G2 Crowd Acquires Siftery to Create a New Way to Buy and Manage Software Spend 🚀

Best User Provisioning/Governance Software

User provisioning/governance software gives a single point of maintenance to manage user access to IT applications. Companies need identity governance programs to maintain organized records of user information such as personal information, account histories, or application credentials. These confidential records can be used by employees and administrators to retain information and regulations. IT managers and administrators utilize the information in these systems to automate tasks such as account creation, editing, or deleting, which can help facilitate employee lifecycle changes like onboarding, promotions, or termination. Human resource workers may utilize the databases as well to aggregate information about employees and monitor access requests. There is significant overlap between user provisioning software and cloud identity and access management. Many products function on a hybrid on­-premise and cloud level, but user provisioning/governance tools may not be able to provide remote access. These products will also often integrate with or provide SSO/federation or password management capabilities.

To qualify as user provisioning/governance software, a product must:

  • Possess infrastructure to store and access identity information
  • Provide administrator tools to create access requirements
  • Automate processes related to identity administration
  • Provide security or authentication features to protect sensitive information
G2 Crowd Grid® for User Provisioning/Governance
Leaders
High Performers
Contenders
Niche
Momentum Leaders
Momentum Score
Market Presence
Satisfaction
Filters
Features
User on/off Boarding
User Maintenance
Governance
Administration
Star Rating

User Provisioning/Governance reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Compare User Provisioning/Governance Software
Results: 49
    G2 Crowd takes pride in showing unbiased ratings on user satisfaction. G2 Crowd does not allow for paid placement in any of our ratings.
    Sort By:

    Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security policies. It integrates directly with an organization’s existing directories and identity systems, as well as 4,000+ applications. Because Okta runs on an integrated platform, organizations can implement the service quickly at large scale and low total cost. Thousands of customers, including Adobe, Allergan, Chiquita, LinkedIn, and Western Union, trust Okta to help their organizations work faster, boost revenue and stay secure.


    Idaptive Services secures enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. Idaptive helps protect against the leading point of attack used in data breaches ― compromised credentials — through it’s Next Gen Access, which uniquely unifies single single-on (SSO), adaptive multi-factor authentication (MFA), enterprise mobility management (EMM) and user behavior analytics (UBA) into an integrated solution. Idaptive Services include the following: Single Sign-On Services – Adaptive single-sign on and one-click access to your cloud, mobile and on-premises apps. No more forgotten passwords, no more user confusion. MFA Services – A common sense approach to multi-factor authentication with risk-based policy that does not hinder end-user productivity. Lifecycle Management Services – Automatically route application requests, create accounts, manage entitlements within those accounts, and revoke access when necessary. Provision users across apps, all from a central control point. Mobility Management Services– Manage mobile devices, secure native mobile apps and provide context for smarter access decisions. Endpoint Management Services - Designed to help control access to corporate resources through a zero trust security approach. Bolster endpoint security with cross-platform policy enforcement and leading device security management capabilities.


    Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud. The Oracle Identity Management platform delivers scalable solutions for identity governance, access management and directory services.


    OneLogin simplifies identity management with secure, one-click access, for employees, customers and partners, through all device types, to all enterprise cloud and on-premises applications. OneLogin enables IT identity policy enforcement, and instantly disables app access for employees who leave or change roles in real time by removing them from Active Directory. Take control over application access, quickly on- and off-board team members, and provide end users with easy access to all their apps on every device. Extend your on-premises security model to the cloud in minutes. Eliminate the pain and expense of extensive identity policy management. OneLogin reduces identity infrastructure costs and complex integration project for each new app and efficiently extends identity policy to the cloud. OneLogin eliminates the need for lengthy integration and provisioning projects, manual de-provisioning, protracted on- and off-boarding processes, username and password resets, and Shadow IT policing.

    OneLogin Reviews

    Rippling makes it easy to manage your employee's payroll, benefits, HR and even IT — from their computers to their software — all in one, online platform. Hiring someone, for example? Through Rippling, you can: invite your new hire to e-sign their agreements, add them to payroll and benefits, order and configure their computer, and create their user account in over 300 apps — like Gmail, MS Office, Slack, Salesforce, and Dropbox. All in just a few clicks.


    Increase user productivity and business flexibility with user provisioning & identity management.


    The comprehensive solution for provisioning identities and controlling access.


    HID Identity Assurance portfolio delivers a full range of authentication and credentialing options that help you gain confidence in your users’ identities and effectively protect access to all your physical resources, internal networks, systems and services, and public and private cloud-based applications.


    Access Control Manager (ACM) helps organizations keep people, property and assets safe with an easy-to-use, role-based system that can grow with you. It has the flexibility to work with the systems you already have, which helps eliminate extra work and increase productivity.


    Holaspirit is a complete web platform designed for teal organisation, especially Holacracy practitioners. Holaspirit eases the implementation and the every-day practice of Holacracy through many features such as Role management, Projects & Actions management or Meeting management. Thanks to the many possible integrations, a user-friendly UI and a multi-languages interface , holaSpirit make your Agile & Teal transition easier.


    Using a business-driven approach, RSA Aveksa’s solution integrates access governance, provisioning, authentication, and single sign-on (SSO) in one platform. Whether on-premise or in the cloud, the platform reduces risk and complexity while improving security, visibility, and compliance.


    SMACS by Stack8 is the only tool that is exclusively focused on the operations and support aspects of managing Cisco Unified Communications. We developed this productivity tool for Voice Operations Teams to facilitate moves, adds, and changes instantly within Cisco’s Unified Communications Manager, Unity Connection, and Unified Communications Manager IM & Presence applications. The user interface is so intuitive that you don’t need any Cisco experience to perform basic requests: it’s designed with the user in mind and the task at hand.


    Only Avatier delivers a private instance cloud independent or on-premise Identity Management platform in just minutes using secure and scalable Docker containers. This enables organizations to scale faster, innovate quicker, conquer and embrace change, to dominate their competition. Avatier brings all back-office business applications and employee assets together and manages them as one. Our Identity solutions are delivered and managed using the latest Docker container technology providing maximum flexibility, scale, compliance, and security to our customers.


    Identity management solution that automates and streamlines access governance


    
Hitachi ID Identity Manager is an integrated solution for managing identities and security entitlements across multiple systems and applications.


    IBM Security Identity Governance and Intelligence (IGI) delivers a business-centric approach to Identity Management and Governance. It empowers business and IT to work together to meet regulatory compliance and security goals across enterprise applications and data. IGI covers enterprise user lifecycle management, access risk assessment and mitigation, certification, password management as well as powerful analytics and reporting to enable business to make the right decisions on enterprise access.


    Mitigate Risk, Ensure Compliance and Empower Users to Manage and Certify Access


    Provision/De-provision Office 365 User Licenses with full audit trail of when and to whom the licenses were assigned or removed. Create and manage Office 365 Licenses in bulk. View assigned licenses by Users or by License types or by usage count of each license type. Keep track of purchased versus assigned licenses with audit trail.


    Superior Application Performance: Allows your staff to complete compliance work in less time than with competitive products allowing them to focus more time on other work


    Control access to your online products and services with ease and precision. The 10Duke Entitlement Service allows you to take control of the delivery and licensing of your digital products. It provides an engine to manage customer access to any type of online content such as a game app, news content, video assets or software applications.


    Adaptive Security Manager is an Intelligent, affordable, adaptive multi-factor security for web applications.


    a.k.a. is an information governance system allows to build customized metadata structures, taxonomies, and retention schedules.


    Admin Report Kit for Windows Enterprise (ARKWE) is a powerful reporting solution for the Microsoft Windows Network. ARKWE collects configuration information about Windows domains & servers, users/groups, policies, events, services, installed applications, shares, permissions, printers, data sources etc. The reports are presented in a variety of formats that are simple, elegant and highly customizable for System Administrators, IT infrastructure Managers and Systems Audit personnel to use and act on. ARKWE's basket of Built-in reports provide powerful, ready-to-use reports that assist in both Management reporting and Compliance reporting requirements such as SOX and HIPAA. A single solution that serves your everyday needs of administrative tasks as well as complex data preparation tasks for assisting in compliance. ARKWE has been architected using the latest Microsoft .NET technology, bringing you the best-in-breed reporting solution for your entire Windows Network. ARKWE is highly optimized for performance (using native Windows API calls wherever appropriate), resulting in fast data collection of deeply embedded configuration data. Imagine scanning your vast network of workstations and servers without having to wait forever to see your reports! You can create data subsets for your network using ARKWE's powerful scan options and meaningfully segment your entire network for data collection and reporting. Windows Network Audit: NTFS Permissions Reports: Gather NTFS security permissions across servers and workstations in an entire domain. Effective Permissions: Generate Effective Permissions of groups and users on shares, folders and files permissions that have been explicitly set and those that have been inherited through groups and nested groups. Local Group Membership: Get the local groups settings of workstations. Network Inventory: Inventory your entire Windows network - servers, workstations, network resources, configuration settings etc.


    Access certification and identity governance to help meet compliance requirements.


    High expectations to deliver at lightning speed is leading to applications being used outside the visibility of IT. Identity-as-a-service (IDaaS) can help you stay on top of cloud adoption and enable an experience your workforce will appreciate.


    The CA Identity Suite provides comprehensive identity management and governance capabilities with a simple, intuitive user experience. This user experience can dramatically simplify processes such as user access requests and access certifications, resulting in improved productivity and user satisfaction. In addition, the CA Identity Suite performs risk analysis and certification and enables remediation actions in real-time during the access provisioning steps, thereby improving audit performance and risk posture with preventive policy enforcement


    Identacor provides a cutting edge, cloud-based Single Sign-On (SSO), provisioning and reporting platform designed to save budgets, free up valuable time, and relieve the technical and administrative challenges of today’s web-enabled world,


    The Access Assurance Suite is an integrated suite of provisioning, governance and identity and access intelligence solutions that enables you to automate routine IAM tasks, identify and eliminate compliance issues as they occur, and predict and prevent the problems that lead to risk.


    CrossIdeas provides Identity & Access Governance Solutions to harmoniously manage people, applications and entitlements.


    Integrated Identity and Data Governance Products


    Deepnet DualShield is a versatile two-factor authentication system that provides a wide range of authentication methods, integrates with all commonly used business applications our of the box, in a unified single platform.


    Directory and Resource Administrator easily delegates just the proper administrative powers needed to administer Active Directory and Office 365.


    With Evidian Enterprise SSO access will be more quickly and securely available. Settings are managed and applied automatically. Evidian Identity & Access Manager will bring real changes to the daily routine of everyone in your company.


    Exchange Administrator builds on Directory and Resource Administrator and easily restricts Microsoft Exchange administrative privileges to specified roles or individuals.


    Fastpath Config AD integrates Microsoft Dynamics with Active Directory for heightened security of the ERP system and streamlined security management.


    Risk & Liquidity is a modular solution system, containing calculation engines, processes, interfaces, accounting templates and much more for numerous kinds of tasks.


    Fischer is a holistic identity governance and administration platform that scales to meet each organization’s needs and delivery preference: on-premises software, manged Identity as a Service® Cloud service, or hosted cloud.


    NetIQ Group Policy Administrator is a centralized management tool that allows you to edit, test, review and compare GPO changes before implementing them in your live environment.


    Privileged Access Manager secures access to elevated privileges. It eliminates shared and static passwords to privileged accounts. It enforces strong authentication and reliable authorization prior to granting access. User access is logged, creating strong accountability. Privileged Access Manager secures access at scale, supporting over a million password changes daily and access by thousands of authorized users. It is designed for reliability, to ensure continuous access to shared accounts and security groups, even in the event of a site-wide disaster.


    Ivanti Identity Director powered by RES provides an attribute-based approach to identity management and access with automated provisioning, workflows, and self service.


    Have a private or wholesale store? Want only registered customers browse your catalog, see prices, and place orders? Hide the entire store behind the login form using the Store Login Access extension for Magento® 2. Features: Allow/disallow registration for certain store views; Share accounts between stores. Choose which store views registered customers will have access to.; Protect your frontend with login form. Hide the catalog, products, prices, checkout, etc.; Unhide specific pages and URLs if needed.; Manage store permissions for customers individually, or for multiple customers in bulk.; Set custom login redirects (dashboard, homepage, or custom URL).


    Nervepoint Access Manager is a complete self-service password rest and account unlock tool. It empowers end users to manage their accounts by synchronize across on-premise and cloud systems. It encompasses remote management with it's own dedicated mobile app, available both on iOS and Android.


    Privilege and Access Management Solution (PAM). Secure Access to Servers,Containers and Apps in 60s. Onion ID makes life easy for CISOs, CFOs, IT and DevOps. Security, Visibility and Auditing in one easy to use solution. The Next Generation of Access and Privilege Management.


    PeoplePlatform helps create, update, and deprovision users and other objects in any directory.


    AD Console gives a simplified platform for managing the Active Directory. The software enlists all the users within the software interface and provides option to create, delete, and rename the users within the Organization Unit. For using the tool, the login details (username and password) for the AD is required.


    Vault One makes your company safer & smarter, Password and Access management security for applications, websites, cloud services, and infrastructure.


    On-boards a user before he joins Allows approvals for user access requests on the fly Triggers automatic access changes when user roles change Automatically revokes unneeded user access Provisions to any application including thick client applications


    Xpress Governance is an access governance tool that helps enterprises to address business challenges, such as continuous compliance, user access certification and consistent access monitoring across heterogeneous applications. Built on industry leading and proprietary technologies, it offers a comprehensive suite of features that enable organizations to take control over its IGA challenges cost-effectively, quickly, and with ease.


    Youzer is an online software for managing and monitoring IT and SaaS accounts that helps companies assign relevant tools to their employees and control the use of SaaS applications within their IT system. IT, HR, and Managers can manage and automate provisioning of IT resources for users, account creation / deactivation, anomaly detection, cost analysis, and IT security from a single dashboard and centralized. A Youzer profile can be created for each new integration employee, who specifies their role, their manager, and their location, and gives them access to all the software and tools they need to do their work. External service providers such as accountants, consultants, volunteers or temporary workers may also be incorporated as users. A selection of tools is provided to prepare the resource options to be assigned to each user, and Youzer automates account creation, provision of resources, and access code communication. Notifications are sent to HR and IT managers in advance about the arrival date of each new employee, eliminating surprises. Youzer provides IT, human resources and managers with centralized access to all users of the IT system. A comprehensive user list lets them know in real time who has access to which resources and directly change the access rights of a particular user. Organizations can also see the number of users assigned to each software and compare the resources assigned to users with the same role to tailor each user's accounts. Features for outsourced employees ensure that access is not left open to employees who have left the business through a pre-scheduled automatic suspension of resources on departure dates.