Opal.dev vs. WSO2 Asgardeo

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Opal.dev
Score 1.0 out of 10
N/A
Opal is a security platform that enables organizations to scale process.N/A
WSO2 Asgardeo
Score 0.0 out of 10
N/A
Asgardeo is an identity-as-a-soluton (IDaaS) that helps developers implement secure authentication flows to applications.N/A
Pricing
Opal.devWSO2 Asgardeo
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Opal.devWSO2 Asgardeo
Free Trial
NoYes
Free/Freemium Version
NoYes
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional DetailsContact vendor for pricing information.
More Pricing Information
Best Alternatives
Opal.devWSO2 Asgardeo
Small Businesses
Auth0
Auth0
Score 8.3 out of 10
Auth0
Auth0
Score 8.3 out of 10
Medium-sized Companies
OneLogin by One Identity
OneLogin by One Identity
Score 9.6 out of 10
OneLogin by One Identity
OneLogin by One Identity
Score 9.6 out of 10
Enterprises
OneLogin by One Identity
OneLogin by One Identity
Score 9.6 out of 10
OneLogin by One Identity
OneLogin by One Identity
Score 9.6 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Opal.devWSO2 Asgardeo
Likelihood to Recommend
1.0
(1 ratings)
-
(0 ratings)
User Testimonials
Opal.devWSO2 Asgardeo
Likelihood to Recommend
Opal.dev
I am frustrated that my organization chose to adopt Opal for our access management tool. It is extremely difficult to use, due to bugs and basic functionality missing. Engineers are not given write access to production resources, so every change must flow through Opal.
This involves writing an IAM policy by hand for every request, because it is far too difficult to find an existing role in the system, and requests must the narrowly tailored only to allow the exact operation requested. Opal makes this process much more difficult because it lacks basic functionality for end users, such as: -Ability to modify an existing IAM role
-Ability to view existing IAM roles
-Ability to delete duplicate Opal roles
-Lack of IAM role templates
-Poor error messages when attempting JSON policy fails validation
In general, each Opal request takes 5-10 minutes because you need to be very explicit with every API action you are requesting, which then needs to be repeated multiple times because it is very hard to get everything correct the first time, which then requires a new round of reviews. This is partially because AWS IAM roles can be tricky to get right, but Opal provides no functionality to make this easier.
Read full review
WSO2
No answers on this topic
Cons
Opal.dev
  • Inability to modify an IAM role after creation
  • Inability to use templated IAM roles
  • Inability to see existing IAM roles
  • Inability for users to clean up existing Opal roles
  • Poor ability to search for existing Opal roles
  • Repeated reliability issues - IAM role creation breaks far too often
  • Cryptic error messages when IAM JSON is incorrect
Read full review
WSO2
No answers on this topic
Return on Investment
Opal.dev
  • Decreased engineering productivity
Read full review
WSO2
No answers on this topic
ScreenShots

Opal.dev Screenshots

Screenshot of Opal.dev

WSO2 Asgardeo Screenshots

Screenshot of Managing User Admins
Asgardeo can manage user accounts and groups in an organization with its provided userstore or by connecting to an existing AD/LDAP to manage accounts and allow authentication for users.Screenshot of Matches an Organization's Brand
Asgardeo can be matched to a brand and theme with provided UIs, URLs and emails to match organizational preferences.Screenshot of Integrates with AppsScreenshot of Customized Sign In Method
An applications authentication flow can be customized to have multiple login options and steps to covering to enable different authentication factors. The authentication flow can be governed with conditional authentication, by several out of the box authentication scripts and the ability to customize per requirements.Screenshot of Buildable Login Flow
Different authentication flows are available for applications, including social login, passwordless authentication and MFA.