• HOME
  • CATEGORIES

    • CATEGORIES

    • Application Development

      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • View All
    • Artificial Intelligence

      • AI Code Assistants (Transitioning to AI Coding Agents)
      • Generative AI Knowledge Management Apps/General Productivity
      • AI Application Development Platforms
      • Conversational AI Platforms
      • Artificial Intelligence Applications in IT Service Management (Transitioning to AI Applications in IT Service Management)
      • View All
    • Cloud Computing

      • Backup and Data Protection Platforms
      • Cloud Database Management Systems
      • Strategic Cloud Platform Services
      • Server Virtualization (Transitioning to Server Virtualization Platforms)
      • Hybrid Cloud Storage
      • View All
    • Customer Relationship Management

      • Contact Center as a Service
      • CRM Customer Engagement Center
      • Digital Experience Platforms
      • Web Content Management
      • Field Service Management
      • View All
    • Data and Analytics

      • Analytics and Business Intelligence Platforms
      • Data Science and Machine Learning Platforms (Transitioning to AI Platforms For Data Science and Machine Learning)
      • Data Integration Tools
      • Process Mining Platforms (Transitioning to Process Intelligence Platforms)
      • Augmented Data Quality Solutions
      • View All
    • Education

      • Manager and Leadership Training
      • Corporate Learning Technologies
      • eLearning Authoring Tools
      • Higher Education Student Information System Software as a Service (Transitioning to Higher Education SaaS Student Information Systems)
      • Digital Learning Content Providers
      • View All
    • Enterprise Networking and Communications

      • Unified Communications as a Service
      • Global WAN Services
      • Intranet Packaged Solutions
      • SD-WAN
      • Edge Distribution Platforms
      • View All
    • Finance

      • Expense Management Software
      • Financial Close and Consolidation Solutions
      • Financial Planning Software
      • Cloud Financial Management Tools
      • Accounts Payable Applications
      • View All
    • Healthcare and Life Sciences

      • Medical Device Security Solutions (Transitioning to Medical Device Risk Management Platforms)
      • Health Navigation Solutions
      • Claim Editor Software
      • Revenue Cycle Management Software (Transitioning to Revenue Cycle Management Solutions)
      • Digital Health Platforms (Transitioning to Healthcare Provider Industry Cloud Platforms)
      • View All
    • Human Resources

      • Employee Recognition and Reward Systems
      • Workforce Management Applications (Transitioning to Workforce Management (WFM) Technology)
      • Digital Employee Experience Management Tools
      • Talent Acquisition (Recruiting) Suites
      • Cloud HCM Suites for Regional and/or Sub-1,000 Employee Enterprises
      • View All
    • IT Infrastructure and IoT

      • Enterprise Wired and Wireless LAN Infrastructure (Transitioning to Enterprise Wired and Wireless LAN)
      • Endpoint Management Tools
      • IT Service Management Platforms
      • Container Management
      • Infrastructure Monitoring Tools
      • View All
    • IT Security

      • Endpoint Protection Platforms
      • Email Security
      • Managed Detection and Response
      • Security Information and Event Management
      • Security Awareness Computer-Based Training
      • View All
    • Legal

      • Contract Life Cycle Management
      • Electronic Signature
      • Governance, Risk and Compliance Tools, Assurance Leaders
      • Compliance Monitoring Solutions
      • Corporate Governance Services
      • View All
    • Manufacturing

      • Enterprise Asset Management Software
      • Manufacturing Execution Systems
      • Global Industrial IoT Platforms
      • PLM Software in Discrete Manufacturing Industries
      • Computer-Aided Design (CAD) Software
      • View All
    • Marketing

      • Video Editing Software
      • Email Marketing
      • Multichannel Marketing Hubs
      • Customer Data Platforms
      • Event Marketing and Management Platforms
      • View All
    • Productivity and Collaboration

      • Document Management
      • Visual Collaboration Applications
      • Collaborative Work Management
      • Knowledge Management (KM) Software
      • Communications Platform as a Service
      • View All
    • Public Sector and Government

      • Government Budgeting and Planning Solution
      • Cloud-Based ERP for U.S. Local Government
      • Citizen Service Delivery
      • Government ERP Solutions
      • Government Contracting Software
      • View All
    • Retail

      • Digital Commerce
      • Digital Commerce Payment Vendors (Transitioning to Digital Commerce Payment Platforms)
      • Retail Assortment Management Applications: Long Life Cycle Products
      • Retail Workforce Management Applications (Transitioning to Retail Workforce Management Technology)
      • Digital Shelf Analytics
      • View All
    • Sales

      • Sales Force Automation Platforms (Transitioning to CRM Sales Platforms)
      • Revenue Enablement Platforms
      • Revenue Intelligence (Transitioning to Revenue Action Orchestration)
      • Configure, Price and Quote Applications
      • Search and Product Discovery
      • View All
    • Supply Chain Management

      • Supply Chain Planning Solutions
      • Transportation Management Systems
      • Real-Time Transportation Visibility Platforms
      • Warehouse Management Systems
      • Supply Chain Strategy, Planning and Operations Consulting
      • View All
    • Utilities

      • Geospatial Information Systems for Energy and Utilities
      • Mobile Workforce Management Software for Utilities (Transitioning to Mobile Workforce Management Solutions for Power and Utilities)
      • Energy Management and Optimization Systems
      • Energy Trading and Risk Management
      • Advanced Distribution Management Systems
      • View All
    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

      • Application Development
      • Artificial Intelligence
      • Cloud Computing
      • Customer Relationship Management
      • Data and Analytics
      • Education
      • Enterprise Networking and Communications
      • Finance
      • Healthcare and Life Sciences
      • Human Resources
      • IT Infrastructure and IoT
      • IT Security
      • Legal
      • Manufacturing
      • Marketing
      • Productivity and Collaboration
      • Public Sector and Government
      • Retail
      • Sales
      • Supply Chain Management
      • Utilities
      Browse All Categories

      Application Development

      69 markets
      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • API Management
      • Enterprise Low-Code Application Platforms
      • Robotic Process Automation
      • DevOps Platforms (Transitioning to DevSecOps Platforms)
      • Business Process Automation Tools
      • Enterprise Architecture Tools
      • Business Orchestration and Automation Technologies
      • Custom Software Development Services
      • Code Review Tools
      • Digital Adoption Platforms
      • Domain Registrars
      • Public Cloud IT Transformation Services (Transitioning to Public Cloud Optimization and Transformation Services)
      • Game Engine Software
      • Website Builders
      • Developer Productivity Insight Platforms
      • AI Agents for Application Developers
      • Application Platforms (Transitioning to Cloud-Native Application Protection Platforms)
      • Feature Management
      • Application Crowdtesting Services
      • Test Data Management
      • API Generation Software
      • Prototyping Software
      • Mobile App Analytics
      • AI-Augmented Code Modernization Tools
      • Application Testing Services, Worldwide (Transitioning to Quality Engineering Services)
      • Virtual Reality Development Software
      • Application Integration Platforms
      • Green Software Engineering
      • Event Brokers
      • Digital Twin of an Organization Platforms
      • Independent Third-Party Software Support of Megavendors
      • Microsoft 365 Implementation and Support Services
      • Application Development Life Cycle Management (Transitioning to DevOps Platforms)
      • BPM-Platform-Based Case Management Frameworks
      • Microsoft Product Support Services
      • Product Roadmapping Tools for Software Engineering
      • Multiexperience Development Platforms
      • Application Portfolio Management Tools
      • Application Composition Platform
      • Internal Developer Portals
      • AI Agent Development Platforms for Software Engineering
      • Cloud Development Environments
      • Load Testing Tools
      • Mobile Development Frameworks (Transitioning to Web and Mobile Development Frameworks)
      • Blockchain Consulting and Proof-of-Concept Development Services
      • B2B Gateway Software
      • Citizen Application Development Platforms
      • Mobile Application Testing Services
      • SAP S/4HANA Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Oracle Cloud Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • SAP Application Services, Worldwide
      • SAP SuccessFactors Service Providers (Transitioning to Cloud ERP Services)
      • Service Mesh
      • Value Stream Management Platforms
      • Business-Outcome-Driven Enterprise Architecture Consulting (Retired)
      • Oracle Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Rapid Mobile App Development Tools
      • SAP Selective Test Data Management Tools
      • API and MCP Testing Tools
      • Augmented Reality Development Software
      • Blockchain as a Service
      • Mobile Application Management (Transitioning to Endpoint Management Tools)
      • Mobile Back-End Services
      • R&D Outsourcing Providers
      View More
  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Access Management

Access Management Reviews and Ratings

What is Access Management?

Gartner defines access management (AM) as tools that include authentication, authorization, single sign-on (SSO) and adaptive access capabilities for modern standards-based web applications, classic web applications and APIs.

AM’s purpose is to give people (employees, consumers and other users) and machines access to protected applications in a streamlined and consistent way that enhances the user experience. For people, SSO is part of the enhanced experience. AM is also responsible for providing security controls to protect the user session during runtime. It enforces authentication and runtime authorization using adaptive access. Lastly, AM can provide identity context for other cybersecurity tools and reliant applications to enable identity-first security.

Learn More About This Category
How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of Duo
Duo
Logo of Microsoft Entra ID
Microsoft Entra ID
Logo of Okta Workforce Identity
Okta Workforce Identity
For 50M-1B USD Companies
Logo of Oracle Cloud Infrastructure Identity and Access Management
Oracle Cloud Infrastructure Identity and Access Management
Logo of Oracle Access Management
Oracle Access Management
Logo of CyberArk Workforce Identity
CyberArk Workforce Identity
For North America
Logo of Oracle Access Management
Oracle Access Management
Logo of OpenText Access Manager (NetIQ)
OpenText Access Manager (NetIQ)
Logo of miniOrange Workforce Identity and Access Management
miniOrange Workforce Identity and Access Management
Integration & Deployment
Logo of Duo
Duo
Logo of Oracle Cloud Infrastructure Identity and Access Management
Oracle Cloud Infrastructure Identity and Access Management
Logo of miniOrange Workforce Identity and Access Management
miniOrange Workforce Identity and Access Management

Product Listings

Filter by

Products 1 - 20 of 124
Sort by
Logo of Okta Workforce Identity

Okta Workforce Identity

By Okta

4.6
(856 Ratings)
customers choice 2025

Workforce Identity Cloud is a software designed to manage and secure user identities and access across an organization’s digital ecosystem. The software enables single sign on, multifactor authentication, lifecycle management, and API access management to help organizations control who has access to applications, resources, and data. Workforce Identity Cloud streamlines user provisioning and deprovisioning, supports integration with various applications and directories, and helps ensure compliance with security policies. The software addresses the business challenge of protecting organizational assets by centralizing identity management and reducing the risk of unauthorized access while supporting workforce productivity.

Show More Details
Logo of Microsoft Entra ID

Microsoft Entra ID

By Microsoft

4.5
(749 Ratings)

Microsoft Entra ID is an identity and access management software designed to help organizations securely manage user identities and control access to applications and resources. The software offers features such as single sign-on, multifactor authentication, and conditional access policies to facilitate secure authentication and authorization processes. Entra ID enables centralized administration of users, groups, and devices, supporting hybrid environments with integration across cloud-based and on-premises applications. It addresses the business need for secure access management by providing tools for identity governance, monitoring, and reporting on user activities. The software helps organizations reduce security risks associated with unauthorized access and streamlines user lifecycle management.

Show More Details
Logo of Ping Identity Platform

Ping Identity Platform

By Ping Identity

4.4
(614 Ratings)

Ping Identity Platform is a software that provides enterprises with capabilities for identity and access management. The software facilitates secure authentication, single sign-on, and multi-factor authentication for users across applications and devices. It enables centralized management of user identities, helping organizations meet regulatory compliance requirements and protect sensitive information. Ping Identity Platform integrates with various cloud and on-premises environments and supports standards-based protocols for interoperability. The software is designed to address business challenges related to secure access control, user provisioning, and digital identity governance in complex enterprise ecosystems.

Show More Details
Logo of OneLogin

OneLogin

By One Identity

4.5
(363 Ratings)

OneLogin is a software that provides identity and access management solutions designed to help organizations securely manage user authentication and access to applications and data. The software enables single sign-on capabilities, multi-factor authentication, and automated user provisioning. It addresses business challenges such as reducing the risk of unauthorized access, streamlining user onboarding and offboarding, and simplifying access control for cloud and on-premises applications. OneLogin integrates with various directories and supports compliance requirements through centralized access policies and audit reporting functionalities.

Show More Details
Logo of Okta Customer Identity

Okta Customer Identity

By Okta

4.6
(252 Ratings)
customers choice 2025

Okta Customer Identity is a software that provides authentication and authorization capabilities for businesses to manage and secure customer access to applications and digital services. The software offers features including single sign-on, multi-factor authentication, user lifecycle management, and API access controls. Okta Customer Identity enables organizations to streamline registration and login experiences, protect customer accounts, and ensure compliance with security requirements. The software supports integration with various platforms and applications, offering tools for developers to embed identity functionality into their products. It addresses business needs related to user management, data security, and frictionless customer access across digital channels.

Show More Details
Logo of SafeNet Trusted Access

SafeNet Trusted Access

By Thales

4.4
(246 Ratings)

Thales’s SafeNet Trusted Access is a cloud-based access management and authentication service. SafeNet Trusted Access protects your environment by applying authentication to all users and apps with diverse authentication capabilities. SafeNet Trusted Access gives you the power to address access security gaps by applying the right policy that enforces the right authentication method for the right user, in line with their specific context. May include FIDO technology.

SafeNet Trusted Access offers enterprises key benefits:

1. Ensure no user is an easy target by allowing you to expand authentication coverage to more users and apps

2. Complement IAM solutions that may already be deployed by applying more effective authentication to more users

3. Provide the right authentication for all your users, based on their context, rather than taking a ‘one size fits all’ approach

4. Meet users’ expectations about being able to work from anywhere on any device securely with the right access security

Show More Details
Logo of AWS Identity and Access Management (IAM)

AWS Identity and Access Management (IAM)

By Amazon Web Services (AWS)

4.5
(244 Ratings)

AWS Identity and Access Management IAM is a software that enables administrators to control user access to resources within Amazon Web Services environments. The software provides capabilities for creating and managing AWS users and groups and defining permissions to allow or deny access to specific AWS resources. It supports policies for fine-grained authorization, multi-factor authentication, and federated access, helping organizations maintain security and compliance by ensuring that only authenticated and authorized users can perform actions on AWS services. IAM addresses the business need for secure, manageable, and scalable user access control in cloud-based infrastructures.

Show More Details
Logo of Oracle Access Management

Oracle Access Management

By Oracle

4.9
(216 Ratings)
customers choice 2025

Oracle Access Management is a software that provides centralized access control and identity management for organizations. It enables secure authentication, single sign-on, and policy enforcement across applications, systems, and devices. The software offers features such as adaptive authentication, federation, and risk-based access, allowing organizations to manage user identities and authorizations effectively. Oracle Access Management integrates with various enterprise environments to streamline user provisioning, enhance compliance, and support regulatory requirements. The software helps address business challenges related to secure digital access and reduces the risk associated with unauthorized access to enterprise resources.

Show More Details
Logo of CyberArk Workforce Identity

CyberArk Workforce Identity

By Palo Alto Networks (CyberArk)

4.6
(177 Ratings)

CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security, and credential management. Identity Management capabilities include lifecycle management, identity orchestration, and identity governance. With CyberArk Identity, organizations can secure workforce access to applications, endpoints, and infrastructure and protect themselves from the leading cause of data breaches – compromised credentials.

Show More Details
Logo of SecureAuth Workforce IAM

SecureAuth Workforce IAM

By SecureAuth

4.3
(102 Ratings)

Arculix is a software developed by SecureAuth that provides authentication and identity management solutions for organizations. The software offers features such as multi-factor authentication, risk-based authentication, and adaptive authentication methods designed to secure access to applications and systems. Arculix addresses business problems related to unauthorized access, data breaches, and regulatory compliance by enabling secure user verification and minimizing risks from compromised credentials. The software integrates with on-premises and cloud environments, supporting a range of use cases including workforce, customer, and partner access. It streamlines user authentication workflows, helps enforce access policies, and aids organizations in managing digital identities while maintaining security standards.

Show More Details
Logo of IBM Verify

IBM Verify

By IBM

4.5
(100 Ratings)

IBM Verify is a software designed to provide identity and access management capabilities, enabling organizations to secure user authentication and manage access to applications and data. The software supports multi-factor authentication, adaptive access, and risk-based authentication to help reduce unauthorized access while streamlining login experiences for users. It addresses business challenges related to secure user identity verification, regulatory compliance, and reducing the risks associated with credential compromise. IBM Verify integrates with various enterprise environments and cloud applications, facilitating centralized access management and supporting policy enforcement to control user permissions across digital resources.

Show More Details
Logo of miniOrange Workforce Identity and Access Management

miniOrange Workforce Identity and Access Management

By miniOrange

4.8
(95 Ratings)

miniOrange Cloud and On-Premise Identity Management - the perfect solution for

all of your SSO, MFA, Provisioning, Adaptive Authentication, Identity Brokering and Legacy Integration

needs. miniOrange's IDP Product - Your employees, customers, and partners can seamlessly access and

securely connect to our cloud or on-premise system. We provide a centralized platform with enhanced

capabilities for access management and identity management which fits any of your use cases and can integrate

with any system. 1. SSO- Single Sign On platform with ready integrations for all your Web, Mobile and Legacy

On-premise Apps 2. MFA - Secure your user's identity with passwords and an additional layer of authentication

(e.g. OTP over SMS/Email/Push) 3. Provisioning - Automatic user provisioning & de-provisioning, password

management and scheduled synchronization of user-data 4. Adaptive Authentication - IP, Location, Time &

Device Restriction 5. External Directory Integration - Microsoft AD, Azure AD, OpenLDAP, Cognito

Show More Details
Logo of WSO2 Identity Server

WSO2 Identity Server

By WSO2

4.4
(89 Ratings)

Designed for developers, by developers, WSO2 Identity Server offers an open, API-driven architecture alongside a broad set of developer tools. WSO2 Identity Server is extensible, and scalable. Features include:

- Single sign-on

- Social & federated login

- Strong authentication

- Passwordless, risk-adaptive and multi-factor authentication

- User onboarding

- Progressive profiling

- Account management

- User self-service

- Identity provisioning

- Identity bridging

- Fine-grained access control

- Privacy, consent & compliance management

- Analytics, dashboarding & reporting

- Preconfigured integration with sales & marketing tools

Show More Details
Logo of Duo

Duo

By Cisco Systems

4.7
(87 Ratings)

Cisco Duo provides security-first Identity and Access Management (IAM) that protects organizations from identity-based threats. Duo includes all the necessary components to serve as your sole IAM platform or seamlessly integrate with and fortify your existing identity providers, operating as a unified defense layer across your identity infrastructure. By embedding critical protections like broad-based MFA and device trust into the company’s base offering, Duo eliminates the "security tax" often imposed by traditional IAM vendors. Essential security is on by default—not a costly, complex upgrade. As a result, Duo addresses advanced threats while delivering a seamless experience that users and admins embrace.

Show More Details
Logo of OpenText Access Manager (NetIQ)

OpenText Access Manager (NetIQ)

By OpenText

4.8
(75 Ratings)

OpenText Access Manager is a software designed to manage and secure digital identities and access privileges within enterprise environments. It offers features such as single sign-on, authentication, authorization, and policy enforcement for web applications and resources. The software streamlines user access by enabling centralized identity management and integrating with various authentication methods, including multi-factor authentication. It assists organizations in addressing the business problem of controlling and monitoring access to sensitive data and applications, reducing security risks, and meeting compliance requirements. OpenText Access Manager supports integration with on-premises and cloud environments, helping enterprises establish secure and scalable access controls for users and systems.

Show More Details
Logo of Oracle Cloud Infrastructure Identity and Access Management

Oracle Cloud Infrastructure Identity and Access Management

By Oracle

4.8
(65 Ratings)
customers choice 2025

Oracle Cloud Infrastructure Identity and Access Management is a software that manages user identities and controls access to cloud resources within Oracle Cloud environments. The software enables organizations to securely authenticate users, assign permissions, and define policies for access to applications and data. It supports multi-factor authentication, single sign-on, and automated provisioning and deprovisioning of user accounts to help reduce security risks. The software delivers audit capabilities for tracking user activities and ensures compliance with access governance requirements. It addresses business needs related to secure access control, user lifecycle management, and protection of sensitive information in cloud deployments.

Show More Details
Logo of Symantec VIP Access Manager (Legacy)

Symantec VIP Access Manager (Legacy)

By Broadcom

4.5
(47 Ratings)

Symantec VIP Access Manager (Legacy) is a software that provides identity and access management capabilities for organizations seeking to secure user authentication and resource access. The software enables businesses to manage user credentials, enforce multi-factor authentication, and grant access to cloud and web applications through single sign-on functionality. It addresses business challenges related to user identity verification, unauthorized access, and regulatory compliance by centralizing authentication processes and offering policy-based access controls. The software integrates with existing directory services and supports various authentication methods, allowing organizations to reduce risk by verifying user identities before granting access to critical applications and data.

Show More Details
Logo of CyberArk Customer Identity

CyberArk Customer Identity

By Palo Alto Networks (CyberArk)

4.5
(42 Ratings)

CyberArk Customer Identity is a software designed to manage and secure customer access to applications and services. The software provides capabilities such as authentication, authorization, identity lifecycle management, and adaptive access controls. It facilitates integration with various applications and supports compliance with security policies by enabling features like multi-factor authentication and passwordless login options. CyberArk Customer Identity addresses business challenges related to user identification, security risks from unauthorized access, and helps organizations streamline customer onboarding processes while safeguarding sensitive data. By centralizing identity management for customers, the software assists businesses in reducing operational complexity and improving access governance.

Show More Details
Logo of Trusfort Identity and Access Management

Trusfort Identity and Access Management

By Trusfort

4.8
(39 Ratings)
Show More Details
Logo of Symantec SiteMinder

Symantec SiteMinder

By Broadcom

4
(36 Ratings)

Symantec SiteMinder is an access management software designed to help organizations securely manage user identities and control access to web applications. The software provides features such as single sign-on, authentication, authorization, and policy management. It enables administrators to define and enforce security policies across multiple applications, helping to protect sensitive data and ensure compliance with regulatory requirements. SiteMinder integrates with various directory services and supports a wide range of authentication protocols, allowing organizations to streamline user access and reduce administrative overhead. The software addresses business challenges related to securing digital resources and managing complex user access environments.

Show More Details

Features of Access Management

Updated December 2025

Mandatory Features:

  • SSO and session management, with support for standard identity protocols (e.g., OpenID Connect, OAuth 2.0 and SAML) and social logins to access standards-based applications and legacy applications (via proxies or agents)

  • User authentication, including: 1.Support for phishing-resistant multifactor authentication (MFA) methods (e.g., X.509 and FIDO2) and other account takeover (ATO) protections 2. Controls to mitigate usage of compromised passwords 3. Protections against common MFA attacks, either directly or via out-of-the-box integration with third-party authentication services 4. Support for passwordless authentication methods

  • Adaptive access based on dynamic evaluation of identity trust and access risk

  • A directory or integrated identity repository, which includes identity synchronization services, for all constituencies

  • Basic identity life cycle management, including support for enabling create, read, update and delete (CRUD) operations across all user types

  • Authorization policy definition and enforcement for any resources, such as applications and APIs, directly defined in the system

Gartner Research

Magic Quadrant for Access ManagementCritical Capabilities for Access Management
Gartner Peer Insights 'Voice of the Customer': Access Management

Top Trending Products

DuoOracle Access ManagementMicrosoft Entra IDAWS Identity and Access Management (IAM)miniOrange Workforce Identity and Access ManagementOkta Workforce IdentityIBM VerifyFortiAuthenticatorMicrosoft Entra External IDImprivata Enterprise Access Management

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.