Authorization Systems

Authorization Systems Overview

What are Authorization Systems?

Authorization systems are software that essentially provide access control through centralized enforcement of access policy to a multi-user computer system.

Best Authorization Systems include:

Oracle Entitlements Server and Axiomatics Reverse Query.

Authorization Products

(1-11 of 11) Sorted by Most Reviews

The Okta Identity Cloud
140 ratings
79 reviews
Top Rated
Okta is an enterprise grade identity management service, built in the cloud. IT can manage access across any application, person or device. Whether the people are employees, partners or customers or whether the applications are in the cloud, on premises or on a mobile device, Okta helps IT become mo…
Auth0
22 ratings
21 reviews
Auth0 is an identity management platform for developers and application teams. It gives users a platform to authenticate and authorize, providing secure access to applications, devices, and users. Auth0 aims to provide the simplicity, extensibility, and expertise to scale and protect any application…
Oracle Entitlements Server
1 rating
1 review
Oracle Entitlements Server is an authorization solution.
Transmit Security
0 ratings
1 review
Transmit Security headquartered in Boston offers their identity orchestration solution, providing strong customer authentication and authorization for entities that need it.
SAP Dynamic Authorization Management
SAP Dynamic Authorization Management, developed by SAP partner NextLabs and sold by SAP, is an authorization solution.
Jericho Authorization Provider
The Jericho Authorization Provider from Jericho Systems in Dallas, Texas is an authorization solution.
Cloud Access Manager
One Identity offers Cloud Access Manager, providing single sign-on (SSO) browser based access to cloud resources and provides policy based access controls and authorization.
Axiomatics Reverse Query
Axiomatics offers an authorization solution.
AccessMatrix Universal Access Management
IAM specialist i-Sprint offers AccessMatrix Universal Access Management (UAM), combines web and federated single sign-on (SSO), web access management, hierarchy based delegated administration, to achieve application security.
Single Connect
Single Connect™ is a privileged access management platform from Kron which is offered to bring privileged accounts under control. With a range of products, Single Connect™ unifies privileged session management, password management, two-factor authentication, database access management and logging, d…
Hitachi ID Privileged Access Manager
Hitachi ID's Privileged Access Manager secures access to elevated privileges. It is designed to eliminate shared and static passwords to privileged accounts, and enforce strong authentication and reliable authorization prior to granting access. User access is logged, creating accountability. Hitach…

Authorization Systems Overview

What are Authorization Systems?

Authorization systems are software that essentially provide access control through centralized enforcement of access policy to a multi-user computer system.