Best User Provisioning/Governance Software

User provisioning/governance software gives a single point of maintenance to manage user access to IT applications. Companies need identity governance programs to maintain organized records of user information such as personal information, account histories, or application credentials. These confidential records can be used by employees and administrators to retain information and regulations. IT managers and administrators utilize the information in these systems to automate tasks such as account creation, editing, or deleting, which can help facilitate employee lifecycle changes like onboarding, promotions, or termination. Human resource workers may utilize the databases as well to aggregate information about employees and monitor access requests. There is significant overlap between user provisioning software and cloud identity and access management. Many products function on a hybrid on­-premise and cloud level, but user provisioning/governance tools may not be able to provide remote access. These products will also often integrate with or provide SSO/federation or password management capabilities.

To qualify as user provisioning/governance software, a product must:

  • Possess infrastructure to store and access identity information
  • Provide administrator tools to create access requirements
  • Automate processes related to identity administration
  • Provide security or authentication features to protect sensitive information
G2 Grid® for User Provisioning/Governance
Leaders
High Performers
Contenders
Niche
Market Presence
Satisfaction
content
Star Rating

User Provisioning/Governance reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Compare User Provisioning/Governance Software

Results: 69
G2 takes pride in showing unbiased ratings on user satisfaction. G2 does not allow for paid placement in any of our ratings.
Results: 69
Filter Results
Filter by:
Sort by
Star Rating
Sort By:

    Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security policies. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications. Because Okta runs on an integrated platform, organizations can implement the service quickly at large scale and low total cost. Thousands of customers, including Adobe, Allergan, Chiquita, LinkedIn, and Western Union, trust Okta to help their organizations work faster, boost revenue and stay secure.

    Idaptive Services secures enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. Idaptive helps protect against the leading point of attack used in data breaches ― compromised credentials — through it’s Next Gen Access, which uniquely unifies single single-on (SSO), adaptive multi-factor authentication (MFA), enterprise mobility management (EMM) and user behavior analytics (UBA) into an integrated solution. Idaptive Services include the following: Single Sign-On Services – Adaptive single-sign on and one-click access to your cloud, mobile and on-premises apps. No more forgotten passwords, no more user confusion. MFA Services – A common sense approach to multi-factor authentication with risk-based policy that does not hinder end-user productivity. Lifecycle Management Services – Automatically route application requests, create accounts, manage entitlements within those accounts, and revoke access when necessary. Provision users across apps, all from a central control point. Mobility Management Services– Manage mobile devices, secure native mobile apps and provide context for smarter access decisions. Endpoint Management Services - Designed to help control access to corporate resources through a zero trust security approach. Bolster endpoint security with cross-platform policy enforcement and leading device security management capabilities.

    Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud. The Oracle Identity Management platform delivers scalable solutions for identity governance, access management and directory services.

    Increase user productivity and business flexibility with user provisioning & identity management.

    Only Avatier delivers private instance, cloud-independent or on-premise Identity Management platforms in just minutes. This enables organizations to scale faster, innovate quicker, conquer and embrace change, to dominate their competition. Avatier's customer identity and access management platform integrates all back-office business applications and employee assets together and manages them as one. Our complete suite of integrated IDM solutions, called Identity Anywhere, are delivered and managed using the latest Docker container technology providing maximum flexibility, scale, compliance, and security to our customers.

    OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin enables IT identity policy enforcement, and instantly disables app access for employees who leave or change roles in real time by removing them from Active Directory. Take control over application access, quickly on- and off-board team members, and provide end users with easy access to all their apps on every device. Extend your on-premises security model to the cloud in minutes. Eliminate the pain and expense of extensive identity policy management. OneLogin reduces identity infrastructure costs and complex integration project for each new app and efficiently extends identity policy to the cloud. OneLogin eliminates the need for lengthy integration and provisioning projects, manual de-provisioning, protracted on- and off-boarding processes, username and password resets, and Shadow IT policing.

    Real-time Windows Active Directory and File-Server change audit solution

    ERP Maestro makes managing access risk, compliance, and security in SAP® environments incredibly easy. Its award-winning software as a service (SaaS) platform automates the monitoring, detection, and prevention of internal cybersecurity risks in SAP systems, minimizing potential breaches and fraud and accelerating remediation. Its industry-leading segregation of duties (SoD) analysis is used by seven of the world's top 10 audit firms and empowers organizations to establish effective governance, risk, and compliance (GRC) processes.

    Using a business-driven approach, RSA Aveksa’s solution integrates access governance, provisioning, authentication, and single sign-on (SSO) in one platform. Whether on-premise or in the cloud, the platform reduces risk and complexity while improving security, visibility, and compliance.

    HID Identity Assurance portfolio delivers a full range of authentication and credentialing options that help you gain confidence in your users’ identities and effectively protect access to all your physical resources, internal networks, systems and services, and public and private cloud-based applications.

    Access Control Manager (ACM) helps organizations keep people, property and assets safe with an easy-to-use, role-based system that can grow with you. It has the flexibility to work with the systems you already have, which helps eliminate extra work and increase productivity.

    SMACS by Stack8 is the only tool that is exclusively focused on the operations and support aspects of managing Cisco Unified Communications. We developed this productivity tool for Voice Operations Teams to facilitate moves, adds, and changes instantly within Cisco’s Unified Communications Manager, Unity Connection, and Unified Communications Manager IM & Presence applications. The user interface is so intuitive that you don’t need any Cisco experience to perform basic requests: it’s designed with the user in mind and the task at hand.

    Identity management solution that automates and streamlines access governance

    
Hitachi ID Identity Manager is an integrated solution for managing identities and security entitlements across multiple systems and applications.

    JumpCloud's Directory-as-a-Service® (DaaS) is the single point of authority to authenticate, authorize, and manage the identities of a business’s employees and the systems and IT resources they need access to. DaaS securely connects employees with systems, applications, and other resources through a single unified cloud-based directory, replacing the need for on premise solutions such as Active Directory® and LDAP. JumpCloud supports all major OS platforms and is designed to control and manage user access to both internal and external IT resources such as servers and applications.

    The comprehensive solution for provisioning identities and controlling access.

    Provision/De-provision Office 365 User Licenses with full audit trail of when and to whom the licenses were assigned or removed. Create and manage Office 365 Licenses in bulk. View assigned licenses by Users or by License types or by usage count of each license type. Keep track of purchased versus assigned licenses with audit trail.

    Superior Application Performance: Allows your staff to complete compliance work in less time than with competitive products allowing them to focus more time on other work

    Control access to your online products and services with ease and precision. The 10Duke Entitlement Service allows you to take control of the delivery and licensing of your digital products. It provides an engine to manage customer access to any type of online content such as a game app, news content, video assets or software applications.

    Adaptive Security Manager is an Intelligent, affordable, adaptive multi-factor security for web applications.

    AD Health Profiler can do health check of production Active Directory Forests. A complete health check indeed is needed before implementing new solutions to your customers and/or before making a big change in your production environment.

    a.k.a. is an information governance system allows to build customized metadata structures, taxonomies, and retention schedules.

    Admin Report Kit for Windows Enterprise (ARKWE) is a powerful reporting solution for the Microsoft Windows Network. ARKWE collects configuration information about Windows domains & servers, users/groups, policies, events, services, installed applications, shares, permissions, printers, data sources etc. The reports are presented in a variety of formats that are simple, elegant and highly customizable for System Administrators, IT infrastructure Managers and Systems Audit personnel to use and act on. ARKWE's basket of Built-in reports provide powerful, ready-to-use reports that assist in both Management reporting and Compliance reporting requirements such as SOX and HIPAA. A single solution that serves your everyday needs of administrative tasks as well as complex data preparation tasks for assisting in compliance. ARKWE has been architected using the latest Microsoft .NET technology, bringing you the best-in-breed reporting solution for your entire Windows Network. ARKWE is highly optimized for performance (using native Windows API calls wherever appropriate), resulting in fast data collection of deeply embedded configuration data. Imagine scanning your vast network of workstations and servers without having to wait forever to see your reports! You can create data subsets for your network using ARKWE's powerful scan options and meaningfully segment your entire network for data collection and reporting. Windows Network Audit: NTFS Permissions Reports: Gather NTFS security permissions across servers and workstations in an entire domain. Effective Permissions: Generate Effective Permissions of groups and users on shares, folders and files permissions that have been explicitly set and those that have been inherited through groups and nested groups. Local Group Membership: Get the local groups settings of workstations. Network Inventory: Inventory your entire Windows network - servers, workstations, network resources, configuration settings etc.

    Access certification and identity governance to help meet compliance requirements.

    High expectations to deliver at lightning speed is leading to applications being used outside the visibility of IT. Identity-as-a-service (IDaaS) can help you stay on top of cloud adoption and enable an experience your workforce will appreciate.

    The CA Identity Suite provides comprehensive identity management and governance capabilities with a simple, intuitive user experience. This user experience can dramatically simplify processes such as user access requests and access certifications, resulting in improved productivity and user satisfaction. In addition, the CA Identity Suite performs risk analysis and certification and enables remediation actions in real-time during the access provisioning steps, thereby improving audit performance and risk posture with preventive policy enforcement

    The Clearswift Information Governance Server (IGS) lies at the heart of the Clearswift Aneesya Platform. Deployed centrally in an organization, it integrates with your own environment for enterprise single sign on and support for Clearswift SECURE Gateways, augmenting their Adaptive Data Loss Prevention functionality.

    Identacor provides a cutting edge, cloud-based Single Sign-On (SSO), provisioning and reporting platform designed to save budgets, free up valuable time, and relieve the technical and administrative challenges of today’s web-enabled world,

    The Access Assurance Suite is an integrated suite of provisioning, governance and identity and access intelligence solutions that enables you to automate routine IAM tasks, identify and eliminate compliance issues as they occur, and predict and prevent the problems that lead to risk.

    CrossIdeas provides Identity & Access Governance Solutions to harmoniously manage people, applications and entitlements.

    Identity Management Managing user accounts in multiple applications is not an easy matter.

    Integrated Identity and Data Governance Products

    Deepnet DualShield is a versatile two-factor authentication system that provides a wide range of authentication methods, integrates with all commonly used business applications our of the box, in a unified single platform.

    FirstWare DynamicGroup is an AD automation tool. It provides automated group assignments of AD objects. Real time savings and higher security through group memberships which are always up-to-date.

    With Evidian Enterprise SSO access will be more quickly and securely available. Settings are managed and applied automatically. Evidian Identity & Access Manager will bring real changes to the daily routine of everyone in your company.

    Fastpath Config AD integrates GP and Active Directory for efficient IT security management. GP security is a silo disconnected from the rest of the organization's security. It doesn’t have to be this way. Fastpath Config AD gives a company's administrator the option to connect GP users to Active Directory (AD) users and GP roles to AD groups. This makes it easy to assign GP security in a way that is familiar to the IT department. Running security through Active Directory reduces your access risk further by removing the need for an 'SA' role in your GP instance. CONFIG AD FEATURES - Manage Microsoft Dynamics GP security via Active Directory groups - Eliminates use of ‘sa’ and Administrator for better security management - Active Directory user disables/deletes are automatically synchronized with Microsoft Dynamics - Leading single sign on product for Microsoft Dynamics GP - Allows users to synchronize Windows IDs and passwords with Microsoft Dynamics GP - Windows password policy enforced for Microsoft Dynamics GP logins - Logoff users after periods of inactivity - Compatible with Citrix, Terminal Services, Remote Desktop Services, and Virtual Machines

    Risk & Liquidity is a modular solution system, containing calculation engines, processes, interfaces, accounting templates and much more for numerous kinds of tasks.

    Fischer is a holistic identity governance and administration platform that scales to meet each organization’s needs and delivery preference: on-premises software, manged Identity as a Service® Cloud service, or hosted cloud.

    Privileged Access Manager secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating strong accountability. Privileged Access Manager secures access at scale, supporting over a million password changes daily and access by thousands of authorized users. It is designed for reliability, to ensure continuous access to shared accounts and security groups, even in the event of a site-wide disaster.

    Holaspirit is a complete web platform designed for teal organisation, especially Holacracy practitioners. Holaspirit eases the implementation and the every-day practice of Holacracy through many features such as Role management, Projects & Actions management or Meeting management. Thanks to the many possible integrations, a user-friendly UI and a multi-languages interface , holaSpirit make your Agile & Teal transition easier.

    Now that it's clear why IAMCompare was built, let's review how it works.

    IBM Security Identity Governance and Intelligence (IGI) delivers a business-centric approach to Identity Management and Governance. It empowers business and IT to work together to meet regulatory compliance and security goals across enterprise applications and data. IGI covers enterprise user lifecycle management, access risk assessment and mitigation, certification, password management as well as powerful analytics and reporting to enable business to make the right decisions on enterprise access.

    Our on-premise authentication solution gives you the flexibility to secure access across your enterprise without compromising the user experience. With a wide range of capabilities, assurance levels, deployment options and mobile innovations, you can easily provision authentication methods tailored to your security needs. A single point of administration lets you manage identities for all users across your entire enterprise, including cloud and legacy applications, VPN access, desktop login and customer and partner portals. And when you’re ready to move to a cloud-based authentication solution, we can protect your investment by transitioning you to our IntelliTrust™ Authentication Service.

    IntelliTrust Authentication Service — an analyst top-rated solution — enables secure access that’s simple to deploy, easy to manage and effortless to use. Behind-the-scenes authentication empowers IntelliTrust users to log in to workstations and applications, and open secure doors with just a tap of their phones. Quickly and easily provision authentication to new applications and streamline identity management across your hybrid enterprise environment from one platform. Incorporate a zero-trust architecture with our industry-proven, time-tested intelligent identity solution.

    Ivanti Identity Director powered by RES provides an attribute-based approach to identity management and access with automated provisioning, workflows, and self service.

    Have a private or wholesale store? Want only registered customers browse your catalog, see prices, and place orders? Hide the entire store behind the login form using the Store Login Access extension for Magento® 2. Features: Allow/disallow registration for certain store views; Share accounts between stores. Choose which store views registered customers will have access to.; Protect your frontend with login form. Hide the catalog, products, prices, checkout, etc.; Unhide specific pages and URLs if needed.; Manage store permissions for customers individually, or for multiple customers in bulk.; Set custom login redirects (dashboard, homepage, or custom URL).

    O365 Manager Plus is an extensive Office 365 tool used for reporting, managing, monitoring, auditing, and creating alerts for critical activities.