Who Uses This Software?

Healthcare, Telecommunication, Manufacturing, Financial Services, Government, Education and Energy


Average Ratings

1 Review

  • 4 / 5
    Overall

  • 4 / 5
    Ease of Use

  • 3 / 5
    Customer Service

Product Details

  • Starting Price
    Not provided by vendor
  • Free Version
    Yes
  • Free Trial
    Yes
  • Deployment
    Cloud, SaaS, Web
    Installed - Windows
  • Training
    Documentation
    Webinars
    Live Online
    In Person
  • Support
    Online
    24/7 (Live Rep)

Vendor Details

  • OpenIAM
  • www.openiam.com
  • Founded 2008

About Identity Manager

Enterprise Open Source Identity and Access Management suite with password management, access governance, provisioning, role management, and delegated administration features. Built with a unified architecture so you are deploying one product versus many, leading to a system that is simple to use with a lower total cost of ownership. Strong integration with AD, Exchange, Google and Office365.


Identity Manager Features

  • Access Request Management
  • Account Management
  • Compliance Management
  • Multifactor Authentication
  • Password Management
  • Role Management
  • Single Sign On
  • User Activity Monitoring
  • User Provisioning

Identity Manager Reviews Recently Reviewed!


Used >6 yrs, now on v3.5 using all IAM features for 20,000+ Users on 1 server - it just works!

Jul 19, 2018
4/5
Overall

4 / 5
Ease of Use

5 / 5
Features & Functionality

3 / 5
Customer Support

5 / 5
Value for Money
Likelihood to Recommend: 9.0/10 Not
Likely
Extremely
Likely

Pros: Full Features, all integrated (not different pieces glued together), very reliability, and you can configure all of the functions and screens to be exactly what you want.

Cons: Not really their problem - But Identity and Access is about defining clear process & policy, together with real- integration of multiple sources, so the task is never simple to do right.

Overall: Simplified Single-Click provisioning and de-provisioning of Users, along with great security controls and logging of who is accessing what resources, when and on what device, and very few HelpDesk calls for password issues.