Lissi vs. Opal.dev

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Lissi
Score 0.0 out of 10
N/A
Lissi provides tools for organisations and individuals to manage and control their digital identity, credentials and relationships. Available on cloud as Lissi Connect or on-premise as Lissi Agent, Lissi enables enterprises to offer passwordless authentication (Lissi Connect) or issue and request identity data from third-parties (on-premise). Additionally, the Lissi Wallet can be used to store identity data and manage credentials, track information sharing and interact with trusted contacts.N/A
Opal.dev
Score 1.0 out of 10
N/A
Opal is a security platform that enables organizations to scale process.N/A
Pricing
LissiOpal.dev
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
LissiOpal.dev
Free Trial
NoNo
Free/Freemium Version
YesNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional DetailsContact vendor for pricing information.
More Pricing Information
Best Alternatives
LissiOpal.dev
Small Businesses
Auth0
Auth0
Score 8.3 out of 10
Auth0
Auth0
Score 8.3 out of 10
Medium-sized Companies
OneLogin by One Identity
OneLogin by One Identity
Score 9.6 out of 10
OneLogin by One Identity
OneLogin by One Identity
Score 9.6 out of 10
Enterprises
OneLogin by One Identity
OneLogin by One Identity
Score 9.6 out of 10
OneLogin by One Identity
OneLogin by One Identity
Score 9.6 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
LissiOpal.dev
Likelihood to Recommend
-
(0 ratings)
1.0
(1 ratings)
User Testimonials
LissiOpal.dev
Likelihood to Recommend
Neosfer Gmbh
No answers on this topic
Opal.dev
I am frustrated that my organization chose to adopt Opal for our access management tool. It is extremely difficult to use, due to bugs and basic functionality missing. Engineers are not given write access to production resources, so every change must flow through Opal.
This involves writing an IAM policy by hand for every request, because it is far too difficult to find an existing role in the system, and requests must the narrowly tailored only to allow the exact operation requested. Opal makes this process much more difficult because it lacks basic functionality for end users, such as: -Ability to modify an existing IAM role
-Ability to view existing IAM roles
-Ability to delete duplicate Opal roles
-Lack of IAM role templates
-Poor error messages when attempting JSON policy fails validation
In general, each Opal request takes 5-10 minutes because you need to be very explicit with every API action you are requesting, which then needs to be repeated multiple times because it is very hard to get everything correct the first time, which then requires a new round of reviews. This is partially because AWS IAM roles can be tricky to get right, but Opal provides no functionality to make this easier.
Read full review
Cons
Neosfer Gmbh
No answers on this topic
Opal.dev
  • Inability to modify an IAM role after creation
  • Inability to use templated IAM roles
  • Inability to see existing IAM roles
  • Inability for users to clean up existing Opal roles
  • Poor ability to search for existing Opal roles
  • Repeated reliability issues - IAM role creation breaks far too often
  • Cryptic error messages when IAM JSON is incorrect
Read full review
Return on Investment
Neosfer Gmbh
No answers on this topic
Opal.dev
  • Decreased engineering productivity
Read full review
ScreenShots

Opal.dev Screenshots

Screenshot of Opal.dev