Auth0 is an identity management platform for developers and application teams. It gives users a platform to authenticate and authorize, providing secure access to applications, devices, and users. Auth0 aims to provide the simplicity, extensibility, and expertise to scale and protect any application, for any audience. Integrate Auth0 into any app, written in any language, and any framework.
$23
per month
Oracle Entitlements Server
Score 4.0 out of 10
N/A
Oracle Entitlements Server is an authorization solution.
Great for user authentication and access priviledge management. We are using it for both our commercial and financial clients and Auth0 meets all the regulations and due diligence required to close deals with these enterprise customers. Given their tiered pricing structure, we don't see a scenario where Auth0 would not be appropriate for the solution it provides.
Could be suited for cases where authorization policies change extremely frequently and unpredictably. For all other scenarios, I would avoid this product!
Price point for ALL features can get a bit pricey. But they have a startup plan which helps big time. Developer plans start at $23/mo and do not include all features.
Actions, rules, hooks, and email customization are great features, but the UI is a bit tough sometimes, not very responsive to screen size and code editors are cut off in a difficult place to maneuver.
Horrible administration web UI - had to spend months with our database team to make an application's entitlements show up in < 30 seconds, difficult to navigate UI. It has sliders that make you think you can expand certain portions of the UI, but they do nothing. Many operations that must be done in day-to-day administration require 3 clicks per application, so this makes policy creation and distribution extremely time-consuming. A variety of random errors would occur and instead of friendly messages, full exceptions were shown to the user, including a stack trace. Often, this stack trace was so long, the box would overflow the screen and the user would be unable to close the popup box.
The built in Policy Decision Point's web service only supported returning a SINGLE entitlement at a time. This was completely inadequate (would have crippled our apps' performance) and somewhat laughable given this is an 'enterprise product'. We ended up having to write our own web-service which could check multiple entitlements at once using the Java API
Horrible Support - we opened at least 20 support cases and the majority were classified as bugs or product enhancements, and then nothing was done on them. I am pretty sure this product has no full-time developers, given the lack of progress seen on their product in over 2 years. A variety of issues went back and forth between the OES and Weblogic teams, both blaming each other, and never got resolved. When we tried to escalate, various Oracle manager folks claimed to be exerting pressure, but ultimately everything fell back on us (sorry, can't reproduce it on our end) and made no progress. Almost every support person we got did not speak fluent English, writing back in incomplete sentences, and confusing basic pronouns (he vs she), etc.
Lack of product documentation. It took us about a month of working with support to enable LDAPS binds for users logging into the admin UI (by default, it only worked with unsecure LDAP binds). All of such configuration was undocumented and we had to rely on support giving us explicit instructions. There was also a bevy of patches that had to be applied to 3 different components of the product in a specific order to work properly. Some patches caused regressions and broke functionality that previously had been corrected by a prior patch. They also released an entire new version (Patch Set 1 I believe) and forgot to increment the build number in the UI, causing much confusion. Any development house with basic build/release practices in place would have avoided this.
Overall it is a very good authentication platform. It is very intuitive when someone get used to it . The dashboard is clean and most configurations steps are easy to setup. It handles complex authentication flows in a straightforward way. It is just real time detailed analytics logs could be improved.
There isn't a clear method to get a hold of support when trouble arises if you're on their standard plan. You can file a support ticket and they generally are responsive. I've often been able to find similar questions to the questions I've had when it comes to support in their ticket history, however, some have been closed without a satisfactory conclusion for the original poster.
We went with Auth0 over Okta due to price concerns and the overall simplicity of Auth0. We chose Auth0 over Amazon Cognito because Cognito has very poor documentation and client library support. Auth0 offers a service that hits the sweet spot for organizations with small development teams and limited finances.
I saw one other competitor at a trade show, but unfortunately their product didn't seem much better. It forced administrators to dig through horribly complex expressions with lots of ANDs and ORs to debug a basic policy. I didn't think it would be easy enough to use.