Browse Software
List Your Product
Loading...
Authentik logo

Authentik

  Add to Compare

86% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Cognito logo
Visit Website

89% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Keycloak logo
Visit Website

Overview

Description Cognito is an Identity and Access Management software that comes with an identity verification service and needs just a phone number to begin verifying your customers, which in turn assists you in streamlining your flow and cutting down troublesome inputs. It helps minimize manual review to the maximum while increasing match rate through highest quality regulated data on the market. It slowly gathers all required data from customers to verify them with the least information provided, without compromising on security and adhering to the strictest standards and best policies prevalent in the industry. It even automates compliance processes with the assistance of modern systems, helps verify age of customers if you happen to sell age-restricted goods and services and even enables real-time sanction screening while dealing with potential customers. It makes sharing links and creating new verification links possible, without writing codes, through its powerful and intuitive dashboard. Last, but not the least, the data that Cognito software provides is primary and hundred percent up-to-date. Read more Keycloak is an open-source Identity and Access Management solution which provides modern applications and services to the users. The tool makes it easy to secure services and applications with little to no code. It lets users authenticate via Keycloak rather than using individual applications. This means that their applications don't have to deal with login forms, authenticate users or store users. Users don't have to login again to access a different application once they login to Keycloak from a particular app. Single-sign out allows users to logout once to be logged out of all applications that use Keycloak. Using Keycloak, companies can enable login with social networks very quickly through the admin console. All that is required is social network selection; there is no code or application change. Administrators can centrally manage all aspects of the Keycloak server, like enabling and disabling various features using the admin console. Keycloak also allows them to configure identity brokering and user federation. Read more
Pricing Options
  • Free Trial Available
  • Starts at $0.10.
  • Free Trial Not Available
  • Offers Free-forever plan.
SW Score & Breakdown

86% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    100%
  • Reviews
    66%
  • Momentum
    60%
  • Popularity
    76%

89% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    93%
  • Reviews
    73%
  • Momentum
    71%
  • Popularity
    73%
SaaSworthy Awards
Not Available
# 4 Fastest Growing

Features

Total Features
11 Features
9 Features
Common Features for All
    API Access Management Ensures that calls with authenticated access can enter APIs
    Access Request Management Helps to view and manage access requests submitted by the personnel
    Account Management Helps to manage user accounts within organisations
    Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed
    Multi-factor Authentication Uses more than one method to verify a user's identity for a login
    Password Management Enables the administrator to manage, authenticate and reset passwords
    Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys
    Role Management Helps regulate access to systems, based on individual roles
    Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
    Social Sign On Allows users to sign on using credentials of social networking services
    User Activity Monitoring Monitors and records user activities in the enterprise
  • + 8 More - Show Less
    • API Access Management Ensures that calls with authenticated access can enter APIs
      Access Request Management Helps to view and manage access requests submitted by the personnel
      Account Management Helps to manage user accounts within organisations
      Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed
      Multi-factor Authentication Uses more than one method to verify a user's identity for a login
      Password Management Enables the administrator to manage, authenticate and reset passwords
      Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys
      Role Management Helps regulate access to systems, based on individual roles
      Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
      Social Sign On Allows users to sign on using credentials of social networking services
      User Activity Monitoring Monitors and records user activities in the enterprise
  • + 6 More - Show Less
  • Technical Details

    Organization Types Supported
    • Large Enterprises
    • Medium Business
    • Small Business
    • Large Enterprises
    • Medium Business
    • Small Business
    Platforms Supported
    • SaaS/Web/Cloud
    • Installed - Windows
    • SaaS/Web/Cloud
    • Installed - Windows
    Modes of Support
    • Online
    • Online

    Reviews & Ratings

    User Rating
    5/5 1 user ratings
    4.5/5 44 user ratings
    Rating Distribution
    • Excellent

      100%
    • Very Good

      0%
    • Average

      0%
    • Poor

      0%
    • Terrible

      0%
    • Excellent

      54.5%
    • Very Good

      40.9%
    • Average

      4.5%
    • Poor

      0%
    • Terrible

      0%
    Pros & Cons
    • Streamlines verification flow and reduces manual review.
    • Verifies customers with minimal information, adhering to industry standards.
    • Automates compliance processes and verifies customer age for age-restricted products.
    • Enables real-time sanction screening.
    • Provides up-to-date and primary data.
    • May require additional setup and configuration.
    • May not be suitable for all industries or use cases.
    • Open-source and cost-effective solution.
    • Provides modern authentication and access management for applications.
    • Supports single sign-on and social login.
    • Offers centralized administration and management.
    • Allows for easy integration with social networks.
    • May require technical expertise for implementation.
    • May not offer all the features of commercial IAM solutions.
      Read All User Reviews Read All User Reviews

    AI-Generated from the text of User Reviews

    Pricing

    Pricing Options
    • Free Trial Available
    • Starts at $0.10.
    • Free Trial Not Available
    • Offers Free-forever plan.
    Pricing Plans
    Monthly Plans Annual Plans

    Flow $2.49 $2.49 per user / month

    Identity $0.99 $0.99 per user / month

    Screening $0.10 $0.10 per user / month

    Keycloak Free

     
    View Detailed Pricing
    View Detailed Pricing

    Screenshots & Videos

    Screenshots Not Available Admin Console
    + 5 More
    Videos Video Thumbnail Not Available

    Vendor information

    Company Details Located in: Palo Alto, California Founded in: 2013 Located in: Raleigh, North Carolina
    Contact Details

    Not available

    https://cognitohq.com/products/identity-verification-service/

    Not available

    https://www.keycloak.org/

    Social Media Handles

    FAQs

    What are the key differences between Cognito and Keycloak?

    Cognito focuses on identity verification with minimal manual review, while Keycloak is an open-source IAM solution for modern applications.

    What are the alternative products to Cognito?

    The top alternatives to Cognito are Auth0, iDenfy, IBM Security Verify Access, AWS IAM, and Salesforce Identity.

    What are the alternative products to Keycloak?

    The top alternatives to Keycloak are Auth0, Azure AD, Okta, Teamstack, and Oracle Identity Management.

    Which product offers more comprehensive identity verification features?

    Cognito offers more comprehensive identity verification features, including phone number verification, age verification, and real-time sanction screening.

    Which product is more suitable for large-scale identity management?

    Both Cognito and Keycloak are suitable for large-scale identity management, with Cognito offering a cloud-based solution and Keycloak providing an open-source option.

    We understand SaaS better

    SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

    icon

    Buyers

    Looking for the right SaaS

    We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

    icon

    Makers

    Want more customers?

    Our experts will research about your product and list it on SaaSworthy for FREE.

    Get Listed