FusionAuth Features
Authentication Options (6)
Authentication User experience
This feature was mentioned in 61 FusionAuth reviews.
Process of providing credentials and logging into multiple systems is easy and intuitive for users
Supports Required Authentication systems
59 reviewers of FusionAuth have provided feedback on this feature.
Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc.
Multi-Factor Authentication
As reported in 55 FusionAuth reviews.
Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are.
Supports Required Authentication Methods/Protocols
As reported in 57 FusionAuth reviews.
Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case
Federation/SAML support (idp)
Based on 54 FusionAuth reviews.
Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials.
Federation/SAML support (sp)
52 reviewers of FusionAuth have provided feedback on this feature.
Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider.
Access Control Types (5)
Endpoint access
This feature was mentioned in 54 FusionAuth reviews.
Provides ability to control access to PC's, Mobile devices, and other endpoint devices.
Local Access
Based on 54 FusionAuth reviews.
Controls access to legacy applications, web based applications, network resources and servers while employees are on the companies local area network.
Remote Access
As reported in 53 FusionAuth reviews.
Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network.
Partner Access
Based on 47 FusionAuth reviews.
Controls access to users that are not company employees that are either within the companies local area network or outside the network
Supports BYOD users
As reported in 51 FusionAuth reviews.
Enables users to use their own device to access company applications.
Administration (20)
Ease of installation on server
As reported in 57 FusionAuth reviews.
Installation process is easy and flexible.
Password Policy Enforcement
Based on 56 FusionAuth reviews.
Options for resetting and enforcing password policies
Administration Console
As reported in 58 FusionAuth reviews.
Provides Administration tools/console that are easy to use and learn for routine maintenance tasks
Ease of connecting applications
As reported in 55 FusionAuth reviews.
Easily provisions new systems, platforms or applications using configuration and not customization.
Self Service Password Administration
Based on 57 FusionAuth reviews.
Users can set, change passwords without interaction from IT staff
Reporting
Standard and customized report creation to ensure appropriate access rights have been assigned
Ease of set up for target systems
Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured
APIs
Provides appropriate application interfaces to enable custom integrations for unique business requirements
Encryption
Encrypts all data transfers using end-to-end encryption.
Audit Trails
Provides audit trails to monitor useage to reduce fraud.
Regulatory Compliance
Complies with regulations for strong customer authentication such as KYC, PSD2, and others.
Bi-Directional Identity Synchronization
Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application.
Policy Management
Enables administrators to create access policies and applies policy controls throughout request and provisioning processes.
Cloud Directory
Provides or integrates with a cloud based directory option that contains all user names and attributes.
Application Integrations
Integrates with common applications such as service desk tools.
Password synchronization
Based on 14 FusionAuth reviews.
Syncronizes passwords across company systems.
Centralized management
Based on 18 FusionAuth reviews.
Provides a tool for IT administrators to manage the software.
Group policy complexity controls
Based on 15 FusionAuth reviews.
Configure specific policies for users or groups using group policy objects.
Multiple policies
Based on 15 FusionAuth reviews.
Supports multiple password policies.
Multi-lingual
15 reviewers of FusionAuth have provided feedback on this feature.
Supports multiple languages.
Platform (7)
Multiple Operating system support
Based on 50 FusionAuth reviews.
Supports Endpoint access control to multiple operating systems
Multi-Domain Support
50 reviewers of FusionAuth have provided feedback on this feature.
Allows user authentication to be honored by all the hosts in two or more domains
Cross Browser support
As reported in 53 FusionAuth reviews.
Support access to browser based applications across required browser types
Fail over protection
Based on 49 FusionAuth reviews.
Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate
Reporting
55 reviewers of FusionAuth have provided feedback on this feature.
Contains pre-built and custom reporting tools to required to manage business
Auditing
Based on 53 FusionAuth reviews.
Provides mechanism for auditing authentication for trouble shooting purposes.
Third Party Web Services support
49 reviewers of FusionAuth have provided feedback on this feature.
Can call and pass credentials to third party web services.
User on/off Boarding (6)
Self Service Access requests
Users can request access to an application and be automatically provisioned if they meet policy requirements
Smart/Automated Provisioning
Automates account/access rights creation, changes and removals for on-premise and cloud apps
Role Management
Establish roles that create a set of authentication rights for each user in the role
Policy Management
Enables administrators to create access policies and applies policy controls throughout request and provisioning processes
Access Termination
Terminate access to multiple applications based on dates
Approval Workflows
Allow business stake-holders/managers to approve or reject requested changes to access via a defined workflow
User Maintenance (3)
Self Service Password Reset
Enables users to reset passwords without administrator interaction. Enforces password policies when resetting.
Bulk Changes
Change users and permissions in bulk
Bi-directional Identity Synchronization
Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application
Governance (2)
Identifies and Alerts for Threats
Alerts administrators when inappropriate access occurs
Compliance Audits
Proactively audits access rights against policies
Authentication type (8)
SMS-Based
As reported in 43 FusionAuth reviews.
Sends a one-time passcode (OTP) via SMS.
Voice-Based Telephony
This feature was mentioned in 37 FusionAuth reviews.
Provides a one-time passcode (OTP) via voice-call.
Email-Based
As reported in 47 FusionAuth reviews.
Sends a one-time passcode (OTP) via email.
Hardware Token-Based
As reported in 39 FusionAuth reviews.
Supports hardware tokens, which are often USB-sized, fob-like devices that store codes.
Software Token
Based on 42 FusionAuth reviews.
Offers software tokens, which are applications installed on a mobile phone, wearable devices, or desktops and generate time-based one-time passcodes (TOTP) that a user can easily copy. Software tokens work both online and offline.
Biometric Factor
37 reviewers of FusionAuth have provided feedback on this feature.
Allows biometric factors such as fingerprints, faceprints, voiceprints, or other biometric information to be used as an authentication factor.
Mobile-Push
This feature was mentioned in 33 FusionAuth reviews.
Offers mobile push authentication, which is a user-friendly method that does not require a user to copy a code, but rather accept or deny an authentication using a mobile application. Mobile push authentication only works when a user is connected to the internet.
Risk-Based Authentication
Based on 34 FusionAuth reviews.
Analyzes users' IP addresses, devices, behaviors and identities to authenticate a user.
Functionality (22)
Multi-Device Sync
Based on 35 FusionAuth reviews.
Allows the use of tokens on multiple devices. This feature can also be turned off if the user does not want this.
Backup
This feature was mentioned in 37 FusionAuth reviews.
Offers encrypted backup recovery stored by the vendor.
Active Directory integration
16 reviewers of FusionAuth have provided feedback on this feature.
Intetgrates with Active Directory.
LDAP integration
As reported in 13 FusionAuth reviews.
Integrates with Lightweight Directory Access Protocol (LDAP)-based directory services.
Hacker dictionary
Based on 13 FusionAuth reviews.
Utilizes existing known hacking dictionaries to disallow users to select passwords that have been compromized.
Custom blacklist dictionary
Based on 12 FusionAuth reviews.
Allows administrators to create a custom blacklist to disallow employees from using specific words in their passwords.
Self-registration and self-service
As reported in 42 FusionAuth reviews.
Enables a seamless customer experience with self-registration and self-service functions, including account creation and preference management.
Authentication
51 reviewers of FusionAuth have provided feedback on this feature.
Verifies user identity with authentication, which may include multiple multi-factor authentication methods.
Scalability
This feature was mentioned in 48 FusionAuth reviews.
Scales to support growing a customer base.
Consent and preference management
35 reviewers of FusionAuth have provided feedback on this feature.
Captures and manages a customer's consent and preferences to comply with data privacy laws such as GDPR and CCPA.
Social login
This feature was mentioned in 39 FusionAuth reviews.
Offers users the option to sign in with social media accounts.
Customer data linking
As reported in 37 FusionAuth reviews.
Integrates with directories or other data stores that house customer data to create a complete view of a customer.
FIDO2-compliant
Offers FIDO2-enabled authentication method
Works with hardware security keys
Works with hardware security keys
Multiple authentication methods
This feature was mentioned in 13 FusionAuth reviews.
Offer users multiple ways to authenticate including, but not limited to: mobile push on trusted devices, FIDO-enabled devices, physical security keys, keycards, smart watches, biometrics, QR codes, desktop app + pin, and others.
Offline or no-phone solution
This feature was mentioned in 10 FusionAuth reviews.
Offers solutions when users are offline or do not have access to a mobile phone.
User provisioning
As reported in 57 FusionAuth reviews.
Simplifies or automates user provisioning, deprovisioning, and other user role changes.
Password manager
This feature was mentioned in 53 FusionAuth reviews.
Offers password management tools to end users.
Single Sign-on
As reported in 56 FusionAuth reviews.
Offers single sign-on functionalities to end users, allowing them to authenticate once and be given access to all of their company accounts.
Enforces policies
This feature was mentioned in 56 FusionAuth reviews.
Enforces user-access policies based on individual, role type, group membership or other factors to prevent unauthorized access to company systems and data.
Authentication
58 reviewers of FusionAuth have provided feedback on this feature.
Authenticates users prior to granting access to company systems.
Multi-factor authentication
As reported in 51 FusionAuth reviews.
Offers multi-factor authentication methods to verify a user's identity.
Integration (4)
Uses Open Standards
Connections use open standards such as SAML or RADIS.
Mobile SDK
Offers developers a mobile software development kit to seamlessly add biometric authentication into their applications.
Workforce Authentication
Integrates with identity and access management (IAM) solutions to manage workforce authentication.
Customer Authentication
Integrates with customer identity and access management (ICAM) solutions to manage customer authentication.
Type (2)
On-premises solution
As reported in 52 FusionAuth reviews.
Provides an IAM solution for on-prem systems.
Cloud-solution
This feature was mentioned in 52 FusionAuth reviews.
Provides an IAM solution for cloud-based systems.
Reporting (4)
Tracking
Based on 50 FusionAuth reviews.
Tracks user activities across protected systems.
Reporting
54 reviewers of FusionAuth have provided feedback on this feature.
Provides reporting functionality.
Access & Permission Change Reporting
Log and report all modifications to user roles and access rights.
Compliance & Audit Trail Export
Provide standardized reports for regulatory compliance and audits.
Implementation (3)
Easy Setup
This feature was mentioned in 46 FusionAuth reviews.
Offers an easy to understand user interface to make setup smooth.
Mobile SDK
Offers a mobile software development kit (SDK) for iOS, Blackberry, and Android.
Web SDK
Based on 41 FusionAuth reviews.
Offers a software development kit (SDK) for web-based applications.
Authentication & Authorization - Identity and Access Management (IAM) (1)
Adaptive & Contextual Access Control
10 reviewers of FusionAuth have provided feedback on this feature.
Grant access based on user attributes, location, device posture or risk.
Administration & Governance - Identity and Access Management (IAM) (2)
Identity Lifecycle Management
Automate onboarding, offboarding, and access reviews throughout user lifecycles.
Self‑Service Account Management
Enable users to reset passwords and update profiles without admin support.
AI Authentication Risk Management - Customer Identity and Access Management (CIAM) (5)
Adaptive MFA
Possesses AI-driven triggers to determine when to require MFA or stronger authentication rather than always requiring it.
Anomaly Detection
Builds profiles of known devices/environments per user and flags deviations such as new devices, new networks, and/or suspicious locations as higher risk.
Fraudulent Login Detection
Spot fraudulent behavior, such as account takeover attempts, credential stuffing, bots, and brute force attacks through the use of AI.
Adaptive Authentication Policies
Uses machine learning to analyze past authentication events and suggest optimizations to security policies (e.g. thresholds, triggers) or to adjust rules over time.
Risk-Based Authentication
Leverages AI to assign a risk score to a login attempt based on context, device, IP, historical patterns to dynamically decide whether to prompt for MFA, additional challenges, or allow seamless login.





