Likelihood to Recommend AWS Identity & Access Management is well suited to managing AWS application access between services. Very helpful for both third-party products and in-house developed software. Very happy with how easy it is to create access keys and then share them in our environment. AWS IAM can also be used to manage individual users, but I highly recommend using AWS SSO for that purpose instead. Much easier to deploy for console access and from a security side easier to turn off in one click from your SSO provider.
Read full review It is supported by virtually all cloud-based software applications for business. I am happy to allow users to use this in addition to other authenticators. Certainly, if your business is in the Google cloud it makes sense, but my approach to the remote/virtual work world these past couple of years has been structured flexibility. Leaving some choice up to the users for their own comfort, particularly when they are using their own devices. I cannot think of a scenario where it is less appropriate - perhaps where you run the risk of "app sprawl". I.e., where you are requiring users to handle multiple authenticators (which can happen with certain pieces of hardware) you may want to encourage consolidation into one to avoid frustration.
Read full review Pros Customized access per key to limit scope Safely distributes access keys Provides access audits Read full review One strength is in how it checks identity to stop unwanted people from getting access. Another strength is in cutting down on the frustration of users for the authentication process. With the pandemic and needing to work away from the office it also provided additional security in keeping our network/infrastructure safe. Read full review Cons Better integration with roles and policies so you don't need three windows open to create a new IAM user Display recommended configurations based on services being used Easier options to base config on existing users Read full review I once performed a factory reset of my smartphone which had Google Authenticator. I didn't have a backup for the device. When I restored my phone with the same google account, I was not able to restore the authenticator app settings. I had to add all the keys back into the app to use it. This is cumbersome, but I understand it is set up this way for security reasons. I don't like the ease with which it lets you delete a key. If I accidentally delete a key, I am doomed to get my 2FA key reset, unless I still have the QR code saved somewhere. Read full review Likelihood to Renew We would be unable to manage the interconnected nature of our AWS services without AWS IAM.
Read full review It works as intended, easy to setup, free and gives you another level of security against any unwanted access or cyber attacks
Read full review Usability I have not faced any technical challenge personally using this application. It's very lightweight and doesn't require many system resources on your mobile device.
Read full review Reliability and Availability In terms of availability, I had not experienced any issues with outages or the product not working when needed
Read full review Performance The performance of google Authenticator is good and I have not experienced any slow downs
Read full review Support Rating I have found Google’s support to be hit or miss. There are times when they are very responsive, and I get my issue resolved quickly, and there are times where a response from them takes weeks. There is no in-between. But my support experience with this particular product is nonexistent because I have not had a problem with it yet. Hopefully, we do not have any problems with it either.
Read full review Implementation Rating It was easy to implement and it went very smoothly. No issues
Read full review Alternatives Considered While we do not use
Microsoft Azure for our servers and other customer-facing services. If we did, we would have to use
Microsoft Azure Active Directory to manage access to services appropriately. It's difficult to quantify the differences between the services as they are truly different. I would recommend choosing AWS or Azure, then using the identity management provided by the same vendor.
Read full review We deploy Google Authenticator in residential and non-managed client scenarios. Google Authenticator can perform the basic functions needed for multi-factor authentication but lacks the more advanced features of solutions like Cisco's Secure Access by Duo. Google Authenticator is our go-to solution for anyone ready to increase their security but struggling to find the necessary technology budget.
Read full review Scalability The product doesn’t have any features of tools that can help it scale
Read full review Return on Investment Without IAM, it would be difficult to use AWS across services. Increased ROI Read full review More secure data = less worried about a data breach. Takes longer to log in, and if I don't have my phone then I have to go looking for it, so it really makes it so that you can't be without your phone, which in certain instances is annoying or not possible and can hold up work time. Everyone is willing to use the same program because everyone likes Google—makes it easier to manage. Read full review ScreenShots