Compare the Top Identity Management Software for Cloud as of January 2026 - Page 5

  • 1
    ImageWare CloudID
    ImageWare CloudID® is a highly modular, software platform that enabled rapid development and deployment of highly secure, yet flexible biometric identity management solutions. ImageWare CloudID® is easily incorporated into new or existing cloud-enabled environments or integrated as cloud-ready software into traditional networked client server and data center IT infrastructures. Two innovations differentiate this biometric identity platform, virtually any biometric modality and algorithm from any vendor can be quickly incorporated into the system, and the system can be easily scaled to satisfy the requirements of small organizations or entire counties, providing ultra-scalable real-time solutions. ImageWare CloudID’s server platform is a set of configurable, server-based software modules designed to add or enhance biometric identity management and credential issuance capabilities to existing applications or support the development of these capabilities in new end-to-end applications.
  • 2
    Juniper Identity Management Service
    Protecting access to corporate data is one of your top security priorities. Insiders with direct access to corporate data can circumvent weak user controls. To keep your corporate resources safe, user access must be governed and enforced across the enterprise, mobile, and the cloud. Juniper Identity Management Service strengthens enterprise security that authenticates and restricts user access. It’s the first line of defense in preventing corporate breaches and safeguarding corporate assets. Employees are identified and assigned corporate roles that determine what applications and data they are permitted to access. Juniper Identity Management Service seamlessly integrates with SRX Series next-generation firewalls, enabling security teams to match application activity and security policies to user roles. It can then generate detailed user-metrics and audit reports for detailed reporting.
  • 3
    Deepnet DualShield

    Deepnet DualShield

    Deepnet Security

    If you are looking for an enterprise grade 2-factor authentication (2FA) or multi-factor authentication (MFA) product that can secure all commonly used business applications and also provides a wide range of authentication methods, then you are in the right place. Deepnet DualShield is a multi-factor authentication system that unifies a variety of authentication methods, protocols, solutions and user experience in a single platform. In addition to the MFA functions, DualShield also provides self-service Password Reset, Single Sign-On (SSO), Identity & Access Management (IAM) and Adaptive Authentication. It is one of the most powerful and flexible multi-factor authentication system in the world. Deepnet DualShield can be installed on premises or hosted in a private cloud, which means that you will have the total control of your own user authentication system, and that you will be able to keep your users’ identities and credentials in a safe place.
  • 4
    Zluri

    Zluri

    Zluri

    Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management, Access Management, and Access Review capabilities. Zluri empowers IT and Security teams to gain visibility into their SaaS landscape, unlock recurring savings, & securely manage access with provisioning and de-provisioning of users. Zluri’s technology is powered by an Authknox engine, and assisted by an Automation engine, enabling companies to navigate & control complex SaaS ecosystems easily. Trusted by over 250 global customers, Zluri is committed to delivering innovative, reliable, and scalable solutions that empower organizations to optimize their SaaS usage, ensure compliance, and enhance Access Management practices.
  • 5
    Huawei IAM

    Huawei IAM

    Huawei Cloud

    Create IAM users and groups and grant them permissions by using policies and roles, allowing or denying access to specific services and resources. Delegate a trusted HUAWEI CLOUD account or a cloud service to access your HUAWEI CLOUD resources based on assigned permissions. Establish a trust relationship between your existing identity system and HUAWEI CLOUD by creating a SAML-based or OpenID Connect–based identity provider or a custom identity broker. In this way, users in your enterprise can log in to HUAWEI CLOUD through single sign-on (SSO). You can require IAM users to complete identity authentication each time they log in or perform a critical operation. IAM allows you to create IAM users and authorize them to securely access your resources using their own username and password. IAM allows you to authorize another HUAWEI CLOUD account or a cloud service to access your resources based on assigned permissions.
  • 6
    Ubisecure

    Ubisecure

    Ubisecure

    The Ubisecure Identity Platform helps organisations manage the many Digital Identity risks and opportunities. Focused on European B2B and B2C scenarios, Ubisecure combines highly assured Organisation Identity and Individual Identity to reduce fraud and increase efficiency in global trade and supply chain. Ubisecure is now the #1 global issuer of Legal Entity Identifiers (LEI). The Identity platform enables organisations to de-risk homegrown user registration and login solutions, and enable Single Sign-On (SSO) across all platforms and devices. Simplified MFA, including TOTP and Bank ID / Reusuable eIDs, reduce fraud by verifying customer identities, and automated customer credential management workflows for your helpdesk. Advanced identity use cases like consolidation of identity data silos, and Identity Relationship Management & Delegation can increase operational effectiveness, manage data breaches, and reduce IT costs dramatically.
  • 7
    Catalyst Cloud

    Catalyst Cloud

    Catalyst Cloud

    As New Zealand's local innovator in true cloud computing, we are making the cloud more accessible to accelerate the growth of our digital economy in Aotearoa. It’s easy to get started with pay as you go, curated services, standardized APIs, and simple web dashboard. And then it’s just as easy to scale as you need. Why not give our service a try and sign up for a free trial? We were the first in New Zealand to offer a CNCF certified Kubernetes service. And, we were the first to offer the five essential characteristics of cloud computing according to NIST. We’ve just scratched the surface of what’s possible in the cloud, and we want to do so much more. Proud members of the open source movement we believe open standards deliver superior value and freedom to our customers. Our cloud is built on OpenStack and has an open API standard used by many cloud providers world-wide.
    Starting Price: $0.017 per hour
  • 8
    aapi

    aapi

    aapi

    Act on identity events in other apps to make identity experiences more seamless, secure, compliant, and productive. Automatically embed the correct real-time actions for users and teams to efficiently act on data in downstream apps with a single click. Next-generation granular access into specific functions of apps, surpassing existing PAM and CASB solutions for true zero trust. Events, like identity provisioning and suspicious activity, are responded to by aapi to automate identity, application, and security responses. aapi automatically embeds correct real-time actions for users and teams to act on data in downstream apps within their chosen application with a single click, while access is protected by your IAM. Users are given access to only the individual features within apps they need, while keeping everything else safe and secure, all directly through your IAM.
    Starting Price: $4 per user per month
  • 9
    Access Auditor

    Access Auditor

    Security Compliance Corp

    Access Auditor automates user entitlement reviews and user access reviews. Access Auditor also alerts on changes in user access rights, and watches for separation of duties violations, and shows who has access to what. Users can be imported from any AD/LDAP, Database, or any REST API. Enterprise roles (RBAC) can be modeled and defined, allowing full RBAC reviews and provisioning. Access Manager leverages the same ease-of-use to automate the provisioning and management of user access rights. Any system with a database, LDAP, or REST API can be automatically managed via role based access controls. SCC’s powerful and simple approach to Identity Management enables a very rapid success at a low overall cost. With a 100% customer success rate, Access Auditor is the fastest and simplest solution available and can automate your user access reviews in under a week.
  • 10
    Alibaba Cloud IDaaS

    Alibaba Cloud IDaaS

    Alibaba Cloud

    Alibaba Cloud Identity as a Service (IDaaS) is a cloud-based identity and access management service (IAM) covering comprehensive functions that enable user portal, user directory, flexible authentication, single sign-on, centralized authorization, and audit reporting. IDaaS plays a central role in enterprise identity management by removing ID silos and enabling one account-access-all function. IDaaS incorporates advanced security technologies that will facilitate identity management and enable enterprises to enhance their identity security to improve management efficiency. IDaaS supports all standard SSO protocols, which allows enterprises to connect to all mature enterprise services. Passwords are eliminated and security risks are reduced significantly. Users can painlessly and securely store dozens of passwords. IDaaS may serve as a bridge for other cloud platform identities to be connected to Alibaba Cloud.
  • 11
    Asgardeo
    Asgardeo helps developers implement secure authentication flows to applications in a few simple steps. Easily integrate single page, regular web, and mobile applications. SDKs that enable working with various technology stacks. Enable social sign-in with Google, Facebook, and GitHub using pre-defined templates (with more to follow). Configure external identity providers that can connect with open standards like OpenID Connect and SAML to your application. Manage your customers, employees, and partners with (default) supported onboarding and management workflows. Use Asgardeo provided directory or plug in your own LDAP or Active Directory via an agent. Choose from a variety of methods such as Email OTP, SMS OTP, and TOTP for 2FA. Define multiple steps and configure options according to user requirements. Unlock the full application experience by focusing on the business logic and enable login and secure access to end-users.
  • 12
    Incode

    Incode

    Incode Technologies

    Incode is a leader in identity verification, offering advanced solutions for KYC (Know Your Customer) and AML (Anti-Money Laundering) compliance. Their platform helps businesses safeguard against financial crime while ensuring compliance with global regulations. Using intelligent automation, Incode provides continuous AML monitoring throughout the customer lifecycle, adapting verification flows based on risk levels to balance security and user experience. The solution screens customers against extensive global sanctions, PEP, and adverse media lists to maintain thorough compliance. It also keeps auditable records for regulatory reporting and accountability. Incode’s technology includes facial recognition, document verification, and liveness detection to enable secure and efficient onboarding across various industries.
  • 13
    C2 Identity

    C2 Identity

    Synology C2

    Easily grant or revoke user access to company resources with group management. Access the admin console from a browser to manage individual or groups of user accounts. Let users manage their own credentials and personal information through a self-service portal. Centrally manage users, groups, workstations, and single sign-on (SSO) for Software as a Service (SaaS) applications across your entire organization. Easily migrate users from an LDAP server, Windows AD server, Microsoft 365, Google Workspace, or by importing a CSV file. Free up IT teams' workloads by letting users reset their password, secondary email address, phone number, address, and more. Create on-premises LDAP servers for fast local authentication. Streamline authentication for SaaS applications with SSO and user account provisioning. C2 Identity's low-latency hybrid architecture lets you authenticate locally through an LDAP server for fast offline authentication.
    Starting Price: $19.99 per month
  • 14
    Azure ExpressRoute
    Use Azure ExpressRoute to create private connections between Azure datacenters and infrastructure on your premises or in a colocation environment. ExpressRoute connections don't go over the public internet, and they offer more reliability, faster speeds, and lower latencies than typical internet connections. In some cases, using ExpressRoute connections to transfer data between on-premises systems and Azure can give you significant cost benefits. Use ExpressRoute to both connect and add compute and storage capacity to your existing datacenters. With high throughput and fast latencies, Azure will feel like a natural extension to or between your datacenters, so you enjoy the scale and economics of the public cloud without having to compromise on network performance.
    Starting Price: $55 per month
  • 15
    VIDchain

    VIDchain

    Validated ID

    Digital identity is not a new challenge. Since the beginning of the online revolution, validating with complete confidence the real identity of people in a digital environment has been a problem both for users, who have had their privacy and control over their personal data removed and for companies that have suffered the cost of inefficient and constant identification security failures. With VIDchain, we offer a decentralized self-rule identity (SSI) service based on Blockchain to provide people control over their identity and facilitate secure user access to online services. It improves processes and reduces identity verification costs. It implements secure identification processes and improves anti-fraud measures in compliance with eIDAS and GDPR. Based on standards that eliminate the need for hundreds of credentials. You can easily validate your digital identity with anyone you want.
  • 16
    Microsoft Entra
    Confidently enable smarter, real-time access decisions for all identities across hybrid, multicloud, and beyond. Safeguard your organization by protecting access to every app and every resource for every user. Effectively secure every identity including employees, customers, partners, apps, devices, and workloads across every environment. Discover and right-size permissions, manage access lifecycles, and ensure least privilege access for any identity. Keep your users productive with simple sign-in experiences, intelligent security, and unified administration. Safeguard your organization with the identity and access management solution that connects people to their apps, devices, and data. Discover, remediate, and monitor permission risks across your multicloud infrastructure with a cloud infrastructure entitlement management (CIEM) solution. Create, issue, and verify privacy-respecting decentralized identity credentials with an identity verification solution.
  • 17
    Powertech Identity Manager for IBM i
    Giving users the rights they need (and limiting access they don’t need) is a critical piece of maintaining IBM i security. Reduce the tedium involved in creating and updating user profiles with an automated, easy-to-use solution. When you have new employees or existing employees changing roles in your organization, you can create new user profiles with the exact settings they’ll need based on that employee’s department and title—no need to start from scratch. Ensure employees in the same roles receive identical authorities, system permissions, and partition access required to do their job. Templates provide consistency in user profile settings across the board. Change profile settings and update profile templates on multiple systems without actually having to sign on to each system. Powertech Identity Manager for IBM i’s central administration menu allows you to create or change user profiles across systems.
  • 18
    WALLIX Trustelem

    WALLIX Trustelem

    WALLIX Group

    WALLIX Trustelem is designed to make administration simple and intuitive. The web-based administration console enables IT staff to easily set up directory synchronization, manage life cycles of external user accounts and applications, create and adapt access rules, monitor activity, and audit access security. Keep control over your identities and data! The WALLIX Trustelem platform is hosted and operated by a trusted European cloud provider. Your data sovereignty and security are essential to ensure quality of service and to protect your company’s assets. Trustelem is designed for simplicity of user experience and administration, in both build and run phases. Security is at the heart of Trustelem's infrastructure, software and operations.
  • 19
    Ory

    Ory

    Ory

    The missing web-scale API for identity and access control. 10x your security, user experience, and PII compliance today. Build secure apps on top of the Ory Network and reach new customers in any geopolitical region of the world with the best login experience ever. Login is more than a username and password. Building it from the ground up is time-consuming and dangerous. Ory's API-first microservice architecture makes it straightforward to integrate projects at any stage. Pay for usage, not features. Get advanced multi-factor to auth on every Ory subscription plan. Plus advanced permissions, SSO, OAuth2, OIDC, multi-tenancy, and so much more. Ory is made for high-performance, high-scale applications in any cloud. Built with developers in mind, Ory lets you quickly build your on-brand user experience and integrate it into your software stack. Ory's focus on open standards and automated data import capabilities makes migrating from legacy systems straightforward.
    Starting Price: $29 per month
  • 20
    Signicat

    Signicat

    Signicat

    Signicat is a pioneering, pan-European digital identity company with an unrivalled track record in the world’s most advanced digital identity markets. Founded in 2006, Signicat's mission is to build technology for people to trust each other in a digital world. Its Digital Identity Platform incorporates the most extensive suite of identity-proofing and authentication systems in the world, all easily accessible through a single integration point. The platform supports and orchestrates seamlessly the full identity journey, from recognition and onboarding, through login and consent, to making legally binding business agreements which stand the test of time. In 2019, Signicat was acquired by leading European private equity investor Nordic Capital. Today, Signicat boasts a workforce of over 450 dedicated professionals across 17 European offices.
  • 21
    Infisign

    Infisign

    Infisign

    Infisign is a cutting-edge Identity and Access Management (IAM) platform that revolutionizes digital security by leveraging decentralized identity, passwordless authentication, federation, and privileged access management capabilities. The solution empowers organizations to streamline user authentication, manage access efficiently, and ensure compliance across diverse environments. With its unique approach, Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.
    Starting Price: $4/user/month
  • 22
    walt.id

    walt.id

    walt.id

    We offer holistic digital identity and wallet infrastructure used by thousands of developers, governments and businesses across industries. The products are open source, based on open standards, compliant with digital identity regulations and available for self-management (on-premise) or as a managed service (SaaS). Our Digital Identity Infrastructure include the following products and functionality: Issuer SDKs, APIs & APPs: Issue credentials or mint tokens with our infrastructure and white label applications. Wallet SDKs, APIs & APPs: Launch a wallet for your organization, employees or customers to manage access, credentials and tokens. Verifier SDKs, APIs & APPs: Verify credentials or tokens, use powerful verification policies and white label apps. Identity Provider: Enable wallet-, credential- and token-based authentication and identification for your apps.
    Starting Price: Free
  • 23
    NdSecure

    NdSecure

    Ndende Technologies

    NdSecure is a Single Sign-On (SSO) and Identity and Access Management (IAM) solution. Ndsecure offers a user-friendly, flexible, and customizable identity and access management solution capable of operating within a diverse industry-centric architecture. The role played by NdSecure is to provide a robust and secure logical access control environment, incorporating strong authentication methods. The objective is to prevent unauthorized access to the corporate management system, thereby reducing frauds arising from insider threats. NdSecure’s API management platform provides more advanced ways for the workforce to control access to various applications. By leveraging existing request content and identity stores, NdSecure can provide: • Policy-based authentication • Coarse and fine-grained authorization • Single sign-on (using SAML, OpenId Connect, social log-in or OAuth-based federation) • Support for Common Criteria • Uses FIDO 2.0 and W3C WebAuthn
    Starting Price: $8/month/user
  • 24
    Active Roles

    Active Roles

    One Identity

    Simplify identity management and security with visibility of all Entra ID (Azure AD) tenants, Microsoft 365, and Active Directory domains from a single pane of glass. Ensure users and objects have fine-grained privileged access only when they need it with dynamic delegation across your identity landscape. Automate manual processes to increase efficiency and security while accelerating account, group, and directory management. Manage all Active Directory domains, Entra ID (Azure AD), and Microsoft 365 tenants from a single pane of glass with our Microsoft solution. Control access and permissions with dynamic rules, group families, and policies with automation. Manage users, groups, roles, contacts, Microsoft 365 licenses, and objects with configurable workflows and customizable scripts. Seamless integration of Active Roles with AWS Directory Service for a zero-trust least privilege model, access delegation, and synchronized on-prem user data.
  • 25
    Curity

    Curity

    Curity

    The Curity identity server is a standards-based identity and API security platform designed to provide robust authentication and authorization for digital services. It combines identity and API security, enabling scalable customer identity and access management to accelerate digital transformation, growth, and customer loyalty. It offers a range of features, including multi-factor authentication, user journey orchestration, decentralized identity, and secure access management. It supports various identity-related standards such as OAuth, OpenID Connect, and SCIM, ensuring interoperability and compliance with industry protocols. Curity's architecture is built on the principle of separation of concerns, enhancing security, flexibility, and scalability. It provides advanced configuration management with transaction-based changes, rollbacks, and backups, accessible through a web UI, CLI, RESTCONF API, and XML config files.
  • 26
    RapidIdentity

    RapidIdentity

    Identity Automation

    Identity Automation delivers the most scalable, full-lifecycle identity, access, governance, and administration solution. As the company's flagship product, RapidIdentity helps organizations increase business agility, embrace security, and deliver an enhanced user experience. For organizations looking to streamline security, reduce risk from network and data breaches, and lessen IT costs, use RapidIdentity today!
  • 27
    PracticeProtect

    PracticeProtect

    PracticeProtect

    You don’t need a password manager. You need a cloud and data security platform purpose-built for accountants. From compliance to advisory, single sign-on and one click offboarding, Practice Protect is trusted by more accountants worldwide than any other data and password tool. Expand your practice, hire with confidence, operate remotely and support your teams wherever they are with upgraded login security, email protection and cyber threat training. It’s all built-in. With 50+ custom-built features and 6,000+ integrations, accounting firms are safer, and more scalable with Practice Protect. From up to 10x more encryption than retail password managers to compliance templates, security training and unlimited person-to-person support, Practice Protect is the complete cloud and cyber security platform for the modern accounting firm. Find out why more accountants choose Practice Protect than any other data security tool, worldwide.
  • 28
    Pirean Access: One

    Pirean Access: One

    Pirean Software

    We provide robust authentication and authorization services across web and mobile. Our Access: One platform protects high-value data, equity and IP across critical industries. We partner with some of the world’s largest organizations to protect their services globally. Delivered through our private cloud identity platform, we enable our customers to quickly realize identity services that: Provide a central point of control for managing identities and entitlements. Provide flexible access management, supporting single sign-on and strong user authentication. Deliver an agile and robust IAM API for extending the reach of your identity infrastructure. We are recognized for our innovation, our versatility and our focus on the end user.
  • 29
    SentryLogin

    SentryLogin

    Sentry Login

    Since 2001 Sentry has been the #1 Member System for Squarespace, Weebly, WordPress and more. Easy to install paywall and password protection for Weebly, Squarespace, Yola, Blogger, WordPress and more. Sentry is easy: it was created with non-programmers in mind. All login form and protection code is provided so all you have to do is Copy, Paste, and Publish. The built-in Sentry Integration Wizard guides you in setting up your subscription plans and takes you through the installation, too. Sentry is easy, but if you ever get stuck, our friendly staff responds quickly to your email help requests... for life! No one has better or faster support. Using the Header / Footer (skin) tools, you can easily set the appearance of Sentry's forms and pages to look more like your site. Better yet, let us create your skin branding for you! The service is free.
    Starting Price: $4.95 per month
  • 30
    DirectID

    DirectID

    DirectID

    DirectID is a global credit risk platform that is redefining the industry for both lenders and their consumers. By leveraging Open Finance and bank statement data, DirectID help lenders understand their customers throughout the credit risk lifecycle, from onboarding through to collections & recoveries. Today DirectID powers some of the world's biggest brands from banking, consumer and SME lending through to the gig economy, gambling and others. DirectID’s Platform provides global access to bank data through over 13,000+ connections across 65 countries supporting access to over 1.5bn people through one simple integration. The insights provide solutions to common lending questions such as affordability, income verification, expense categorisation, cash flow, emerging financial distress, and more, and are all available directly or through the platform itself. The business is authorised by the FCA to provide AISP (Account Information Service Provider) services within the UK.