Auth0® is an identity solution that provides secure access to any application, for any user. Safeguarding, according to the vendor, billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 lets users integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access control. It can authenticate users…
$23
per month
Google Cloud Identity
Score 8.7 out of 10
N/A
Google Cloud Identity is a unified identity, access, app, and endpoint management (IAM/EMM) platform that gives users access to apps with single sign-on, provides multi-factor authentication to protect users and company data, and enforces policies for personal and corporate devices and endpoints.
Great for user authentication and access priviledge management. We are using it for both our commercial and financial clients and Auth0 meets all the regulations and due diligence required to close deals with these enterprise customers. Given their tiered pricing structure, we don't see a scenario where Auth0 would not be appropriate for the solution it provides.
For example, if the system you are building is a general application service that does not primarily focus on ID management, it would be wise to use a service like Google's rather than developing your own IDaaS. While there may be cases where an IDaaS other than Google's is acceptable, Google is likely one of the best solutions when considering user recognition and ease of use. On the other hand, Gmail addresses are commonly used for other purposes, and users may not pay much attention to password management, so you should avoid using them for systems that require security. To strengthen security, you should consider making multi-factor authentication mandatory, etc.
Price point for ALL features can get a bit pricey. But they have a startup plan which helps big time. Developer plans start at $23/mo and do not include all features.
Actions, rules, hooks, and email customization are great features, but the UI is a bit tough sometimes, not very responsive to screen size and code editors are cut off in a difficult place to maneuver.
This time, I investigated it in advance, and it worked as expected, so I don't have any specific ideas for improvement.
Additionally, if we were using another IDAAS, it would have been beneficial to have knowledge on how to integrate it with Google tools, along with some relevant case studies.
It’s also convenient that Universal Login can be customized from the dashboard (branding/themes/templates) without rebuilding the whole auth UI. It loses a few points because the dashboard and advanced configuration have a real learning curve there are many settings and moving parts, and it can feel overwhelming when you’re doing anything beyond the basics
I chose Google because I thought it would be the best fit, but I didn't fully consider other cloud platforms (Azure, AWS, etc.), so I rated it 8. We assume that current Japanese users are familiar with Google, because we feel that there are far more people with Google email addresses than those with IDs on other cloud services.
There isn't a clear method to get a hold of support when trouble arises if you're on their standard plan. You can file a support ticket and they generally are responsive. I've often been able to find similar questions to the questions I've had when it comes to support in their ticket history, however, some have been closed without a satisfactory conclusion for the original poster.
We went with Auth0 over Okta due to price concerns and the overall simplicity of Auth0. We chose Auth0 over Amazon Cognito because Cognito has very poor documentation and client library support. Auth0 offers a service that hits the sweet spot for organizations with small development teams and limited finances.
We adopted Google Cloud Identity as an additional feature because it allowed us to integrate with it using multi-factor authentication. The IBM Cloud platform remains valid, and we have no plans to discontinue its use for identity management. From the user's perspective, we simply added more authentication options. This also ensures we are prepared for future use when multi-factor authentication becomes available for user apps on the IBM Cloud.
From a business perspective, there were two steps.
First, we switched from our in-house ID management system to a cloud service. This allowed us to focus our development resources on application development.
At the same time, we were able to localize the handling of personal information, which resulted in increased efficiency in management aspects, including handling external inquiries, and in the development of encryption.
The second step was adding Google Cloud Identity as an option.
This allows more users to easily use our services. It can be said that this has improved user convenience.
I expect Google to accommodate future changes in authentication requirements, such as biometric authentication.