miniOrange Identity & Access Management Features
What are the features of miniOrange Identity & Access Management?
Authentication Options
- Authentication User experience
Administration
- Ease of installation on server
- Administration Console
- Ease of connecting applications
Top Rated miniOrange Identity & Access Management Alternatives
Filter for Features
Authentication Options
Authentication User experience | Based on 10 miniOrange Identity & Access Management reviews. Process of providing credentials and logging into multiple systems is easy and intuitive for users | 87% (Based on 10 reviews) | |
Supports Required Authentication systems | Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc. | Not enough data | |
Multi-Factor Authentication | Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are. | Not enough data | |
Supports Required Authentication Methods/Protocols | Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case | Not enough data | |
Federation/SAML support (idp) | Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials. | Not enough data | |
Federation/SAML support (sp) | Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider. | Not enough data |
Access Control Types
Endpoint access | Provides ability to control access to PC's, Mobile devices, and other endpoint devices. | Not enough data | |
Local Access | Controls access to legacy applications, web based applications, network resources and servers while employees are on the companies local area network. | Not enough data | |
Remote Access | Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network. | Not enough data | |
Partner Access | Controls access to users that are not company employees that are either within the companies local area network or outside the network | Not enough data | |
Supports BYOD users | Enables users to use their own device to access company applications. | Not enough data |
Administration
Ease of installation on server | Installation process is easy and flexible. This feature was mentioned in 10 miniOrange Identity & Access Management reviews. | 93% (Based on 10 reviews) | |
Password Policy Enforcement | Options for resetting and enforcing password policies | Not enough data | |
Administration Console | As reported in 10 miniOrange Identity & Access Management reviews. Provides Administration tools/console that are easy to use and learn for routine maintenance tasks | 88% (Based on 10 reviews) | |
Ease of connecting applications | Easily provisions new systems, platforms or applications using configuration and not customization. 10 reviewers of miniOrange Identity & Access Management have provided feedback on this feature. | 88% (Based on 10 reviews) | |
Self Service Password Administration | Users can set, change passwords without interaction from IT staff | Not enough data | |
Reporting | Standard and customized report creation to ensure appropriate access rights have been assigned | Not enough data | |
Ease of set up for target systems | Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured | Not enough data | |
APIs | Provides appropriate application interfaces to enable custom integrations for unique business requirements | Not enough data | |
Smart/Automated Provisioning | Automates account/access rights creation, changes and removals for on-premise and cloud apps | Not enough data | |
Policy Management | Enables administrators to create access policies and applies policy controls throughout request and provisioning processes | Not enough data | |
On-premise identity repositories supported | Variety and Quality of integrations (ie Active Directory, LDAP) | Not enough data | |
Ease of Connecting Applications | Easily provisions new systems, platforms or applications using configuration and not customization. | Not enough data | |
Bi-Directional Identity Synchronization | Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application. | Not enough data | |
Policy Management | Enables administrators to create access policies and applies policy controls throughout request and provisioning processes. | Not enough data | |
Cloud Directory | Provides or integrates with a cloud based directory option that contains all user names and attributes. | Not enough data | |
Application Integrations | Integrates with common applications such as service desk tools. | Not enough data | |
Password synchronization | Syncronizes passwords across company systems. | Not enough data | |
Centralized management | Provides a tool for IT administrators to manage the software. | Not enough data | |
Group policy complexity controls | Configure specific policies for users or groups using group policy objects. | Not enough data | |
Multiple policies | Supports multiple password policies. | Not enough data | |
Multi-lingual | Supports multiple languages. | Not enough data |
Platform
Multiple Operating system support | Supports Endpoint access control to multiple operating systems | Not enough data | |
Multi-Domain Support | Allows user authentication to be honored by all the hosts in two or more domains | Not enough data | |
Cross Browser support | Support access to browser based applications across required browser types | Not enough data | |
Fail over protection | Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate | Not enough data | |
Reporting | Contains pre-built and custom reporting tools to required to manage business | Not enough data | |
Auditing | Provides mechanism for auditing authentication for trouble shooting purposes. | Not enough data | |
Third Party Web Services support | Can call and pass credentials to third party web services. | Not enough data |
User on/off Boarding
Self Service Access requests | Users can request access to an application and be automatically provisioned if they meet policy requirements | Not enough data | |
Smart/Automated Provisioning | Automates account/access rights creation, changes and removals for on-premise and cloud apps | Not enough data | |
Role Management | Establish roles that create a set of authentication rights for each user in the role | Not enough data | |
Policy Management | Enables administrators to create access policies and applies policy controls throughout request and provisioning processes | Not enough data | |
Access Termination | Terminate access to multiple applications based on dates | Not enough data | |
Approval Workflows | Allow business stake-holders/managers to approve or reject requested changes to access via a defined workflow | Not enough data |
User Maintenance
Self Service Password Reset | Enables users to reset passwords without administrator interaction. Enforces password policies when resetting. | Not enough data | |
Bulk Changes | Change users and permissions in bulk | Not enough data | |
Bi-directional Identity Synchronization | Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application | Not enough data |
Governance
Identifies and Alerts for Threats | Alerts administrators when inappropriate access occurs | Not enough data | |
Compliance Audits | Proactively audits access rights against policies | Not enough data |
Authentication type
SMS-Based | Sends a one-time passcode (OTP) via SMS. | Not enough data | |
Voice-Based Telephony | Provides a one-time passcode (OTP) via voice-call. | Not enough data | |
Email-Based | Sends a one-time passcode (OTP) via email. | Not enough data | |
Hardware Token-Based | Supports hardware tokens, which are often USB-sized, fob-like devices that store codes. | Not enough data | |
Software Token | Offers software tokens, which are applications installed on a mobile phone, wearable devices, or desktops and generate time-based one-time passcodes (TOTP) that a user can easily copy. Software tokens work both online and offline. | Not enough data | |
Biometric Factor | Allows biometric factors such as fingerprints, faceprints, voiceprints, or other biometric information to be used as an authentication factor. | Not enough data | |
Mobile-Push | Offers mobile push authentication, which is a user-friendly method that does not require a user to copy a code, but rather accept or deny an authentication using a mobile application. Mobile push authentication only works when a user is connected to the internet. | Not enough data | |
Risk-Based Authentication | Analyzes users' IP addresses, devices, behaviors and identities to authenticate a user. | Not enough data |
Functionality
Multi-Device Sync | Allows the use of tokens on multiple devices. This feature can also be turned off if the user does not want this. | Not enough data | |
Backup | Offers encrypted backup recovery stored by the vendor. | Not enough data | |
SSO | Provides a single access point for users to access multiple cloud products without multiple logins. | Not enough data | |
Multi-Factor Authentication | Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are. | Not enough data | |
Supports Required Authentication systems | Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc. | Not enough data | |
Active Directory integration | Intetgrates with Active Directory. | Not enough data | |
LDAP integration | Integrates with Lightweight Directory Access Protocol (LDAP)-based directory services. | Not enough data | |
Hacker dictionary | Utilizes existing known hacking dictionaries to disallow users to select passwords that have been compromized. | Not enough data | |
Custom blacklist dictionary | Allows administrators to create a custom blacklist to disallow employees from using specific words in their passwords. | Not enough data | |
Self-registration and self-service | Enables a seamless customer experience with self-registration and self-service functions, including account creation and preference management. | Not enough data | |
Authentication | Verifies user identity with authentication, which may include multiple multi-factor authentication methods. | Not enough data | |
Scalability | Scales to support growing a customer base. | Not enough data | |
Consent and preference management | Captures and manages a customer's consent and preferences to comply with data privacy laws such as GDPR and CCPA. | Not enough data | |
Social login | Offers users the option to sign in with social media accounts. | Not enough data | |
Customer data linking | Integrates with directories or other data stores that house customer data to create a complete view of a customer. | Not enough data | |
FIDO2-compliant | Offers FIDO2-enabled authentication method | Not enough data | |
Works with hardware security keys | Works with hardware security keys | Not enough data | |
Multiple authentication methods | Offer users multiple ways to authenticate including, but not limited to: mobile push on trusted devices, FIDO-enabled devices, physical security keys, keycards, smart watches, biometrics, QR codes, desktop app + pin, and others. | Not enough data | |
Offline or no-phone solution | Offers solutions when users are offline or do not have access to a mobile phone. | Not enough data | |
User provisioning | Simplifies or automates user provisioning, deprovisioning, and other user role changes. | Not enough data | |
Password manager | Offers password management tools to end users. | Not enough data | |
Single Sign-on | Offers single sign-on functionalities to end users, allowing them to authenticate once and be given access to all of their company accounts. | Not enough data | |
Enforces policies | Enforces user-access policies based on individual, role type, group membership or other factors to prevent unauthorized access to company systems and data. | Not enough data | |
Authentication | Authenticates users prior to granting access to company systems. | Not enough data | |
Multi-factor authentication | Offers multi-factor authentication methods to verify a user's identity. | Not enough data |
Intelligence
Transaction Scoring | Rates each transaction's risk based on specific factors and their benchmarked scores. | Not enough data | |
Risk Assessment | Flags suspicious transactions and either alerts administrators or declines transaction. | Not enough data | |
Intelligence Reporting | Actively gathers data on suspicious purchasing sources and characteristics of common committers of fraud. | Not enough data | |
ID Analytics | Stores data from external or internal sources related to fake accounts, evaluating users for risk. | Not enough data |
Detection
Fraud Detection | Finds patterns in common occurrences of fraud to use when evaluating risk of purchasers. | Not enough data | |
Alerts | Alerts administrators when fraud is suspected or transactions have been declined. | Not enough data | |
Real-Time Monitoring | Constantly monitors system to detect anomalies in real time. | Not enough data |
Response
Device Tracking | Keeps records of geographic location and IP addresses of fraud suspects. | Not enough data | |
Fraud Markers | Tags users suspected of committing fraud and identifies them upon return. | Not enough data | |
Blacklisting | Prevents previous committers of fraud from future transactions. | Not enough data | |
Bot Mitigation | Monitors for and rids systems of bots suspected of committing fraud. | Not enough data |
Access Control
Role Management | Establish roles that create a set of authentication rights for each user in the role | Not enough data | |
Access Termination | Terminate access to multiple applications based on dates | Not enough data | |
Remote Access | Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network. | Not enough data | |
Partner Access | Controls access to users that are not company employees that are either within the companies local area network or outside the network | Not enough data |
User Experience
Self-Service Experience | Allows users to set, change passwords easily without interaction from IT staff. | Not enough data | |
Mobile App Usability | Integrates with your mobile device for use on mobile apps. | Not enough data | |
Multilingual Support | Accommodates multiple languages. | Not enough data |
Authentication
Multi-Factor Authentication | Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are. | Not enough data | |
Biometric Authentication | Uses biometric trait or characteristic to authenticate. Additional hardware may be required to support this type. | Not enough data | |
Other Authentication Methods | Provides authentication capabilities outside standard authentication methods such as MFA and biometric . | Not enough data | |
Role-Specific Authentication | Able to assign authentication requirements for different levels of users, such as more robust authentication for senior level executives. | Not enough data |
Compliance
NIST-compliant | Complies with the National Institute of Standards and Technology password best practice recommendations. | Not enough data | |
NCSC-compliant | Complies with the National Cyber Security Centre (NCSC) password best practice recommendations. | Not enough data | |
Section 508-compliant | Compliant with Section 508 to enable employees with disabilities to use this software. | Not enough data |
Type
On-premises solution | Provides an IAM solution for on-prem systems. | Not enough data | |
Cloud-solution | Provides an IAM solution for cloud-based systems. | Not enough data |
Reporting
Tracking | Tracks user activities across protected systems. | Not enough data | |
Reporting | Provides reporting functionality. | Not enough data |
Implementation
Easy Setup | Offers an easy to understand user interface to make setup smooth. | Not enough data | |
Mobile SDK | Offers a mobile software development kit (SDK) for iOS, Blackberry, and Android. | Not enough data | |
Web SDK | Offers a software development kit (SDK) for web-based applications. | Not enough data |