14 reviewers of Scalekit have provided feedback on this feature.
Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case
Federation/SAML support (idp)
Based on 14 Scalekit reviews.
Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials.
Federation/SAML support (sp)
14 reviewers of Scalekit have provided feedback on this feature.
Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider.
Administration (4)
Administration Console
As reported in 14 Scalekit reviews.
Provides Administration tools/console that are easy to use and learn for routine maintenance tasks
Ease of connecting applications
Based on 14 Scalekit reviews.
Easily provisions new systems, platforms or applications using configuration and not customization.
Ease of set up for target systems
Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured
APIs
Provides appropriate application interfaces to enable custom integrations for unique business requirements
Platform (5)
Multiple Operating system support
As reported in 13 Scalekit reviews.
Supports Endpoint access control to multiple operating systems
Multi-Domain Support
This feature was mentioned in 13 Scalekit reviews.
Allows user authentication to be honored by all the hosts in two or more domains
Cross Browser support
14 reviewers of Scalekit have provided feedback on this feature.
Support access to browser based applications across required browser types
Fail over protection
As reported in 12 Scalekit reviews.
Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate
Auditing
As reported in 11 Scalekit reviews.
Provides mechanism for auditing authentication for trouble shooting purposes.
User on/off Boarding (6)
Self Service Access requests
Users can request access to an application and be automatically provisioned if they meet policy requirements
Smart/Automated Provisioning
Automates account/access rights creation, changes and removals for on-premise and cloud apps
Role Management
Establish roles that create a set of authentication rights for each user in the role
Policy Management
Enables administrators to create access policies and applies policy controls throughout request and provisioning processes
Access Termination
Terminate access to multiple applications based on dates
Approval Workflows
Allow business stake-holders/managers to approve or reject requested changes to access via a defined workflow
User Maintenance (2)
Bulk Changes
Change users and permissions in bulk
Bi-directional Identity Synchronization
Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application
Governance (1)
Compliance Audits
Proactively audits access rights against policies
Functionality (16)
Self-registration and self-service
Enables a seamless customer experience with self-registration and self-service functions, including account creation and preference management.
Authentication
Verifies user identity with authentication, which may include multiple multi-factor authentication methods.
Scalability
Scales to support growing a customer base.
Consent and preference management
Captures and manages a customer's consent and preferences to comply with data privacy laws such as GDPR and CCPA.
Social login
Offers users the option to sign in with social media accounts.
Customer data linking
Integrates with directories or other data stores that house customer data to create a complete view of a customer.
FIDO2-compliant
Offers FIDO2-enabled authentication method
Works with hardware security keys
Works with hardware security keys
Multiple authentication methods
Offer users multiple ways to authenticate including, but not limited to: mobile push on trusted devices, FIDO-enabled devices, physical security keys, keycards, smart watches, biometrics, QR codes, desktop app + pin, and others.
Offline or no-phone solution
Offers solutions when users are offline or do not have access to a mobile phone.
User provisioning
Simplifies or automates user provisioning, deprovisioning, and other user role changes.
Password manager
Offers password management tools to end users.
Single Sign-on
Offers single sign-on functionalities to end users, allowing them to authenticate once and be given access to all of their company accounts.
Enforces policies
Enforces user-access policies based on individual, role type, group membership or other factors to prevent unauthorized access to company systems and data.
Authentication
Authenticates users prior to granting access to company systems.
Multi-factor authentication
Offers multi-factor authentication methods to verify a user's identity.
Type (2)
On-premises solution
Provides an IAM solution for on-prem systems.
Cloud-solution
Provides an IAM solution for cloud-based systems.
Reporting (4)
Tracking
Tracks user activities across protected systems.
Reporting
Provides reporting functionality.
Access & Permission Change Reporting
Log and report all modifications to user roles and access rights.
Compliance & Audit Trail Export
Provide standardized reports for regulatory compliance and audits.
Authentication & Authorization - Identity and Access Management (IAM) (1)
Adaptive & Contextual Access Control
Grant access based on user attributes, location, device posture or risk.
Administration & Governance - Identity and Access Management (IAM) (2)
Identity Lifecycle Management
Automate onboarding, offboarding, and access reviews throughout user lifecycles.
Self‑Service Account Management
Enable users to reset passwords and update profiles without admin support.
Generative AI - Identity and Access Management (IAM) (3)
AI‑Driven Access Anomaly Detection
Identify unusual access patterns using machine learning models.
Automated Policy Tuning
Dynamically adjust access policies based on risk and AI-generated insights.
Predictive Role Recommendations
Suggest appropriate user roles based on usage patterns and peer behavior.
With over 3 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.