

OneLogin and AWS IAM Identity Center are leading products in the identity and access management category. Based on the feature sets and pricing flexibility, OneLogin appears to have an edge with its comprehensive integration capabilities and cost-effectiveness.
Features: OneLogin provides Single Sign-On, Multi-Factor Authentication, and extensive user provisioning, making it ideal for organizations handling multiple applications. Its SmartFactor Authentication enhances security and usability, particularly for global companies with varied IT structures. AWS IAM Identity Center offers centralized management with role and permission templates, optimizing access control within the AWS ecosystem through permission sets and seamless integration across AWS accounts.
Room for Improvement: OneLogin users seek enhanced analytics, better third-party application integration, and a modernized UI to suit larger enterprises. AWS IAM Identity Center could improve on UI clarity, extend integration in complex environments, and benefit from features like time-based user management and policy debugging to better serve large organizations.
Ease of Deployment and Customer Service: Deployment via the public cloud is straightforward for both OneLogin and AWS IAM Identity Center. OneLogin reports inconsistent support following its acquisition by One Identity, raising concerns. AWS IAM Identity Center benefits from Amazon's robust support but faces criticism for its complex setup.
Pricing and ROI: OneLogin is considered cost-effective with competitive pricing and flexible licensing, delivering good ROI by streamlining user management and reducing IT workload. AWS IAM Identity Center attracts budget-conscious users with a free tier, although premium features may incur additional costs impacting ROI based on the implementation's complexity.
The return on investment includes operational efficiency gains, security risk reduction, compliance with regulations, improved user experience, productivity benefits, reduced overhead, and better security posture.
We have achieved significant time efficiencies with AWS IAM Identity Center.
Teams spend far less time on password issues, access requests, and onboarding, often cutting IT tickets by 30 to 50 percent.
We have been able to save 50% of our cost and time.
I notice strong ROI as it helps reduce help desk tickets, provides major time savings in user management, improves productivity with SSO, and provides better security overall, lowering operational costs and increasing efficiency.
AWS provides immediate solutions and assistance whenever needed, especially if issues arise that cannot be handled internally.
They are prompt, keep you updated, and provide excellent assistance.
AWS offers better assistance plans for their services.
I would rate the customer support a 10.
I have contacted support on a few occasions, mainly for advanced configuration guidance, troubleshooting provisioning issues, and clarifying documentation for complex integrations.
Whenever we've had questions or needed help with setup, their team responded quickly and really guided us step by step.
AWS Identity Center successfully supports scalable deployments, allowing additional resources as the company grows.
The scalability of AWS IAM Identity Center is excellent.
It can handle both a small number of users and a bigger number of users efficiently.
Role-based access controls, automated provisioning, and directory integration scale smoothly, allowing me to maintain consistent policies and workflows even as complexity increases.
It has strong technical capabilities designed to be horizontally scalable, easily supporting a large user base without the need for manual infrastructure upgrades.
Since it is a cloud-based IAM platform, scaling is much easier compared to traditional systems.
There can be issues if there is an outage on AWS's side, which could prevent logging in because your region might be down, affecting the Identity Center's availability.
It offers 99.96% uptime.
Stability-wise, it is functioning well without any outages or crashes.
Overall, OneLogin's stability gives me confidence that it can support my organization's current needs and scale as we grow.
There have been no major outages, and performance has been really consistent.
During the trial period, which was for thirty days, I never faced any downtime.
Having a lot of users on one instance is hard to configure, so I hope for more flexibility and ease in configuration.
Enhancements could include automation tools or a centralized dashboard for managing roles and policies across multiple accounts, simplifying the process.
When configuring it with third-party tools, like Active Directory, the naming convention of permission sets requires careful attention, which can be confusing.
More real-time alerts, such as when access fails or MFA is triggered, would help users understand issues faster.
Step-by-step tutorials and troubleshooting guides would help users resolve issues faster without needing to contact support.
It is easy to implement and incorporate in any enterprise, and you can define the ROI pretty fast.
AWS IAM Identity Center is available as a free service by default.
It is not that expensive, rated at three out of ten for costs.
Pricing for AWS IAM Identity Center is very affordable, rated at two out of ten with one being cheap.
The cost is less compared to Okta and Entra ID.
Overall, the pricing, setup, and licensing structure are transparent and deliver a good return on investment, especially when considering the operational efficiency and security improvements gained from using OneLogin.
I consider the pricing of OneLogin to be competitive since it is cheaper than other products I used, such as Okta, which is beneficial for mid-size organizations.
It provides the least privilege-based access control, which limits users to only the operations they need to perform without interfering with unrelated configurations.
These features allow for excellent micro-level control over resources, ensuring specific permissions are granted.
Its valuable features include granular access control, allowing precise control over who can access specific AWS resources and under what conditions using JSON-based policies.
Multi-Factor Authentication is generally useful for adding an extra layer of security, which is crucial, especially for the sensitive nature of the data we handle.
With SmartFactor Authentication, I can balance between them. I can give users an easy and smooth user experience as long as the risk indices are low, but I can implement pretty rigid authentication workflows if the risk gets higher.
OneLogin's best features are its MFA capabilities as well as making it easier to access different applications depending on the user.
| Product | Mindshare (%) |
|---|---|
| OneLogin | 2.8% |
| AWS IAM Identity Center | 1.5% |
| Other | 95.7% |

| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 4 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 92 |
| Midsize Enterprise | 25 |
| Large Enterprise | 47 |
AWS IAM Identity Center provides centralized identity management, permission sets for role creation, and structured access, offering single sign-on and multi-factor authentication while integrating with AWS and third-party apps.
IAM Identity Center offers granular control and flexibility through JSON and attribute-based policies. It facilitates single sign-on, multi-factor authentication, and integrates seamlessly with AWS and third-party applications. By utilizing existing templates, it streamlines permissions allocation. Some users note a lack of clarity in the interface and challenges in integrating with third-party tools, particularly with naming conventions in permission sets. There are requests for enhanced policy visualization, debugging tools, and better documentation on temporary access credentials.
What are the key features of AWS IAM Identity Center?AWS IAM Identity Center is deployed widely for identity management, centralized access, and role-based control. Enterprises manage IAM over multiple AWS accounts and integrate it with systems like Azure AD. It allows setting permissions for DevOps and security teams, ensuring tailored access and limited privilege credentials for testing and deployment.
OneLogin offers organizations a user-friendly platform for single sign-on, multifactor authentication, and seamless access management. It enhances security and streamlines processes, making it vital for application management.
Designed for ease of integration, OneLogin helps organizations efficiently manage access and improve cybersecurity through centralized application management. It simplifies onboarding and offboarding, enhancing remote work capabilities and offering robust user mapping. Users appreciate seamless integration and reliable logs. However, it could improve with enhanced technical support, more out-of-box connectors, and better customization options. Challenges with device management and system integrations have been noted, with legacy application support and infrastructure stability needing attention.
What are the key features of OneLogin?Organizations employ OneLogin for single sign-on and identity management, connecting users to applications like CRM and Slack. It supports role-based access control and seamless cloud transition, integrating with Active Directory to enhance user management in industries demanding strong security and efficiency.
We monitor all Identity and Access Management as a Service (IDaaS) (IAMaaS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.