HelloID Features
What are the features of HelloID?
Authentication Options
- Authentication User experience
- Federation/SAML support (idp)
Administration
- Administration Console
- Ease of connecting applications
- Reporting
- Ease of set up for target systems
Platform
- Multiple Operating system support
- Reporting
User on/off Boarding
- Smart/Automated Provisioning
- Role Management
- Policy Management
- Access Termination
User Maintenance
- Bulk Changes
Reporting
- Reporting
Top Rated HelloID Alternatives
(48)
4.4 out of 5
Visit Website
Sponsored
HelloID Categories on G2
Filter for Features
Authentication Options
Authentication User experience | As reported in 10 HelloID reviews. Process of providing credentials and logging into multiple systems is easy and intuitive for users | 92% (Based on 10 reviews) | |
Supports Required Authentication systems | Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc. | Not enough data | |
Multi-Factor Authentication | Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are. | Not enough data | |
Supports Required Authentication Methods/Protocols | Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case | Not enough data | |
Federation/SAML support (idp) | Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials. This feature was mentioned in 10 HelloID reviews. | 95% (Based on 10 reviews) | |
Federation/SAML support (sp) | Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider. | Not enough data |
Access Control Types
Local Access | Controls access to legacy applications, web based applications, network resources and servers while employees are on the companies local area network. | Not enough data | |
Remote Access | Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network. | Not enough data | |
Partner Access | Controls access to users that are not company employees that are either within the companies local area network or outside the network | Not enough data | |
Supports BYOD users | Enables users to use their own device to access company applications. | Not enough data |
Administration
Ease of installation on server | Installation process is easy and flexible. | Not enough data | |
Password Policy Enforcement | Options for resetting and enforcing password policies | Not enough data | |
Administration Console | As reported in 10 HelloID reviews. Provides Administration tools/console that are easy to use and learn for routine maintenance tasks | 97% (Based on 10 reviews) | |
Ease of connecting applications | As reported in 10 HelloID reviews. Easily provisions new systems, platforms or applications using configuration and not customization. | 82% (Based on 10 reviews) | |
Self Service Password Administration | Users can set, change passwords without interaction from IT staff | Not enough data | |
Reporting | Standard and customized report creation to ensure appropriate access rights have been assigned This feature was mentioned in 12 HelloID reviews. | 81% (Based on 12 reviews) | |
Ease of set up for target systems | As reported in 11 HelloID reviews. Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured | 83% (Based on 11 reviews) | |
APIs | Provides appropriate application interfaces to enable custom integrations for unique business requirements | Not enough data | |
Smart/Automated Provisioning | Automates account/access rights creation, changes and removals for on-premise and cloud apps | Not enough data | |
Policy Management | Enables administrators to create access policies and applies policy controls throughout request and provisioning processes | Not enough data | |
On-premise identity repositories supported | Variety and Quality of integrations (ie Active Directory, LDAP) | Not enough data | |
Ease of Connecting Applications | Easily provisions new systems, platforms or applications using configuration and not customization. | Not enough data |
Platform
Multiple Operating system support | Based on 10 HelloID reviews. Supports Endpoint access control to multiple operating systems | 98% (Based on 10 reviews) | |
Multi-Domain Support | Allows user authentication to be honored by all the hosts in two or more domains | Not enough data | |
Cross Browser support | Support access to browser based applications across required browser types | Not enough data | |
Fail over protection | Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate | Not enough data | |
Reporting | Contains pre-built and custom reporting tools to required to manage business 10 reviewers of HelloID have provided feedback on this feature. | 90% (Based on 10 reviews) | |
Auditing | Provides mechanism for auditing authentication for trouble shooting purposes. | Not enough data | |
Third Party Web Services support | Can call and pass credentials to third party web services. | Not enough data |
User on/off Boarding
Self Service Access requests | Users can request access to an application and be automatically provisioned if they meet policy requirements | Not enough data | |
Smart/Automated Provisioning | As reported in 10 HelloID reviews. Automates account/access rights creation, changes and removals for on-premise and cloud apps | 97% (Based on 10 reviews) | |
Role Management | Establish roles that create a set of authentication rights for each user in the role This feature was mentioned in 10 HelloID reviews. | 90% (Based on 10 reviews) | |
Policy Management | Enables administrators to create access policies and applies policy controls throughout request and provisioning processes This feature was mentioned in 10 HelloID reviews. | 90% (Based on 10 reviews) | |
Access Termination | Terminate access to multiple applications based on dates This feature was mentioned in 11 HelloID reviews. | 95% (Based on 11 reviews) | |
Approval Workflows | Allow business stake-holders/managers to approve or reject requested changes to access via a defined workflow | Not enough data |
User Maintenance
Self Service Password Reset | Enables users to reset passwords without administrator interaction. Enforces password policies when resetting. | Not enough data | |
Bulk Changes | As reported in 11 HelloID reviews. Change users and permissions in bulk | 94% (Based on 11 reviews) |
Governance
Compliance Audits | Proactively audits access rights against policies | Not enough data |
Authentication type
SMS-Based | Sends a one-time passcode (OTP) via SMS. | Not enough data | |
Email-Based | Sends a one-time passcode (OTP) via email. | Not enough data | |
Hardware Token-Based | Supports hardware tokens, which are often USB-sized, fob-like devices that store codes. | Not enough data | |
Software Token | Offers software tokens, which are applications installed on a mobile phone, wearable devices, or desktops and generate time-based one-time passcodes (TOTP) that a user can easily copy. Software tokens work both online and offline. | Not enough data | |
Mobile-Push | Offers mobile push authentication, which is a user-friendly method that does not require a user to copy a code, but rather accept or deny an authentication using a mobile application. Mobile push authentication only works when a user is connected to the internet. | Not enough data |
Functionality
Backup | Offers encrypted backup recovery stored by the vendor. | Not enough data | |
SSO | Provides a single access point for users to access multiple cloud products without multiple logins. | Not enough data | |
Multi-Factor Authentication | Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are. | Not enough data | |
Supports Required Authentication systems | Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc. | Not enough data | |
User provisioning | Simplifies or automates user provisioning, deprovisioning, and other user role changes. | Not enough data | |
Password manager | Offers password management tools to end users. | Not enough data | |
Single Sign-on | Offers single sign-on functionalities to end users, allowing them to authenticate once and be given access to all of their company accounts. | Not enough data | |
Enforces policies | Enforces user-access policies based on individual, role type, group membership or other factors to prevent unauthorized access to company systems and data. | Not enough data | |
Authentication | Authenticates users prior to granting access to company systems. | Not enough data | |
Multi-factor authentication | Offers multi-factor authentication methods to verify a user's identity. | Not enough data |
Access Control
Role Management | Establish roles that create a set of authentication rights for each user in the role | Not enough data | |
Access Termination | Terminate access to multiple applications based on dates | Not enough data | |
Remote Access | Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network. | Not enough data | |
Partner Access | Controls access to users that are not company employees that are either within the companies local area network or outside the network | Not enough data |
Type
On-premises solution | Provides an IAM solution for on-prem systems. | Not enough data | |
Cloud-solution | Provides an IAM solution for cloud-based systems. | Not enough data |
Reporting
Reporting | As reported in 10 HelloID reviews. Provides reporting functionality. | 87% (Based on 10 reviews) |
Implementation
Easy Setup | Offers an easy to understand user interface to make setup smooth. | Not enough data |