(3)
5.0 out of 5
Visit Website
Sponsored
Self Service Access requests | Based on 17 Oracle Identity Management reviews and verified by the G2 Product R&D team. Users can request access to an application and be automatically provisioned if they meet policy requirements | 81% (Based on 17 reviews) | |
Smart/Automated Provisioning | Based on 16 Oracle Identity Management reviews and verified by the G2 Product R&D team. Automates account/access rights creation, changes and removals for on-premise and cloud apps | 75% (Based on 16 reviews) | |
Role Management | Based on 17 Oracle Identity Management reviews and verified by the G2 Product R&D team. Establish roles that create a set of authentication rights for each user in the role | 75% (Based on 17 reviews) | |
Policy Management | Based on 16 Oracle Identity Management reviews and verified by the G2 Product R&D team. Enables administrators to create access policies and applies policy controls throughout request and provisioning processes | 74% (Based on 16 reviews) | |
Access Termination | Based on 17 Oracle Identity Management reviews and verified by the G2 Product R&D team. Terminate access to multiple applications based on dates | 76% (Based on 17 reviews) | |
Approval Workflows | Based on 16 Oracle Identity Management reviews and verified by the G2 Product R&D team. Allow business stake-holders/managers to approve or reject requested changes to access via a defined workflow | 77% (Based on 16 reviews) |
Self Service Password Reset | Based on 16 Oracle Identity Management reviews and verified by the G2 Product R&D team. Enables users to reset passwords without administrator interaction. Enforces password policies when resetting. | 81% (Based on 16 reviews) | |
Bulk Changes | Based on 15 Oracle Identity Management reviews and verified by the G2 Product R&D team. Change users and permissions in bulk | 73% (Based on 15 reviews) | |
Bi-directional Identity Synchronization | Based on 15 Oracle Identity Management reviews and verified by the G2 Product R&D team. Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application | 76% (Based on 15 reviews) |
Identifies and Alerts for Threats | Alerts administrators when inappropriate access occurs 13 reviewers of Oracle Identity Management have provided feedback on this feature. | 74% (Based on 13 reviews) | |
Compliance Audits | Based on 14 Oracle Identity Management reviews and verified by the G2 Product R&D team. Proactively audits access rights against policies | 77% (Based on 14 reviews) |
Reporting | Based on 13 Oracle Identity Management reviews and verified by the G2 Product R&D team. Standard and customized report creation to ensure appropriate access rights have been assigned | 68% (Based on 13 reviews) | |
Mobile App | Provides mobile application that alerts administrators of potential issues and allows administrators manage access rights | Not enough data | |
Ease of set up for target systems | Based on 13 Oracle Identity Management reviews and verified by the G2 Product R&D team. Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured | 73% (Based on 13 reviews) | |
APIs | Based on 13 Oracle Identity Management reviews and verified by the G2 Product R&D team. Provides appropriate application interfaces to enable custom integrations for unique business requirements | 71% (Based on 13 reviews) | |
Smart/Automated Provisioning | Automates account/access rights creation, changes and removals for on-premise and cloud apps | Not enough data | |
Policy Management | Enables administrators to create access policies and applies policy controls throughout request and provisioning processes | Not enough data | |
On-premise identity repositories supported | Variety and Quality of integrations (ie Active Directory, LDAP) | Not enough data | |
Ease of Connecting Applications | Easily provisions new systems, platforms or applications using configuration and not customization. | Not enough data |
Role Management | Establish roles that create a set of authentication rights for each user in the role | Not enough data | |
Access Termination | Terminate access to multiple applications based on dates | Not enough data | |
Remote Access | Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network. | Not enough data | |
Partner Access | Controls access to users that are not company employees that are either within the companies local area network or outside the network | Not enough data |
SSO | Provides a single access point for users to access multiple cloud products without multiple logins. | Not enough data | |
Multi-Factor Authentication | Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are. | Not enough data | |
Supports Required Authentication systems | Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc. | Not enough data | |
User provisioning | Simplifies or automates user provisioning, deprovisioning, and other user role changes. 14 reviewers of Oracle Identity Management have provided feedback on this feature. | 85% (Based on 14 reviews) | |
Password manager | Based on 13 Oracle Identity Management reviews. Offers password management tools to end users. | 85% (Based on 13 reviews) | |
Single Sign-on | Based on 15 Oracle Identity Management reviews. Offers single sign-on functionalities to end users, allowing them to authenticate once and be given access to all of their company accounts. | 78% (Based on 15 reviews) | |
Enforces policies | Based on 14 Oracle Identity Management reviews. Enforces user-access policies based on individual, role type, group membership or other factors to prevent unauthorized access to company systems and data. | 80% (Based on 14 reviews) | |
Authentication | Authenticates users prior to granting access to company systems. This feature was mentioned in 15 Oracle Identity Management reviews. | 82% (Based on 15 reviews) | |
Multi-factor authentication | Offers multi-factor authentication methods to verify a user's identity. 15 reviewers of Oracle Identity Management have provided feedback on this feature. | 81% (Based on 15 reviews) |
On-premises solution | Based on 15 Oracle Identity Management reviews. Provides an IAM solution for on-prem systems. | 80% (Based on 15 reviews) | |
Cloud-solution | Provides an IAM solution for cloud-based systems. | Not enough data |
Tracking | As reported in 12 Oracle Identity Management reviews. Tracks user activities across protected systems. | 76% (Based on 12 reviews) | |
Reporting | Provides reporting functionality. This feature was mentioned in 12 Oracle Identity Management reviews. | 72% (Based on 12 reviews) |