Browse Software
List Your Product
Loading...
Azure AD logo

Azure AD

  Add to Compare

86% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

WSO2 Identity Server logo
Visit Website

87% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

Keycloak logo
Visit Website

Overview

Description WSO2 Identity Server offers AI-driven customer-oriented IAM solutions. With the program, organizations can provide a frictionless, and secure experience to their customers, digitally. The software supports SSO between various logged-in apps for an enhanced digital experience. It enables organizations to federate access to their web and mobile apps across multiple domains with open identity standards, including OIDC, SAML,and WS Federation. Enterprises get to ensure adaptive and multi-factor authentication based on key attributes like risk, context, and identity. The system helps enforce phishing proof and access validation based on security key, or FIDO2 supported biometrics. It is compliant with privacy regulations and industry standards, like CCPA, GDPR, etc. With WSO2 Identity Server enterprises get to evaluate, revoke, and record user consent while acting within privacy guidelines. With open standards like OAuth, the software provides secure access to microservices and APIs. Its inherent open-source value grants access to the program’s codebase. The API-driven solution offers enriched scalability as per the needs of an individual business. Read more Keycloak is an open-source Identity and Access Management solution which provides modern applications and services to the users. The tool makes it easy to secure services and applications with little to no code. It lets users authenticate via Keycloak rather than using individual applications. This means that their applications don't have to deal with login forms, authenticate users or store users. Users don't have to login again to access a different application once they login to Keycloak from a particular app. Single-sign out allows users to logout once to be logged out of all applications that use Keycloak. Using Keycloak, companies can enable login with social networks very quickly through the admin console. All that is required is social network selection; there is no code or application change. Administrators can centrally manage all aspects of the Keycloak server, like enabling and disabling various features using the admin console. Keycloak also allows them to configure identity brokering and user federation. Read more
Pricing Options
  • Free Trial Not Available
  • WSO2 Identity Server Offers Custom plan.
  • Free Trial Not Available
  • Keycloak Offers Custom plan.
SW Score & Breakdown

86% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    97%
  • Reviews
    78%
  • Momentum
    60%
  • Popularity
    65%

87% SW Score The SW Score ranks the products within a particular category on a variety of parameters, to provide a definite ranking system. Read more

  • Features The Feature Score % is calculated using the weighted average method, where core features hold more weight in the final calculation. Read more
    93%
  • Reviews
    70%
  • Momentum
    64%
  • Popularity
    73%
SaaSworthy Awards # 5 Highly Rated # 4 Fastest Growing

Features

Total Features
10 Features
9 Features
Common Features for All
    API Access Management Ensures that calls with authenticated access can enter APIs
    Access Request Management Helps to view and manage access requests submitted by the personnel
    Account Management Helps to manage user accounts within organisations
    Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed
    Multi-factor Authentication Uses more than one method to verify a user's identity for a login
    Password Management Enables the administrator to manage, authenticate and reset passwords
    Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys
    Role Management Helps regulate access to systems, based on individual roles
    Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
    Social Sign On Allows users to sign on using credentials of social networking services
    User Activity Monitoring Monitors and records user activities in the enterprise
  • + 7 More - Show Less
    • API Access Management Ensures that calls with authenticated access can enter APIs
      Access Request Management Helps to view and manage access requests submitted by the personnel
      Account Management Helps to manage user accounts within organisations
      Compliance Management Helps in making an assessment of risks, ensures policy comprehension and that policies/procedures are being followed
      Multi-factor Authentication Uses more than one method to verify a user's identity for a login
      Password Management Enables the administrator to manage, authenticate and reset passwords
      Passwordless Login Allows to login without password using other means of verification, e.g. SSH keys
      Role Management Helps regulate access to systems, based on individual roles
      Single Sign-On (SSO) Permits one set of login credentials to access multiple applications
      Social Sign On Allows users to sign on using credentials of social networking services
      User Activity Monitoring Monitors and records user activities in the enterprise
  • + 6 More - Show Less
  • Technical Details

    Organization Types Supported
    • Large Enterprises
    • Medium Business
    • Small Business
    • Large Enterprises
    • Medium Business
    • Small Business
    Platforms Supported
    • SaaS/Web/Cloud
    • Installed - Windows
    • Installed - Mac
    • SaaS/Web/Cloud
    • Installed - Windows
    • Installed - Mac
    Modes of Support
    • 24/7 (Live rep)
    • Online
    • 24/7 (Live rep)
    • Online
    API Support
    • Available
    • NA

    Reviews & Ratings

    User Rating
    4.3/5 43 user ratings
    4.4/5 19 user ratings
    Ratings Distribution
    • Excellent

      39.5%
    • Very Good

      51.2%
    • Average

      7%
    • Poor

      2.3%
    • Terrible

      0%
    • Excellent

      55%
    • Very Good

      37.5%
    • Average

      5%
    • Poor

      0%
    • Terrible

      2.5%
    Pros & Cons
    • AI-driven customer-oriented IAM solutions
    • Frictionless and secure customer experience
    • Adaptive and multi-factor authentication
    • Compliance with privacy regulations and industry standards
    • Open-source value and API-driven scalability
    • May require technical expertise for implementation
    • Customization options may be limited compared to proprietary solutions
    • Open-source and easy to implement
    • Modern and user-friendly interface
    • Supports social login and single sign-out
    • Centralized management and administration
    • Active community and extensive documentation
    • May not be suitable for large enterprises with complex IAM requirements
    • Limited support for legacy systems and applications
      Read All User Reviews Read All User Reviews

    AI-Generated from the text of User Reviews

    Pricing

    Pricing Options
    • Free Trial Not Available
    • WSO2 Identity Server Offers Custom plan.
    • Free Trial Not Available
    • Keycloak Offers Custom plan.
    Pricing Plans
    Monthly Plans Annual Plans

    WSO2 Identity Server Custom

    Keycloak Custom

     
    View Detailed Pricing
    View Detailed Pricing

    Screenshots & Videos

    Screenshots IS Analytics Admin Console
    + 5 More
    Videos Video Thumbnail
    + 1 More
    Not Available

    Vendor information

    Company Details Located in: Mountain View, California Located in: Raleigh, North Carolina
    Contact Details

    +1 650-745-4499

    https://wso2.com/identity-and-access-management/

    Not available

    https://www.keycloak.org/

    Social Media Handles

    Not available

    FAQs

    What are the key differences between WSO2 Identity Server and Keycloak?

    WSO2 Identity Server focuses on providing AI-driven customer-oriented IAM solutions, while Keycloak is an open-source IAM tool for modern applications.

    What are the alternative products to WSO2 Identity Server?

    The top alternatives to WSO2 Identity Server are Ping Identity, Salesforce Identity, Ubisecure CIAM, AWS IAM, and SailPoint IdentityIQ.

    Which product is better for managing user access across multiple domains?

    Both WSO2 Identity Server and Keycloak offer multi-domain access management capabilities, enabling organizations to federate access to their web and mobile apps across multiple domains.

    How do these products handle compliance with privacy regulations?

    WSO2 Identity Server and Keycloak are both compliant with privacy regulations such as CCPA and GDPR, ensuring that organizations can meet their data protection obligations.

    Can I integrate WSO2 Identity Server with other SaaS products?

    Yes, WSO2 Identity Server offers integration capabilities with various SaaS products, including WordPress, Bitly, and MailChimp.

    We understand SaaS better

    SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

    icon

    Buyers

    Looking for the right SaaS

    We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

    icon

    Makers

    Want more customers?

    Our experts will research about your product and list it on SaaSworthy for FREE.

    Get Listed