \* Avatier Universal Workflow Approval. Push notification instantly alerts you to urgent matters that require your attention. Using Avatier don&#39;t ever miss an important workforce request for roles, access, assets, or even generic change control. Approve/Deny ServiceNow, Workday, SAP, and other leading apps using Avatier&#39;s Universal Workflow Platform(TM) across all of your favorite platforms like Microsoft Teams, Outlook, ServiceNow, Slack, and Chrome Extension. \* Avatier Self-Service Password Management with Strong Password Policy Enforcement. Your workforce needs self-service password reset and synchronization without requiring an expensive call the help desk. Your service desk needs a secure friendly assisted password reset form anywhere. Avatier gives your workforce the seamless ability to perform these actions wherever they are by securely authenticating with a variety of flexible authentication MFA options. Avatier&#39;s Password Policy Manager will also ensure that your password meets the enterprise password policy and maintain strong passwords across all systems. \* Avatier Single Sign-on (SSO). Modern SSO solutions need to support a diverse workforce with a choice of how and where they would like to securely gain access to their cloud apps. Avatier SSO enables access when your workforce needs it the most with Just-in-Time (JIT) cloud application user provisioning/deprovisioning. It has never been easier to onboard your workforce across all of your cloud applications. Achieve more together with Avatier. To experience Avatier Identity Anywhere in action, we are offering an exclusive FREE 14 day trial to qualified organizations. Schedule yours today: https://calendly.com/avatier-cloudtrial/avatier-kickoff-meeting


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 30
**How Do G2 Users Rate Avatier Identity Anywhere?**

- **Has the product been a good partner in doing business?:** 9.8/10 (Category avg: 9.0/10)
- **APIs:** 9.3/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 9.3/10 (Category avg: 8.6/10)

**Who Is the Company Behind Avatier Identity Anywhere?**

- **Seller:** [Avatier](https://www.g2.com/sellers/avatier)
- **Year Founded:** 1995
- **HQ Location:** Pleasanton, CA
- **Twitter:** @Avatier (1,603 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/355652/ (33 employees on LinkedIn®)
- **Phone:** 925-217-5170

**Who Uses This Product?**
  - **Company Size:** 90% Enterprise, 10% Mid-Market


### 21. [Auth0](https://www.g2.com/products/auth0/reviews)
  Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while also enabling SSO.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 252
**How Do G2 Users Rate Auth0?**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 9.0/10)
- **Mobile App:** 8.3/10 (Category avg: 7.5/10)
- **APIs:** 8.9/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 8.4/10 (Category avg: 8.6/10)

**Who Is the Company Behind Auth0?**

- **Seller:** [Okta](https://www.g2.com/sellers/okta)
- **Company Website:** https://okta.com
- **Year Founded:** 2009
- **HQ Location:** San Francisco, California
- **Twitter:** @okta (42,783 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/926041/ (7,230 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** Software Engineer, Software Developer
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 49% Small-Business, 30% Mid-Market


#### What Are Auth0's Pros and Cons?

**Pros:**

- Ease of Use (54 reviews)
- Security (47 reviews)
- Authentication (39 reviews)
- Integrations (34 reviews)
- Easy Integrations (33 reviews)

**Cons:**

- Expensive (27 reviews)
- Cost (20 reviews)
- Expensive Pricing (17 reviews)
- Difficult Learning (15 reviews)
- Complexity (12 reviews)

### 22. [HelloID](https://www.g2.com/products/helloid/reviews)
  HelloID is a complete, cloud-based IDaaS solution that streamlines user provisioning, self-service, and single sign-on processes within your organization or educational institution. Automate the entire user lifecycle process with HelloID by connecting your HR/SIS data to all your downstream systems. Account details and usage rights are automatically kept up-to-date, which reduces human error and increases security. HelloID puts the power of IDM into your hands to meet current and future needs.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 31
**How Do G2 Users Rate HelloID?**

- **Has the product been a good partner in doing business?:** 9.6/10 (Category avg: 9.0/10)
- **APIs:** 8.5/10 (Category avg: 8.5/10)

**Who Is the Company Behind HelloID?**

- **Seller:** [Tools4ever](https://www.g2.com/sellers/tools4ever)
- **Year Founded:** 1999
- **HQ Location:** Lynbrook, New York
- **Twitter:** @Tools4ever (329 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/124368/ (63 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Primary/Secondary Education, Education Management
  - **Company Size:** 59% Mid-Market, 38% Enterprise


### 23. [WSO2 Identity Platform](https://www.g2.com/products/wso2-identity-platform/reviews)
  What is WSO2 Identity Platform? WSO2 Identity Platform is a unified, API-first suite designed to orchestrate identity for humans, applications, and autonomous AI agents. It provides a modular fabric for modern identity, allowing organizations to deploy the full platform or select specific capabilities to enhance their existing IAM stack. Managed identities within the suite now exceed one billion for more than 250 customers across global industries including financial services, healthcare, and government. Comprehensive capabilities WSO2 Identity Platform serves as a strategic foundation for modern identity by offering: - Developer-first design with extreme extensibility: Use an API-first approach to customize every stage of the user journey. Avoid proprietary black boxes with a platform built for deep technical integration. - Open source freedom without hidden vendor lock-in: Retain full control of your identity data and logic. Benefit from a transparent, community-vetted codebase that ensures long-term agility and security. - Deploy anywhere across hybrid and cloud environments: Run WSO2 Access Manager on-premises, in private clouds, or as a containerized solution. Maintain consistency across your infrastructure with ease. - Scale to millions of users with proven reliability: Effortlessly manage complex B2B and B2C requirements. From progressive profiling to delegated administration, handle massive growth without performance loss. - Future-proof security for humans and AI agents: Secure the next generation of digital interactions. Use AI-powered flows and branding to protect both human users and autonomous AI agents seamlessly. - Meet global standards with built-in compliance: Simplify adherence to GDPR, FAPI, and OIDC. WSO2 Access Manager provides the granular consent and security protocols required for highly regulated industries. Value proposition: How do you position yourself against your competitors? - WSO2 Identity Platform is designed for deep technical integration and absolute deployment freedom. - Total deployment freedom: Maintain control with options for self-managed software for privacy or managed SaaS for speed. - Agentic enterprise strategy: WSO2 is a pioneer in treating AI agents as first-class citizens, providing the identity layer required to secure and govern autonomous AI interactions. - Extreme extensibility: Service extensions and an API-first approach allow developers to modify flow behaviors to meet unique requirements without being locked into a &quot;proprietary black box&quot;. - Lower TCO &amp; high ROI: Proven to provide a 332% ROI over three years, with pricing that allows for scaling to over 100 million users without exponential cost increases. - Open source transparency: A community-vetted codebase ensures long-term agility, security, and the elimination of hidden vendor lock-in.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 104
**How Do G2 Users Rate WSO2 Identity Platform?**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.0/10)
- **Mobile App:** 8.1/10 (Category avg: 7.5/10)
- **APIs:** 9.2/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 8.5/10 (Category avg: 8.6/10)

**Who Is the Company Behind WSO2 Identity Platform?**

- **Seller:** [WSO2](https://www.g2.com/sellers/wso2)
- **Company Website:** https://wso2.com
- **Year Founded:** 2005
- **HQ Location:** Mountain View, CA
- **Twitter:** @wso2 (12,730 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/66028/ (1,218 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** Software Engineer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 46% Mid-Market, 38% Enterprise


#### What Are WSO2 Identity Platform's Pros and Cons?

**Pros:**

- Authentication (31 reviews)
- Security (26 reviews)
- Ease of Use (24 reviews)
- Identity Management (24 reviews)
- Single Sign-On (22 reviews)

**Cons:**

- Difficult Learning (14 reviews)
- Complexity (11 reviews)
- Complex Setup (11 reviews)
- Learning Curve (10 reviews)
- Poor Documentation (10 reviews)

### 24. [Cerby](https://www.g2.com/products/cerby/reviews)
  Cerby provides identity teams with the only comprehensive access management platform for non-federated applications. Harnessing the power of identity providers, Cerby makes passwordless authentication an immediate reality for any application by extending single sign-on and lifecycle management capabilities. With Cerby, identity teams can extend access, minimize risk, and lower costs.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 25
**How Do G2 Users Rate Cerby?**

- **Has the product been a good partner in doing business?:** 8.5/10 (Category avg: 9.0/10)
- **Mobile App:** 8.9/10 (Category avg: 7.5/10)
- **APIs:** 8.6/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 9.0/10 (Category avg: 8.6/10)

**Who Is the Company Behind Cerby?**

- **Seller:** [Cerby](https://www.g2.com/sellers/cerby)
- **Year Founded:** 2020
- **HQ Location:** Alameda, US
- **Twitter:** @CerbyHQ (494 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cerby/ (151 employees on LinkedIn®)

**Who Uses This Product?**
  - **Top Industries:** Marketing and Advertising, Retail
  - **Company Size:** 44% Enterprise, 28% Mid-Market


### 25. [Lumos](https://www.g2.com/products/lumos/reviews)
  Lumos is the first Autonomous Identity platform to automatically discover and manage access across all your apps. Instead of being overwhelmed by the sprawl of apps and access, Lumos empowers organizations with one unified solution that controls access on auto-pilot. With Lumos, gain full visibility, enhance security, and boost productivity — all in one platform. Trusted by hundreds of companies, Lumos powers millions of access requests across global companies.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 68
**How Do G2 Users Rate Lumos?**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.0/10)
- **Mobile App:** 6.9/10 (Category avg: 7.5/10)
- **APIs:** 8.7/10 (Category avg: 8.5/10)
- **Bi-directional Identity Synchronization:** 8.8/10 (Category avg: 8.6/10)

**Who Is the Company Behind Lumos?**

- **Seller:** [Lumos](https://www.g2.com/sellers/lumos)
- **Company Website:** https://lumos.com
- **Year Founded:** 2020
- **HQ Location:** Silicon Valley, California
- **Twitter:** @lumosidentity (258 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/lumosidentity/ (164 employees on LinkedIn®)

**Who Uses This Product?**
  - **Who Uses This:** IT Manager
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 74% Mid-Market, 16% Enterprise


#### What Are Lumos's Pros and Cons?

**Pros:**

- Ease of Use (11 reviews)
- Time-saving (10 reviews)
- Automation (9 reviews)
- Application Integration (7 reviews)
- Customer Support (7 reviews)

**Cons:**

- Integration Issues (7 reviews)
- Limited Integrations (6 reviews)
- Integration Difficulty (5 reviews)
- Complex Setup (3 reviews)
- Lack of Features (3 reviews)


    ## What Is User Provisioning and Governance Tools?
  [Identity Management Software](https://www.g2.com/categories/identity-management)
  ## What Software Categories Are Similar to User Provisioning and Governance Tools?
    - [Single Sign-On (SSO) Solutions](https://www.g2.com/categories/single-sign-on-sso)
    - [Identity and Access Management (IAM) Software](https://www.g2.com/categories/identity-and-access-management-iam)
    - [Multi-Factor Authentication (MFA) Software](https://www.g2.com/categories/multi-factor-authentication-mfa)
    - [Risk-Based Authentication Software](https://www.g2.com/categories/risk-based-authentication-rba)
    - [Customer Identity and Access Management (CIAM) Software](https://www.g2.com/categories/customer-identity-and-access-management-ciam)
    - [Privileged Access Management (PAM) Software](https://www.g2.com/categories/privileged-access-management-pam)
    - [Passwordless Authentication Software](https://www.g2.com/categories/passwordless-authentication)

  
---

## How Do You Choose the Right User Provisioning and Governance Tools?

### What You Should Know About User Provisioning and Governance Tools

### What are user provisioning and governance tools and software?

User provisioning and governance tools help companies automate the process of creating, permissioning, managing, and deactivating user accounts on corporate systems and applications across the enterprise. Typical use cases include user lifecycle stages such as setting up accounts for newly hired employees during onboarding and providing them access to the tools they need, changing user groups and permissions when employees are promoted or move within departments, and removing user accounts after an employee leaves the company. User provisioning and governance tools software automate user account creation by connecting information in user identity stores such as HR systems and/or user directories like Active Directory or G Suite to enterprise applications to systems that employees use such as email systems, databases, CRM systems, communication systems, employee productivity software, file storage systems, ERP applications, subscriptions, custom company applications, and more.

There is considerable overlap between user provisioning and governance tools and [identity and access management (IAM) software](https://www.g2.com/categories/identity-and-access-management-iam) functionality, as both offer user provisioning and govern user access. User provisioning and governance solutions focus more specifically on user lifecycle and group management. At the same time, IAM software includes additional benefits, such as centralized identity functions for both on-premises and cloud accounts and providing user authentication before granting user access to corporate systems.

### **Key benefits of user provisioning and governance software solutions**

- Automate user account lifecycle from provisioning during onboarding through de-provisioning after leaving the company
- Grant access to applications and systems based on user type through role or group management functions
- Reduce the time helpdesk team members need to spend manually creating users
- Improve end-user experience by offering self-service tools and integrations with [single sign-on solutions](https://www.g2.com/categories/single-sign-on-sso) and [password management tools](https://www.g2.com/categories/password-managers)

### Why use user provisioning and governance systems?

Using automated tools to manage user lifecycles, companies can eliminate manual user provisioning and de-provisioning tasks, which can ultimately reduce the burden on IT help desk teams and free up staff time for more high-level work. Deploying user provisioning and governance solutions reduces human error when creating accounts while reducing the threat of “permission creep&quot; when accounts are not properly changed after promotions, demotions, or terminations. Using this software enables companies to manage large numbers of users at once by applying role or group policies across users in a standard fashion.

**Setting up new hires —** Companies use user provisioning and governance tools to ensure new hires receive access to the accounts they need as quickly as possible during onboarding. If IT staff manually created user accounts, the process could take days, weeks, or even months and be prone to human error.

**Removing access for terminated employees—** It is important to remove access for terminated employees as quickly as possible to prevent security risks, either from the terminated employees themselves or from hackers accessing abandoned user accounts. Using user provisioning and governance tools, companies can automatically de-provision user accounts when an employee is removed from an HR system or other identity store.

**Enforcing role or group-based policies —** When managing hundreds (if not thousands) of user accounts, taking actions, such as providing access to new applications based on the users’ role or group types, can save a lot of time and get these users up and running quickly. For example, suppose all sales representatives should have access to a particular sales-related application. In that case, those user accounts can automatically be provisioned with access if they belong to the sales group. On the other hand, employees in the legal department may not need access to that sales application, so they would not be provisioned with an account for that specific sales software.

**Security —&amp;nbsp;** Insider threats can occur when user accounts are given too much access for their job type, and employees use the information they shouldn’t have access to. For example, an intern-employee likely shouldn’t be given the same access to the company’s accounts, like an accounting system, as the chief operating officer has. Using role- and group-based policies, IT administrators can easily remove permissions no longer needed by a type or group of employees and prevent permission creep.

**Reducing costs—** Labor **&amp;nbsp;** is typically one of the highest expenses companies have. Using user provisioning and governance tools frees up time for IT help desk team members to do other higher-value work. Many user provisioning and governance tools solutions allow end-user self-service to make changes like name changes directly.

### Who uses user provisioning and governance software tools?

Most companies would benefit from using identity governance software solutions to manage employee user account provisioning, management, and de-provisioning. In particular, companies with many employees and user accounts to manage, such as enterprise-level companies, would benefit from using identity governance platforms, as manual account creation is difficult, laborious, and prone to error.

IT administrators and help desk teams typically manage user provisioning and governance tools within a company’s corporate structure. With automated lifecycle management, however, multiple stakeholders across the enterprise can work in tandem to ensure users are set up correctly and have the proper access. For example, HR representatives can change new hires or people who have left the company in the HR system. This information can be pulled by the user provisioning and governance tools system to automatically take actions on a user’s associated accounts. End users can use self-service tools to make changes to their user profile, like name or title changes.

### Features of user provisioning and governance tools

At their core, user provisioning/governance software must, at minimum, provide tools to automatically provision and de-provision user accounts based on user identities and grant permissions based on governance rules for users to access specific enterprise applications. Many user provisioning/governance software offers additional features to further automate user account lifecycles and provide a better end-user experience. These features may include:

**Automatic user provisioning and de-provisioning —** User provisioning/governance software pulls data from identity stores like [HR systems](https://www.g2.com/categories/core-hr) to provision new accounts. Specific access to accounts can be automated based on roles or group membership. When an employee leaves or is terminated or when a contractor’s contract date expires, the software can automatically terminate accounts to prevent abandoned accounts from living on in systems.

**Lifecycle management —** The software takes user account actions throughout employee lifecycle changes from onboarding and promotions to termination.

**Integrations —** A main tenet of user provisioning/governance software is integrating with other software applications such as HR systems, user directories, [ERP applications](https://www.g2.com/categories/erp-systems), [email systems](https://www.g2.com/categories/email), [databases](https://www.g2.com/categories/database-software), [CRM systems](https://www.g2.com/categories/crm), communication systems, employee productivity software, and [file storage systems](https://www.g2.com/categories/cloud-file-storage).

**Identity synchronization —** User provisioning/governance software can synchronize identity information changes across multiple applications. For example, if a user changes their personal information, such as a phone number or title, in one system, those changes are pushed to their other applications in corporate systems.

**Access governance, role/group management, and policy enforcement —** Governing who has access to what applications or systems is determined by a user’s role and group membership. Using role-based or group membership factors to determine what access a user should be granted ensures that access to a company application is granted uniformly and adheres to company policies.

**Delegated access authorization—** When business managers need to give their subordinates access to company accounts or change their permissions, they can approve access using delegation workflows.

**Access verification workflow —** User provisioning/governance software can regularly query managers to confirm their subordinates&#39; access and whether changes need to be made.

**Reports and audits—** User provisioning/governance software can conduct audits and provide reports on account usage, including account creation and deactivation. This may be a necessary feature for companies in highly regulated industries that need to periodically audit users.

**User self-service and improved user experience —** Providing users with self-service functionality, such as allowing employees to change their names and titles directly in the system or being able to request access to specific applications for manager approval, can further remove manual processes off IT helpdesk staff and improve employee productivity.

**Password management and single sign-on—** Many user provisioning and governance tools offer additional end-user benefits, such as password management&amp;nbsp;and single sign-on functionality.

Other Features of User Provisioning and Governance Tools: [Bi-directional identity synchronization](https://www.g2.com/categories/user-provisioning-and-governance-tools/f/bi-directional-identity-synchronization), [Identifies and alerts for threats](https://www.g2.com/categories/user-provisioning-and-governance-tools/f/identifies-and-alerts-for-threats), [Mobile app](https://www.g2.com/categories/user-provisioning-and-governance-tools/f/mobile-app)

### Emerging trends in user provisioning and governance

Historically speaking, Microsoft’s product, Active Directory (AD), has been one of the most widely used directory services since its introduction in 1999. Because of AD’s large market share, it is worth mentioning that many other user provisioning and governance tools vendors generally offer both identity and user governance tools that integrate with AD or, conversely, offer entirely separate solutions that utilize their own directory service.

Active Directory manages IT resources, stores information about users, groups, applications, and networks, and provides access to computers, applications, and servers. AD was initially designed for on-premises use cases. Still, given the shift to cloud computing and storage in the digital transformation, Microsoft introduced Azure AD, which extends an on-premises instance of AD to the cloud and synchronizes identities with cloud-based applications. Other user provisioning and governance tools offer cloud solutions tying into on-site AD instances. Many providers provide cloud-native solutions and robust [identity and access management (IAM)](https://www.g2.com/categories/identity-and-access-management-iam) tools.

### Software and services related to user provisioning and governance solutions

User provisioning and governance tools are part of a complete identity management solution. Many user provisioning and governance tools providers natively have or integrate with other providers to offer:

[**Single sign-on (SSO) software**](https://www.g2.com/categories/single-sign-on-sso) **—** Single sign-on (SSO) software allows users to access multiple corporate applications with one set of credentials. This gives users more access to their applications without logging in multiple times. Single sign-on (SSO) is achieved through federation by linking IT systems, applications, and identities to create a seamless user experience.

[**Password manager software**](https://www.g2.com/categories/password-manager) **—** Password manager software helps end users manage their passwords by allowing them to create one master password to access the passwords associated with their accounts. This is different from single sign-on, which federates the identity to other applications, while password manager software merely provides a secure storage vault to house user passwords.

[**Identity and access management (IAM) software**](https://www.g2.com/categories/identity-and-access-management-iam) **—** User provisioning and governance tools are a part of identity and access management (IAM) functionality, which allows IT administrators to quickly provision, de-provision, and change user identities. IAM software also authenticates users to ensure they are who they say they are before providing access to corporate assets. IAM software is a modern solution, especially for companies utilizing numerous cloud-based applications.

[**Customer identity and access management (CIAM) software**](https://www.g2.com/categories/customer-identity-and-access-management-ciam) **—** Customer identity and access management (CIAM) software manages a company’s customer identities and accounts. CIAM is different from identity and access management (IAM) software. IAM is used for internal corporate use—such as managing the identities of internal employees or contractors—while CIAM is for customer-focused identity management.

[**Privileged access management (PAM) software**](https://www.g2.com/categories/privileged-access-management-pam) **—** Privileged access management (PAM) software is a tool used to protect a company’s privileged account credentials. It is generally used by IT administrators and other super users with high-level access to applications, not everyday users.

[**Multi-factor authentication (MFA) software**](https://www.g2.com/categories/multi-factor-authentication-mfa) **—** Before granting a user access to company assets, it is essential to authenticate that they are indeed who they say they are. This can be achieved using multi-factor authentication (MFA) software solutions such as SMS codes, mobile push, biometric verification, or email one-time-pass (OTP) pushes. For example, if an employee loses their laptop, the laptop and the accounts the employee has access to are generally rendered useless to someone else unless that person could spoof the employee’s other authentication factors.



    
