Users can request access to an application and be automatically provisioned if they meet policy requirements
Smart/Automated Provisioning
Automates account/access rights creation, changes and removals for on-premise and cloud apps
Role Management
Establish roles that create a set of authentication rights for each user in the role
Policy Management
Enables administrators to create access policies and applies policy controls throughout request and provisioning processes
Access Termination
Terminate access to multiple applications based on dates
Approval Workflows
Allow business stake-holders/managers to approve or reject requested changes to access via a defined workflow
User Maintenance (2)
Self Service Password Reset
Enables users to reset passwords without administrator interaction. Enforces password policies when resetting.
Bulk Changes
Change users and permissions in bulk
Governance (1)
Identifies and Alerts for Threats
Alerts administrators when inappropriate access occurs
Administration (3)
Reporting
Standard and customized report creation to ensure appropriate access rights have been assigned
Ease of set up for target systems
Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured
APIs
Provides appropriate application interfaces to enable custom integrations for unique business requirements
Authentication type (8)
SMS-Based
Sends a one-time passcode (OTP) via SMS.
Voice-Based Telephony
Provides a one-time passcode (OTP) via voice-call.
Email-Based
Sends a one-time passcode (OTP) via email.
Hardware Token-Based
Supports hardware tokens, which are often USB-sized, fob-like devices that store codes.
Software Token
Offers software tokens, which are applications installed on a mobile phone, wearable devices, or desktops and generate time-based one-time passcodes (TOTP) that a user can easily copy. Software tokens work both online and offline.
Biometric Factor
Allows biometric factors such as fingerprints, faceprints, voiceprints, or other biometric information to be used as an authentication factor.
Mobile-Push
Offers mobile push authentication, which is a user-friendly method that does not require a user to copy a code, but rather accept or deny an authentication using a mobile application. Mobile push authentication only works when a user is connected to the internet.
Risk-Based Authentication
Analyzes users' IP addresses, devices, behaviors and identities to authenticate a user.
Functionality (7)
Backup
Offers encrypted backup recovery stored by the vendor.
Self-registration and self-service
30 reviewers of Kinde have provided feedback on this feature.
Enables a seamless customer experience with self-registration and self-service functions, including account creation and preference management.
Authentication
Based on 30 Kinde reviews.
Verifies user identity with authentication, which may include multiple multi-factor authentication methods.
Scalability
29 reviewers of Kinde have provided feedback on this feature.
Scales to support growing a customer base.
Consent and preference management
This feature was mentioned in 29 Kinde reviews.
Captures and manages a customer's consent and preferences to comply with data privacy laws such as GDPR and CCPA.
Social login
Based on 30 Kinde reviews.
Offers users the option to sign in with social media accounts.
Customer data linking
27 reviewers of Kinde have provided feedback on this feature.
Integrates with directories or other data stores that house customer data to create a complete view of a customer.
Billing (4)
Automation
Ability to create and send invoices automatically at predefined or custom frequencies.
Consolidation
Consolidate invoices so customers can make one payment for multiple bills.
Adjustments
Adjust invoices to handle exceptions and correct errors.
Blacklisting
Allows users to temporarily or permanently block potential fraudsters.
Dunning (3)
Collections
Assists users in collecting payments for unpaid invoices.
Dispute Management
Manages disputes regarding billing and payments.
Escalation
Define escalation processes to suspend service for unpaid invoices.
Performance (3)
Packages
Track the financial performance of various types of packages.
Discounts
Identify the impact of special pricing and discounts on revenue.
Plan Changes
Monitor plan changes such as upgrades and downgrades, or cancellations.
Implementation (3)
Easy Setup
Offers an easy to understand user interface to make setup smooth.
Mobile SDK
Offers a mobile software development kit (SDK) for iOS, Blackberry, and Android.
Web SDK
Offers a software development kit (SDK) for web-based applications.
Reporting (3)
Dimensions
Reports revenue based on various dimensions, such as subscription segments, geographies, or discounts
Deferred Revenue
Tracks revenue for goods or services that have yet to be collected
Revenue Recognition
Accurately determines and reports the accounting period when revenues are recognized
Usage Metering - Usage-based billing Software (3)
Metering engine
Track customer's usage data based on the services they have subscribe to
Data extraction/ingestion
Connect to data sources to pull/push usage based data via data-source-specific connectors or APIs
Analytics/reporting
Create and send usgae based reports such as product usage, free units, etc to clients
Bill Generation - Usage-based billing Software (3)
Templates
Provide standard document templates for Invoice, payment, refund and contracts
Digital Billing
Ability to convert invoices to digital formats such as PDF
Usage Billing
Automatically generates invoices based on the service usage
Bill Processing - Usage-based billing Software (3)
Consolidation
Allow users to consolidate multiple invoices into one
Batch Invoicing
Ability to create multiple types of invoices
Management
Manage invoicing for different types of products or services
Integration - Usage-based billing Software (3)
Accounting
Provide integration with accounting and financial management software
Payments
Integrate with payments software to facilitate payments
ERP
Deliver integrations with accounting modules of ERP systems
Agentic AI - Subscription Billing (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
AI Authentication Risk Management - Customer Identity and Access Management (CIAM) (5)
Adaptive MFA
Possesses AI-driven triggers to determine when to require MFA or stronger authentication rather than always requiring it.
Anomaly Detection
Builds profiles of known devices/environments per user and flags deviations such as new devices, new networks, and/or suspicious locations as higher risk.
Fraudulent Login Detection
Spot fraudulent behavior, such as account takeover attempts, credential stuffing, bots, and brute force attacks through the use of AI.
Adaptive Authentication Policies
Uses machine learning to analyze past authentication events and suggest optimizations to security policies (e.g. thresholds, triggers) or to adjust rules over time.
Risk-Based Authentication
Leverages AI to assign a risk score to a login attempt based on context, device, IP, historical patterns to dynamically decide whether to prompt for MFA, additional challenges, or allow seamless login.
AI Biometric & Behavioral Analysis - Customer Identity and Access Management (CIAM) (2)
Behavioral Biometric Analysis
Monitors behavioral signals including typing patterns, mouse movement, and/or touch/swipe dynamics to verify user identity either at login or continuously after login.
Liveness Detection
Uses computer vision, facial recognition, or other biometrics during onboarding or at risk events, with AI-based liveness checks to prevent spoofing or replay attacks.
AI Context-Aware Security Controls - Customer Identity and Access Management (CIAM) (2)
Account Recovery Assistants
Generates dynamic prompts to guide users through account recovery workflows.
Constraint Enforcement
Implements artificial intelligence to filter, rewrite, or block prompts that attempt to access unauthorized data, escalate privileges improperly, exploit system weaknesses, or otherwise re-provision customer access permissions.
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.