Covisint Cloud Identity

(1)
2.5 out of 5 stars

Cloud Identity Services enable organizations to simply and securely manage digital identities across virtually any combination of internal/external systems and end user groups.

Work for Covisint Cloud Identity?
Centrify user  2x

Learning about Covisint?

We can help you find the solution that fits you best.

Compare Covisint Cloud Identity to Similar Solutions

Covisint Cloud Identity Reviews

Write a Review
Filter Reviews
Filter Reviews
Ratings
Company Size
User Role
User Industry
Showing 1 Covisint review
LinkedIn Connections
Covisint review by <span>Aakash P.</span>
Aakash P.
Validated Reviewer
Invitation from G2 Crowd
Reviewed On

Ok, but outdated

What do you like best?

Easier to grant access (got this setup much faster than other things at my new job)

Password change

What do you dislike?

Outdated UI, isnt very intuitive to use. It doesnt help that this is something i dont use very often- so each time it takes me a couple of minutes figure things out

Recommendations to others considering the product

Its a decent service, ui could be better.

What business problems are you solving with the product? What benefits have you realized?

One place to get various portal access instead having to request everything manually

Sign in to G2 Crowd to see what your connections have to say about Covisint Cloud Identity
Headshots

What Cloud Identity and Access Management solution do you use?

Thanks for letting us know!

There are not enough reviews of Covisint Cloud Identity for G2 Crowd to provide buying insight. Below are some alternatives with more reviews:

1
Okta Logo
Okta
(179)
Okta is an on-demand identity and access management service for web based applications, both in the cloud and behind the firewall
2
Centrify Application Services Logo
Centrify Application Services
(59)
Centrify Application Services secures enterprise identities against cyberthreats that target today’s hybrid IT environment of cloud, mobile and on-premises. Centrify helps protect against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise’s users as well as its privileged accounts.
3
Microsoft Azure Active Directory Logo
Microsoft Azure Active Directory
(50)
Azure Active Directory is a comprehensive identity and access management cloud solution that provides a robust set of capabilities to manage users and groups and help secure access to applications including Microsoft online services like Office 365 and a world of non-Microsoft SaaS applications.
4
RSA SecurID® Access Logo
RSA SecurID® Access
(47)
Establish an enterprise-wide authentication policy that protects your most valuable applications, resources, and information.
5
OneLogin Logo
OneLogin
(46)
Extend enterprise security & compliance to all public and private cloud apps with secure single sign-on (SSO), multi-factor authentication & user provisioning.
6
Bitium Logo
Bitium
(40)
Unified Cloud Management System including single sign-on identity/access management, password control, corporate insights, security, and more.
7
Salesforce Platform: Identity Logo
Salesforce Platform: Identity
(40)
Salesforce App Cloud provides an out-of-the-box identity solution using open standards, including SAML, OpenID Connect, OAuth, and SCIM. Now IT can manage apps, users, and data sharing with simplicity and transparency.
8
AWS Identity and Access Management (IAM) Logo
AWS Identity and Access Management (IAM)
(17)
AWS Identity and Access Management (IAM) enables you to securely control access to AWS services and resources for your users. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.
9
Gigya Logo
Gigya
(14)
The Trusted Platform for Identity-Driven Relationships
10
CyberArk Logo
CyberArk
(12)
Enterprise-class, unified policy-based solution that secures, manages and logs all privileged accounts.
Show more
Kate avatar
Kate from G2 Crowd

Learning about Covisint Cloud Identity?

I can help.
* We monitor all Covisint Cloud Identity reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.

Compare Covisint Cloud Identity to Similar Solutions