No more typing reviews! Try our Samantha, our new voice AI agent.
Abhijeet Chaskar - PeerSpot reviewer
Cybersecurity Analyst at DigitalTrack solution
Real User
Top 5Leaderboard
Apr 8, 2026
Automation has transformed user lifecycle management and now streamlines secure role-based access
Pros and Cons
  • "I have seen a great return on investment with One Identity Manager, especially in terms of time-saving and reduced manual efforts, saving 70 to 80% of time compared to previous methods and allowing for almost 90% faster access removal or granting, making it a great solution for my environment."

    What is our primary use case?

    As an engineer, I primarily use One Identity Manager for user lifecycle management and access governance, which helps me to automate onboarding users or employees, role changes, and offboarding. This is the primary use case, and additionally, I am using it for access requests and approvals, ensuring controlled access through a portal where user requests go through an approval process. My use case also involves role-based access control, where access is assigned based on job roles, with automated features that eliminate the need for manual effort. Furthermore, HR system integration acts as a source of information, allowing user data to sync automatically and maintain accurate data across the organization while providing a compliance and audit-ready environment.

    Whenever any new employee or user joins my organization, their account is automatically created in the system and access is granted based on their roles and responsibilities, which really helps me to reduce the manual efforts of the IT team. If they require any change in the department, access is automatically granted or updated.

    What is most valuable?

    The best feature offered by One Identity Manager is the excellent automation for user lifecycle management, along with strong role-based access control where access is assigned based on job role, department, and business functions.

    The role-based access control feature of One Identity Manager helps my team by keeping the environment secure and ensuring standardized access across users. Instead of assigning access manually, I create roles based on departments, such as finance, IT, or HR, each with predefined access. Every user in the same role receives consistent access, independent of manual decisions, saving a significant amount of time for my IT team, with automated provisioning resulting in over a 70% reduction in provisioning efforts and faster onboarding of employees.

    One Identity Manager has positively impacted my organization by saving my IT team a huge amount of time, allowing them to concentrate on other critical tasks and increasing their productivity, resulting in a notable reduction in onboarding and offboarding time. This improvement eliminates the need for manual work for the IT team and enhances my security posture.

    I have seen a significant reduction in the time previously taken for onboarding users, achieving a 70 to 80% faster onboarding process compared to the previous time it required, which has had a positive impact on my organization.

    What needs improvement?

    Based on my experience with One Identity Manager, it is working very well as per my requirements, and I do not believe it requires any kind of improvement at this point; it is offering great features with impressive usability.

    Sometimes, the initial setup or deployment of the solution feels a little complex and could be simplified with better planning, which would allow for more flexibility for new engineers.

    For how long have I used the solution?

    I have been using One Identity Manager for more than three years.

    Buyer's Guide
    One Identity Manager
    April 2026
    Learn what your peers think about One Identity Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
    893,244 professionals have used our research since 2012.

    What do I think about the stability of the solution?

    One Identity Manager is stable.

    What do I think about the scalability of the solution?

    I do not see any challenges with the scalability of One Identity Manager; it is a very scalable solution suitable for mid to large enterprises, capable of handling thousands of users.

    How are customer service and support?

    One Identity Manager's customer support is good, providing effective assistance in resolving complex issues whenever I face them. They are always ready to help.

    Which solution did I use previously and why did I switch?

    From day one, I have been using One Identity Manager and have not used a different solution.

    How was the initial setup?

    Sometimes, the initial setup or deployment of the solution feels a little complex and could be simplified with better planning, which would allow for more flexibility for new engineers.

    What was our ROI?

    I have seen a great return on investment with One Identity Manager, especially in terms of time-saving and reduced manual efforts, saving 70 to 80% of time compared to previous methods and allowing for almost 90% faster access removal or granting, making it a great solution for my environment.

    What's my experience with pricing, setup cost, and licensing?

    I do not handle pricing, setup costs, or licensing for One Identity Manager, as this is managed by a different team in my organization.

    Which other solutions did I evaluate?

    I did not evaluate other options before choosing One Identity Manager.

    What other advice do I have?

    I highly recommend One Identity Manager as it will really help any organization. My advice is to invest time in proper planning before implementation, particularly around role design and identity structure, starting with core use cases such as user lifecycle management and access requests, and gradually expanding to advanced governance to ensure a smooth deployment. I give this review a rating of 10.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
    Last updated: Apr 8, 2026
    Flag as inappropriate
    PeerSpot user
    IAM Consultant at a outsourcing company with 501-1,000 employees
    MSP
    Top 20
    Feb 11, 2026
    Centralized identity management has automated access reviews and simplifies onboarding
    Pros and Cons
    • "For most customers, their access management system becomes smoother using One Identity Manager."
    • "One Identity Manager could be improved because the community is a bit small, and the documentation sometimes isn't clear or interactive."

    What is our primary use case?

    My main use case for One Identity Manager is for identity access management solutions for clients. For our clients, let's say we have a bank company as a client. In that client, there will be employees, various kinds of employees, permanent employees, external employees, vendors, so many people might be there. Every employee who gets onboarded into a company will be having some identity within the company, so to provide an entire identity access management system is essential.

    What is most valuable?

    Once a user is onboarded, we can give some accesses by default using birthright roles or dynamic roles. We can also provide a way so that the user can request the roles or accesses that the user might require. We have a portal, IT Shop, everything set up, and we can create workflows, access approval workflows, and all so that the user can request the required access, and if the proper workflow has been completed, the access will be provided. These all things can be customized as per the customer requirements.

    Using One Identity Manager, we can connect with various target systems like ServiceNow, SuccessFactors, Workday, whatever, however. To One Identity Manager, we can onboard data, and we can also send the data to various target systems, whatever the customer might need. It provides various connectors such as DB connector, native SQL connector, Oracle connector, SAP connector, Exchange connector, Active Directory connector, PowerShell connector. There are so many ways we can connect to other systems so that we can send data to other systems and sync back from those systems, making this One Identity Manager system a centralized system that controls everything. One Identity Manager can act as a source of truth for various systems, which is one way for the companies to centralize their IM system.

    In my opinion, the best features One Identity Manager offers are customization. We can customize many things as per our requirements, not just use the default options, out-of-the-box options. We can connect to any target system using the PowerShell connector, which is the best way. We also have API connectors and other things as well. From the latest versions, they are moving from the native portal to the Angular portal, which will speed up the portal development process and make the portal more attractive and dynamic. It also has other supportive portals like Operations Portal, Admin Portal, and Password Reset Portal for various services and all.

    Most customers choose One Identity Manager because of the customization it provides, not just for me or my customers. We have one feature called attestation, which helps review user access periodically and frequently and ensures the audit players and audit processes work properly within the organization.

    One Identity Manager positively impacts my organization and my clients by automating user access reviews, which often won't happen properly. With One Identity Manager, we can schedule those access review processes and automate them so that they automatically trigger and send access review emails to the user's managers, ensuring they take action on the access side, whether the user should have that access or not. For most customers, their access management system becomes smoother using One Identity Manager.

    The specific outcomes my clients have seen include saving time and reducing manual work. Without a centralized IM system like One Identity Manager, onboarding tasks must be done manually, leading to human errors. If a user makes a mistake manually, it could lead to another incident, causing bottleneck issues in operations. Using a centralized system like One Identity Manager really eases the onboarding and offboarding processes for any organization, making identity access management smoother.

    What needs improvement?

    One Identity Manager could be improved because the community is a bit small, and the documentation sometimes isn't clear or interactive. This migration from the native portal to the Angular portal is not well known, and I think this change could bring chaos within the community.

    For how long have I used the solution?

    I have been using One Identity Manager for more than two and a half years.

    What do I think about the stability of the solution?

    One Identity Manager is stable in my experience.

    What do I think about the scalability of the solution?

    One Identity Manager's scalability depends on the subscription you take and the size of your user base.

    How are customer service and support?

    Customer service rating: 4 out of 10.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    I evaluated SailPoint, Saviynt, and other tools before choosing One Identity Manager. I prefer One Identity Manager because of the customizations it allows, though I'm not completely certain about other solutions. My experience with One Identity Manager influenced my choice.

    What was our ROI?

    When using a centralized system like One Identity Manager that offers so much customization, I see a return on investment through saved money. Instead of spending on various systems, having one centralized system that handles all my organizational requirements helps save money. The setup is easy, and One Identity Manager provides support.

    What other advice do I have?

    I advise others looking into using One Identity Manager to go ahead and take the latest version of One Identity Manager solution to avoid the headaches of migrating from previous versions. The latest versions have support from One Identity Manager as well, fixing many issues and adding new features as part of the new releases. Our company has a business relationship with this vendor as we are partners. I rate this solution an 8 out of 10.

    Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
    Last updated: Feb 11, 2026
    Flag as inappropriate
    PeerSpot user
    Buyer's Guide
    One Identity Manager
    April 2026
    Learn what your peers think about One Identity Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
    893,244 professionals have used our research since 2012.
    reviewer2679231 - PeerSpot reviewer
    enterprise it architect at a financial services firm with 10,001+ employees
    Real User
    Top 20
    Apr 3, 2025
    Enables us to handle very complex enterprise use cases and cover a large number of applications
    Pros and Cons
    • "What I like the most is the flexibility or configurability. It is not like you are writing huge lines of code. It allows us to handle our very complex enterprise use cases, and we have many of those."
    • "What I like the most is the flexibility or configurability."
    • "There is an area for improvement when it comes to intuitiveness. It has the ability to manage everything and does that fairly well, but that also causes a risk of drowning end-users in complexity."
    • "There is an area for improvement when it comes to intuitiveness. It has the ability to manage everything and does that fairly well, but that also causes a risk of drowning end-users in complexity."

    What is our primary use case?

    We use it for identity management and governance. We are a large financial institution; therefore, we use it for identity management and all the cases surrounding that, such as segregation of duty, attestation, extensive provisioning, and life cycle management.

    How has it helped my organization?

    The largest improvement we have seen is the depth of how many applications we have covered. We have about 4,000 applications connected to One Identity Manager, fully managed from there. That has definitely grown over the years, including the ease of connecting those applications. In the end, what we want to achieve as an organization is not a nice technical solution, but our goals are being in control of our accounts, being in control of our entitlements, and being in control of what entitlements are assigned to whom and why, and proper substantiation for that. To be able to achieve that, we need to have a large range of applications that we actually manage. That is something that has become easier and grown over the years. I would say this is the biggest improvement. Moreover, better processes have been introduced surrounding the data so that we do not just connect the applications, but at a data level, we actually achieve the control we want by ensuring everything in those applications is monitored and kept in control.

    The SAP integration goes in-depth into the SAP tool, enabling us to get all the information we want from there. It connects SAP accounts to employee identities under governance, which is very important. It saves licensing costs by cleaning up and ensuring SAP accounts are associated with actual employees. We want a SAP account associated with one person.

    It provides IGA for the difficult-to-manage aspects of SAP, such as T Codes, profiles, and rules. It provides profiles, profile limits, and field values.

    It offers a single platform for enterprise-level administration and governance of users, data, and privileged accounts. It is very good, especially when you are looking at the enterprise backend. On the platform side, it is very good. However, the frontend usability, at least for our organization, could still be improved a little bit. That is not so much for the admin perspective; that is for the actual end-users in our enterprise. That is partially also due to the fact that we are still using some of the older portals because we have been using the tool for a while, and we have not had a chance to migrate to all the latest versions. It is very good for enterprise management, but our end-user experience could still use some fine-tuning, tweaking, and improvements.

    We can easily customize the solution for our needs.

    We use the solution's business roles to map company structures for dynamic application purposes. That is very important for us because it is one of the ways where we can remove the complexity for end-users. We can automate things while still providing a good control framework where we can say we are in control. Being a large enterprise, we have a complicated structure, so we need a good model that allows us to accommodate that complicated structure. With the business roles, we were able to do that.

    We use it to extend governance to cloud apps. This extension is important for us because, as a large financial institution, we have to meet a lot of compliance requirements. That does not stop with our on-premise environment; it also applies to our cloud systems, so we need to manage those.

    It helps minimize gaps in governance coverage among test, dev, and production servers. We also have a lot of our dev, test, and acceptance environments connected to the solution. It allows us to manage those as well based on the production user's life cycle. We have no issues there.

    It helps consolidate procurement and licensing a little bit. We do not manage our procurement or licensing in the tool. We have our own procurement tools for that. However, when we know, for example, that there are limits to the amount of licenses we can give out, we use the tool to ensure we do not pass those limits. We use it more as an enforcement tool or safety valve to ensure we follow the guidelines set by procurement on how much we can do.

    It streamlines application access decisions, application compliance, and application auditing. We use the segregation of duty framework. We use the attestation framework. It is one of the core pillars for the regulatory and compliance set where we show we are in control of our identities, accounts, and the access they have. We can show that we meet all the regulations in regular reviewing that ensure that no toxic combinations or toxic pairs are assigned.

    It helps achieve an identity-centric zero-trust model. We are currently using it for one body, and we are looking into extending it to machine identities. For our current human employees, we are in the identity-centric model. We also have multiple sources from where identities come. We have a lot of subsidiary companies. We have a lot of statements of work or external contractors, and sometimes people come in from multiple sources at the same time. It also allows us to consolidate that to see that it is actually the same identity.

    It helps create a privileged governance stance to close the security gap between privileged users and standard users. For the management of privileged accounts, we use another solution called CyberArk Privileged Access Management, and we do have a close automated connection between One Identity and CyberArk where we use One Identity to decide who should have access to which privileged accounts and why. CyberArk is a tool that we use to actually hand out access to those accounts and monitor usage of those accounts, etc. The governance part of who can use which account is managed from One Identity, and then the actual usage is done through CyberArk, and that integration works well for us.

    What is most valuable?

    What I like the most is the flexibility or configurability. It is not like you are writing huge lines of code. It allows us to handle our very complex enterprise use cases, and we have many of those. We have a lot of scenarios where we need to do things internationally or slightly differently per country, or need to comply with specific regulations. It gives us a lot of flexibility to meet all those needs while also being able to accommodate our enterprise processes. It allows us to shift the tool to work for us instead of needing to change the organization to follow a piece of technology.

    What needs improvement?

    Their support could be enhanced.

    There is an area for improvement when it comes to intuitiveness. It has the ability to manage everything and does that fairly well, but that also causes a risk of drowning end-users in complexity. One Identity technology probably has the best way to handle the complexity that you want to tackle as a large enterprise. It can handle any complex use case you can think of, but that is also the thing they should improve on. They should keep it simpler for end-users, even though they are handling that complexity. They should handle all the complexity, but keep it simple for the end users, so the part they need to improve on is keeping it simple for the end users.

    For how long have I used the solution?

    I have been using it in some way, shape, or form for 14 years. At my current place of employment, we have been using it for 8 years.

    What do I think about the stability of the solution?

    I would rate the stability a nine out of ten.

    What do I think about the scalability of the solution?

    I would rate its scalability an eight out of ten.

    In terms of the number of users, there are two sides. The number of people who request access would be about 50,000, and there are about 300 or 400 people who do specialized things. That ranges from the actual technical team supporting the solution to people doing more complex business role management and things like that for their pillars within the organization.

    How are customer service and support?

    We use their premier support. That has differed over the eight years. At the start, it certainly did add a lot of value. At a certain point, about one and a half years ago, One Identity underwent some reorganizations and their support level went down and was not up to our expectations anymore. We have had some serious conversations with them about that. They reacted well because support has picked up back to where we expected it to be. The advantage for us with premier support is that, as a large enterprise, we can always run into specific problems, and, at that point, someone who knows all the ins and outs of the product looks at it and helps us resolve those.

    Premier Support has not been an influence in purchasing additional licenses or products from the vendor. However, it has definitely been an influence in using the product for this long and not switching to a competitor.

    About two years ago, I would have rated their support a nine out of ten. Given the issues we have had, I would rate it a seven out of ten, hoping it will climb back up to that nine.

    How would you rate customer service and support?

    Neutral

    How was the initial setup?

    We have a hybrid deployment model. Technical deployment or technical setup is very straightforward. Integrating it into your entire landscape when it is as big as ours and managing everything is obviously complex. I do not believe that is necessarily due to technology; that is due to the sheer volume of data and applications you need to connect.

    From starting the setup to the full global rollout, it took about two years.

    It does require maintenance. It primarily includes the occasional cumulative update packs being deployed. The second thing is that we have a constantly changing environment. New applications come in, and other applications are deprecated. We acquire companies. We spin companies off. They are, on the one hand, business-as-usual cases. On the other hand, they do require changes in the system. When you are, for example, suddenly onboarding 5,000 new people because you have acquired a new organization or need to integrate another directory service, then obviously that has some impact.

    What about the implementation team?

    Our partner is Intragen. Our partner was originally AspisID, and they were acquired by Intragen during the eight-year period.

    They helped with the implementation, although it was company-led. We led the implementation, and they provided expert resources. They definitely helped with the speed of the implementation. Some of the things they implemented were good for the initial implementation, but over the eight-year period, it has had some rework, which is not surprising.

    We got the training from One Identity themselves which was good. Our partner provided on-the-job training but did not provide specific, in-depth training like a specialized training course or anything.

    Our partner was involved in helping us customize the solution for our particular needs. Our experience on the whole was positive. Especially on some very detailed use cases, some choices were made which were good in the short term. In the long term, we have had to revisit them. What we are really happy with is that all the customizations they have done have proven to be very upgradable. Customizations that were done seven or eight years ago are still able to work in the current versions of the product. The customizations were done fairly well within the One Identity framework, but for the specific banking use cases, we are currently revisiting some of those.

    The customer service we received from our partner has been very good. They have provided good value. They have definitely helped us move forward. They were originally AspisID and were acquired by Intragen. We have the advantage that they have local people, which always makes for a good collaboration. Their nearshore team integrates fairly well into our organization. They do their best to help bridge the cultural gaps. Due to the way they work with the nearshore team, they have been able to provide the resources we want, which we found to be tricky in the past with the IAM market.

    What was our ROI?

    That is a tricky estimate to give. Our primary reason for having the tool is not just a return on investment; without technology like this, we do not see a good way to meet our mandatory compliance requirements. Having a technology like this, whether it is One Identity or another, is almost a given to be able to keep a banking license when you are at our scale. Without it, we would need thousands of additional people. That is hard to translate into a return on investment, other than as a multiple of hundreds. That is just not the way you would tackle that problem.

    What's my experience with pricing, setup cost, and licensing?

    I am aware of the cost. For us, it is quite cost-efficient. We have a good enterprise license agreement, and we are very happy with what we get for the price we pay for it.

    Which other solutions did I evaluate?

    I would compare One Identity Manager fairly favorably to other vendors on the market for identity management governance. We have recently done another RFP and decided to extend our contract, primarily because we have a lot of complex use cases, and the fact that the tool can tackle those fairly well is important for us.

    What other advice do I have?

    I would recommend One Identity Manager to other users, but I would ask questions like, 'What are the users? How big are they?' For other enterprise organizations, I would definitely recommend it. For smaller organizations, like mid-size businesses with a few hundred employees, I would only recommend it if they are in a heavily regulated space. 

    I would rate One Identity Manager a nine out of ten.

    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
    PeerSpot user
    Shrikant Patil - PeerSpot reviewer
    Cyber Security Analyst at Essen Vision Software
    Real User
    Top 5
    May 10, 2026
    Automation has transformed identity workflows and delivers faster, compliant access management
    Pros and Cons
    • "Strong return on investment has been seen mainly through reduced manual identity management work and faster onboarding and offboarding processes."
    • "Reporting customization and troubleshooting complex workflows can sometimes be time-consuming, so better visibility and simpler administration tools would be helpful."

    What is our primary use case?

    One Identity Manager is primarily used for identity and life cycle management, access governance, provisioning, and automating joiner, mover, leaver processes across different systems.

    One Identity Manager automatically provisions accounts and assigns the right access when a new employee joins. It also handles transfers or adjusts promotions automatically when someone changes roles or leaves the company.

    One Identity Manager has been integrated with Active Directory, HR systems, and a few business applications so identity changes flow automatically across multiple platforms from a single process.

    What is most valuable?

    The best features One Identity Manager offers are identity lifecycle automation, access governance, role-based provisioning, approval workflows, and risk monitoring and compliance reporting capabilities.

    The automation feature is relied upon most because onboarding and access provisioning are much faster now. There have been fewer access-related errors because approvals and role assignments are automated and standardized across systems. One Identity Manager has improved access governance, reduced manual identity management tasks, and helped standardize onboarding, role changes, and offboarding processes across the organization.

    One Identity Manager has positively impacted the organization through access governance, reduced manual identity management tasks, standardized onboarding and role changes, and offboarding processes across the organization.

    What needs improvement?

    Reporting customization and troubleshooting complex workflows can sometimes be time-consuming, so better visibility and simpler administration tools would be helpful.

    One Identity Manager is powerful, but the UI could be more intuitive and some advanced configuration customizations have a fairly steep learning curve.

    Reporting customization and troubleshooting complex workflows should be easier and more streamlined, so better visibility and simpler administration tools would help significantly.

    For how long have I used the solution?

    One Identity Manager has been used for one year.

    What do I think about the stability of the solution?

    One Identity Manager is stable and smooth.

    What do I think about the scalability of the solution?

    One Identity Manager scales very well for large enterprise environments, especially when managing multiple directories, hybrid infrastructure, and high volumes of provisioning and governance workflows. The platform's modular architecture helps with scaling across multiple domains and millions of identities, although larger deployments usually need careful performance tuning and infrastructure planning.

    How are customer service and support?

    Customer support for One Identity Manager is excellent, and they are reliable and quick to resolve every query.

    Which solution did I use previously and why did I switch?

    Before One Identity Manager, manual processes and native AD tools with some custom scripts were mainly relied upon. The switch to One Identity Manager was made to get better automation, centralized governance, and strong compliance control.

    How was the initial setup?

    Setup requires proper planning because implementation and customization can take some time in complex environments.

    What was our ROI?

    Strong return on investment has been seen mainly through reduced manual identity management work and faster onboarding and offboarding processes. Tasks that previously took hours across multiple teams are now mostly automated, which has improved efficiency and reduced access-related errors.

    What's my experience with pricing, setup cost, and licensing?

    The pricing and licensing for One Identity Manager are definitely enterprise-focused and can get expensive depending on the number of managed identities and integrations. The automation and governance capabilities justify the investment in large environments.

    Which other solutions did I evaluate?

    SailPoint, Saviynt, and Microsoft Entra ID Governance were evaluated before choosing One Identity Manager, mainly because strong hybrid identity governance and flexible provisioning workflows were needed.

    What other advice do I have?

    One Identity Manager is very powerful and works best when the workflows and access policies are well-planned from the beginning, so it is important to clearly define identity governance processes and role models before implementation. The overall rating for this review is 8 out of 10.

    Which deployment model are you using for this solution?

    Hybrid Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Microsoft Azure
    Disclosure: My company does not have a business relationship with this vendor other than being a customer.
    Last updated: May 10, 2026
    Flag as inappropriate
    PeerSpot user
    Technical Support Engineer at Digitaltrack
    Real User
    Top 5Leaderboard
    Apr 16, 2026
    Automated identity workflows have reduced manual provisioning and improve access compliance
    Pros and Cons
    • "One Identity Manager is a powerful and reliable identity governance solution suitable for large enterprise environments, offering strong automation, security, and compliance features that help streamline access management and, once properly implemented, deliver long-term value and improved overall operational efficiency."
    • "The initial setup and configuration are quite complex and time-consuming, especially for large environments, and the user interface could be improved to be more user-friendly."

    What is our primary use case?

    One Identity Manager serves as a robust and comprehensive identity governance and administration solution, providing centralized control over user identities, access rights, and compliance management across the organization.

    I use One Identity Manager to manage user identity and access across multiple systems, which helps automate user provisioning and reduce manual work. The RBAC feature is very useful for controlling access and maintaining compliance, and the strong reporting and auditing features help during audits. However, the initial setup is somewhat complex and requires skilled resources.

    Overall, it is a stable and reliable solution for identity and access management. In our organization, One Identity Manager automates the user lifecycle management process. Whenever a new employee joins, their account is automatically created in Active Directory and other connected systems based on their role. We have implemented role-based access control to ensure that they receive appropriate access depending on their department and job function, which reduces manual error and improves security.

    What is most valuable?

    The best features One Identity Manager offers include automated user lifecycle management, role-based access control, centralized identity management, strong audit and compliance support, integration with multiple systems, and AI-driven security and risk insight.

    What needs improvement?

    One Identity Manager sometimes generates false-positive policy violations, especially in a complex RBAC environment where multiple roles and inheritance rules apply. There are cases where it flags excessive or conflicting access, even though the access is valid based on the requirement, usually due to role overlaps or misconfigured policies.

    One Identity Manager is a strong solution, but several areas require improvement. The initial setup and configuration are quite complex and time-consuming, especially for large environments, and the user interface could be improved to be more user-friendly. The current interface is difficult for new users to navigate, and troubleshooting issues such as synchronization or policy conflicts sometimes require deep technical knowledge.

    Additionally, the system can generate false-positives in access violations, requiring manual tuning and validation. Performance could also be improved when handling large datasets or running heavy reports.

    For how long have I used the solution?

    I have been working in my current field for five years and have been using One Identity Manager for one year.

    What do I think about the stability of the solution?

    One Identity Manager is stable in my experience. Our experience with One Identity Manager has been stable and reliable, performing well in daily operations such as user provisioning, synchronization, and access management. We have not faced any major downtime; however, issues can occasionally occur during heavy workloads or large synchronization jobs. Overall, with proper configuration and maintenance, the platform remains stable in an enterprise environment.

    How are customer service and support?

    Customer support for One Identity Manager is generally good and responsive, providing quick responses for troubleshooting issues and resolving queries. For complex issues, response time can sometimes take longer, but the support team is knowledgeable and effective, with proper documentation and experienced resources, which helps in faster issue resolution.

    Which solution did I use previously and why did I switch?

    I have not used a previous solution before One Identity Manager.

    How was the initial setup?

    One Identity Manager is a powerful solution for identity governance, especially in large enterprise environments, improving security by ensuring proper access control and reducing manual efforts. My environment consists of almost five thousand users using LDAP security. However, proper planning is very important before implementation since the initial setup and customization can be complex, so having skilled resources or vendor support is recommended. Once implemented correctly, it provides good stability, scalability, and long-term benefits for managing identities and compliance.

    One Identity Manager is a strong solution, but several areas require improvement. The initial setup and configuration are quite complex and time-consuming, especially for large environments, and the user interface could be improved to be more user-friendly. The current interface is difficult for new users to navigate, and troubleshooting issues such as synchronization or policy conflicts sometimes require deep technical knowledge. Additionally, the system can generate false-positives in access violations, requiring manual tuning and validation. Performance could also be improved when handling large datasets or running heavy reports.

    Which other solutions did I evaluate?

    Before choosing One Identity Manager, we evaluated other solutions such as SailPoint Identity, Microsoft Entra ID, and Okta. These solutions also provide strong identity features compared to One Identity Manager, but we selected One Identity Manager due to its strong customization capabilities, flexible integrations with multiple systems, and powerful on-premise support.

    What other advice do I have?

    In our experience, One Identity Manager sometimes generates false-positive policy violations, especially in a complex RBAC environment where multiple roles and inheritance rules apply. There are cases where it flags excessive or conflicting access, even though the access is valid based on the requirement, usually due to role overlaps or misconfigured policies.

    One Identity Manager is a powerful and reliable identity governance solution suitable for large enterprise environments. It offers strong automation, security, and compliance features that help streamline access management. While the initial setup can be complex, once properly implemented, it delivers long-term value and improves overall operational efficiency.

    Customer support for One Identity Manager is generally good and responsive, providing quick responses for troubleshooting issues and resolving queries. For complex issues, response time can sometimes take longer, but the support team is knowledgeable and effective, with proper documentation and experienced resources, which helps in faster issue resolution. I would rate this product nine out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
    Last updated: Apr 16, 2026
    Flag as inappropriate
    PeerSpot user
    Team Lead Infra - West Region at Digitaltrack
    Real User
    Top 5Leaderboard
    Mar 31, 2026
    Automation has transformed user lifecycle management and delivers precise, compliant access control
    Pros and Cons
    • "Implementing One Identity Manager has completely eliminated the manual process, indirectly saving our organization's money and providing a clear return on investment through significantly reducing manual efforts for business reports and saving considerable time for the quality team."
    • "The initial setup could be improved to reduce the complexity."

    What is our primary use case?

    One Identity Manager is used to manage the user lifecycle and control access for applications. We specify which users are allowed to access particular applications at specific times, and the system enables us to control all of these elements based on our requirements.

    During employee onboarding, employee details are automatically pulled from the HR system into One Identity Manager. Based on their role and department, the system automatically creates their account and assigns the required access such as Gmail access, applications, or any other necessary access. The system creates access automatically and sends it for approval if needed.

    What is most valuable?

    One Identity Manager offers strong access control, support for automation with good audit visibility, and performance that functions well within our enterprise environment.

    Automation has significantly reduced our manual tasks. This automation substantially lowers human errors, allowing us to save considerable time.

    One Identity Manager has positively impacted our organization by improving security since users receive only the access they need while also providing proper access controls. It increases efficiency by automating user onboarding and offboarding, saving our resources' time while reducing human errors and speeding up the employee onboarding process.

    What needs improvement?

    The initial setup could be improved to reduce the complexity.

    For how long have I used the solution?

    I have been using One Identity Manager for more than three years.

    What do I think about the stability of the solution?

    One Identity Manager is very stable.

    What do I think about the scalability of the solution?

    The scalability of One Identity Manager is excellent, matching our organization's growth with no issues.

    How are customer service and support?

    Customer support is responsive and available 24/7, allowing them to troubleshoot whatever we require.

    Which solution did I use previously and why did I switch?

    From the beginning, we have been using One Identity Manager as our solution.

    How was the initial setup?

    The setup cost and licensing were straightforward, with excellent support. There were no issues with pricing, setup cost, or licensing.

    What about the implementation team?

    We are both a customer and partner of the vendor.

    What was our ROI?

    Implementing One Identity Manager has completely eliminated the manual process, indirectly saving our organization's money and providing a clear return on investment through significantly reducing manual efforts for business reports and saving considerable time for the quality team.

    What's my experience with pricing, setup cost, and licensing?

    The setup cost and licensing were straightforward, with excellent support. There were no issues with pricing, setup cost, or licensing.

    Which other solutions did I evaluate?

    We have not evaluated other options before choosing One Identity Manager.

    What other advice do I have?

    Automation has significantly reduced our manual tasks, and this automation substantially lowers human errors, allowing us to save considerable time. One Identity Manager works properly in our organization, and there is no requirement to improve or add any features as it is functioning well for us.

    My advice for others looking into using One Identity Manager is that anyone planning to deploy it should have skilled resources for proper implementation. They should focus on clear role-based access from the beginning to avoid over-personalization with the right plan and setup. I would rate this solution a 9 out of 10.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer. customer and partner
    Last updated: Mar 31, 2026
    Flag as inappropriate
    PeerSpot user
    Ankush Kondewar - PeerSpot reviewer
    Senior Technical Support Executive at DigitalTrack Solutions Pvt Ltd
    Real User
    Top 5Leaderboard
    Apr 2, 2026
    Automated access workflows have transformed onboarding and improved security and audit readiness
    Pros and Cons
    • "Since we are using One Identity Manager, we have seen a significant positive impact by improving our security through ensuring users only receive the access they need and reducing manual work, making identity management more efficient and organized."
    • "There is always a need for improvement based on the features, which is why I deducted one point from the overall rating."

    What is our primary use case?

    One Identity Manager is primarily used for user lifecycle management, access request and approval, role-based access control, and compliance.

    How has it helped my organization?

    Since we are using One Identity Manager, we have seen a significant positive impact by improving our security through ensuring users only receive the access they need and reducing manual work, making identity management more efficient and organized.

    We have experienced specific outcomes with One Identity Manager, including faster onboarding and offboarding processes for users and fewer security incidents.

    What is most valuable?

    The best feature of One Identity Manager is the access request and approval functionality, which allows users to request access to a service portal, and the request goes to the proper approver before access is granted, ensuring control and secure access management while also providing a solution that streamlines and assists with audits.

    What I find most valuable about the access request and approval features is that they make the environment more secure.

    Another standout feature of One Identity Manager is centralized management, which allows all users and access to be managed from a central, unified platform that supports multiple systems such as Active Directory and cloud applications, simplifying identity management.

    What needs improvement?

    There is always a need for improvement based on the features, which is why I deducted one point from the overall rating.

    For how long have I used the solution?

    I have been using One Identity Manager for more than three years.

    What do I think about the stability of the solution?

    One Identity Manager is stable.

    What do I think about the scalability of the solution?

    Scalability-wise, One Identity Manager is managing our growth of users, so there is no challenge.

    How are customer service and support?

    I have had a great experience with the customer support team for One Identity Manager, as they are ready to provide support and resolve issues within the timeline.

    Which solution did I use previously and why did I switch?

    We have not evaluated other options because we had already decided that One Identity Manager is excellent, so we are using this solution.

    How was the initial setup?

    I had a good experience with the pricing and setup of One Identity Manager, as the sales team was very helpful during this process and assisted us in implementation, leading to an overall great experience with the pricing and setup cost.

    What about the implementation team?

    We are a partner with the vendor of One Identity Manager.

    What was our ROI?

    We have seen a good return on investment with One Identity Manager, as automation has reduced manual efforts by approximately 40 to 50%, especially in user provisioning and access management, saving significant time for the IT team and reducing the workload of our employees.

    What's my experience with pricing, setup cost, and licensing?

    I had a good experience with the pricing and setup of One Identity Manager, as the sales team was very helpful during this process and assisted us in implementation, leading to an overall great experience with the pricing and setup cost.

    Which other solutions did I evaluate?

    We have not evaluated other options because we had already decided that One Identity Manager is excellent, so we are using this solution.

    What other advice do I have?

    I highly recommend any organization looking for this type of solution to consider One Identity Manager. My advice would be to plan the implementation carefully and understand your requirements in advance, ensuring your access policies are well-defined for a smooth deployment. I gave this review a rating of 9 out of 10.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
    Last updated: Apr 2, 2026
    Flag as inappropriate
    PeerSpot user
    Technical Lead at a tech vendor with 10,001+ employees
    Real User
    Top 20
    Mar 6, 2026
    Identity-centric governance has improved and business rules automate role-based provisioning
    Pros and Cons
    • "The main benefits I've seen from using One Identity Manager are that it's very easy to use, and compared to other tools such as SailPoint and Okta, which are very difficult to learn and manage identities with, One Identity Manager has a very good UI and is easy to learn and understand if we have knowledge about .NET and SQL, or the OOPS concept, making it easy to grasp the tool."
    • "From a user experience perspective, One Identity Manager is good; the only difficulty I find sometimes is because it's a Windows application, it's very difficult to view all data since it's a limited Windows space."

    What is our primary use case?

    I mainly use One Identity Manager for resolving incidents and other tasks, working as both a manager and sometimes as a designer.

    We are using One Identity Manager for IGA only, managing the data and identities.

    We make use of One Identity Manager's business rules to map company structures for dynamic application provisioning. For the client I'm using, they have multiple business and system rules, so it's going well with a proper structure of business role entitlement and everything.

    We are using One Identity Manager for Cloud Azure, but I'm not part of that team as of now.

    One Identity Manager helps to minimize gaps in governance coverage among test, dev, and production servers through the CI/CD pipeline, making it easy to migrate the data and development across different environments.

    Minimizing these gaps has affected my operations by making it fast. If we automate this process through deployment, then it's very fast.

    We are using a DevOps model for One Identity Manager, specifically through CI/CD.

    One Identity Manager has helped me achieve an identity-centric zero-trust model because all data related to identity can be seen on the Object Browser, with role and entitlement assigned to that identity along with other relevant details. It's a very good thing as we can view everything about that identity on one page, making it a good approach.

    What is most valuable?

    What I find valuable about One Identity Manager is that in the Object Browser, we can see everything, which is a good feature. We can also do and change the data in one place, so that is beneficial; we don't need to query each time.

    I find it beneficial because we don't need to open the database, so it's good.

    The business rules functionality is important to me because for each individual, we don't need to assign the role. If we assign a particular functionality to the role, it will be assigned to the employee using that business role, meaning we don't need to assign specific things for each employee; it will be done through the business role, which is a good feature.

    The main benefits I've seen from using One Identity Manager are that it's very easy to use. I check with other teams, and they are using different tools such as SailPoint and Okta, which are very difficult to learn and manage identities with. With One Identity Manager, the UI is very good; it's easy to learn and understand if we have knowledge about .NET and SQL, or the OOPS concept, making it easy to grasp the tool.

    What needs improvement?

    From a user experience perspective, One Identity Manager is good; the only difficulty I find sometimes is because it's a Windows application, it's very difficult to view all data since it's a limited Windows space. Opening multiple windows is difficult as it's a Windows application.

    When I need to compare between two different things, I can't do it in a single window. I have to open two windows and check them. Even if I have to change the data, I have to open another instance of the application and check. If it could be done in a single instance, then it would have a better approach.

    One Identity Manager has just introduced Angular, so if some of the functionality can be done through a web version, creating a lighter web version to perform tasks would be useful.

    For how long have I used the solution?

    I've been working with One Identity Manager for more than one and a half years.

    How was the initial setup?

    My personal experience with the initial setup and onboarding of One Identity Manager was very smooth. We got training from one of the partners, and we used their online labs to complete the setup, which was straightforward. We did not face any difficulties, and if we follow the proper steps, it's very easy to configure and deploy.

    What other advice do I have?

    There is very little information available about One Identity Manager on the internet, and very few people are using it, as it's a niche skill. If we could have more information or videos, it would be easier for people to use it, and if we encounter any problems with the tools, we can check the functionalities, understanding what features we can find and where.

    I did not escalate any technical questions to the support team, but we have access to labs for a limited period. If we could have lab access extended for more days, it would be helpful for me and my team members to learn more about One Identity Manager, which could assist in related inquiries.

    My overall review rating for One Identity Manager is 8.5 out of 10.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
    Last updated: Mar 6, 2026
    Flag as inappropriate
    PeerSpot user
    Buyer's Guide
    Download our free One Identity Manager Report and get advice and tips from experienced pros sharing their opinions.
    Updated: April 2026
    Buyer's Guide
    Download our free One Identity Manager Report and get advice and tips from experienced pros sharing their opinions.