This tool is a way for data centers to secure their connectivity. My primary use case for this product is to synchronize with the LDAP server, and allow single sign-on, role-based access.
Solution Architect at a tech consulting company with 501-1,000 employees
A stable solution for single sign-on and role-based permissions
Pros and Cons
- "I would rate the solution's stability eight or nine out of ten."
- "The high availability architecture has to be improved."
What is our primary use case?
How has it helped my organization?
We are able to use this tool to better secure next generation data centers, which use software defined networks. An example of this is the telecom industry. We will also be using it to develop e-commerce websites.
What is most valuable?
For us, the single sign-on access and the role-based permissions are the major requirement. These are the features that I find most valuable.
What needs improvement?
I have two suggestions for improving the product. First, improvements have to been made in the high availability architecture. This has to do with the master-slave replication, and how the load balancing is handled between the identity servers. The way in which it is handled has to be improved.
My second suggestion has to do with LDAP synchronization. Ideally, the agents should be simplified beyond what they are now.
Buyer's Guide
WSO2 Identity Server
June 2025

Learn what your peers think about WSO2 Identity Server. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
I would rate the solution's stability eight or nine out of ten. It is not crashing or stopping anywhere. I'm not giving a score of ten because of the points for improvement that I mentioned.
What do I think about the scalability of the solution?
The scalability is there. Currently we are able to support more than one hundred thousand users, and we are able to manage them using LDAP.
We have multiple projects where this solution is used. One of these projects has thirty internal users, and the external users are their customers. It is a huge customer base.
Another one of our projects has approximately one hundred users, which will be more than ten thousand customers.
Generally, there are two kinds of projects. The first I call "light", where the customers are the end users. This makes for a very large number of users. The second type of project is an operational team, where there are approximately one hundred users, or real-time operation team members. Their customers will total more than ten thousand.
We do have plans to increase our number of clients.
How are customer service and support?
With our subscription, their technical support is really very good. There are a lot of documents available, but they are quite difficult to understand and deploy based on this alone.
Which solution did I use previously and why did I switch?
Beyond evaluating a couple of other products, we did not use a different solution.
How was the initial setup?
I found the initial setup to be easy. It was not complex.
The initial deployment will take two days, maximum, and two team members are sufficient to handle it. After the initial deployment, we had to do further customization on our website. This took us approximately two to three weeks.
We currently have a five member team for maintaining the solution.
What about the implementation team?
We deployed the solution ourselves.
What was our ROI?
We do recognize a return on our investment. However, because this is only one of the tools in our full solution, I cannot tell you exactly how much this component contributes.
What's my experience with pricing, setup cost, and licensing?
Price matters to us, and the primary reason that we adopted this solution is that it is open source. This means that the actual product is free of cost; however, we do have a support licence that we can pay for by yearly subscription.
We do very well with this. We have to take their support, but that is a minimal charge if I'm comparing it to other identity managers.
Overall, the licensing is ok. If you are paying for support then you will be supported very well.
Which other solutions did I evaluate?
We evaluated a couple of other products before settling on this one. One of the solutions that we tried was CyberArk for privileged access management.
What other advice do I have?
This is a really good, open source product.
I would suggest purchasing a subscription for technical support. It is a lightweight program, and the documentation is sufficient. However, there are specific features that you may want to use, and for this you may need full, in-depth support when it comes time to deploy.
Once you purchase the subscription, it is like a perpetual license. You can do everything yourself.
I would rate this product eight out of ten. Other than the small improvements that I have suggested, it is a very good solution.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

A comprehensive ecosystem but very difficult to setup and configure
Pros and Cons
- "Comprehensive ecosystem."
- "I found the initial setup to be very complex."
What is our primary use case?
My primary use case for this product is to evaluate identity solutions for our customers.
How has it helped my organization?
Because I did not go on to adopt this solution, I can only say that it might be a good solution. The documentation and ecosystem were of high quality.
What is most valuable?
The feature that I found most valuable was the ecosystem. It is very comprehensive, and allowed me to find that components that I wanted to use. Other examples include the identity server and the API.
What needs improvement?
I found that the product was too large, and therefore difficult for people such as myself who only wanted to make use of a single function. I was interested in the identity server, alone.
I would like to see a simpler and faster installation and configuration process for making use of individual components.
For how long have I used the solution?
Trial/evaluations only.
What do I think about the stability of the solution?
Judging from the completeness of the ecosystem and the quality of the documentation, I feel that this might be a good product. I just did not have enough time and patience to fully evaluate it.
How was the initial setup?
I found the initial setup to be very complex, which is the main problem that I encountered. I had expected to configure the system in one or two days, but it took longer than I expected.
For example, I was looking for a particular setup, and used LDAP as instructed. However, I could not find where to make use of the API.
What about the implementation team?
I did the implementation and testing of this solution myself. The testing and evaluation phase was approximately two weeks.
Which other solutions did I evaluate?
This, in fact, was the product that I evaluated. I eventually moved on to the solution that I use now.
What other advice do I have?
I tried the product but I found it very cumbersome, so I no longer use it. Time and simplicity were my primary concerns, so I moved on to a new solution.
I would rate this solution a seven out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
WSO2 Identity Server
June 2025

Learn what your peers think about WSO2 Identity Server. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
860,592 professionals have used our research since 2012.
Programmer at a tech services company with 11-50 employees
Open source access management solution that is easy to set up and offers a valuable keystore feature
Pros and Cons
- "The keystore feature has been most valuable for us."
- "This solution requires extensive knowledge to be used effectively as certain areas of its use are not user friendly."
What is our primary use case?
I use this solution to generate keystores and certifications and link these with project development in our company.
What is most valuable?
The keystore feature has been most valuable for us.
What needs improvement?
This solution requires extensive knowledge to be used effectively as certain areas of its use are not user friendly.
What do I think about the stability of the solution?
This is a stable solution.
What do I think about the scalability of the solution?
We have not explored this solution's scalability yet.
How was the initial setup?
The initial setup is not very complex. It took a couple of hours to complete and can be done by one person. I created users from a CSS file and it was very easy to import.
What other advice do I have?
I would recommend this solution to others. I would rate it a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free WSO2 Identity Server Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Product Categories
Customer Identity and Access Management (CIAM)Popular Comparisons
Ping Identity Platform
ForgeRock
SecureAuth Identity Platform
Buyer's Guide
Download our free WSO2 Identity Server Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Looking for an Identity and Access Management product for an energy and utility organization
- What are some tips for effective identity and access management to prevent insider data breaches?
- Which is the best Privileged Account Management solution?
- What are your best practices for Identity and Access Management (IAM) in the Cloud?
- What access management tools would you recommend to help with GDPR compliance?
- How to convince a client that Identity and Access Management (IdAM) is essential for risk elimination?
- What advice do you have for an enterprise user on Password Day 2021?
- How is Zero Trust different from the Least Privileged model?
- What are the best practices to prevent a Brute Force attack via remote access?
- Microsoft accounts are going passwordless. What do you think?