Admin By Request Features
Authentication Options (6)
Authentication User experience
Process of providing credentials and logging into multiple systems is easy and intuitive for users
Supports Required Authentication systems
Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc.
Multi-Factor Authentication
Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are.
Supports Required Authentication Methods/Protocols
Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case
Federation/SAML support (idp)
Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials.
Federation/SAML support (sp)
Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider.
Access Control Types (5)
Endpoint access
Provides ability to control access to PC's, Mobile devices, and other endpoint devices.
Local Access
Controls access to legacy applications, web based applications, network resources and servers while employees are on the companies local area network.
Remote Access
Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network.
Partner Access
Controls access to users that are not company employees that are either within the companies local area network or outside the network
Supports BYOD users
Enables users to use their own device to access company applications.
Administration (11)
Ease of installation on server
Installation process is easy and flexible.
Password Policy Enforcement
Options for resetting and enforcing password policies
Administration Console
Provides Administration tools/console that are easy to use and learn for routine maintenance tasks
Ease of connecting applications
Easily provisions new systems, platforms or applications using configuration and not customization.
Self Service Password Administration
Users can set, change passwords without interaction from IT staff
Policy, User, and Role Management
Creates access requirements and standards and establishes user, roles, and access rights. This feature was mentioned in 12 Admin By Request reviews.
Approval Workflows
As reported in 13 Admin By Request reviews. Allows administrators to approve or reject access changes to using defined workflows.
Automated Provisioning
Based on 12 Admin By Request reviews. Automates provisioning and deprovisioning to reduce the amount of administrative manual work.
Bulk Changes
Reduces manual administrative work.
Centralized Management
Manages identity information from on-premise and cloud applications. 12 reviewers of Admin By Request have provided feedback on this feature.
Self-Service Access Requests
Automatically allows access if users meet policy requirements. 12 reviewers of Admin By Request have provided feedback on this feature.
Platform (7)
Multiple Operating system support
Supports Endpoint access control to multiple operating systems
Multi-Domain Support
Allows user authentication to be honored by all the hosts in two or more domains
Cross Browser support
Support access to browser based applications across required browser types
Fail over protection
Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate
Reporting
Contains pre-built and custom reporting tools to required to manage business
Auditing
Provides mechanism for auditing authentication for trouble shooting purposes.
Third Party Web Services support
Can call and pass credentials to third party web services.
Authentication type (8)
SMS-Based
Sends a one-time passcode (OTP) via SMS.
Voice-Based Telephony
Provides a one-time passcode (OTP) via voice-call.
Email-Based
Sends a one-time passcode (OTP) via email.
Hardware Token-Based
Supports hardware tokens, which are often USB-sized, fob-like devices that store codes.
Software Token
Offers software tokens, which are applications installed on a mobile phone, wearable devices, or desktops and generate time-based one-time passcodes (TOTP) that a user can easily copy. Software tokens work both online and offline.
Biometric Factor
Allows biometric factors such as fingerprints, faceprints, voiceprints, or other biometric information to be used as an authentication factor.
Mobile-Push
Offers mobile push authentication, which is a user-friendly method that does not require a user to copy a code, but rather accept or deny an authentication using a mobile application. Mobile push authentication only works when a user is connected to the internet.
Risk-Based Authentication
Analyzes users' IP addresses, devices, behaviors and identities to authenticate a user.
Functionality (11)
Multi-Device Sync
Allows the use of tokens on multiple devices. This feature can also be turned off if the user does not want this.
Backup
Offers encrypted backup recovery stored by the vendor.
Multi-Factor Authentication
Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. 10 reviewers of Admin By Request have provided feedback on this feature.
Single Sign-On
Provides a single access point for users to access multiple cloud products without multiple logins. This feature was mentioned in 12 Admin By Request reviews.
BYOD support
Enables users to bring-your-own-device to access company applications.
Centralized management
As reported in 11 Admin By Request reviews. Ensures that credentials are centrally stored (in a secure vault) and when changed, that systems remain connected.
Role-based security
Allows privileges based on roles, such as business unit or other factors. 10 reviewers of Admin By Request have provided feedback on this feature.
Live notifications
Configure which events will trigger a notification to prevent privileged access abuse in real-time.
Live session recording & playback
Offers live session recording and playback for compliance and auditing purposes.
Hide passwords
Offers the option to hide passwords when sharing with users, such as contract workers
Temporary, time-limited privilege
Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse. This feature was mentioned in 11 Admin By Request reviews.
Monitoring (3)
Audit Logging
Based on 11 Admin By Request reviews. Provides audit logs for compliance reasons.
Activity Logging
Based on 11 Admin By Request reviews. Monitors, records, and logs both real-time and post-event activity.
Anomaly Detection
Detects abnormal user behavior to mitigate risks.
Reporting (2)
Audit log
Creates a comprehnsive log of all activities when utilizing Privileged Access Management Software software. This feature was mentioned in 13 Admin By Request reviews.
Reporting
As reported in 13 Admin By Request reviews. Includes reporting functionality.
Implementation (3)
Easy Setup
Offers an easy to understand user interface to make setup smooth.
Mobile SDK
Offers a mobile software development kit (SDK) for iOS, Blackberry, and Android.
Web SDK
Offers a software development kit (SDK) for web-based applications.
You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.




