Best User Provisioning/Governance Software

User provisioning/governance software gives a single point of maintenance to manage user access to IT applications. Companies need identity governance programs to maintain organized records of user information such as personal information, account histories, or application credentials. These confidential records can be used by employees and administrators to retain information and regulations. IT managers and administrators utilize the information in these systems to automate tasks such as account creation, editing, or deleting, which can help facilitate employee lifecycle changes like onboarding, promotions, or termination. Human resource workers may utilize the databases as well to aggregate information about employees and monitor access requests. There is significant overlap between user provisioning software and cloud identity and access management. Many products function on a hybrid on­-premise and cloud level, but user provisioning/governance tools may not be able to provide remote access. These products will also often integrate with or provide SSO/federation or password management capabilities.

To qualify as user provisioning/governance software, a product must:

  • Possess infrastructure to store and access identity information
  • Provide administrator tools to create access requirements
  • Automate processes related to identity administration
  • Provide security or authentication features to protect sensitive information
G2 Crowd Grid® for User Provisioning/Governance
Leaders
High Performers
Contenders
Niche
Momentum Leaders
Momentum Score
Market Presence
Satisfaction
content
Features
User on/off Boarding
User Maintenance
Governance
Administration
Star Rating

User Provisioning/Governance reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Compare User Provisioning/Governance Software
Results: 62
G2 Crowd takes pride in showing unbiased ratings on user satisfaction. G2 Crowd does not allow for paid placement in any of our ratings.
Results: 62
Filter Results
Filter by:
Sort by
Features
Star Rating
Sort By:

    Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security policies. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications. Because Okta runs on an integrated platform, organizations can implement the service quickly at large scale and low total cost. Thousands of customers, including Adobe, Allergan, Chiquita, LinkedIn, and Western Union, trust Okta to help their organizations work faster, boost revenue and stay secure.

    JumpCloud's Directory-as-a-Service® (DaaS) is the single point of authority to authenticate, authorize, and manage the identities of a business’s employees and the systems and IT resources they need access to. DaaS securely connects employees with systems, applications, and other resources through a single unified cloud-based directory, replacing the need for on premise solutions such as Active Directory® and LDAP. JumpCloud supports all major OS platforms and is designed to control and manage user access to both internal and external IT resources such as servers and applications.

    OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin enables IT identity policy enforcement, and instantly disables app access for employees who leave or change roles in real time by removing them from Active Directory. Take control over application access, quickly on- and off-board team members, and provide end users with easy access to all their apps on every device. Extend your on-premises security model to the cloud in minutes. Eliminate the pain and expense of extensive identity policy management. OneLogin reduces identity infrastructure costs and complex integration project for each new app and efficiently extends identity policy to the cloud. OneLogin eliminates the need for lengthy integration and provisioning projects, manual de-provisioning, protracted on- and off-boarding processes, username and password resets, and Shadow IT policing.

    Idaptive Services secures enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. Idaptive helps protect against the leading point of attack used in data breaches ― compromised credentials — through it’s Next Gen Access, which uniquely unifies single single-on (SSO), adaptive multi-factor authentication (MFA), enterprise mobility management (EMM) and user behavior analytics (UBA) into an integrated solution. Idaptive Services include the following: Single Sign-On Services – Adaptive single-sign on and one-click access to your cloud, mobile and on-premises apps. No more forgotten passwords, no more user confusion. MFA Services – A common sense approach to multi-factor authentication with risk-based policy that does not hinder end-user productivity. Lifecycle Management Services – Automatically route application requests, create accounts, manage entitlements within those accounts, and revoke access when necessary. Provision users across apps, all from a central control point. Mobility Management Services– Manage mobile devices, secure native mobile apps and provide context for smarter access decisions. Endpoint Management Services - Designed to help control access to corporate resources through a zero trust security approach. Bolster endpoint security with cross-platform policy enforcement and leading device security management capabilities.

    Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud. The Oracle Identity Management platform delivers scalable solutions for identity governance, access management and directory services.

    Rippling is the world's first way to manage your company's HR & IT — from your team's payroll and health insurance, to their computers and cloud apps — all in one, integrated system. Want to hire someone, for example? Just click a button, and Rippling can instantly: add new hires to your payroll and benefits, create their email, ship their work computer, and even create their user account across all your cloud apps, like Gmail, Slack, and Microsoft Office.

    Increase user productivity and business flexibility with user provisioning & identity management.

    ERP Maestro makes managing access risk, compliance, and security in SAP® environments incredibly easy. Its award-winning software as a service (SaaS) platform automates the monitoring, detection, and prevention of internal cybersecurity risks in SAP systems, minimizing potential breaches and fraud and accelerating remediation. Its industry-leading segregation of duties (SoD) analysis is used by seven of the world's top 10 audit firms and empowers organizations to establish effective governance, risk, and compliance (GRC) processes.

    HID Identity Assurance portfolio delivers a full range of authentication and credentialing options that help you gain confidence in your users’ identities and effectively protect access to all your physical resources, internal networks, systems and services, and public and private cloud-based applications.

    Access Control Manager (ACM) helps organizations keep people, property and assets safe with an easy-to-use, role-based system that can grow with you. It has the flexibility to work with the systems you already have, which helps eliminate extra work and increase productivity.

    The CA Identity Suite provides comprehensive identity management and governance capabilities with a simple, intuitive user experience. This user experience can dramatically simplify processes such as user access requests and access certifications, resulting in improved productivity and user satisfaction. In addition, the CA Identity Suite performs risk analysis and certification and enables remediation actions in real-time during the access provisioning steps, thereby improving audit performance and risk posture with preventive policy enforcement

    Only Avatier delivers a private instance cloud independent or on-premise Identity Management platform in just minutes using secure and scalable Docker containers. This enables organizations to scale faster, innovate quicker, conquer and embrace change, to dominate their competition. Avatier brings all back-office business applications and employee assets together and manages them as one. Our Identity solutions are delivered and managed using the latest Docker container technology providing maximum flexibility, scale, compliance, and security to our customers.

    Holaspirit is a complete web platform designed for teal organisation, especially Holacracy practitioners. Holaspirit eases the implementation and the every-day practice of Holacracy through many features such as Role management, Projects & Actions management or Meeting management. Thanks to the many possible integrations, a user-friendly UI and a multi-languages interface , holaSpirit make your Agile & Teal transition easier.

    Using a business-driven approach, RSA Aveksa’s solution integrates access governance, provisioning, authentication, and single sign-on (SSO) in one platform. Whether on-premise or in the cloud, the platform reduces risk and complexity while improving security, visibility, and compliance.

    SMACS by Stack8 is the only tool that is exclusively focused on the operations and support aspects of managing Cisco Unified Communications. We developed this productivity tool for Voice Operations Teams to facilitate moves, adds, and changes instantly within Cisco’s Unified Communications Manager, Unity Connection, and Unified Communications Manager IM & Presence applications. The user interface is so intuitive that you don’t need any Cisco experience to perform basic requests: it’s designed with the user in mind and the task at hand.

    High expectations to deliver at lightning speed is leading to applications being used outside the visibility of IT. Identity-as-a-service (IDaaS) can help you stay on top of cloud adoption and enable an experience your workforce will appreciate.

    Identity management solution that automates and streamlines access governance

    
Hitachi ID Identity Manager is an integrated solution for managing identities and security entitlements across multiple systems and applications.

    Provision/De-provision Office 365 User Licenses with full audit trail of when and to whom the licenses were assigned or removed. Create and manage Office 365 Licenses in bulk. View assigned licenses by Users or by License types or by usage count of each license type. Keep track of purchased versus assigned licenses with audit trail.

    Access certification and identity governance to help meet compliance requirements.

    IBM Security Identity Governance and Intelligence (IGI) delivers a business-centric approach to Identity Management and Governance. It empowers business and IT to work together to meet regulatory compliance and security goals across enterprise applications and data. IGI covers enterprise user lifecycle management, access risk assessment and mitigation, certification, password management as well as powerful analytics and reporting to enable business to make the right decisions on enterprise access.

    NetIQ Group Policy Administrator is a centralized management tool that allows you to edit, test, review and compare GPO changes before implementing them in your live environment.

    Superior Application Performance: Allows your staff to complete compliance work in less time than with competitive products allowing them to focus more time on other work

    Symantec Workspace Streaming is an application streaming solution used to enable on-demand application provisioning, real-time software license management and instant application upgrades.

    Control access to your online products and services with ease and precision. The 10Duke Entitlement Service allows you to take control of the delivery and licensing of your digital products. It provides an engine to manage customer access to any type of online content such as a game app, news content, video assets or software applications.

    Adaptive Security Manager is an Intelligent, affordable, adaptive multi-factor security for web applications.

    AD Health Profiler can do health check of production Active Directory Forests. A complete health check indeed is needed before implementing new solutions to your customers and/or before making a big change in your production environment.

    a.k.a. is an information governance system allows to build customized metadata structures, taxonomies, and retention schedules.

    Admin Report Kit for Windows Enterprise (ARKWE) is a powerful reporting solution for the Microsoft Windows Network. ARKWE collects configuration information about Windows domains & servers, users/groups, policies, events, services, installed applications, shares, permissions, printers, data sources etc. The reports are presented in a variety of formats that are simple, elegant and highly customizable for System Administrators, IT infrastructure Managers and Systems Audit personnel to use and act on. ARKWE's basket of Built-in reports provide powerful, ready-to-use reports that assist in both Management reporting and Compliance reporting requirements such as SOX and HIPAA. A single solution that serves your everyday needs of administrative tasks as well as complex data preparation tasks for assisting in compliance. ARKWE has been architected using the latest Microsoft .NET technology, bringing you the best-in-breed reporting solution for your entire Windows Network. ARKWE is highly optimized for performance (using native Windows API calls wherever appropriate), resulting in fast data collection of deeply embedded configuration data. Imagine scanning your vast network of workstations and servers without having to wait forever to see your reports! You can create data subsets for your network using ARKWE's powerful scan options and meaningfully segment your entire network for data collection and reporting. Windows Network Audit: NTFS Permissions Reports: Gather NTFS security permissions across servers and workstations in an entire domain. Effective Permissions: Generate Effective Permissions of groups and users on shares, folders and files permissions that have been explicitly set and those that have been inherited through groups and nested groups. Local Group Membership: Get the local groups settings of workstations. Network Inventory: Inventory your entire Windows network - servers, workstations, network resources, configuration settings etc.

    The Clearswift Information Governance Server (IGS) lies at the heart of the Clearswift Aneesya Platform. Deployed centrally in an organization, it integrates with your own environment for enterprise single sign on and support for Clearswift SECURE Gateways, augmenting their Adaptive Data Loss Prevention functionality.

    Identacor provides a cutting edge, cloud-based Single Sign-On (SSO), provisioning and reporting platform designed to save budgets, free up valuable time, and relieve the technical and administrative challenges of today’s web-enabled world,

    The Access Assurance Suite is an integrated suite of provisioning, governance and identity and access intelligence solutions that enables you to automate routine IAM tasks, identify and eliminate compliance issues as they occur, and predict and prevent the problems that lead to risk.

    CrossIdeas provides Identity & Access Governance Solutions to harmoniously manage people, applications and entitlements.

    Identity Management Managing user accounts in multiple applications is not an easy matter.

    Deepnet DualShield is a versatile two-factor authentication system that provides a wide range of authentication methods, integrates with all commonly used business applications our of the box, in a unified single platform.

    With Evidian Enterprise SSO access will be more quickly and securely available. Settings are managed and applied automatically. Evidian Identity & Access Manager will bring real changes to the daily routine of everyone in your company.

    Fastpath Config AD integrates Microsoft Dynamics with Active Directory for heightened security of the ERP system and streamlined security management.

    Risk & Liquidity is a modular solution system, containing calculation engines, processes, interfaces, accounting templates and much more for numerous kinds of tasks.

    Fischer is a holistic identity governance and administration platform that scales to meet each organization’s needs and delivery preference: on-premises software, manged Identity as a Service® Cloud service, or hosted cloud.

    Privileged Access Manager secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating strong accountability. Privileged Access Manager secures access at scale, supporting over a million password changes daily and access by thousands of authorized users. It is designed for reliability, to ensure continuous access to shared accounts and security groups, even in the event of a site-wide disaster.

    Now that it's clear why IAMCompare was built, let's review how it works.

    Solve your VPN access, Office 365 or immediate needs now, quickly and easily. Then, add new use cases when they arise. From basic app access to high-assurance security requirements.

    Ivanti Identity Director powered by RES provides an attribute-based approach to identity management and access with automated provisioning, workflows, and self service.

    Have a private or wholesale store? Want only registered customers browse your catalog, see prices, and place orders? Hide the entire store behind the login form using the Store Login Access extension for Magento® 2. Features: Allow/disallow registration for certain store views; Share accounts between stores. Choose which store views registered customers will have access to.; Protect your frontend with login form. Hide the catalog, products, prices, checkout, etc.; Unhide specific pages and URLs if needed.; Manage store permissions for customers individually, or for multiple customers in bulk.; Set custom login redirects (dashboard, homepage, or custom URL).