FusionAuth Features
What are the features of FusionAuth?
Authentication Options
- Authentication User experience
- Supports Required Authentication systems
- Multi-Factor Authentication
- Supports Required Authentication Methods/Protocols
Access Control Types
- Endpoint access
Administration
- Ease of installation on server
- Password Policy Enforcement
- Administration Console
- Ease of connecting applications
- Self Service Password Administration
Platform
- Cross Browser support
Functionality
- Authentication
- User provisioning
- Single Sign-on
- Authentication
Top Rated FusionAuth Alternatives
Filter for Features
Authentication Options
Authentication User experience | Process of providing credentials and logging into multiple systems is easy and intuitive for users This feature was mentioned in 19 FusionAuth reviews. | 89% (Based on 19 reviews) | |
Supports Required Authentication systems | As reported in 19 FusionAuth reviews. Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc. | 93% (Based on 19 reviews) | |
Multi-Factor Authentication | Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are. 16 reviewers of FusionAuth have provided feedback on this feature. | 91% (Based on 16 reviews) | |
Supports Required Authentication Methods/Protocols | Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case 19 reviewers of FusionAuth have provided feedback on this feature. | 96% (Based on 19 reviews) | |
Federation/SAML support (idp) | Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials. 15 reviewers of FusionAuth have provided feedback on this feature. | 96% (Based on 15 reviews) | |
Federation/SAML support (sp) | As reported in 14 FusionAuth reviews. Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider. | 94% (Based on 14 reviews) |
Access Control Types
Endpoint access | Provides ability to control access to PC's, Mobile devices, and other endpoint devices. 17 reviewers of FusionAuth have provided feedback on this feature. | 93% (Based on 17 reviews) | |
Local Access | Based on 16 FusionAuth reviews. Controls access to legacy applications, web based applications, network resources and servers while employees are on the companies local area network. | 94% (Based on 16 reviews) | |
Remote Access | As reported in 15 FusionAuth reviews. Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network. | 97% (Based on 15 reviews) | |
Partner Access | As reported in 10 FusionAuth reviews. Controls access to users that are not company employees that are either within the companies local area network or outside the network | 88% (Based on 10 reviews) | |
Supports BYOD users | Based on 13 FusionAuth reviews. Enables users to use their own device to access company applications. | 88% (Based on 13 reviews) |
Administration
Ease of installation on server | Based on 18 FusionAuth reviews. Installation process is easy and flexible. | 90% (Based on 18 reviews) | |
Password Policy Enforcement | Based on 18 FusionAuth reviews. Options for resetting and enforcing password policies | 98% (Based on 18 reviews) | |
Administration Console | As reported in 20 FusionAuth reviews. Provides Administration tools/console that are easy to use and learn for routine maintenance tasks | 91% (Based on 20 reviews) | |
Ease of connecting applications | Easily provisions new systems, platforms or applications using configuration and not customization. This feature was mentioned in 18 FusionAuth reviews. | 91% (Based on 18 reviews) | |
Self Service Password Administration | Based on 18 FusionAuth reviews. Users can set, change passwords without interaction from IT staff | 91% (Based on 18 reviews) | |
Reporting | Standard and customized report creation to ensure appropriate access rights have been assigned | Not enough data | |
Mobile App | Provides mobile application that alerts administrators of potential issues and allows administrators manage access rights | Not enough data | |
Ease of set up for target systems | Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured | Not enough data | |
APIs | Provides appropriate application interfaces to enable custom integrations for unique business requirements | Not enough data | |
Encryption | Encrypts all data transfers using end-to-end encryption. | Not enough data | |
Audit Trails | Provides audit trails to monitor useage to reduce fraud. | Not enough data | |
Regulatory Compliance | Complies with regulations for strong customer authentication such as KYC, PSD2, and others. | Not enough data | |
Bi-Directional Identity Synchronization | Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application. | Not enough data | |
Policy Management | Enables administrators to create access policies and applies policy controls throughout request and provisioning processes. | Not enough data | |
Cloud Directory | Provides or integrates with a cloud based directory option that contains all user names and attributes. | Not enough data | |
Application Integrations | Integrates with common applications such as service desk tools. | Not enough data | |
Password synchronization | Syncronizes passwords across company systems. | Not enough data | |
Centralized management | Provides a tool for IT administrators to manage the software. 10 reviewers of FusionAuth have provided feedback on this feature. | 93% (Based on 10 reviews) | |
Group policy complexity controls | Configure specific policies for users or groups using group policy objects. | Not enough data | |
Multiple policies | Supports multiple password policies. | Not enough data | |
Multi-lingual | Supports multiple languages. | Not enough data |
Platform
Multiple Operating system support | Based on 14 FusionAuth reviews. Supports Endpoint access control to multiple operating systems | 93% (Based on 14 reviews) | |
Multi-Domain Support | Allows user authentication to be honored by all the hosts in two or more domains This feature was mentioned in 14 FusionAuth reviews. | 93% (Based on 14 reviews) | |
Cross Browser support | As reported in 16 FusionAuth reviews. Support access to browser based applications across required browser types | 95% (Based on 16 reviews) | |
Fail over protection | Based on 12 FusionAuth reviews. Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate | 93% (Based on 12 reviews) | |
Reporting | Based on 16 FusionAuth reviews. Contains pre-built and custom reporting tools to required to manage business | 84% (Based on 16 reviews) | |
Auditing | Based on 15 FusionAuth reviews. Provides mechanism for auditing authentication for trouble shooting purposes. | 89% (Based on 15 reviews) | |
Third Party Web Services support | Can call and pass credentials to third party web services. 12 reviewers of FusionAuth have provided feedback on this feature. | 93% (Based on 12 reviews) |
User on/off Boarding
Self Service Access requests | Users can request access to an application and be automatically provisioned if they meet policy requirements | Not enough data | |
Smart/Automated Provisioning | Automates account/access rights creation, changes and removals for on-premise and cloud apps | Not enough data | |
Role Management | Establish roles that create a set of authentication rights for each user in the role | Not enough data | |
Policy Management | Enables administrators to create access policies and applies policy controls throughout request and provisioning processes | Not enough data | |
Access Termination | Terminate access to multiple applications based on dates | Not enough data | |
Approval Workflows | Allow business stake-holders/managers to approve or reject requested changes to access via a defined workflow | Not enough data |
User Maintenance
Self Service Password Reset | Enables users to reset passwords without administrator interaction. Enforces password policies when resetting. | Not enough data | |
Bulk Changes | Change users and permissions in bulk | Not enough data | |
Bi-directional Identity Synchronization | Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application | Not enough data |
Governance
Identifies and Alerts for Threats | Alerts administrators when inappropriate access occurs | Not enough data | |
Compliance Audits | Proactively audits access rights against policies | Not enough data |
Authentication type
SMS-Based | Sends a one-time passcode (OTP) via SMS. | Not enough data | |
Voice-Based Telephony | Provides a one-time passcode (OTP) via voice-call. | Not enough data | |
Email-Based | Sends a one-time passcode (OTP) via email. 11 reviewers of FusionAuth have provided feedback on this feature. | 95% (Based on 11 reviews) | |
Hardware Token-Based | Supports hardware tokens, which are often USB-sized, fob-like devices that store codes. | Not enough data | |
Software Token | Offers software tokens, which are applications installed on a mobile phone, wearable devices, or desktops and generate time-based one-time passcodes (TOTP) that a user can easily copy. Software tokens work both online and offline. | Not enough data | |
Biometric Factor | Allows biometric factors such as fingerprints, faceprints, voiceprints, or other biometric information to be used as an authentication factor. | Not enough data | |
Mobile-Push | Offers mobile push authentication, which is a user-friendly method that does not require a user to copy a code, but rather accept or deny an authentication using a mobile application. Mobile push authentication only works when a user is connected to the internet. | Not enough data | |
Risk-Based Authentication | Analyzes users' IP addresses, devices, behaviors and identities to authenticate a user. | Not enough data |
Functionality
Multi-Device Sync | Allows the use of tokens on multiple devices. This feature can also be turned off if the user does not want this. | Not enough data | |
Backup | Offers encrypted backup recovery stored by the vendor. | Not enough data | |
Active Directory integration | Intetgrates with Active Directory. | Not enough data | |
LDAP integration | Integrates with Lightweight Directory Access Protocol (LDAP)-based directory services. | Not enough data | |
Hacker dictionary | Utilizes existing known hacking dictionaries to disallow users to select passwords that have been compromized. | Not enough data | |
Custom blacklist dictionary | Allows administrators to create a custom blacklist to disallow employees from using specific words in their passwords. | Not enough data | |
Self-registration and self-service | Enables a seamless customer experience with self-registration and self-service functions, including account creation and preference management. 12 reviewers of FusionAuth have provided feedback on this feature. | 83% (Based on 12 reviews) | |
Authentication | As reported in 18 FusionAuth reviews. Verifies user identity with authentication, which may include multiple multi-factor authentication methods. | 97% (Based on 18 reviews) | |
Scalability | Based on 15 FusionAuth reviews. Scales to support growing a customer base. | 92% (Based on 15 reviews) | |
Consent and preference management | Captures and manages a customer's consent and preferences to comply with data privacy laws such as GDPR and CCPA. | Not enough data | |
Social login | As reported in 10 FusionAuth reviews. Offers users the option to sign in with social media accounts. | 85% (Based on 10 reviews) | |
Customer data linking | Integrates with directories or other data stores that house customer data to create a complete view of a customer. | Not enough data | |
FIDO2-compliant | Offers FIDO2-enabled authentication method | Not enough data | |
Works with hardware security keys | Works with hardware security keys | Not enough data | |
Multiple authentication methods | Offer users multiple ways to authenticate including, but not limited to: mobile push on trusted devices, FIDO-enabled devices, physical security keys, keycards, smart watches, biometrics, QR codes, desktop app + pin, and others. | Not enough data | |
Offline or no-phone solution | Offers solutions when users are offline or do not have access to a mobile phone. | Not enough data | |
User provisioning | Based on 18 FusionAuth reviews. Simplifies or automates user provisioning, deprovisioning, and other user role changes. | 93% (Based on 18 reviews) | |
Password manager | As reported in 14 FusionAuth reviews. Offers password management tools to end users. | 90% (Based on 14 reviews) | |
Single Sign-on | Offers single sign-on functionalities to end users, allowing them to authenticate once and be given access to all of their company accounts. This feature was mentioned in 16 FusionAuth reviews. | 95% (Based on 16 reviews) | |
Enforces policies | As reported in 15 FusionAuth reviews. Enforces user-access policies based on individual, role type, group membership or other factors to prevent unauthorized access to company systems and data. | 94% (Based on 15 reviews) | |
Authentication | Authenticates users prior to granting access to company systems. This feature was mentioned in 17 FusionAuth reviews. | 96% (Based on 17 reviews) | |
Multi-factor authentication | Offers multi-factor authentication methods to verify a user's identity. 13 reviewers of FusionAuth have provided feedback on this feature. | 95% (Based on 13 reviews) |
Integration
Uses Open Standards | Connections use open standards such as SAML or RADIS. | Not enough data | |
Mobile SDK | Offers developers a mobile software development kit to seamlessly add biometric authentication into their applications. | Not enough data | |
Workforce Authentication | Integrates with identity and access management (IAM) solutions to manage workforce authentication. | Not enough data | |
Customer Authentication | Integrates with customer identity and access management (ICAM) solutions to manage customer authentication. | Not enough data |
Compliance
NIST-compliant | Complies with the National Institute of Standards and Technology password best practice recommendations. | Not enough data | |
NCSC-compliant | Complies with the National Cyber Security Centre (NCSC) password best practice recommendations. | Not enough data | |
Section 508-compliant | Compliant with Section 508 to enable employees with disabilities to use this software. | Not enough data |
Type
On-premises solution | Provides an IAM solution for on-prem systems. 13 reviewers of FusionAuth have provided feedback on this feature. | 94% (Based on 13 reviews) | |
Cloud-solution | Provides an IAM solution for cloud-based systems. 11 reviewers of FusionAuth have provided feedback on this feature. | 91% (Based on 11 reviews) |
Reporting
Tracking | As reported in 12 FusionAuth reviews. Tracks user activities across protected systems. | 88% (Based on 12 reviews) | |
Reporting | As reported in 14 FusionAuth reviews. Provides reporting functionality. | 85% (Based on 14 reviews) |
Implementation
Easy Setup | Offers an easy to understand user interface to make setup smooth. 12 reviewers of FusionAuth have provided feedback on this feature. | 83% (Based on 12 reviews) | |
Web SDK | Offers a software development kit (SDK) for web-based applications. | Not enough data |