OAuth.io

4.8
(3)

OAuth.io handles identity infrastructure, maintenance, and security overhead with Social Login, Token Authentication, Multi-Factor Authentication, and more. OAuth.io allows you to choose identity providers, add custom attributes, customize your login page or use OAuth's widget and integrate with its app in minutes.

Work for OAuth.io?

Learning about OAuth.io?

We can help you find the solution that fits you best.

OAuth.io Reviews

Chat with a G2 Advisor
Write a Review
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • Industry
Ratings
Company Size
User Role
Industry
Showing 3 OAuth.io reviews
LinkedIn Connections
OAuth.io review by Esleen K.
Esleen K.
Validated Reviewer
Verified Current User
Review Source
content

"A Great Authentication Software."

What do you like best?

It is quite an easy tool to use and implement with our website. It is a great authentication tool as it has great security features that made us settle for it not to forget that it's pricing is also quite fair considering the features that it offers. With OAuth.io, we were able to create custom log ins for our staff to limit just how much of access they have and for us to know just who has access to what.This was very helpful

What do you dislike?

We have not yet experienced any challenge with this software. It has been pretty great so far.

Recommendations to others considering the product

A very good software for authentication. I definitely vouch for it to other users looking for such a software.

What business problems are you solving with the product? What benefits have you realized?

We use it to provide multifactor authenntication on who has what access in the company.

Sign in to G2 Crowd to see what your connections have to say about OAuth.io
OAuth.io review by Maxwell O.
Maxwell O.
Validated Reviewer
Review Source
content

"Simplified Secure Authentication"

What do you like best?

OAuth is easy and fast to implement with over 100 APIs available. Offers a great SDK tools for JavaScript, NodeJS and PHP. It also comes with an intuitive OAuth dashboard. It also supports traditional email and password authentication.

What do you dislike?

The documentation is not that good and may require a little bit more technical knowledge and experience to implement.

Recommendations to others considering the product

Great tool for developers that employ a security-first strategy when setting up authentication systems.

What business problems are you solving with the product? What benefits have you realized?

Definitely a great authentication to try out. Has allowed us to secure our authentication.

What Multi-Factor Authentication solution do you use?

Thanks for letting us know!
OAuth.io review by Jesús F.
Jesús F.
Validated Reviewer
Review Source
content

"Excellent standard for secure authorization, simple for desktop, mobile and web applications"

What do you like best?

The users and their passwords are safe in another server of the application, if some hacker is manipulated by the information, especially because each website or application has a couple of different tokens for each user

What do you dislike?

Unquestionably the great disadvantage of this security application is that some applications that are accessed with Facebook or Twitter post in the user's profile

Recommendations to others considering the product

Use with closed eyes this security application with quality standards

What business problems are you solving with the product? What benefits have you realized?

OKTA OAuth makes the functions of placing access keys the past, allowing better security of applications and users

There are not enough reviews of OAuth.io for G2 Crowd to provide buying insight. Below are some alternatives with more reviews:

1
Google Authenticator Logo
Google Authenticator
4.5
(79)
Google Authenticator is a multifactor app for mobile devices.
2
RSA SecurID® Access Logo
RSA SecurID® Access
4.3
(52)
Establish an enterprise-wide authentication policy that protects your most valuable applications, resources, and information.
3
Ping Intelligent Identity Platform Logo
Ping Intelligent Identity Platform
4.2
(35)
Ping Intelligent Identity Platform is a multi-factor authentication solution.
4
Authy Logo
Authy
4.6
(29)
Two-Factor Authentication smartphone app for consumers, simplest 2fa Rest API for developers and a strong authentication platform for the enterprise.
5
AWS Certificate Manager Logo
AWS Certificate Manager
4.5
(27)
AWS Certificate Manager is a service that lets you easily provision, manage, and deploy Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with AWS services to secure network communications and establish the identity of websites.
6
Google Security Key Enforcement Logo
Google Security Key Enforcement
4.3
(23)
Google Security Key Enforcement is an enhanced protection against phishing.
7
Symantec VIP Access Manager Logo
Symantec VIP Access Manager
4.4
(18)
Create a single access point to protect your cloud and on-premise web apps via Single Sign-On (SSO) with Symantec VIP two-factor authentication.
8
Azure Multi-Factor Authentication Logo
Azure Multi-Factor Authentication
4.1
(18)
Azure Multi-Factor Authentication reduces organizational risk and helps enable regulatory compliance by providing an extra level of authentication, in addition to a user’s account credentials, to secure employee, customer, and partner access.
9
Azure Key Vault Logo
Azure Key Vault
4.1
(18)
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys.
10
AuthPoint Multi-Factor Authentication Logo
AuthPoint Multi-Factor Authentication
4.5
(31)
WatchGuard AuthPoint is the right solution at the right time to make MFA a reality for the businesses who desperately need it to block attacks. Multi-factor authentication (MFA) solution not only helps to reduce the likelihood of network disruptions and data breaches arising from lost or stolen credentials, but we deliver this important capability entirely from the Cloud for easy set-up and management. AuthPoint goes beyond traditional 2-Factor Authentication (2FA) by considering innovative ways to positively identify users, and our large ecosystem of 3rd party integrations means that you can use MFA to protect access to the network, VPNs, and Cloud applications.
Show more
Kate from G2 Crowd

Learning about OAuth.io?

I can help.
* We monitor all OAuth.io reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.