Akeyless Identity Security Platform Features
Usability & Access (5)
Quick Login
As reported in 28 Akeyless Identity Security Platform reviews. Expedites user logins using methods like a master password or password autofill.
Browser Extension
Integrates the tool with your browser for easy use. 25 reviewers of Akeyless Identity Security Platform have provided feedback on this feature.
Mobile App Usability
Based on 18 Akeyless Identity Security Platform reviews. Integrates with your mobile device for use on mobile apps.
Multi-Device Use
As reported in 22 Akeyless Identity Security Platform reviews. Enables user to use the tool across multiple devices.
Admin Management
Allows an employer or administrator to manage employee access. 26 reviewers of Akeyless Identity Security Platform have provided feedback on this feature.
Security Measures (2)
Password Generator
Generates passwords for each of your logins. 22 reviewers of Akeyless Identity Security Platform have provided feedback on this feature.
Two-Factor Authentication
Based on 23 Akeyless Identity Security Platform reviews. Provides extra security by requiring an extra for of verification in addition to a password.
Functionality (25)
Durability
Logs and stores multiple copies and versions of master keys. 22 reviewers of Akeyless Identity Security Platform have provided feedback on this feature.
Envelope Encryption
As reported in 17 Akeyless Identity Security Platform reviews. Implements a key hierarchy with a local data encryption key (DEK) and a key encryption key (KEK).
Automation
Based on 20 Akeyless Identity Security Platform reviews. Allows administrative control over automated tasks related to key management, storage and distribution.
Multi-Factor Authentication
As reported in 13 Akeyless Identity Security Platform reviews. Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate.
Single Sign-On
Provides a single access point for users to access multiple cloud products without multiple logins. 16 reviewers of Akeyless Identity Security Platform have provided feedback on this feature.
BYOD support
As reported in 11 Akeyless Identity Security Platform reviews. Enables users to bring-your-own-device to access company applications.
Password Vault
As reported in 14 Akeyless Identity Security Platform reviews. Stores credentials and passwords in a secure vault. Eliminates hard-coded passwords. Hides passwords from users.
Centralized management
Ensures that credentials are centrally stored (in a secure vault) and when changed, that systems remain connected. 15 reviewers of Akeyless Identity Security Platform have provided feedback on this feature.
Role-based security
As reported in 17 Akeyless Identity Security Platform reviews. Allows privileges based on roles, such as business unit or other factors.
Live notifications
As reported in 12 Akeyless Identity Security Platform reviews. Configure which events will trigger a notification to prevent privileged access abuse in real-time.
Live session recording & playback
Offers live session recording and playback for compliance and auditing purposes.
Hide passwords
Based on 16 Akeyless Identity Security Platform reviews. Offers the option to hide passwords when sharing with users, such as contract workers
Temporary, time-limited privilege
Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse. This feature was mentioned in 15 Akeyless Identity Security Platform reviews.
Certificate Discovery
Automatic discovery of certificates directly from Certificate Authorities, network scanning, and deep discovery methods.
Expiration Monitoring
Monitors and notifies administrators of certificate expiration dates.
Automated Certificate Operations
Automates certificate deployment, renewals, and revocations.
Policy And Role-Based Access Controls
Offers granular permissions for assigning certificate owners and other roles.
Workflow
Offers built-in workflows to assign ownership and management of certificates.
Protocol Support
Offers industry-standard protocols such as CMP, ACME, and SCEP.
Reporting And Search
Offers template and custom reports and search functionality.
Audit And Enforcement
Enforces certificate policies and provides audit trails of user and certificate activities to detect issues.
Key Storage
Allows keys to be stored on end devices, on the platform, or hardware security modules.
Audit trail
As reported in 26 Akeyless Identity Security Platform reviews. Creates audit trail of secrets lifecycle
Cental dashboard
Has a centralized dashboard for users to interact with This feature was mentioned in 26 Akeyless Identity Security Platform reviews.
Universal approach
As reported in 25 Akeyless Identity Security Platform reviews. Offers a universal approach to secrets management with integrations to centralize secrets regardless of platform
Administration (9)
Auditing
Documents access and alterations of the database for analytics and reporting. 19 reviewers of Akeyless Identity Security Platform have provided feedback on this feature.
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. 18 reviewers of Akeyless Identity Security Platform have provided feedback on this feature.
Management Console
As reported in 20 Akeyless Identity Security Platform reviews. Provides Administration tools/console that are easy to use and learn for routine maintenance tasks.
Policy, User, and Role Management
Based on 18 Akeyless Identity Security Platform reviews. Creates access requirements and standards and establishes user, roles, and access rights.
Approval Workflows
As reported in 10 Akeyless Identity Security Platform reviews. Allows administrators to approve or reject access changes to using defined workflows.
Automated Provisioning
As reported in 16 Akeyless Identity Security Platform reviews. Automates provisioning and deprovisioning to reduce the amount of administrative manual work.
Bulk Changes
Reduces manual administrative work. This feature was mentioned in 15 Akeyless Identity Security Platform reviews.
Centralized Management
Manages identity information from on-premise and cloud applications. 16 reviewers of Akeyless Identity Security Platform have provided feedback on this feature.
Self-Service Access Requests
Based on 14 Akeyless Identity Security Platform reviews. Automatically allows access if users meet policy requirements.
Availability (4)
API/Integrations
Integrates with third-party software to provide other features and expand functionality. 20 reviewers of Akeyless Identity Security Platform have provided feedback on this feature.
Service Integration
Integrates with major cloud service provider offerings for simplified management and distribution. 19 reviewers of Akeyless Identity Security Platform have provided feedback on this feature.
Regional Support
Based on 18 Akeyless Identity Security Platform reviews. Supports key distribution across multi-regions to increase availability.
Scalability
As reported in 21 Akeyless Identity Security Platform reviews. Expands functionality while maintaining balanced loads. Serves growing demand without reducing functionality.
Monitoring (3)
Audit Logging
Based on 15 Akeyless Identity Security Platform reviews. Provides audit logs for compliance reasons.
Activity Logging
As reported in 16 Akeyless Identity Security Platform reviews. Monitors, records, and logs both real-time and post-event activity.
Anomaly Detection
Detects abnormal user behavior to mitigate risks. 10 reviewers of Akeyless Identity Security Platform have provided feedback on this feature.
Reporting (2)
Audit log
As reported in 17 Akeyless Identity Security Platform reviews. Creates a comprehnsive log of all activities when utilizing Privileged Access Management Software software.
Reporting
As reported in 15 Akeyless Identity Security Platform reviews. Includes reporting functionality.





