Want to see who topped the 2019 Best Software Awards?

AWS Identity and Access Management (IAM)

4.4
(52 reviews)

AWS Identity and Access Management (IAM) enables you to securely control access to AWS services and resources for your users. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.

Work for AWS Identity and Access Management (IAM)?

Learning about AWS IAM?

We can help you find the solution that fits you best.

AWS Identity and Access Management (IAM) Features

Authentication Options

Authentication User experience

Process of providing credentials and logging into multiple systems is easy and intuitive for users

93%
(Based on 23 reviews)

Local Access

Controls access to legacy applications, web based applications, network resources and servers.

91%
(Based on 21 reviews)

Partner Access

Controls access to users that are not company employees that are either within the companies local area network or outside the network

85%
(Based on 12 reviews)

Mobile Support

Provides mobile application for required mobile os platform and enables single sign on for native and web based business applications

77%
(Based on 11 reviews)

Breath of support for target systems

Standard integrations to most common cloud and on premise applications

86%
(Based on 14 reviews)

Supports BYOD users

Enables users to use their own device to access company applications.

82%
(Based on 9 reviews)

Multi-Factor Authentication

Supports Required Access Types

Works with required networking products and applications out of the box such as: VPN, Web, Cloud applications, Local/Remote Desktop

93%
(Based on 20 reviews)

Supports Required Authentication systems

Includes or supports required authentication technologies. Example systems: One Time Passwords, bioMetric, knowledge based, key cards, mobile phone based tokens, etc

94%
(Based on 19 reviews)

Identity Directories

On-premise identity repositories supported

Variety and Quality of integrations (ie Active Directory, LDAP)

89%
(Based on 16 reviews)

Application as profile master

Directory treats the user's profile that is in an application as the ongoing source of truth for that user's profile. Changes to profile in master application drive changes to profiles in other applications.

88%
(Based on 11 reviews)

Cloud Directory

Provides cloud based directory option that contains all user names and attributes

90%
(Based on 13 reviews)

Provisioning

Self Service Access requests

Users can request access to an application and be automatically provisioned if they meet policy requirements

86%
(Based on 18 reviews)

Smart/Automated Provisioning

Automates account/access rights creation, changes and removals for on-premise and cloud apps

89%
(Based on 17 reviews)

Bi-directional Profile Synchronization

Keeps all profile attributes consistent across applications whether the change is made in the provisioning system or the application

86%
(Based on 10 reviews)

Profile attribute transformation

Transforms profile atributes to the required format for all of the systems being updated

84%
(Based on 16 reviews)

Role Management

Establish roles that create a set of authentication rights for each user in the role

93%
(Based on 23 reviews)

Policy Management

Enables administrators to create access policies and applies policy controls throughout request and provisioning processes

90%
(Based on 22 reviews)

Access Termination

Terminate access to multiple applications based on dates

93%
(Based on 16 reviews)

Approval Work-flows

Allow business stake-holders/managers to approve or reject requested changes to access via a defined work-flow

84%
(Based on 12 reviews)

Governance

Identifies and Alerts for Threats

Alerts administrators when inappropriate access occurs

80%
(Based on 16 reviews)

Compliance Audits

Proactively audits access rights against policies

82%
(Based on 15 reviews)

Administration

Administration Console

Provides Administration tools/console that are easy to use and learn for routine maintenance tasks

85%
(Based on 20 reviews)

Ease of set up for target systems

Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured

85%
(Based on 18 reviews)

Bulk Changes

Change users and permissions in bulk

86%
(Based on 16 reviews)

Self Service Password Administration

Users can set, change passwords without interaction from IT staff

88%
(Based on 16 reviews)

Platform

Customization

Supports customizable UI

82%
(Based on 14 reviews)

Reliability

Cloud based service has minimal downtime

92%
(Based on 17 reviews)

Performance/Scalability

Service performs well under significant use and can scale to support large number of users

93%
(Based on 18 reviews)

Security

Vendor follows appropriate security protocols and has appropriate certifications to ensure no breech of confidential data occurs

93%
(Based on 19 reviews)

Logging and Reporting

Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.

92%
(Based on 16 reviews)

Federation/SAML support

Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials.

88%
(Based on 9 reviews)

Cross Browser support

Support access to browser based applications across required browser types

92%
(Based on 13 reviews)

Reporting

Contains pre-built and custom reporting tools to required to manage business

90%
(Based on 15 reviews)

APIs

Provides appropriate application interfaces to enable custom integrations for unique business requirements

89%
(Based on 14 reviews)