I have been using One Identity Password Manager for approximately one year.
Chief Executive Officer at SMT
Reliable, ideal for small enterprises, but better integration needed
Pros and Cons
- "One Identity Password Manager is a stable solution."
- "The initial setup of One Identity Password Manager is easier than other solutions."
- "One Identity Password Manager could improve the integration with other technology, it is complex for integrating. There needs to be more connectors or adapters. There is limited out-of-the-box customization."
- "If One Identity Password Manager was providing good support I would not have as many complaints as I am. We are a reseller and we have our own technical team, they try to do the level one support, but customers are starting to complain, which means that you don't have the right support."
What is our primary use case?
What needs improvement?
One Identity Password Manager could improve the integration with other technology, it is complex for integrating. There needs to be more connectors or adapters. There is limited out-of-the-box customization.
One of the challenges is we should be able to set more compliance policies regarding rules. How we can use the password retention, password complexity, one-time password, et cetera. There are other solutions that have a full compliance policy and rules configuration. It's much more complicated, but it will cover large enterprises, such as banks and government needs.
For how long have I used the solution?
I have used One Identity Password Manager within the last 12 months.
What do I think about the stability of the solution?
One Identity Password Manager is a stable solution.
Buyer's Guide
One Identity Password Manager
April 2026
Learn what your peers think about One Identity Password Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
892,287 professionals have used our research since 2012.
What do I think about the scalability of the solution?
The scalability of One Identity Password Manager. I have spoken to my technical team and they have indicated it is scalable. It is good for small to medium-sized enterprises. However, for larger enterprises, the solutions need more features, such as two-factor authentication.
We have one client using this solution.
How are customer service and support?
If One Identity Password Manager was providing good support I would not have as many complaints as I am. We are a reseller and we have our own technical team. They try to do the level one support, but customers are starting to complain, which means that you don't have the right support.
Which solution did I use previously and why did I switch?
I have used other similar solutions, such as CyberArk, ARCON, and SharePoint.
How was the initial setup?
The initial setup of One Identity Password Manager is easier than other solutions.
What's my experience with pricing, setup cost, and licensing?
The price of One Identity Password Manager is average. There are other solutions that are more expensive, such as ARCON and others that are less expensive.
What other advice do I have?
I have had many complaints from my customers about this solution and we will most likely replace it soon.
I rate One Identity Password Manager a seven out of eight.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator
Managing Director at Amal it
Enables end-users to change or reset password and unlock their accounts with an OTP, and synchronizes the password with any connected application
Pros and Cons
- "It does have advantages over the other products that we are seeing. Other products don't have the out-of-the-box OTP option, whereas One Identity Password Manager has the out-of-the-box OTP option. It also has a cloud-based solution for generating OTPs. So, the customers can either opt for their own SMS gateway, or they can use the One Identity OTP option where they don't have to have an SMS gateway. With other products, customers must have their own SMS gateway."
- "It allows end-users to reset their password by generating a one-time password (OTP) that they receive on their mobile; they're not dependent on the help desk and can do self-service from anywhere in the world, so if they're traveling, they can still reset or change the password and are not locked out of their account at any given time."
- "If there is a self-service option to update the mobile number, it will be much more useful."
- "If there is a self-service option to update the mobile number, it will be much more useful."
What is our primary use case?
* Allow end users to reset AD password by either answering security questions or by generating OTP
* Reduce load on helpdesk
* Allow end user self-service outside office hours by allowing access to self-service portal from outside corporate network
How has it helped my organization?
It allows end-users to reset their password by generating a one-time password (OTP) that they receive on their mobile. They're not dependent on the help desk. They can do self-service from anywhere in the world. So, if they're traveling, they can still reset their password or change the password. They are not locked out of their account at any given time.
What is most valuable?
The OTP part and self-service are most valuable. You are not dependent on the help desk people.
It does have advantages over the other products that we are seeing. Other products don't have the out-of-the-box OTP option, whereas One Identity Password Manager has the out-of-the-box OTP option. It also has a cloud-based solution for generating OTPs. So, the customers can either opt for their own SMS gateway, or they can use the One Identity OTP option where they don't have to have an SMS gateway. With other products, customers must have their own SMS gateway.
One Identity Password Manager also has the option to synchronize the password with any connected application. For example, if there is an Oracle application or any other application, there is an option of synchronizing. Once the Active Directory Password is reset, you can synchronize the password with connected applications, so you don't have to separately reset the password in connected applications. I haven't come across this feature with any other solution.
What needs improvement?
If there is a self-service option to update the mobile number, it will be much more useful.
If possible, there should be an option for the cloud password reset and synchronization of the password to the cloud.
For how long have I used the solution?
I have been using this solution for more than 17 years.
What do I think about the stability of the solution?
It is very stable.
What do I think about the scalability of the solution?
It is based on the Windows platform, so it is very easy to scale. It is suitable for small, medium, and large enterprises.
How are customer service and technical support?
Their support is pretty good. I would rate them a nine out of 10.
How was the initial setup?
Its initial setup is simple. A plain vanilla implementation could take a day to be up and running. This duration can vary if a customer has requirements for different password policies and different roles.
It doesn't require any maintenance.
What's my experience with pricing, setup cost, and licensing?
Its price is on the cheaper side. It has a perpetual license, and everything is included in the license. You only have to pay separately for the SMS gateway or the OTP part.
What other advice do I have?
It is suitable for all enterprises where end-users have to call the help desk people for resetting or changing the password and unlocking the account. If you try the wrong password three or four times, the account gets locked. In that case, an end-user needs to call the help desk people. On top of that, the help desk is not able to verify whether the end-user is the right person.
One of the requirements that many organizations have but don't know how to implement is validation. If I call by your name or some other person's name, the help desk people will allow me to reset the password. Validation is very important. You can implement validation easily in Password Manager. If you go with the OTP option, then you don't even need validation. The end-users will get an OTP on their mobile, and then they can reset the password.
I would rate One Identity Password Manager a nine out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
One Identity Password Manager
April 2026
Learn what your peers think about One Identity Password Manager. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
892,287 professionals have used our research since 2012.
Systems Engineer at a tech services company with 11-50 employees
Easy to use, flexible, and supports many languages
Pros and Cons
- "What I found most valuable in One Identity Password Manager is its easy use. It's a flexible solution. It also supports many languages, including Arabic."
- "What I found most valuable in One Identity Password Manager is its easy use."
- "An area for improvement in One Identity Password Manager is the management gap since Quest is no longer under Dell, and One Identity is under Quest. The management gap resulted in poor support, which needs improvement."
- "An area for improvement in One Identity Password Manager is the management gap since Quest is no longer under Dell and One Identity is under Quest, which resulted in poor support because it created disconnections between my company and One Identity."
What is our primary use case?
The primary use case for One Identity Password Manager is for a user to reset the password himself. For example, if the end-user goes on vacation or emergency leave, after some time when that user returns to work, he could forget his password. That end-user can ask the system administrator or Active Directory administrator to reset the password because there's a way for the administrator to crack the password for the user. Still, if the user has One Identity Password Manager, he can reset the password by answering a few questions correctly. He'll be able to answer the questions if he sets the questions on One Identity Password Manager before the password reset.
Implementing One Identity Password Manager is better because it can provide better security. For example, the administrator could reset the password without knowing whether the person requesting the password reset was the actual user and not a scammer.
What is most valuable?
What I found most valuable in One Identity Password Manager is its easy use. It's a flexible solution.
I also like that One Identity Password Manager supports many languages, including Arabic. Here in the Middle East, some users like a user interface in Arabic, which makes it easier and better to deal with. Arabic language support is one of the good points of One Identity Password Manager, at least for users here in the Middle East.
What needs improvement?
An area for improvement in One Identity Password Manager is the management gap since Quest is no longer under Dell and One Identity is under Quest. The management gap resulted in poor support because it created disconnections between my company and One Identity. After all, my company used to deal with the Dell team, so right now, support for One Identity Password Manager needs improvement.
For how long have I used the solution?
My familiarity with One Identity Password Manager started six years ago. Still, recently, my company proposed One Identity Password Manager to a customer for password reset in case a user forgets his password.
What do I think about the stability of the solution?
Overall, One Identity Password Manager is a stable solution.
What do I think about the scalability of the solution?
One Identity Password Manager is a scalable solution.
How are customer service and support?
On a scale of one to five, I'd rate the technical support for One Identity Password Manager as four. Because of the product rebranding, there's a small gap in the support provided, which needs improvement.
How was the initial setup?
One Identity Password Manager was easy to implement at least seven years ago. The process could still be easy today, but I have yet to see how it's implemented.
How long the deployment of One Identity Password Manager takes would depend on prerequisite readiness on the customer side. Sometimes, the customer says the prerequisite is ready, but when you go to the site, only fifty percent is prepared, so that causes some delay in the implementation.
What's my experience with pricing, setup cost, and licensing?
The licensing for One Identity Password Manager depends on the customer's requirement. For example, it could be one year, or it could be three years.
In general, One Identity Password Manager is not an expensive product. Pricing for it is competitive.
What other advice do I have?
My company is not an end user or customer of One Identity Password Manager. It's a reseller. My company resells One Identity Safeguard, One Identity Privileged Access Management, and One Identity Password Manager to customers.
The latest version of One Identity Password Manager will be implemented for the customer, though the implementation has yet to start because the customer requested the vendor to implement it.
I'm not sure if One Identity Password Manager has a cloud deployment, but the customer requested an on-premise deployment.
One person is enough to deploy and maintain One Identity Password Manager. It may not be a big solution, but it's helpful.
I would recommend One Identity Password Manager to others because it's a good solution and helpful. However, it would be best if you didn't use it as your main product in terms of network security. It would be best if you had your primary security solutions for your network infrastructure while One Identity Password Manager is your second priority or second-level solution. It's not a high-priority solution. You can bring this into your network later, but it's also an essential solution. You should implement high-priority security solutions first, then One Identity Password Manager after.
Based on my experience, I'd rate One Identity Password Manager as eight out of ten.
My company is a silver partner of One Identity Password Manager.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner/Reseller
Buyer's Guide
Download our free One Identity Password Manager Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2026
Product Categories
Enterprise Password ManagersPopular Comparisons
Azure Key Vault
AWS Secrets Manager
Delinea Secret Server
LastPass Business
1Password Business
Devolutions Hub
Netwrix Password Secure
Fischer Identity Password Management
Buyer's Guide
Download our free One Identity Password Manager Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What are some best practices to implement for secure employee password management?
- What advice do you have for an enterprise user on Password Day 2021?
- When evaluating Enterprise Password Managers, what aspect do you think is the most important to look for?
- Why is Enterprise Password Managers important for companies?
- What should one take into account when selecting an enterprise password manager?











