Introducing G2.ai, the future of software buying.Try now

Compare CentOS and Okta

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
CentOS
CentOS
Star Rating
(407)4.4 out of 5
Market Segments
Mid-Market (38.3% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about CentOS
Okta
Okta
Star Rating
(1,104)4.5 out of 5
Market Segments
Mid-Market (53.4% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$6.00 1 User per month
Browse all 2 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Okta excels in user experience, with many praising its ease of use and seamless integration with other platforms. Users appreciate features like fingerprint login, which simplifies the authentication process.
  • Users say that CentOS is recognized for its rock-solid stability, making it a reliable choice for those who prioritize a dependable operating system. Reviewers highlight its effective package manager and support for various build tools, which enhance its usability for developers.
  • According to verified reviews, Okta stands out in terms of implementation speed, with users noting a quick onboarding process that helps teams get up and running efficiently. This is particularly beneficial for organizations looking to streamline their security authentication.
  • Reviewers mention that while CentOS offers high customization options, some users find it less intuitive compared to Okta. This can lead to a steeper learning curve for those new to Linux environments, despite its strong community support.
  • G2 reviewers highlight that Okta provides superior support quality, with many users expressing satisfaction with the assistance they receive. This is a crucial factor for businesses that require reliable help when issues arise.
  • Users note that while CentOS is a great starting point for Linux beginners, it may not match Okta's overall satisfaction ratings. The feedback indicates that Okta's user-friendly features and robust support make it a preferred choice for many mid-market companies.
Pricing
Entry-Level Pricing
CentOS
No pricing available
Okta
Starter
$6.00
1 User per month
Browse all 2 pricing plans
Free Trial
CentOS
No trial information available
Okta
No trial information available
Ratings
Meets Requirements
9.1
327
9.3
793
Ease of Use
8.5
328
9.3
815
Ease of Setup
8.5
205
8.9
328
Ease of Admin
8.5
197
9.0
186
Quality of Support
8.1
272
8.9
594
Has the product been a good partner in doing business?
8.7
154
8.9
181
Product Direction (% positive)
8.3
308
8.7
769
Features by Category
Not enough data
9.1
453
Authentication Options
Not enough data
9.3
430
Not enough data
Feature Not Available
Not enough data
9.3
411
Not enough data
Feature Not Available
Not enough data
9.2
290
Not enough data
9.2
280
Access Control Types
Not enough data
9.2
315
Not enough data
9.2
341
Not enough data
9.2
349
Not enough data
9.0
253
Not enough data
9.0
267
Administration
Not enough data
9.1
277
Not enough data
9.2
317
Not enough data
9.1
270
Not enough data
9.1
332
Not enough data
9.2
316
Platform
Not enough data
9.2
320
Not enough data
9.2
284
Not enough data
9.2
318
Not enough data
9.0
258
Not enough data
8.9
251
Not enough data
8.9
247
Not enough data
9.0
265
User Provisioning and Governance ToolsHide 15 FeaturesShow 15 Features
Not enough data
9.1
124
User on/off Boarding
Not enough data
9.1
95
|
Verified
Not enough data
9.1
93
|
Verified
Not enough data
9.3
95
|
Verified
Not enough data
9.2
93
|
Verified
Not enough data
9.4
91
|
Verified
Not enough data
8.9
85
|
Verified
User Maintenance
Not enough data
9.3
105
|
Verified
Not enough data
8.9
87
|
Verified
Not enough data
9.0
79
|
Verified
Governance
Not enough data
8.9
82
|
Verified
Not enough data
9.1
82
|
Verified
Administration
Not enough data
8.9
86
|
Verified
Not enough data
8.9
98
|
Verified
Not enough data
8.9
90
|
Verified
Not enough data
9.1
84
|
Verified
Not enough data
8.7
40
Network Management
Not enough data
9.1
32
Not enough data
8.8
32
Not enough data
9.0
34
Not enough data
9.1
33
Security
Not enough data
9.3
35
Not enough data
9.2
37
Not enough data
9.1
32
Not enough data
9.2
37
Identity Management
Not enough data
9.2
32
Not enough data
9.1
31
Not enough data
9.2
36
Generative AI
Not enough data
6.3
14
Not enough data
6.7
14
Cloud Directory ServicesHide 11 FeaturesShow 11 Features
Not enough data
9.4
82
Access Control
Not enough data
9.3
59
Not enough data
9.4
62
Not enough data
9.4
61
Not enough data
9.3
54
Administration
Not enough data
9.5
59
Not enough data
9.5
58
Not enough data
9.4
53
Not enough data
9.4
66
Functionality
Not enough data
9.5
72
Not enough data
9.6
73
Not enough data
9.4
65
Customer Identity and Access Management (CIAM)Hide 15 FeaturesShow 15 Features
Not enough data
9.4
114
Functionality
Not enough data
9.4
99
|
Verified
Not enough data
9.5
106
|
Verified
Not enough data
9.4
103
|
Verified
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
9.3
98
|
Verified
AI Authentication Risk Management - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Biometric & Behavioral Analysis - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
AI Context-Aware Security Controls - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
Identity and Access Management (IAM)Hide 18 FeaturesShow 18 Features
Not enough data
9.2
213
Functionality
Not enough data
9.3
171
Not enough data
9.2
175
Not enough data
9.6
197
Not enough data
9.4
171
Not enough data
9.5
198
Not enough data
9.3
184
Type
Not enough data
9.0
140
Not enough data
9.3
167
Reporting
Not enough data
9.1
153
Not enough data
9.1
152
Not enough data
9.0
42
Not enough data
9.2
42
Authentication & Authorization - Identity and Access Management (IAM)
Not enough data
9.0
42
Administration & Governance - Identity and Access Management (IAM)
Not enough data
9.2
43
Not enough data
9.1
41
Generative AI - Identity and Access Management (IAM)
Not enough data
8.7
42
Not enough data
8.9
42
Not enough data
9.1
42
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Remediation
Not enough data
Not enough data
Not enough data
Not enough data
8.4
13
Not enough data
Memory Management - Operating System
8.7
13
Not enough data
Device Management - Operating System
8.3
12
Not enough data
Backup and Recovery - Operating System
8.2
12
Not enough data
Error Detection - Operating System
8.5
12
Not enough data
Not enough data
Not enough data
Agentic AI - AWS Marketplace
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Non-Human Identity Management (NHIM) SolutionsHide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Lifecycle & Provisioning - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Access, Authentication & Authorization - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility, Governance & Compliance - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
CentOS
CentOS
Small-Business(50 or fewer emp.)
31.3%
Mid-Market(51-1000 emp.)
38.3%
Enterprise(> 1000 emp.)
30.3%
Okta
Okta
Small-Business(50 or fewer emp.)
6.9%
Mid-Market(51-1000 emp.)
53.4%
Enterprise(> 1000 emp.)
39.7%
Reviewers' Industry
CentOS
CentOS
Information Technology and Services
30.6%
Computer Software
15.5%
Computer & Network Security
6.0%
Telecommunications
3.9%
Internet
3.4%
Other
40.7%
Okta
Okta
Computer Software
17.9%
Information Technology and Services
15.5%
Financial Services
6.2%
Internet
4.9%
Marketing and Advertising
4.0%
Other
51.5%
Alternatives
CentOS
CentOS Alternatives
Ubuntu
Ubuntu
Add Ubuntu
Red Hat Enterprise Linux
Red Hat Enterprise Linux
Add Red Hat Enterprise Linux
Windows 7
Windows 7
Add Windows 7
macOS Sierra
macOS Sierra
Add macOS Sierra
Okta
Okta Alternatives
CyberArk Workforce Identity
CyberArk Workforce Identity
Add CyberArk Workforce Identity
OneLogin
OneLogin
Add OneLogin
JumpCloud
JumpCloud
Add JumpCloud
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
Discussions
CentOS
CentOS Discussions
how to improve the customization of repositories?
1 Comment
AM
use a command like this: tcpdump -c 12 -i enp0s3 | grep "string search" You capture the traffic according to the filter set example: http, wget...Read more
How can I acheive client isolation ?
1 Comment
Robert R.
RR
When I was learning about client isolation I found this web article very helpful. I hope it will help you. ...Read more
Bolehkah ini digunakan untuk acara pembelajaran?
1 Comment
David W.
DW
Yes. You can run Moodle, or other learning management system (LMS) products on CentOS Linux, or event management software. There is a rich set of open source...Read more
Okta
Okta Discussions
Is there a way to access your applications on a mobile device?
5 Comments
Erin C.
EC
There is an Okta Mobile app from which you can access your work applications, but it requires a little extra setup and not all organization use it....Read more
How many applications?
2 Comments
Graham P.
GP
Doesn’t it always, though? ;-) Key factors to consider aside from number of applications you’d want to streamline access to via SSO for would be: -How...Read more
Does Okta have a plugin for integration with Spring Boot and Spring Security?
2 Comments
Uday Pratap S.
US
Spring security plugin is available to do user management, take a look at it https://bintray.com/grails/plugins/spring-security-core/viewRead more