Skip to main content
TrustRadius
CyberArk Workforce Identity

CyberArk Workforce Identity
Formerly Idaptive Next-Gen Access

Overview

What is CyberArk Workforce Identity?

CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security,…

Read more
Recent Reviews

TrustRadius Insights

Fast implementation: Users have found the implementation of Centrify's solution for federation with Azure/Office 365 to be significantly …
Continue reading
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is CyberArk Workforce Identity?

CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor…

Entry-level set up fee?

  • $4 per user/per month
    Optional
For the latest information on pricing, visithttps://www.centrify.com/products/appli…

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

3 people also want pricing

Alternatives Pricing

What is Microsoft Entra ID?

Microsoft Entra ID (formerly Microsoft Azure Active Directory or Azure AD) is a cloud-based identity and access management (IAM) solution supporting restricted access to applications with Azure Multi-Factor Authentication (MFA) built-in, single sign-on (SSO), B2B collaboration controls, self…

What is The Okta Identity Cloud?

Okta is an enterprise grade identity management service, built in the cloud. IT can manage access across any application, person or device. Whether the people are employees, partners or customers or whether the applications are in the cloud, on premises or on a mobile device, Okta helps IT become…

Return to navigation

Product Details

What is CyberArk Workforce Identity?

CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security, and credential management. Identity Management capabilities include lifecycle management, identity orchestration, and identity governance. With CyberArk Identity, organizations can secure workforce access to applications, endpoints, and infrastructure and protect themselves from the leading cause of data breaches – compromised credentials.

CyberArk Identity is part of the CyberArk Identity Security Platform. Built for the dynamic enterprise, CyberArk Identity Security Platform secures access for any identity to any resource or environment from anywhere using any device.  The CyberArk Identity Security Platform enables operational efficiencies with a single admin portal, streamlines meeting compliance requirements with unified audit capabilities, and delivers Identity Security Intelligence for continuous identity threat detection and protection.

Workforce Access solutions:

  • CyberArk Single Sign-On (SSO) is a solution for one-click access to cloud, mobile, and legacy apps. CyberArk SSO enables a secure and frictionless sign-in experience for both internal and external users that adjusts based on risk.

  • CyberArk App Gateway is an add-on to the Single Sign-On solution that enables VPN-less access to legacy applications. It allows companies to set up per-application, per-user access to individual legacy applications hosted on-premises.

  • CyberArk Adaptive Multi-Factor Authentication (MFA) helps strengthen security and prevent attacks involving compromised credentials by requiring users to present multiple forms of evidence to gain access to your applications. CyberArk Adaptive MFA uses AI-powered behavioral analytics and contextual information to determine which authentication factors to apply to a particular user in a specific situation.

  • CyberArk Secure Web Sessions is a cloud-based service that enables organizations to monitor, record, and audit end-user activity within high-risk and high-value web applications. Security and compliance specialists can use Secure Web Sessions to search recorded sessions using free text input and quickly filter events by users, dates, and actions.

  • CyberArk Workforce Password Management is an enterprise-focused password manager providing a user-friendly solution to store business application credentials in a centralized vault and securely share them with other users in the organization.

Identity Management Services:

  • CyberArk Identity Lifecycle Management provides a way to route application access requests, create application accounts, manage entitlements for those accounts, and revoke access when necessary.

  • CyberArk Identity Flows is an identity orchestration solution that improves security, efficiency, and productivity by automating identity data and events. With Identity Flows, organizations can automate complex identity management workflows and synchronize identity data across diverse applications, directory stores, and repositories.

  • CyberArk Identity Compliance solution continuously discovers access, streamlines access certifications, and provides comprehensive identity analytics. Identity Compliance automates manually intensive, error-prone administrative processes, ensuring all workforce and privileged access rights are properly assigned and continually certified across enterprises.

CyberArk Workforce Identity Screenshots

Screenshot of Admin PortalScreenshot of Identity LoginScreenshot of SWS PortalScreenshot of UBA PortalScreenshot of User Portal

CyberArk Workforce Identity Videos

CyberArk Workforce Identity Competitors

CyberArk Workforce Identity Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationApple iOS, Android, Mobile Web
Supported CountriesAmericas, Israel, UK, Canada, France, GMBH, Spain, Netherlands, Italia (Milan), Italia (Rome), Turkey, Australia, Asia Pacific, Japan, India, Denmark
Supported LanguagesArabic, German, English, Spanish, French, Italian, Japanese, Korean, Dutch, Portuguese, Brazil Portuguese, Russian, Serbian, Swedish, Thai, Vietnamese, Chinese, Simplified Chinese - Traditional

Frequently Asked Questions

The Okta Identity Cloud, OneLogin by One Identity, and PingOne from Ping Identity are common alternatives for CyberArk Workforce Identity.

Reviewers rate ID-Management Access Control and Account Provisioning and De-provisioning and ID Management Workflow Automation highest, with a score of 9.

The most common users of CyberArk Workforce Identity are from Mid-sized Companies (51-1,000 employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(73)

Attribute Ratings

Reviews

(26-43 of 43)
Companies can't remove reviews or game the system. Here's why
Jeremiah Miller | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use Centrify to provide single-sign on services for our users. Our users can log in to Centrify and gain access to a variety of different applications without having to remember multiple passwords or sign in again. Centrify also allows us to implement multi-factor authentication.
  • Multi factor authentication.
  • Broad support for a variety of applications.
  • Customer service.
  • I'd like to see support for a few more SSO technologies, like OAuth.
SAML integration is great, it makes a good identity provider for all of your applications that support this. It's also great if you want to share an application between multiple users without them having to know the password, for example a corporate Facebook or Twitter account.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We're using Centrify across our organization to easily implement SSO with multiple vendors, including Office365 and Dropbox. The ability for our users to change their password in one place has been excellent.
  • Easy to use on both desktop and mobile.
  • Enables SSO with multiple vendors.
  • Could be easier to add new services.
It's excellent if you're planning to implement multiple online services which you'd like to authenticate with Active Directory.
Debbie Brannan | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized

Mobility management for tablets in use by various County departments. Increased secure use of mobile devices by providing security configuration with enforcement and ability to wipe device if needed. Remote device location provides ability to locate missing devices and also provides an added security feature allowing us to track and find employees in the field if in distress.

SSO for on premise applications using federation with Active Directory. SSO, user provisioning, and license management for cloud applications.

Provides users with ability to perform Password Reset.


  • Easy User Password Reset
  • Provisioning and protecting enterprise mobile devices
  • Integration with Office 365
  • Location services for Centrify administrators should be enhanced
  • Centrify browser extension becomes unstable and needs to be reinstalled

Well suited for any applications that are Active Directory integrated.

Cloud applications that require password changes due to inactivity or require passwords to be changed after X number of days.

Score 6 out of 10
Vetted Review
Verified User
Incentivized
Centrify is being used across our entire organization to enforce an encryption policy on all of our Mac workstations. This allows us to control and secure our Mac machines in the same way that we can manage our PCs through Group Policy
  • Active Directory joining
  • Password reset
  • User notification of password reset
  • A more simplified process for installing Centrify and joining machines
  • More descriptive and useful error messaging and logging
  • Ability to manage machines through secured wireless connections
Centrify is well suited for hybrid Mac/PC environments where equivalent levels of administrator control are required. It may not be as well suited for organizations with lots of remote users - we have run into issues with user account lockouts that are more easily resolved with local user, but can be difficult with remote users
Keith Ryan | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We've implemented Centrify Identity Service across our entire organization and it has solved multiple day to day tasks such as SSO and MDM. It makes Mobile Device Management incredibly easy so that employees can enroll their own devices. It's a common thing for an employee to damage their cell phone or tablet, get it replaced and then add their own device onto our network and set up their email by enrolling it through the Centrify Portal. It really makes my job easier.
  • It's a common thing for an employee to damage their cell phone or tablet, get it replaced and then add their own device onto our network and set up their email by enrolling it through the Centrify Portal. It really makes my job easier.
  • If an employee loses their device, Centrify gives them the ability to lock, wipe, and even locate their device.
  • Centrify gives employees the ability to change their AD password easily via the Centrify portal.
  • The device enrollment process could be a little better. For the average user and the less than average user the process is a little cumbersome. It could be made a bit easier as it is a little lengthy. For the above average user it is not a problem.
  • I think creating a security question should not be an option. It should be mandatory since it is the easiest way to authenticate. If SSO is enabled and a user cannot get into their Office 365 account and does not have their security question set up or a device enrolled then the only option is to send them an email to authenticate then they are locked out and need the help of an administrator.
Centrify gives you SSO and MDM all wrapped up in one package making the administrator's job a bit easier. However, the end user may struggle a bit with authentication if they cannot log into their account and they don't have a device enrolled to use mobile authentication, or they didn't set up a security question.
July 21, 2016

MAC with Centrify

Daniel Tripo | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
With Centrify we are able to fully manage Macs in our windows environment. We also use it for enforcing group policies on end users' workstations, therefore protecting our assets and information.
  • Mac management
  • Identity managemnet
  • BYOD enforcement
  • Deployment of clients
In today's environments we are seeing an increased usage of Macs and PCs. Centrify has a plan for managing this type of setup and it works seamlessly with your windows Active Directory structure.
Sue Atherton, CISM | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Centrify provides single sign-on to numerous business applications. It is also used for Office 365 license provisioning. We will also be rolling out the MDM solution.
  • Single Sign-On - streamlines access to numerous business applications
  • Ease of use - users can seamlessly access applications through Centrify
  • License provisioning - with Centrify we can easily assign Office 365 licenses to our employees
  • We'd like the ability to have single sign-on to non-SAML applications. More of a screen scrape or learned key entry to other applications.
Centrify streamlines access to business applications.
Daniel Czuchra | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We are using Centrify across our entire company. Centrify solves several problems in our organization. First it helps improve our security by creating a secure, easy to use user authentication service across applications that would have previously required separate login credentials. This allows our users to only remember one password for multiple applications, reducing the possible security risks of password reuse and credential sharing. Centrify helps our IT Support staff by reducing the number of support calls for password management. Centrify also provides excellent credential management for our *NIX users as they often do not use Windows machines.
  • Centrify does an excellent job of supporting multiple platforms. Windows, Macs, Linux, iOS and Android are all well supported.
  • Ease of use. Centrify is easy and self explanatory for our users. Centrify is also great at integrating non SAML or LDAP systems into its service.
  • Centrify does a great job at uptime. The uptime provided is outstanding and ensures our users can always access their systems anywhere.
  • Centrify support could use more transparency in its actions. I've made provisioning changes and been burned in the past by them.
  • Centrify could support more browsers to integrate apps with.
  • Centrify could provide a user focused education platform to help users understand what CIS is and how it helps them.
Centrify is great in most organizations that do not have the resources to build their own SAML/ADFS authentication platform. It allows for the quick rollout and integration of SAML, AD, LDAP and more applications into the environment. CIS may not be appropriate in use cases where there are a large number of proprietary login methods or systems that require their own 2 factor auth mechanisms.
July 19, 2016

Perfect integration

George Trujillo | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
The computer environment is mostly PC Windows/LDAP , we use centrify to bind and migrate our OSX/MACs into this environment, it works flawlessly and allows our employees to work without issue.
  • Integration, being able to use apple computers in our environment without the usual sticky points
  • Security, increased our ability to provide security
  • Access, allowed our users to access the information such as team drives, and cross platform cooperative work
  • Cloud features could use some small improvements,
  • Mobile application integration could be improved
  • Easier instruction fro deployment usage would be preferable, or a way to save setup settings
Any environment that wants to deploy MAC/OSX in a predominantly windows environment, this is a god-send and works perfectly.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We currently use Centrify on our MacBooks and as our MDM for Iphones. Centrify allows us to lock down and if needed remotely lock/wipe devices.
  • Allows you to push windows group policy to Macbooks
  • Allows you to remote lock/wipe macbooks and iphones
  • Is a quick easy Mobile Device Management solution for iphones.
  • n/a
  • n/a
  • n/a
We are a small to medium organization and Centrify has been fairly easy to set up and deploy to our devices.
Score 5 out of 10
Vetted Review
Verified User
Incentivized
We use it solely with Office 365 to replace on premise DirSync. It gives us a SSO for Office 365 and auto license provisioning.
  • Does well with SSO for Office 365.
  • Mobile device management seems to work pretty well.
  • It seems like features break or change on a somewhat regular basis and there is a disconnect with internally with Centrify with these ongoing changes regarding best practices for setting up and configuring Centrify.
  • Would love to see impersonation feature under admin portal to be able to troubleshoot user logins. OneLogin currently has this feature and comes in handy.
We have had a few instances where functionality that was working with Centrify, all the sudden does not anymore with us not making any changes to the Centrify portal. When it's working though, it seems to work fine.
Mike Flegel B.Sc CISSP CEDS | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use it as a platform for all cloud and/or web based applications, and application of consistent access policy. It is also used to streamline administration of application access. As well, it will also be used to manage all mobile devices in the near future.
  • It's very intuitive - extremely important when trying to get users to do something totally different than they have been used to their whole careers. User acceptability has been extremely high.
  • The 'value' of the product is very obvious. The amount of time and resources used to administer access control is sharply down and the level of detailed reports and metrics provides senior management with the information they need.
  • Adding legacy internal applications is quite difficult. Some of these are going to be around for a few years yet so it would be nice if they could be added in a much simpler fashion. Perhaps as an alternative, make it possible to add an icon for the legacy app on the SSO portal but it would just take you to the legacy application sign on screen. At least, it would keep all the applications together on one screen.
  • Some people still use Blackberries and likely always will so long as that company stays solvent (just saying).
I think for companies that are in a transitional plan of moving systems to the cloud, having an IAM/SSO system earlier rather than later would be ideal. This system should be included as part of that transitional plan. If a company's cloud strategy is still uncertain, I would say just the opposite.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use the Identity portion across the entire organization for SSO and user provisioning across multiple applications and multiple platforms.
  • Admin portal is very easy and straightforward to use.
  • Centrify team is well-versed and very helpful in application integration.
  • Although the administrative portal is easy to use, there are times when you can get lost in all of the advanced options.
Suited well for companies/departments with many diverse applications where account creation is a hassle.
Joseph Politi | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Centrify Identity Service is used for single sign on to the majority of our corporate applications. It is used across the entire organization. We utilize Centrify identity Service for critical applications such as Office 365, Salesforce and our ticketing system. In addition, we leverage Centrify for provisioning user accounts into a couple of SSO apps including Office 365. Centrify addresses a number of key business problems revolving around identity management including the lifecycle management of user identities as well as the ease of access to key applications for our business users.
  • Centrify makes it simple to ramp up new applications to the Identity Service. Case in point, Office 365 took a fraction of the time to set up when compared to the traditional ADFS configuration.
  • Centrify Support and Account Success Management have been far and away the best experience compared to other vendors.
  • The ability for Centrify to provision accounts for a couple of critical applications has really helped streamline our account creation and termination process.
  • I would like to see more detailed error reporting when it comes to sync reports in order to quickly identify the root cause of directory sync issues.
Applications that can be configured to provision accounts using Centrify are well suited for the service since it further streamlines identity management. The Advanced Scripting feature in the Identity service makes it easier to configure applications that require certain attributes and is another scenario where the Centrify Service shines.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Centrify is used throughout our entire organization. One of the primary business problems addressed by Centrify for end users is access management. With Centrify, we've been able to centralize access management for users, thereby reducing the need to remember multiple passwords for a variety of systems. Additionally, we use Centrify for automatic provisioning and de-provisioning of user accounts for Office 365, Salesforce, and more. This has drastically improved the efficiency and effectiveness of our internal process for on-boarding and off-boarding of users.
  • User provisioning is accurate, effective, and fully customizable.
  • Custom configuration of applications for SSO and provisioning is easy using fully customizable scripts to address your exact need.
  • The user interface is clean and easy to navigate.
  • Support is helpful and prompt.
  • More robust Mobile Device Management solution.
Centrify Identity Service is well suited for nearly any organization, especially ones utilizing Active Directory for user management. It is especially well suited for organizations looking to reduce internal resource use, because it's easy to maintain and manage. Its features also allow you to free up resources previously dedicated to the provisioning and deprovisioning of Office 365/Salesforce users (as well as other applications).
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Centrify is used across my entire organization. My company uses several online applications, even multiple user logins for the same application. Centrify is the only reason I can stay sane with the number of logins and users that I need to jump between. Centrify allows us to keep passwords for our clients safe while still giving everyone in the organization access to the necessary applications with a single click.
  • Single sign on with Centrify saves me at least an hour of searching for and typing passwords everyday
  • Centrify provides our clients with a level of security interally across consultants and teams
  • Centrify is flexible enough to give access to the people that need it while restricting those that don't
  • Distinguish between users of a single application that have multiple sign-ons.
  • Customize individual tile layout.
  • Toggle to different views of sets of tiles, personal tiles vs. client tiles vs. internal tiles etc.
Centrify is great for people who need to change between multiple SAAS applications quickly, or even multiple instances of a single SAAS application. It is less suited for people who spend a lot of time in a single SAAS application, or have only a few SAAS applications that they need access to. It is also great for user provisioning and access to SAAS applications without exposing actual passwords.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
As a predominately "Windows" shop, we realized that the Macintosh OS was a sore spot. After much research, I realized that Centrify was a perfect fit as a scalable, easy to use way to reign these devices in. I'm implementing this solution across all lines of business.
  • Allows central "group policy" administration, much like Windows.
  • Easy to use tools and methods of management.
  • Great support staff!
  • Maybe a little more in initial setup assistance.
  • Maybe allow for some central patch compliance reporting.
  • More straight forward logging?
Any environment with a Macintosh/UNIX population would benefit from this solution if your backbone lies with Microsoft. If the OSX devices under your control number less than a dozen, it may not be necessary but the ability to make large scale changes on these elusive computers is worth a fortune!
July 16, 2014

Centrify for Mac

James Bainter | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
For my Apple focused group, we see Centrify as a great fit for organizations that have concerns with binding Macs into Active Directory. For many IT departments, AD is THE way they manage users through group policy. Therefore, the ability to extend that out to Macs is a huge plus. They continue to "live" in AD and do not have to learn a new application, or go to another dashboard to do their job.
  • Active Directory integration for Mac user authentication and user and group management.
  • Smart card login to Active Directory provides strong authentication and SSO to enterprise services
  • Includes a cloud-based architecture for managing remote Macs that leverages Apple's mobile device support and profile-based management
  • It would be nice if an end user could open a helpdesk ticket directly from the App in Mac
There are multiple ways to accomplish what a customer is looking to do. The most important thing is to dig in and find out what that is. If managing Macs through Active Directory is the final objective, then I would highly recommend Centrify for Mac.
Return to navigation