Users can request access to an application and be automatically provisioned if they meet policy requirements
Smart/Automated Provisioning
As reported in 11 NIM reviews.
Automates account/access rights creation, changes and removals for on-premise and cloud apps
Role Management
Based on 10 NIM reviews.
Establish roles that create a set of authentication rights for each user in the role
Policy Management
As reported in 10 NIM reviews.
Enables administrators to create access policies and applies policy controls throughout request and provisioning processes
Access Termination
This feature was mentioned in 10 NIM reviews.
Terminate access to multiple applications based on dates
Approval Workflows
Allow business stake-holders/managers to approve or reject requested changes to access via a defined workflow
User Maintenance (3)
Self Service Password Reset
This feature was mentioned in 10 NIM reviews.
Enables users to reset passwords without administrator interaction. Enforces password policies when resetting.
Bulk Changes
Change users and permissions in bulk
Bi-directional Identity Synchronization
Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application
Administration (6)
Reporting
Standard and customized report creation to ensure appropriate access rights have been assigned
Ease of set up for target systems
Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured
Bi-Directional Identity Synchronization
Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application.
Policy Management
Enables administrators to create access policies and applies policy controls throughout request and provisioning processes.
Cloud Directory
Provides or integrates with a cloud based directory option that contains all user names and attributes.
Application Integrations
Integrates with common applications such as service desk tools.
User Experience (1)
Self-Service Experience
Allows users to set, change passwords easily without interaction from IT staff.
Authentication (4)
Multi-Factor Authentication
Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are.
Biometric Authentication
Uses biometric trait or characteristic to authenticate. Additional hardware may be required to support this type.
Other Authentication Methods
Provides authentication capabilities outside standard authentication methods such as MFA and biometric .
Role-Specific Authentication
Able to assign authentication requirements for different levels of users, such as more robust authentication for senior level executives.
Functionality (6)
User provisioning
Simplifies or automates user provisioning, deprovisioning, and other user role changes.
Password manager
Offers password management tools to end users.
Single Sign-on
Offers single sign-on functionalities to end users, allowing them to authenticate once and be given access to all of their company accounts.
Enforces policies
Enforces user-access policies based on individual, role type, group membership or other factors to prevent unauthorized access to company systems and data.
Authentication
Authenticates users prior to granting access to company systems.
Multi-factor authentication
Offers multi-factor authentication methods to verify a user's identity.
Type (2)
On-premises solution
Provides an IAM solution for on-prem systems.
Cloud-solution
Provides an IAM solution for cloud-based systems.
Reporting (3)
Reporting
Provides reporting functionality.
Access & Permission Change Reporting
Log and report all modifications to user roles and access rights.
Compliance & Audit Trail Export
Provide standardized reports for regulatory compliance and audits.
Generative AI - Security Compliance (2)
Predictive Risk
Can analyze patterns and trends in security data to predict potential compliance risks.
Automated Documentation
Can automate the creation of compliance documentation by quickly generating accurate and comprehensive reports.
Authentication & Authorization - Identity and Access Management (IAM) (1)
Adaptive & Contextual Access Control
Grant access based on user attributes, location, device posture or risk.
Administration & Governance - Identity and Access Management (IAM) (2)
Identity Lifecycle Management
Automate onboarding, offboarding, and access reviews throughout user lifecycles.
Self‑Service Account Management
Enable users to reset passwords and update profiles without admin support.
Generative AI - Identity and Access Management (IAM) (3)
AI‑Driven Access Anomaly Detection
Identify unusual access patterns using machine learning models.
Automated Policy Tuning
Dynamically adjust access policies based on risk and AI-generated insights.
Predictive Role Recommendations
Suggest appropriate user roles based on usage patterns and peer behavior.
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.