Home/Identity and Access Management (IAM) Software/One Identity vs KeycloakUpdated on: January 27, 2023

Compare One Identity vs Keycloak

88% The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More Remove
88% The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More Remove
Visit Website

Visit Website

ADD PRODUCT
88% The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More Remove
88% The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read More Remove
Visit Website

Visit Website

Overview

Summary

One Identity is an advanced identity and access management tool that helps businesses to establish an identity-centric security strategy with Privileged Access Management (PAM) solutions. The tool helps to mitigate risk, secure data, satisfy compliance and meet uptime requirements by offering customers access to data and applications they need. With the Identity Manager, users can not only unify information security policies but can even fulfil governance needs in present times and into the future. One Identity comes with certified SAP integration offering advanced capabilities to enhance existing SAP security models and even improves them. Businesses can make better decisions by combining security information and policies from multiple sources to reduce risks. Further, One Identity provides auditors with detailed, real-time governance reports that include information about the available resources in the users’ environment and who has access to them. The tool also helps to achieve unified governance for all employees, regardless of their role and level of access. ..show more

Keycloak is an open-source Identity and Access Management solution which provides modern applications and services to the users. The tool makes it easy to secure services and applications with little to no code. It lets users authenticate via Keycloak rather than using individual applications. This means that their applications don't have to deal with login forms, authenticate users or store users. Users don't have to login again to access a different application once they login to Keycloak from a particular app. Single-sign out allows users to logout once to be logged out of all applications that use Keycloak. Using Keycloak, companies can enable login with social networks very quickly through the admin console. All that is required is social network selection; there is no code or application change. Administrators can centrally manage all aspects of the Keycloak server, like enabling and disabling various features using the admin console. Keycloak also allows them to configure identity brokering and user federation. ..show more

Features

API Access Management Ensures that calls with authenticated access can enter APIs

Access Request Management Helps to view and manage access requests submitted by the personnel

Account Management Helps to manage user accounts within organisations

Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed

Multi-factor Authentication Uses more than one method to verify a user's identity for a login

Password Management Enables the administrator to manage, authenticate and reset passwords

Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys

Role Management Helps regulate access to systems, based on individual roles

Single Sign-On (SSO) Permits one set of login credentials to access multiple applications

Social Sign On Allows users to sign on using credentials of social networking services

User Activity Monitoring Monitors and records user activities in the enterprise

TECHNICAL DETAILS

Access Monitoring

24/7 (Live rep)

Business Hours

Online

Contact Number/Address

Aliso Viejo, California / 1-800-306-9329

N/A

API

Deployment

SaaS/Web/Cloud

Mobile - Android

Mobile - iOS

Mobile - Windows

Mobile - BlackBerry

Installed - Windows

Installed - Mac

Customers

Individuals

Freelancers

Large Enterprises

Medium Business

Small Business

Pricing

Pricing Model

Free Trial

Freemium

One-time license

Open-source

Subscription

Quotation Based

Plans

One Identity
Custom

Features

  • Provisioning
  • Process Orchestration
  • Password Management
  • Extend AD-based identity administration to UNIX/Linux
  • Identity administration for cloud applications
  • Identity Lifecycle
  • Access Certification
  • Privileged Account Governance
  • Access Request
  • Auditing
  • Data Governance
  • Privileged Session Management
View Price Page
Keycloak
Custom

Features

  • Single-Sign On
  • Standard Protocols
  • Centralized Management
  • Adapters
  • LDAP and Active Directory
  • Social Login
  • Identity Brokering
  • High Performance
  • Clustering
  • Themes
  • Extensible
  • Password Policies
View Price Page

SCREENSHOTS

One Identity Screenshots
View 0 screenshot(s)
Keycloak Screenshots
View 6 screenshot(s)

INTEGRATIONS

  • Safeguard
  • Microsoft Azure
    NA

ALTERNATIVES

Top alternatives to One Identity

Keycloak
Keycloak
Microsoft Azure
Microsoft Azure
Thycotic Secret Server
Thycotic Secret Server
Azure AD
Azure AD
OneLogin
OneLogin

Top alternatives to Keycloak

WSO2 API Manager
WSO2 API Manager
Gluu
Gluu
Azure AD
Azure AD
Cognito
Cognito
Auth0
Auth0