We utilize One Identity Manager to manage the employee lifecycle, provision user accounts, administer numerous systems, and maintain a web portal.
IDM Senior Engineer at a tech services company with 1,001-5,000 employees
Provides good performance, has a nice appearance, and helps minimize governance
Pros and Cons
- "The most valuable features are the behavior, configuration, and customization options."
- "Using dynamic business roles can degrade the performance of One Identity Manager."
What is our primary use case?
How has it helped my organization?
One Identity Manager's ability to consolidate tools helps simplify the administration process.
I would rate the UI nine out of ten. The performance and appearance have improved since the new portal was implemented.
With my experience and the help of the user community, customizing One Identity Manager is not difficult.
The business roles feature is easy to use.
We see the benefits of One Identity Manager within weeks of deployment.
One Identity Manager helps minimize governance gaps between test, development, and production servers. An administrator's experience typically correlates with increased ease of use.
One Identity Manager simplifies the process of determining application access. Integration is straightforward for standard systems like Active Directory or Exchange, but connecting custom web applications requires developing a connector, which is time-consuming but manageable for experienced programmers.
What is most valuable?
One Identity Manager is more reliable than other identity managers. The most valuable features are the behavior, configuration, and customization options.
What needs improvement?
Using dynamic business roles can degrade the performance of One Identity Manager.
I would like to have better documentation for configuring other Microsoft systems.
Buyer's Guide
One Identity Manager
April 2026
Learn what your peers think about One Identity Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
893,244 professionals have used our research since 2012.
For how long have I used the solution?
I have been using One Identity Manager for almost four years.
What do I think about the stability of the solution?
One Identity Manager is stable. If it crashes, it is due to human error, not the solution itself.
What do I think about the scalability of the solution?
One Identity Manager's scalability depends on the use of other Microsoft systems, such as SQL and Windows servers.
How was the initial setup?
The deployment is straightforward. The deployment takes between one and two hours and requires one engineer. The overall implementation requires a team consisting of an architect, an analyzer, one or two programs, testers, and an engineer.
What about the implementation team?
We are integrators who implement One Identity Manager for our customers.
What other advice do I have?
I would rate One Identity Manager nine out of ten.
In most cases, the customer doesn't need to do any maintenance.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cyber Security Analyst at a tech vendor with 10,001+ employees
A single platform that is customizable and user-friendly
Pros and Cons
- "One Identity Manager's account creation feature stands out as its most valuable functionality."
- "I would like One Identity Manager to offer an easier way for users to learn to use their new features."
What is our primary use case?
We operate in three regions and use One Identity Manager for identity governance.
How has it helped my organization?
One Identity Manager enables us to manage SAP systems efficiently. We can configure user settings and assign global and business roles, adding them to the directory regardless of their account activation status.
One Identity Manager integrates SAP accounts with employee identities. We can create accounts by importing job data into the server. However, if an employee's data is missing, we must input it first to create their profile.
One Identity Manager provides a single platform for enterprise-level administration and governance of users' data and privileged accounts.
The interface is intuitive, displaying all employee details and allowing for direct edits after account creation.
Customizing One Identity Manager is easy to do.
One Identity Manager allows us to manage business roles, including adding and removing them through the deployment flow sheet.
One Identity Manager is user-friendly, offering both ease of understanding and management. From a central console, we can apply both business and referral roles.
One Identity Manager helps to make procurement and licensing easier.
One Identity Manager helps us achieve an identity-centric zero-trust model.
What is most valuable?
One Identity Manager's account creation feature stands out as its most valuable functionality.
What needs improvement?
I would like One Identity Manager to offer an easier way for users to learn to use their new features.
For how long have I used the solution?
I have been using One Identity Manager for two years.
What do I think about the stability of the solution?
One Identity Manager is stable.
How was the initial setup?
The initial deployment of One Identity Manager was straightforward. We have three environments where we deploy the load sheets to servers in a top-down approach. For removal, we follow the same procedure in reverse order.
What other advice do I have?
I would rate One Identity Manager nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
One Identity Manager
April 2026
Learn what your peers think about One Identity Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
893,244 professionals have used our research since 2012.
Works at a healthcare company with 10,001+ employees
Is user-friendly and streamlines operations but it could benefit from more advanced reporting
Pros and Cons
- "The self-service functionality of One Identity Manager is arguably the most valuable feature."
- "I would like to have more advanced features and reporting added to One Identity Manager."
What is our primary use case?
We use One Identity Manager to control what our users access.
How has it helped my organization?
Having a single platform helps streamline operations and connect to multiple systems, centralizing information for improved access and efficiency by eliminating the need for redundant software.
The UI is intuitive and user-friendly, so it doesn't require much training.
One Identity Manager has helped streamline our processes. Now we are all synced and data is not lost between teams.
One Identity Manager provides governance helping minimize the gaps within our test, dev, and production servers.
One Identity Manager provides governance helping minimize the gaps between privileged users and standard users.
One Identity Manager helps streamline application auditing.
What is most valuable?
The self-service functionality of One Identity Manager is arguably the most valuable feature. It allows us to easily initiate access requests for new hires through a user-friendly interface. This information is automatically sent to HR for review. Similarly, for departing employees, the intuitive interface enables us to import their details and trigger the termination process seamlessly.
What needs improvement?
I would like to have more advanced features and reporting added to One Identity Manager.
For how long have I used the solution?
I have been using One Identity Manager for four years.
What do I think about the stability of the solution?
I have not experienced any stability issues with One Identity Manager.
What do I think about the scalability of the solution?
One Identity Manager is scalable.
What other advice do I have?
I would rate One Identity Manager a seven out of ten.
No maintenance is required on our end.
I recommend that organizations considering One Identity Manager ensure it aligns with their use cases and user base before implementation.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Works at a comms service provider with 1-10 employees
Efficient application governance, robust documentation, and offers responsive support
Pros and Cons
- "The portfolio view simplifies this process, eliminating the need to check through Tableau or other tools."
- "I would like them to enhance the search functionality to enable faster processing when looking for objects."
What is our primary use case?
The primary use case involves overseeing comprehensive identity and access provisioning, along with managing the onboarding and de-provisioning processes for users. This includes orchestrating the creation of new projects, conducting simulations, and ensuring synchronization between a core solution and other target systems.
How has it helped my organization?
We utilize One Identity Manager to assist in SAP management. When connecting to an SAP target system, the synchronization of data is facilitated. Following the data sync process, all users can be reviewed within One Identity Manager under the SAP user tab. Furthermore, this tool allows us to publish data seamlessly from One Identity to various target systems.
Identity Governance and Administration is particularly beneficial for addressing the complexities associated with managing SAP, especially when dealing with aspects like transaction code (t-code) profiles and rules. It's important to note that while One Identity Manager doesn't specifically handle t-codes, it does provide functionality through the manager for managing files, rules, and other relevant features associated with transaction codes.
I haven't observed specialized workflows or specific business logic for SAP in One Identity Manager.
One Identity Manager serves as a consolidated platform for enterprise-level administration, offering governance over user data, privileged accounts, and related aspects. It's particularly effective in managing privileged accounts. By incorporating the manager, administrators can easily assign resources, facilitating the seamless management of admin accounts. The available features within the manager enable the creation of special identities, such as admin accounts.
The user experience with One Identity Manager is excellent. It's highly user-friendly, with well-organized features that make exploration intuitive. Everything, including account definitions, is easily accessible in the manager module. You can efficiently check the status and associations of objects, such as which projects or other objects are linked to a specific one.
Customizing the manager to meet our specific needs is crucial, as there are some limitations tied to factors like database performance. These limitations are often dependent on the volume of data being imported or synchronized. It's important to note that the platform's performance can be impacted when dealing with a high volume of data, potentially leading to degradation in performance.
I've utilized the Business Roles feature to map company structures, and it's a highly valuable tool as it allows you to define a set of rules for various markets. This feature facilitates logic and rule sets associated with market specifications. Under the business roles section, you can easily identify how markets can request access through IT software products and sales tools. Each business role is linked to specific SAP roles, creating a layered structure. This functionality simplifies understanding of the connection between SAP roles and business roles. If you're searching for a particular SAP role, you can efficiently locate it within the corresponding business role and vice versa. The platform also makes it easy to check mappings, and if new business roles need to be created, the process is streamlined within the Manager.
The Manager aids in reducing governance gaps among Test, Dev, and Production Servers. By synchronizing data monthly from the production system to the development and sandbox environments, this approach effectively minimizes any potential gaps in governance coverage.
It assists in streamlining decisions related to application access.
It does not include features for application compliance and auditing. Application auditing is not a capability provided. We do have Application rules in place, and for auditing, we utilize the attestation feature available in the Manager. However, it's important to note that managing the entire application is not within the scope of the tool.
What is most valuable?
In the Manager tools, my favorite feature is the ability to obtain a comprehensive overview of any user efficiently. The portfolio view simplifies this process, eliminating the need to check through Tableau or other tools. Another significant advantage is the quick and easy creation of mappings, roles, and IT configurations for various products within One Identity Manager. This feature stands out as a valuable and time-saving capability in the manager tools.
In our Governance and management tool, One Identity Manager plays a crucial role in connecting SAP accounts to employee identities. This integration ensures that all identities are linked to their respective employee profiles. This connection is of utmost importance because if, for instance, a login is enabled for a specific user, maintaining a consistent ID becomes essential. With One Identity, this process becomes seamless, allowing the replication of related attributes across all relevant systems and ensuring a cohesive identity management approach.
What needs improvement?
I would like them to enhance the search functionality to enable faster processing when looking for objects. Ideally, the system should automatically identify relevant entries and promptly present the results, eliminating the need for users to input search criteria each time they look for specific objects.
For how long have I used the solution?
I have been using it for the last six years.
What do I think about the stability of the solution?
I would rate its stability capabilities eight out of ten.
What do I think about the scalability of the solution?
I would rate the scalability abilities nine out of ten.
How are customer service and support?
Whenever we require support from One Identity, we initiate a service request, and the support team is readily accessible. They typically respond within twenty-four hours and effectively assist us with any issues we encounter. The support from One Identity has been reliable and responsive. I would rate it eight out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial deployment was straightforward and smooth, mainly due to the clarity provided in the installation guide. Following the step-by-step instructions outlined in the documentation from the One Identity solution made the deployment and setup process very simple.
What about the implementation team?
With the assistance of an architect, I managed the deployment process by completing just the configurations for the initial installation of One Identity. Maintenance during deployment is essential, especially when there are significant changes and script modifications aimed at improving performance. System maintenance is a necessary step in ensuring optimal functionality, and we routinely undertake these tasks.
What other advice do I have?
The system lacks the capability to empower application orders in the line of Business Management to independently make governance decisions for applications without requiring IT involvement.
It did not assist us in realizing an Identity-centric Zero Trust model.
I recommend that individuals working with this system should possess some knowledge of Microsoft SQL and be familiar with server configurations. A good understanding of SQL servers can simplify the process of comprehending and managing cloud repairs. I would rate it nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
COO at a comms service provider with 11-50 employees
Seamless user experience, excellent intuitiveness, and offers a good integration with SAP
Pros and Cons
- "The solution offers good integration with other environments such as SAP and Active Directory, et cetera."
- "It’s not something you get from the beginning. It’s not like Windows. It is more complicated. You need to know a few things from the back end, however, as you learn it, it becomes easy."
What is our primary use case?
We use the solution for managing identity access in a production company with nearly 6,000 users and more than 10,000 employees.
How has it helped my organization?
The main benefit is that it makes it easier to comply with GDPR. It makes it much, much easier. Also, it helps with data privacy and everything. It reduced the workload on the help desk and other departments that deal with user access and provisioning providers for users.
What is most valuable?
The solution offers good integration with other environments such as SAP and Active Directory, et cetera. We are managing access and managing all the provisioning of user access and accounts.
We manage the product to help manage SAP. The solution is okay for providing an enterprise view for the management of logically disconnected SAP accounts. It is quite complicated since SAP has quite a structure for these roles and accesses, however, it is quite manageable in One Identity and it is well supported with proper support from our external provider. We finally managed to make it perform. It is now working well.
One Identity Manager connects SAP accounts to employ identities under governance. This is important. We had it implemented before only based on requests without active-active connection. There were quite a lot of non-matched users, and what happened a lot was that we would have users who had left the company and were still active in SAP. So now when a user leaves the company it’s not an issue. Also, the SAP account is already provisioned. This ensures data protection and the privacy of users and everything.
If I were to assess One Identity Manager for providing us with a single platform for enterprise-level administration and governance of users, data, and privileged accounts, I’d rate it highly. From a rating of five, I’d rate it 4.9.
The solution's user experience and intuitiveness are good. It’s extensive.
How easy it is to customize really depends on the level of desired customizations. There are some customizations out of the box while others require quite a lot of coding. In that case, I’d suggest a person uses support or gets external support.
What needs improvement?
You do need to learn it. It’s not something you get from the beginning. It’s not like Windows. It is more complicated. You need to know a few things from the back end, however, as you learn it, it becomes easy.
For how long have I used the solution?
I've used the solution for four or more years.
What other advice do I have?
I'd rate the solution nine out of ten.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Manager IAM at a computer software company with 11-50 employees
Delivers SAP-specialized workflows and business logic and has solutions for all needs related to the IDE and privileged identity
Pros and Cons
- "The most valuable feature of One Identity Manager is it simplifies user-account provisioning and administration. One Identity offers a comprehensive range of solutions that cater to almost every aspect of the identity and access management domain."
- "One Identity Manager is currently in the process of modernizing its UI, which I hope will result in a more user-friendly interface for its Identity Manager. However, it is uncertain whether they have plans to consolidate their various tools into a unified system to simplify configuration and tasks."
What is our primary use case?
The purpose of One Identity Manager is to implement identity and access management tools. For on-premises use, we must connect various target systems and trusted sources with the central identity and access management tools. This involves integrating Workday or other HR management systems with One Identity Manager and linking authentication sources, such as Active Directory or Azure AD, with One Identity Manager. Additionally, One Identity Manager has a specialized connector library for SAP solutions.
This solution can be deployed on the cloud and on-premise.
How has it helped my organization?
One Identity Manager connects SAP accounts to employee identities under governance from the connections that are provided.
For customers who already have an SAP system in place, the availability of readily available, specially-designed connectors is crucial. This would be highly beneficial for all clients with SAP systems.
The solution delivers SAP-specialized workflows and business logic.
This vendor provides end-to-end solutions that cover a wide range of areas related to user administration and governance, such as identity governance and administration, identity management, access management, and cloud-based solutions. They are also one of the few vendors to offer complete privileged account management solutions. Recently, they acquired OneLogin, which adds customer identity and access management to their comprehensive offering.
One Identity has solutions for all needs related to the IDE and privileged identity.
One Identity Manager provides a Web UI interface for users, which is currently being modernized through their latest initiative UI. Looking at their roadmap, we can expect to see more advanced UI from One Identity Manager in the future, reflecting ongoing product improvement.
Customizing One Identity Manager to fit specific needs is moderately difficult. With the help of experts, customization is possible, although it may not be a straightforward process. While it is not extremely difficult, it does require some level of expertise to carry out successful customization. One Identity Manager offers various tools for different customization requirements. Having the appropriately skilled resources available can greatly facilitate the customization process.
We make use of the solution's business rules to map our company structure for dynamic application provisioning. The importance of the business rules functionality lies in its ability to assist business analysts in designing organizational approval and provisioning policies. When gathering requirements, business analysts can utilize business rules to create effective policies that meet their needs and achieve their goals.
Connectors are available for both on-premise solutions and cloud-based applications or systems. One Identity Manager offers Starlink connectors specifically for connecting to cloud-based solutions. Although I have not personally worked with this offering, I am aware that it is available.
One Identity Manager helps to minimize gaps in governance coverage across test, dev, and production servers. They offer a feature that allows for the import and export of work, which is useful for moving content between different environments.
Reducing gaps in operations is crucial, not just for identity management but for any product. One way to achieve this is by synchronizing test, dev, and production environments as closely as possible. While it may not be feasible to replicate production exactly, having a miniature model that closely resembles it can greatly reduce gaps and potential problems. This concept applies to all identity and access management products when implementing them. The closer your test or dev environment is to production, the better you can reduce gaps and find potential problems that could arise in production. By identifying these issues in the test or dev environment, you can address them before they occur in the production environment.
The solution has helped create a privileged governance stance to close the security gap between privileged users and standard users.
The critical capabilities of any identity management product are operational activities such as providing access, provisioning, and deep provisioning. These tools are essential to efficiently manage identity and access. However, I am a bit confused about how licensing works with these capabilities.
The solution aids in simplifying application governance aspects such as making decisions regarding application access, ensuring application compliance, and conducting application audits.
The application governance requirements are being taken into consideration while designing and implementing streamlined solutions, which prove to be helpful.
One Identity Manager provides a dedicated module that enables us to set up a test station as per specific requirements. These test stations can be reviewed by the respective managers and their subordinate application orders based on roles. There is also a notification system in place to keep users informed.
In One Identity Manager, there is a module for review and attestation cycles. Whenever this cycle is triggered, notifications are sent to the respective parties who need to take action on their subordinates or evaluate role members. All of these features are available in One Identity Manager and can help fulfill business requirements. Moreover, One Identity Manager can indirectly assist in managing compliance auditing by tracking all actions, such as who performed them and when. This can be beneficial during external or internal audits as it helps in generating reports.
The solution positively impacted our operations and business by allowing us to streamline account provisioning for new hires and employees transferring between departments. When a new member joins my department, their line manager can request the creation of their account in advance. The request is then approved by concerned approvers and notifications are sent out. This reduces the onboarding time for new employees and ensures a smooth transition when an employee moves to a new department. Access can be removed or granted as per the requirements of the new department and line managers can request these changes through the portal, further simplifying the process.
The zero trust model can be implemented based on our understanding of the requirements. We need to design the business policies, rules, role membership, dynamic role membership, group memberships, etc., based on our understanding of zero trust. We need to set up the rules and policies according to the zero trust model and then implement them to achieve our business objectives. This includes designing policies based on departments, roles, job titles, and locations. By doing this, we can effectively implement the zero-trust policy.
What is most valuable?
The most valuable feature of One Identity Manager is it simplifies user-account provisioning and administration. One Identity offers a comprehensive range of solutions that cater to almost every aspect of the identity and access management domain. Their solution suite includes a login solution for access management that can be seamlessly integrated with your IGS solution. Additionally, they offer a dedicated tool for IGA that fulfills all your identity and assessment requirements. In addition, they have a solution called One Identity Safeguard for identity management and access management, which is gaining increased importance. With One Identity, you can obtain end-to-end solutions from a single vendor, whereas with other vendors, you would need to combine various vendors to achieve the same result.
What needs improvement?
The tools within One Identity Manager are distributed, meaning there is no unified platform that covers all development, configuration, and installation details. Instead, there are separate tools for each requirement, such as object browser designer, manager tool, synchronization editor, report designer, job queue, and DBQueue. While these tools have built-in functionality, it can be tedious to learn and implement them all. This is in contrast to SharePoint, where all requirements related to role management, workflows, provisioning, and connector configuration can be implemented in one portal. In the case of One Identity Manager, different tools need to be used for each respective requirement. For example, the sync editor is used for connector configuration and related synchronization, while the job queue and DBQueue are used for monitoring jobs.
One Identity Manager is currently in the process of modernizing its UI, which I hope will result in a more user-friendly interface for its Identity Manager. However, it is uncertain whether they have plans to consolidate their various tools into a unified system to simplify configuration and tasks.
It is important to note that this modernization effort is a long-term goal, given that this solution has been in the industry for over 20 to 30 years. Despite its age, it remains one of the leading solutions in the market and is recognized by Gartner and other similar institutions as a top solution.
For how long have I used the solution?
I have been using One Identity Manager for approximately one year.
What do I think about the stability of the solution?
The solution is stable in my usage. Since the setup is distributed, there are several components in the environment. Regular monitoring allows us to take appropriate actions when necessary. The solution is stable and scalable according to the available data and comparisons with other vendors' products, as evidenced by reports from Gartner and other evaluators such as Scooping Your Coal. Based on a comparative analysis of multiple products, including those of leading competitors, I have come to this conclusion. These analysis reports are typically released annually.
I rate the stability of One Identity Manager a seven out of ten.
What do I think about the scalability of the solution?
One Identity Manager loads various identity and access management tools, it necessitates multiple instances for applications, web servers, and job server services. Therefore, the installation requires a substantially distributed setup but overall it is scalable.
I rate the scalability of One Identity Manager a seven out of ten.
How are customer service and support?
I have not used the support from the vendor. One Identity has various support sites, such as the support center and community sites, which can help address any questions or issues related to One Identity products. However, my experience with these sites is limited, and I cannot provide more detailed information.
How was the initial setup?
Installing One Identity Manager can be considered moderately difficult, but not overly so since it is based entirely on the Microsoft Windows platform. In comparison to other software installations, it is moderate in difficulty and should not be too challenging to complete.
The deployment timeframe for One Identity Manager varies depending on the size and scope of the project or proof-of-concept. It is difficult to provide a specific estimate without knowing more about the project requirements. Generally, it can take anywhere from three to six months to complete the deployment based on the project scope.
If you want to showcase the functionality of One Identity Manager, the solution provides a cloud environment to its partners with a pre-installed setup. You can use this environment to demonstrate to the customer for a limited time of about one week. This is a quick and easy way to showcase a few use cases that align with your project scope. However, the actual implementation timeframe will depend on the specific project requirements.
I rate the initial setup of One Identity Manager a seven out of ten.
What about the implementation team?
Typically, the installation and configuration of One Identity Manager are handled by a specialized team, while the development and configuration of individual tools to meet business requirements are done by other parties. For installation and configuration alone, it may require at least two individuals with the necessary expertise to ensure a successful setup.
What other advice do I have?
The requirement for maintenance and support varies depending on the situation. If it's a 24/7 operation, then three resources would be needed to cover all three shifts. However, the need for resources depends on the different aspects of maintenance, such as infrastructure installation, configuration, daily health checks, and level three support, which involves the development and making of changes. Typically, organizations have dedicated teams for these three areas, team members should be assigned accordingly based on this information. The tool is comprehensive and able to meet identity and access management needs. However, it can be complex as it contains multiple tools to address requirements in specific areas.
I rate One Identity Manager an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
System Administrator at a tech services company with 10,001+ employees
Helps make our overall structure extremely organized and streamlines application auditing
Pros and Cons
- "One of the valuable features is that it is relatively organized. I definitely appreciate that aspect. It is also relatively simple to use with a very easy flow to the GUI. The user interface is really top-notch."
- "I have a very positive opinion of One Identity Manager; in all honesty, it's the best application that I've used."
- "There is a small area inside of the administrator's GUI that could be a little bit more organized."
- "There is a small area inside the administrator's GUI that could be a little bit more organized."
What is our primary use case?
We use it to manage the roles that everybody receives for our network. We use it to create an overarching business role and then we have individual, direct assignments to provide extra permissions where needed.
How has it helped my organization?
It definitely makes the overall structure extremely organized. It doesn't help to minimize gaps in governance, but it definitely helps the administrator see exactly where the gaps are so that issues can be resolved.
It also helps streamline aspects of application governance including application access decisions and application auditing. In terms of auditing, for every application we use, we undergo an audit, mainly for the number of roles we are allowed to give out and the access that everybody is allowed to have. With One Identity, we are easily able to pull up the individual roles and it tells us exactly who has a given role.
What is most valuable?
One of the valuable features is that it is relatively organized. I definitely appreciate that aspect. It is also relatively simple to use with a very easy flow to the GUI. The user interface is really top-notch. Whatever we need to do with it, we are able to see just how to do it right away.
Customization is also fairly easy. There really isn't a whole lot to it.
And one of the main things that we use it for is the creation and modification of business roles. That way, we can assign just one role to a user and they have all the permissions that they would need. We also use the solution to extend the governance to cloud apps. For users who need to work with the cloud on a daily basis, it makes assigning their privileges a lot easier.
What needs improvement?
There is a small area inside the administrator's GUI that could be a little bit more organized.
For how long have I used the solution?
I have used One Identity Manager for about three years.
What do I think about the stability of the solution?
It seems pretty stable. I haven't seen it go down.
What do I think about the scalability of the solution?
The scalability seems to be on par with what we need. We're able to add and remove exactly as needed.
Which solution did I use previously and why did I switch?
The other solution that I used was Active Directory.
How was the initial setup?
I was not involved in the deployment. But in terms of maintenance on our side, it is just the typical configuration of business roles and direct assignments.
What other advice do I have?
One of the variables it really depends on is the replication time that is set for it to replicate and pull all of the new changes that have been made from the user GUIs. But I work with a relatively large network, so our replication time is different from that of an average company or user.
I have a very positive opinion of One Identity Manager. In all honesty, it's the best application that I've used. I give it my 100 percent recommendation.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Specialist at a financial services firm with 1,001-5,000 employees
Scalable solution where the database acts as the central management configuration tool, but it must include SaaS in the future
Pros and Cons
- "The solution is a typical, conventional IGA but the tool itself offers many options for customization."
- "The solution is very stable and we rate it a twelve out of ten."
- "The product must include SaaS in the future."
- "The use of the administrative tools is cumbersome because too many are required for configurations."
What is our primary use case?
Our company hosts our on-premises application with this solution. It is not a complete SaaS product but rather a hosted environment in their tenancy.
How has it helped my organization?
We have an internal team of four administrators and site developers who manage the solution and provide support to 2,000 employees. Our operational model includes contracting with professional services for new development, managing releases, and deployment.
What is most valuable?
The solution is a typical, conventional IGA but the tool itself offers many options for customization. Some other products are easier to implement but don't have the same customization capabilities.
What needs improvement?
The product must include SaaS in the future.
The use of the administrative tools is cumbersome because too many are required for configurations. For example, the solution requires master usage of eight different client tools so it is excessive to manage the product. A small fix or deployment requires opening three or four different client tools that are not intuitive or easy to use.
The user experience and interface need additional improvements. Version 8.2 included improvements to the GUI and the inclusion of Angular JS which is better. However, the interface for 8.5 is a bit basic.
Mastery of VB.NET is required to develop using the solution. Most developers use Java or .Net and VB.NET kills the vibe. We have to use VB.NET internally when working within the solution and that really needs to be modernized. To be honest, no developer is interested in learning VB.NET because it is a substandard language compared to newer options.
For how long have I used the solution?
I have been using the solution for six years.
What do I think about the stability of the solution?
The solution is very stable and we rate it a twelve out of ten. However, reaching that stability is torture.
We had issues and bugs because of customization requirements and it took us a year to go live. Too many custom processes cause issues even though the end result is stable. Gathering things to implement and install takes time. In our case, the implementation document for us to go live was 500 pages and that was a bit terrifying.
What do I think about the scalability of the solution?
The solution is scalable and the database is the key element in integrations. Everything connects to the central database which is a benefit because then the database becomes the central configuration management tool. If you upload DLL code to the database, it pushes it to other components. It is a well-designed central configuration approach.
This approach can be a bit of a drain on performance because everything is connected to the central database. It is important to keep on top of database health with the solution.
How are customer service and support?
Support needs to be better because this is a framework-style product and your own developer needs to be able to work efficiently with theirs. Sometimes a problem is in the development code, not the core product functionality. It takes too much time, as operational support to investigate and find the root cause. The solution offers amazing functionality for the framework, but if you didn't write the code yourself you are in trouble.
For example, if a third party writes code and then their involvement ends, an issue in production that needs support won't get it because the third party's code error is an unsupported area.
Which solution did I use previously and why did I switch?
If your company's active management processes are not aligned with ISO or NIST standards, a lot of customization is required and this is the best solution. For ITSM, this is also the solution to use.
If your processes are aligned then other solutions are appropriate. For a product like SalesPoint, the solution might be ServiceNow.
How was the initial setup?
The initial setup is very complex and I rate it a four out of ten.
Deployment depends on the project scope. If the project is smaller, you can connect with Active Directory and auto RMS on the same day. However, if you want joiners, movers, or leaders to go live, it becomes more complex.
What's my experience with pricing, setup cost, and licensing?
The pricing is good and I think more money is made out of selling professional services than the product itself.
Developers who have worked with the product won't need the assistance of professional services. It is easy to implement once you are accustomed to the product.
Someone new to the product would need 20-30 days of services a year and in that scenario, it is expensive to develop and maintain.
What other advice do I have?
I rate this solution a six out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free One Identity Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2026
Product Categories
Identity Governance Administration (IGA) User Provisioning Software Identity Management (IM)Popular Comparisons
Microsoft Entra ID
SailPoint Identity Security Cloud
Omada Identity
Saviynt Identity Cloud
Fortinet FortiAuthenticator
OneLogin
CyberArk Identity
ForgeRock
One Identity Active Roles
Microsoft Entra ID Protection
Oracle Identity Governance
IBM Security Verify Access
Symantec Identity Governance and Administration
Microsoft Identity Manager
SAP Identity Management
Buyer's Guide
Download our free One Identity Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:















