Best User Provisioning/Governance Software

User provisioning/governance software gives a single point of maintenance to manage user access to IT applications. Companies need identity governance programs to maintain organized records of user information such as personal information, account histories, or application credentials. These confidential records can be used by employees and administrators to retain information and regulations. IT managers and administrators utilize the information in these systems to automate tasks such as account creation, editing, or deleting, which can help facilitate employee lifecycle changes like onboarding, promotions, or termination. Human resource workers may utilize the databases as well to aggregate information about employees and monitor access requests. There is significant overlap between user provisioning software and cloud identity and access management. Many products function on a hybrid on­-premise and cloud level, but user provisioning/governance tools may not be able to provide remote access. These products will also often integrate with or provide SSO/federation or password management capabilities.

To qualify as user provisioning/governance software, a product must:

  • Possess infrastructure to store and access identity information
  • Provide administrator tools to create access requirements
  • Automate processes related to identity administration
  • Provide security or authentication features to protect sensitive information
G2 Crowd Grid® for User Provisioning/Governance
High Performers
Momentum Leaders
Momentum Score
Market Presence

Get personalized User Provisioning/Governance recommendations

Compare User Provisioning/Governance Software
    Results: 47

    User on/off Boarding
    User Maintenance
    Star Rating

    User Provisioning/Governance reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

    Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security policies. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications. Because Okta runs on an integrated platform, organizations can implement the service quickly at large scale and low total cost. Thousands of customers, including Adobe, Allergan, Chiquita, LinkedIn, and Western Union, trust Okta to help their organizations work faster, boost revenue and stay secure.

    Centrify Application Services improves end-user productivity and secures every user’s access to apps. IT teams that leverage Centrify's Application Services are able to support internal users (employees, contractors) and external users (partners, customers), wherever they are. Components of Centrify Application Services: Single Sign-On – One-click access to your cloud, mobile and on-premises apps. No more forgotten passwords, no more user confusion. Adaptive MFA for App Access – A common sense approach to multi-factor authentication with risk-based policy that does not hinder end-user productivity. Workflow & Lifecycle Management – Automatically route application requests, create accounts, manage entitlements within those accounts, and revoke access when necessary. Provision users across apps, all from a central control point. Mobility Management – Manage devices, secure native mobile apps and provide context for smarter access decisions. App Gateway – Provide your IT administration teams with secure, granular access to infrastructure regardless of location and without the hassles of a VPN. More about Centrify: Centrify delivers Zero Trust Security through the power of Next-Gen Access. Centrify verifies every user, validates their devices, and limits access and privilege.   Centrify’s Next-Gen Access is the only industry-recognized solution that uniquely converges Identity-as-a Service (IDaaS), enterprise mobility management (EMM) and privileged access management (PAM). 
 Founded in 2004 by Tom Kemp, Adam Au and Paul Moore, Centrify is customer funded by over 5,000 customers and backed by top tier investors including Accel Partners, Mayfield, Sigma West, Index Ventures, Samsung Ventures, NTT Docomo and Fortinet.

    Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud. The Oracle Identity Management platform delivers scalable solutions for identity governance, access management and directory services.

    OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin enables IT identity policy enforcement, and instantly disables app access for employees who leave or change roles in real time by removing them from Active Directory. Take control over application access, quickly on- and off-board team members, and provide end users with easy access to all their apps on every device. Extend your on-premises security model to the cloud in minutes. Eliminate the pain and expense of extensive identity policy management. OneLogin reduces identity infrastructure costs and complex integration project for each new app and efficiently extends identity policy to the cloud. OneLogin eliminates the need for lengthy integration and provisioning projects, manual de-provisioning, protracted on- and off-boarding processes, username and password resets, and Shadow IT policing.

    OneLogin Reviews

    Increase user productivity and business flexibility with user provisioning & identity management.

    The comprehensive solution for provisioning identities and controlling access.

    HID Identity Assurance portfolio delivers a full range of authentication and credentialing options that help you gain confidence in your users’ identities and effectively protect access to all your physical resources, internal networks, systems and services, and public and private cloud-based applications.

    Holaspirit is a complete web platform designed for teal organisation, especially Holacracy practitioners. Holaspirit eases the implementation and the every-day practice of Holacracy through many features such as Role management, Projects & Actions management or Meeting management. Thanks to the many possible integrations, a user-friendly UI and a multi-languages interface , holaSpirit make your Agile & Teal transition easier.

    Using a business-driven approach, RSA Aveksa’s solution integrates access governance, provisioning, authentication, and single sign-on (SSO) in one platform. Whether on-premise or in the cloud, the platform reduces risk and complexity while improving security, visibility, and compliance.

    SMACS by Stack8 is the only tool that is exclusively focused on the operations and support aspects of managing Cisco Unified Communications. We developed this productivity tool for Voice Operations Teams to facilitate moves, adds, and changes instantly within Cisco’s Unified Communications Manager, Unity Connection, and Unified Communications Manager IM & Presence applications. The user interface is so intuitive that you don’t need any Cisco experience to perform basic requests: it’s designed with the user in mind and the task at hand.

    Access Control Manager (ACM) helps organizations keep people, property and assets safe with an easy-to-use, role-based system that can grow with you. It has the flexibility to work with the systems you already have, which helps eliminate extra work and increase productivity.

    Provision/De-provision Office 365 User Licenses with full audit trail of when and to whom the licenses were assigned or removed. Create and manage Office 365 Licenses in bulk. View assigned licenses by Users or by License types or by usage count of each license type. Keep track of purchased versus assigned licenses with audit trail.

    Rippling makes it easy to manage your employee's payroll, benefits, HR and even IT — from their computers to their software — all in one, online platform. Hiring someone, for example? Through Rippling, you can: invite your new hire to e-sign their agreements, add them to payroll and benefits, order and configure their computer, and create their user account in over 300 apps — like Gmail, MS Office, Slack, Salesforce, and Dropbox. All in just a few clicks.

    Identity management solution that automates and streamlines access governance

Hitachi ID Identity Manager is an integrated solution for managing identities and security entitlements across multiple systems and applications.

    Mitigate Risk, Ensure Compliance and Empower Users to Manage and Certify Access

    Superior Application Performance: Allows your staff to complete compliance work in less time than with competitive products allowing them to focus more time on other work

    Control access to your online products and services with ease and precision. The 10Duke Entitlement Service allows you to take control of the delivery and licensing of your digital products. It provides an engine to manage customer access to any type of online content such as a game app, news content, video assets or software applications.

    Adaptive Security Manager is an Intelligent, affordable, adaptive multi-factor security for web applications.

    a.k.a. is an information governance system allows to build customized metadata structures, taxonomies, and retention schedules.

    Admin Report Kit for Windows Enterprise (ARKWE) is a powerful reporting solution for the Microsoft Windows Network. ARKWE collects configuration information about Windows domains & servers, users/groups, policies, events, services, installed applications, shares, permissions, printers, data sources etc. The reports are presented in a variety of formats that are simple, elegant and highly customizable for System Administrators, IT infrastructure Managers and Systems Audit personnel to use and act on. ARKWE's basket of Built-in reports provide powerful, ready-to-use reports that assist in both Management reporting and Compliance reporting requirements such as SOX and HIPAA. A single solution that serves your everyday needs of administrative tasks as well as complex data preparation tasks for assisting in compliance. ARKWE has been architected using the latest Microsoft .NET technology, bringing you the best-in-breed reporting solution for your entire Windows Network. ARKWE is highly optimized for performance (using native Windows API calls wherever appropriate), resulting in fast data collection of deeply embedded configuration data. Imagine scanning your vast network of workstations and servers without having to wait forever to see your reports! You can create data subsets for your network using ARKWE's powerful scan options and meaningfully segment your entire network for data collection and reporting. Windows Network Audit: NTFS Permissions Reports: Gather NTFS security permissions across servers and workstations in an entire domain. Effective Permissions: Generate Effective Permissions of groups and users on shares, folders and files permissions that have been explicitly set and those that have been inherited through groups and nested groups. Local Group Membership: Get the local groups settings of workstations. Network Inventory: Inventory your entire Windows network - servers, workstations, network resources, configuration settings etc.

    The World's First Identity-as-a-Container (IDaaC) Platform. Docker Container Cloud-Independent Identity Management for Everyone.

    Access certification and identity governance to help meet compliance requirements.

    High expectations to deliver at lightning speed is leading to applications being used outside the visibility of IT. Identity-as-a-service (IDaaS) can help you stay on top of cloud adoption and enable an experience your workforce will appreciate.

    The CA Identity Suite provides comprehensive identity management and governance capabilities with a simple, intuitive user experience. This user experience can dramatically simplify processes such as user access requests and access certifications, resulting in improved productivity and user satisfaction. In addition, the CA Identity Suite performs risk analysis and certification and enables remediation actions in real-time during the access provisioning steps, thereby improving audit performance and risk posture with preventive policy enforcement

    Identacor provides a cutting edge, cloud-based Single Sign-On (SSO), provisioning and reporting platform designed to save budgets, free up valuable time, and relieve the technical and administrative challenges of today’s web-enabled world,

    The Access Assurance Suite is an integrated suite of provisioning, governance and identity and access intelligence solutions that enables you to automate routine IAM tasks, identify and eliminate compliance issues as they occur, and predict and prevent the problems that lead to risk.

    CrossIdeas provides Identity & Access Governance Solutions to harmoniously manage people, applications and entitlements.

    Deepnet DualShield is a versatile two-factor authentication system that provides a wide range of authentication methods, integrates with all commonly used business applications our of the box, in a unified single platform.

    Directory and Resource Administrator easily delegates just the proper administrative powers needed to administer Active Directory and Office 365.

    With Evidian Enterprise SSO access will be more quickly and securely available. Settings are managed and applied automatically. Evidian Identity & Access Manager will bring real changes to the daily routine of everyone in your company.

    Exchange Administrator builds on Directory and Resource Administrator and easily restricts Microsoft Exchange administrative privileges to specified roles or individuals.

    Fastpath Config AD integrates Microsoft Dynamics with Active Directory for heightened security of the ERP system and streamlined security management.

    Fischer is a holistic identity governance and administration platform that scales to meet each organization’s needs and delivery preference: on-premises software, manged Identity as a Service® Cloud service, or hosted cloud.

    NetIQ Group Policy Administrator is a centralized management tool that allows you to edit, test, review and compare GPO changes before implementing them in your live environment.

    Hitachi ID Privileged Access Manager is a system for securing access to privileged accounts. It works by regularly randomizing privileged passwords on workstations, servers, network devices and applications.

    IBM Security Identity Governance and Intelligence (IGI) delivers a business-centric approach to Identity Management and Governance. It empowers business and IT to work together to meet regulatory compliance and security goals across enterprise applications and data. IGI covers enterprise user lifecycle management, access risk assessment and mitigation, certification, password management as well as powerful analytics and reporting to enable business to make the right decisions on enterprise access.

    Have a private or wholesale store? Want only registered customers browse your catalog, see prices, and place orders? Hide the entire store behind the login form using the Store Login Access extension for Magento® 2. Features: Allow/disallow registration for certain store views; Share accounts between stores. Choose which store views registered customers will have access to.; Protect your frontend with login form. Hide the catalog, products, prices, checkout, etc.; Unhide specific pages and URLs if needed.; Manage store permissions for customers individually, or for multiple customers in bulk.; Set custom login redirects (dashboard, homepage, or custom URL).

    Nervepoint Access Manager is a complete self-service password rest and account unlock tool. It empowers end users to manage their accounts by synchronize across on-premise and cloud systems. It encompasses remote management with it's own dedicated mobile app, available both on iOS and Android.

    Privilege and Access Management Solution (PAM). Secure Access to Servers,Containers and Apps in 60s. Onion ID makes life easy for CISOs, CFOs, IT and DevOps. Security, Visibility and Auditing in one easy to use solution. The Next Generation of Access and Privilege Management.

    PeoplePlatform helps create, update, and deprovision users and other objects in any directory.

    AD Console gives a simplified platform for managing the Active Directory. The software enlists all the users within the software interface and provides option to create, delete, and rename the users within the Organization Unit. For using the tool, the login details (username and password) for the AD is required.

    Vault One makes your company safer & smarter, Password and Access management security for applications, websites, cloud services, and infrastructure.

    On-boards a user before he joins Allows approvals for user access requests on the fly Triggers automatic access changes when user roles change Automatically revokes unneeded user access Provisions to any application including thick client applications

    Xpress Governance is an access governance tool that helps enterprises to address business challenges, such as continuous compliance, user access certification and consistent access monitoring across heterogeneous applications. Built on industry leading and proprietary technologies, it offers a comprehensive suite of features that enable organizations to take control over its IGA challenges cost-effectively, quickly, and with ease.

    Youzer is an online software for managing and monitoring IT and SaaS accounts that helps companies assign relevant tools to their employees and control the use of SaaS applications within their IT system. IT, HR, and Managers can manage and automate provisioning of IT resources for users, account creation / deactivation, anomaly detection, cost analysis, and IT security from a single dashboard and centralized. A Youzer profile can be created for each new integration employee, who specifies their role, their manager, and their location, and gives them access to all the software and tools they need to do their work. External service providers such as accountants, consultants, volunteers or temporary workers may also be incorporated as users. A selection of tools is provided to prepare the resource options to be assigned to each user, and Youzer automates account creation, provision of resources, and access code communication. Notifications are sent to HR and IT managers in advance about the arrival date of each new employee, eliminating surprises. Youzer provides IT, human resources and managers with centralized access to all users of the IT system. A comprehensive user list lets them know in real time who has access to which resources and directly change the access rights of a particular user. Organizations can also see the number of users assigned to each software and compare the resources assigned to users with the same role to tailor each user's accounts. Features for outsourced employees ensure that access is not left open to employees who have left the business through a pre-scheduled automatic suspension of resources on departure dates.