AWS Organizations helps users centrally govern an environment as the organization grows, and scale workloads on AWS. Using AWS Organizations, users can automate account creation, create groups of accounts to reflect your business needs, and apply policies for these groups for governance.
N/A
Microsoft Entra ID
Score 8.9 out of 10
N/A
Microsoft Entra ID (formerly Microsoft Azure Active Directory or Azure AD) is a cloud-based identity and access management (IAM) solution supporting restricted access to applications with Azure Multi-Factor Authentication (MFA) built-in, single sign-on (SSO), B2B collaboration controls, self-service password, and integration with Microsoft productivity and cloud storage (Office 365, OneDrive, etc) as well as 3rd party services.
We were using AWS Organizations for managing our different departments' access over cloud infrastructure, but when it comes to user-level access, they don't have that reliable a tool. After using Microsoft Azure Active Directory, it resolved our user-level access and …
AWS Organizations is well suited for centralized billing and user management of all of your AWS accounts when paired with AWS SSO and a SAML provider of your choice. AWS Organizations does not have an integration with IAM user accounts and this could be helpful for organizations without SAML capability.
Entra ID is particularly suited in highly regulated environments where conditional access can be applied via device filters, app filters, locations, and groups. It is less suited in organizations seeking to secure a perimeter based on Zero-trust principles as the first line of Attack and that have not yet invested in a comprehensive endpoint security solution.
The conditional access piece works really well for us. We in the past have had situations where, and you've seen it also in the news like SIM swaps that are happening, the attacks that are happening. We don't have to just solely rely on an application, a cloud application, having MFA, et cetera. We now have it applied to a larger number of applications and it effectively has stopped attacks the coming across.
One of which is there is a very fast rate of UI changes which impacts users who need to use it on a daily basis and for users not to experience with Microsoft, it leads to many manuals being outdated too soon.
MSFT Entra ID has been essential for managing our geographically dispersed team. We're confident that it will scale with us as grow, and we'll be able to take advantage of additional security and ID management features as they become necessary. Being able to centrally manage our user access from anywhere with a small support team is such a relief.
I think it can be hard to manage, but only because it is so big. Any time you have a lot you can do the management of it gets harder. They do a good job making it good to use and document the product very well.
I have not needed to engage support for anything at this time. I have been able to find the answers either online or in a knowledgebase. I tried to skip the question but it would not let me, so I rated a 9 based on other interactions with Microsoft support I have had
Make sure you use a good partner. Our implementation was a bit longer and more problematic than we expected. Our partner got it done, but, in my opinion, some of their inexperience and staffing issues were evident.
The Microsoft Entra ID reaches to height in comparison to other applications of Google cloud console and Amazon Web Services due to its amazing feature of provisioning and Microsoft Graph APIs. Plus ease of implementation of single sign on feature to different apps as an identity provider is a cherry on the cake
Microsoft Professional Services' technical knowledge is appreciable as consultants design the solution as per customer requirements. Mapping of features per user specifications and assisting Customer IT engineers to implement so they can manage and administer the services.