PropelAuth Features
What are the features of PropelAuth?
Authentication Options
- Authentication User experience
- Supports Required Authentication systems
- Multi-Factor Authentication
- Supports Required Authentication Methods/Protocols
- Federation/SAML support (sp)
Administration
- Administration Console
- Self Service Password Administration
Platform
- Multi-Domain Support
Functionality
- Self-registration and self-service
- Authentication
- Scalability
- Consent and preference management
- Social login
- Customer data linking
- User provisioning
Top Rated PropelAuth Alternatives
PropelAuth Categories on G2
Filter for Features
Authentication Options
Authentication User experience | As reported in 11 PropelAuth reviews. Process of providing credentials and logging into multiple systems is easy and intuitive for users | 98% (Based on 11 reviews) | |
Supports Required Authentication systems | Based on 10 PropelAuth reviews. Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc. | 100% (Based on 10 reviews) | |
Multi-Factor Authentication | As reported in 11 PropelAuth reviews. Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are. | 98% (Based on 11 reviews) | |
Supports Required Authentication Methods/Protocols | Support SSO via Web agents, proxy agents, agent-less, SAML or oAuth and WS-Federation authentication and authorization Web services depending upon the application and business use case 11 reviewers of PropelAuth have provided feedback on this feature. | 100% (Based on 11 reviews) | |
Federation/SAML support (idp) | Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials. This feature was mentioned in 10 PropelAuth reviews. | 90% (Based on 10 reviews) | |
Federation/SAML support (sp) | As reported in 10 PropelAuth reviews. Can serve as the Service provider from an external service so that when the user logs in externally they have seamless SSO to internal applications from a service provider. | 90% (Based on 10 reviews) |
Access Control Types
Endpoint access | Provides ability to control access to PC's, Mobile devices, and other endpoint devices. | Not enough data | |
Local Access | Controls access to legacy applications, web based applications, network resources and servers while employees are on the companies local area network. | Not enough data | |
Remote Access | Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network. | Not enough data | |
Partner Access | Controls access to users that are not company employees that are either within the companies local area network or outside the network | Not enough data | |
Supports BYOD users | Enables users to use their own device to access company applications. | Not enough data |
Administration
Ease of installation on server | Installation process is easy and flexible. | Not enough data | |
Password Policy Enforcement | Options for resetting and enforcing password policies | Not enough data | |
Administration Console | Provides Administration tools/console that are easy to use and learn for routine maintenance tasks 10 reviewers of PropelAuth have provided feedback on this feature. | 100% (Based on 10 reviews) | |
Ease of connecting applications | Easily provisions new systems, platforms or applications using configuration and not customization. | Not enough data | |
Self Service Password Administration | Users can set, change passwords without interaction from IT staff 10 reviewers of PropelAuth have provided feedback on this feature. | 98% (Based on 10 reviews) |
Platform
Multiple Operating system support | Supports Endpoint access control to multiple operating systems | Not enough data | |
Multi-Domain Support | Allows user authentication to be honored by all the hosts in two or more domains 10 reviewers of PropelAuth have provided feedback on this feature. | 93% (Based on 10 reviews) | |
Cross Browser support | Support access to browser based applications across required browser types | Not enough data | |
Fail over protection | Provides required failover mechanisms to ensure if one server, network, etc fails users are still able able to authenticate | Not enough data | |
Reporting | Contains pre-built and custom reporting tools to required to manage business | Not enough data | |
Auditing | Provides mechanism for auditing authentication for trouble shooting purposes. | Not enough data | |
Third Party Web Services support | Can call and pass credentials to third party web services. | Not enough data |
Authentication type
SMS-Based | Sends a one-time passcode (OTP) via SMS. | Not enough data | |
Voice-Based Telephony | Provides a one-time passcode (OTP) via voice-call. | Not enough data | |
Email-Based | Sends a one-time passcode (OTP) via email. | Not enough data | |
Hardware Token-Based | Supports hardware tokens, which are often USB-sized, fob-like devices that store codes. | Not enough data | |
Software Token | Offers software tokens, which are applications installed on a mobile phone, wearable devices, or desktops and generate time-based one-time passcodes (TOTP) that a user can easily copy. Software tokens work both online and offline. | Not enough data | |
Biometric Factor | Allows biometric factors such as fingerprints, faceprints, voiceprints, or other biometric information to be used as an authentication factor. | Not enough data | |
Mobile-Push | Offers mobile push authentication, which is a user-friendly method that does not require a user to copy a code, but rather accept or deny an authentication using a mobile application. Mobile push authentication only works when a user is connected to the internet. | Not enough data | |
Risk-Based Authentication | Analyzes users' IP addresses, devices, behaviors and identities to authenticate a user. | Not enough data |
Functionality
Multi-Device Sync | Allows the use of tokens on multiple devices. This feature can also be turned off if the user does not want this. | Not enough data | |
Backup | Offers encrypted backup recovery stored by the vendor. | Not enough data | |
Self-registration and self-service | Enables a seamless customer experience with self-registration and self-service functions, including account creation and preference management. This feature was mentioned in 18 PropelAuth reviews. | 98% (Based on 18 reviews) | |
Authentication | Verifies user identity with authentication, which may include multiple multi-factor authentication methods. 20 reviewers of PropelAuth have provided feedback on this feature. | 100% (Based on 20 reviews) | |
Scalability | As reported in 19 PropelAuth reviews. Scales to support growing a customer base. | 98% (Based on 19 reviews) | |
Consent and preference management | Captures and manages a customer's consent and preferences to comply with data privacy laws such as GDPR and CCPA. 15 reviewers of PropelAuth have provided feedback on this feature. | 90% (Based on 15 reviews) | |
Social login | Based on 16 PropelAuth reviews. Offers users the option to sign in with social media accounts. | 91% (Based on 16 reviews) | |
Customer data linking | Integrates with directories or other data stores that house customer data to create a complete view of a customer. This feature was mentioned in 16 PropelAuth reviews. | 77% (Based on 16 reviews) | |
User provisioning | Simplifies or automates user provisioning, deprovisioning, and other user role changes. 10 reviewers of PropelAuth have provided feedback on this feature. | 95% (Based on 10 reviews) | |
Password manager | Offers password management tools to end users. | Not enough data | |
Single Sign-on | Offers single sign-on functionalities to end users, allowing them to authenticate once and be given access to all of their company accounts. | Not enough data | |
Enforces policies | Enforces user-access policies based on individual, role type, group membership or other factors to prevent unauthorized access to company systems and data. | Not enough data | |
Authentication | Authenticates users prior to granting access to company systems. | Not enough data | |
Multi-factor authentication | Offers multi-factor authentication methods to verify a user's identity. | Not enough data |
Type
On-premises solution | Provides an IAM solution for on-prem systems. | Not enough data | |
Cloud-solution | Provides an IAM solution for cloud-based systems. | Not enough data |
Reporting
Tracking | Tracks user activities across protected systems. | Not enough data | |
Reporting | Provides reporting functionality. | Not enough data |
Implementation
Easy Setup | Offers an easy to understand user interface to make setup smooth. | Not enough data | |
Mobile SDK | Offers a mobile software development kit (SDK) for iOS, Blackberry, and Android. | Not enough data | |
Web SDK | Offers a software development kit (SDK) for web-based applications. | Not enough data |