Capterra’s researchers use a mix of verified reviews, independent research and objective methodologies to bring you selection and ranking information you can trust. While we may earn a referral fee when you visit a provider through our links or speak to an advisor, this has no influence on our research or methodology.
Capterra carefully verified over 2 million reviews to bring you authentic software and services experiences from real users. Our human moderators verify that reviewers are real people and that reviews are authentic. They use leading tech to analyze text quality and to detect plagiarism and generative AI. Learn more.
Capterra lists all providers across its website—not just those that pay us—so that users can make informed purchase decisions. Capterra is free for users. Software and service providers pay us for sponsored profiles to receive web traffic and sales opportunities. Sponsored profiles include a link-out icon that takes users to the provider’s website. Learn more.
Auth0 makes identity work for everyone, whether you’re enabling enterprise identity integration, SSO, and MFA for business partners (B2B), or protecting customer identities through CIAM (B2C).
Chief Information Officer , Chief Technology Officer , Chief Information Security Officer , Chief Digital Officer , Solutions Architect , Enterprise Architect , Identity Management Consultant , Securi...
It has been a positive experience. It performs very well, is flexible and has proven to be a good solution for our products.
I've struggled integrating auth0 in the back end with Node.js applications without getting a definitive error message that shows what is failing. Integrating Auth0 on the front end is simpler.
We've been using Auth0 to manage access to hosted applications that are accessed by both employees and customer employees. Setup is easy, and functionality and reliability is very good.
Documentation was a bit confusing to beginners.
Good documentation and very supportive customer support. Fairly easy to integrate into existing projects.
Some limitations: maximum user search result (1000) not clear until we encountered it and the lack of user containers (groups).
It's a platform with a great feature set, one of the best developer experience and correct pricing.
Also, the system management tools can sometimes be a bit of a mess with too many tools because sometimes it is not easy to locate particular settings within the tool.
Ping ID has also been easy to configure and is a nice MFA tool. We have not rolled it out to the whole company yet but the bet users love the ease of use.
My only complaint is some of the transitions can be confusing. For example, after adding a new device there is a brief pause before the device is authenticated.
Rich product suite enabling both Workforce/Enterprise IAM and Customer IAM. Strong cloud capabilities with on-prem components, in whatever mix works best for me.
Also if the phone the ID is linked to is lost or broken to a point it's not usable, it can be difficult to authorise a new device for pairing without support from IT.
This could also be a great individual help for freelancers and workers who aim to secure their data at home.
Sometime mfa messages comes with lag or get lost. When selecting the preferred device as well the response time is high.
Unparalleled support for federation standards, great integration with infrastructure, good APIs for integration.
Documentation can be confusing, rely on an experienced integration partner or online tutorials.
Speaker 1: Hi, my name is Andrew. I'm an SEO manager. I would give Ping ID a four out of five. For more reviews like this, click below. Prior to using Ping ID, we used Microsoft's proprietary authenticator. And that was very good. We had a lot of issues with mobile authentication, however. The reason we chose to go with Ping ID was because of its reputation in the industry. And also because of its extensive mobile apps to facilitate the authentication process. Getting started with Ping ID was fairly straightforward, fairly easy. It did take a little configuration because of our setup with our servers. However, once we're up and running, it was pretty seamless. For any organization thinking about getting Ping ID, I'd recommend that they look at alternatives such as Microsoft's own authenticator and identify what's important to their organization and whether Ping ID would be an asset within their organization. The Microsoft authenticator is a great tool, but there are some areas where it falls short.
Auth0
Top FeaturesPing Identity
Auth0
--
Ping Identity
--
Products similar to those you're currently comparing: