Skip to main content
TrustRadius
CyberArk Workforce Identity

CyberArk Workforce Identity
Formerly Idaptive Next-Gen Access

Overview

What is CyberArk Workforce Identity?

CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security,…

Read more
Recent Reviews

TrustRadius Insights

Fast implementation: Users have found the implementation of Centrify's solution for federation with Azure/Office 365 to be significantly …
Continue reading
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is CyberArk Workforce Identity?

CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor…

Entry-level set up fee?

  • $4 per user/per month
    Optional
For the latest information on pricing, visithttps://www.centrify.com/products/appli…

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

3 people also want pricing

Alternatives Pricing

What is Microsoft Entra ID?

Microsoft Entra ID (formerly Microsoft Azure Active Directory or Azure AD) is a cloud-based identity and access management (IAM) solution supporting restricted access to applications with Azure Multi-Factor Authentication (MFA) built-in, single sign-on (SSO), B2B collaboration controls, self…

What is The Okta Identity Cloud?

Okta is an enterprise grade identity management service, built in the cloud. IT can manage access across any application, person or device. Whether the people are employees, partners or customers or whether the applications are in the cloud, on premises or on a mobile device, Okta helps IT become…

Return to navigation

Product Details

What is CyberArk Workforce Identity?

CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security, and credential management. Identity Management capabilities include lifecycle management, identity orchestration, and identity governance. With CyberArk Identity, organizations can secure workforce access to applications, endpoints, and infrastructure and protect themselves from the leading cause of data breaches – compromised credentials.

CyberArk Identity is part of the CyberArk Identity Security Platform. Built for the dynamic enterprise, CyberArk Identity Security Platform secures access for any identity to any resource or environment from anywhere using any device.  The CyberArk Identity Security Platform enables operational efficiencies with a single admin portal, streamlines meeting compliance requirements with unified audit capabilities, and delivers Identity Security Intelligence for continuous identity threat detection and protection.

Workforce Access solutions:

  • CyberArk Single Sign-On (SSO) is a solution for one-click access to cloud, mobile, and legacy apps. CyberArk SSO enables a secure and frictionless sign-in experience for both internal and external users that adjusts based on risk.

  • CyberArk App Gateway is an add-on to the Single Sign-On solution that enables VPN-less access to legacy applications. It allows companies to set up per-application, per-user access to individual legacy applications hosted on-premises.

  • CyberArk Adaptive Multi-Factor Authentication (MFA) helps strengthen security and prevent attacks involving compromised credentials by requiring users to present multiple forms of evidence to gain access to your applications. CyberArk Adaptive MFA uses AI-powered behavioral analytics and contextual information to determine which authentication factors to apply to a particular user in a specific situation.

  • CyberArk Secure Web Sessions is a cloud-based service that enables organizations to monitor, record, and audit end-user activity within high-risk and high-value web applications. Security and compliance specialists can use Secure Web Sessions to search recorded sessions using free text input and quickly filter events by users, dates, and actions.

  • CyberArk Workforce Password Management is an enterprise-focused password manager providing a user-friendly solution to store business application credentials in a centralized vault and securely share them with other users in the organization.

Identity Management Services:

  • CyberArk Identity Lifecycle Management provides a way to route application access requests, create application accounts, manage entitlements for those accounts, and revoke access when necessary.

  • CyberArk Identity Flows is an identity orchestration solution that improves security, efficiency, and productivity by automating identity data and events. With Identity Flows, organizations can automate complex identity management workflows and synchronize identity data across diverse applications, directory stores, and repositories.

  • CyberArk Identity Compliance solution continuously discovers access, streamlines access certifications, and provides comprehensive identity analytics. Identity Compliance automates manually intensive, error-prone administrative processes, ensuring all workforce and privileged access rights are properly assigned and continually certified across enterprises.

CyberArk Workforce Identity Screenshots

Screenshot of Admin PortalScreenshot of Identity LoginScreenshot of SWS PortalScreenshot of UBA PortalScreenshot of User Portal

CyberArk Workforce Identity Videos

CyberArk Workforce Identity Competitors

CyberArk Workforce Identity Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationApple iOS, Android, Mobile Web
Supported CountriesAmericas, Israel, UK, Canada, France, GMBH, Spain, Netherlands, Italia (Milan), Italia (Rome), Turkey, Australia, Asia Pacific, Japan, India, Denmark
Supported LanguagesArabic, German, English, Spanish, French, Italian, Japanese, Korean, Dutch, Portuguese, Brazil Portuguese, Russian, Serbian, Swedish, Thai, Vietnamese, Chinese, Simplified Chinese - Traditional

Frequently Asked Questions

The Okta Identity Cloud, OneLogin by One Identity, and PingOne from Ping Identity are common alternatives for CyberArk Workforce Identity.

Reviewers rate ID-Management Access Control and Account Provisioning and De-provisioning and ID Management Workflow Automation highest, with a score of 9.

The most common users of CyberArk Workforce Identity are from Mid-sized Companies (51-1,000 employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(73)

Attribute Ratings

Reviews

(1-15 of 15)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Our engagement with Centrify started with a separate requirement from another critical vendor. They migrated to an SSO only supported platform which meant we had to find a solution to continue using their services. We evaluated several vendors but ultimately we determined Centrify best met our current and future needs.
  • The administrative functions have a low learning curve which saves on the administrative overhead.
  • There are already thousands of pre-built apps to integrate Centrify with.
  • Deployment to the organization was seamless and worked as intended with the apps we went live with.
  • Support was a little slow on responding to new cases
  • You cannot disable the "Mobile" tab from a users profile meaning they think they have the ability to provision mobile devices and access apps via their mobile device.
Centrify encompasses several solutions right out of the box. In addition to SSO, we are now looking to implement MFA across the enterprise and also at our VPN.
Andy Close | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
It is being used across the whole organization. We started out with them for our mobile device management solution and have moved on to SSO and their user portal. The user portal will help us centralize the user experience and give us a way to point our users to one spot for their apps rather than all over the place.
  • Mobile Device Management
  • SSO
  • User Portal to centralize your apps
  • They do not support Microsoft Remote Desktop Gateway
They are well suited for mobile device management. The only place we see so far that they don't address is support for the Microsoft Remote Desktop Gateway. That could just be not enough people use it to make it worthwhile, but there doesn't seem to be a way to make the software run with it.
Score 7 out of 10
Vetted Review
Verified User
Centrify Multifactor and Same Sign-On (SSO) functionality were rolled out to our entire company to protect the companies resources and IT systems from unauthorized access. Passwords are no longer safe enough and expecting our users to remember many different passwords simply isn't an answer. We selected Centrify to protect access to our companies resources from anyone accessing the systems external to one of our branch offices. If external to the company, you must perform a multifactor authentication to gain access -- across all systems, period. Internally and externally, we utilize Centrify so that users can log in to many different IT systems using just their email address and network password. This reduces the number of passwords a user is expected to know.
  • Many methods of Multifactor Authentication - a Phone call, SMS text message, security questions, mobile app, etc.
  • Top Notch Support - Willing to work on issues until resolved.
  • System Up-time and Stability.
  • Security-Minded Company.
  • Lacks a large application catalog of pre-built solutions to work with many online vendors. Okta and Duo have a larger catalog of pre-built solutions to just click and configure. Centrify lacks this, but their support is great at configuring the applications regardless of the catalog.
Very well suited to protected IT systems for Multifactor authentication and single sign-on
Aaron Mitchell | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We first chose to use Centrify just as a federation alternative for ADFS for use with Office 365. It gives our users the same seamless SSO that they got from ADFS and it provides us with granular MFA and better security to meet the requirements of our company security policies. After implementing Centrify for federation, we found that we were able to replace several existing systems with what was already included with our Centrify subscription. We replaced BES, AirWatch, and Good with Centrify for our MDM solution; we of course replaced ADFS; we replaced SecureAuth for SAML assertions; and we are bout to replace DirSync with Centrify provisioning. This solution also became the default user portal for access to our web-based applications and hosted services, which simplified our users' access when away from our office.
  • Implementation of the Centrify solution for federation with Azure/Office 365 takes about 15 minutes versus the several hours it can take to stand up other solutions.
  • Mobile Device Management (MDM) has granular controls for administrators yet is very easy for our users.
  • I have been in the IT field for over 20 years, and the technical support at Centrify is by far the best I have ever encountered.
  • Granular Multi-factor Authentication (MFA) works perfectly and is easy to set up and maintain.
  • If you ever have to re-federate with Azure/Office 365, it only takes a few minutes, which is amazingly fast in comparison to other solutions we have tried in the past.
  • Establishing SAML assertions is well documented and easily accomplished. If you do run into any issues, Centrify technical support will assist you.
  • Centrify is excellent about proactively sending communications regarding problems and maintenance releases.
  • The Centrify Identity Service solution is constantly being updated and improved to not only bring new features/innovations, but also to make sure that everything is kept safe against the latest security threats.
  • As a customer, I truly get the impression that my business is important to Centrify and they try to be a good business partner.
  • Centrify listens to suggestions regarding the product development. This is true for suggestions regarding the admin/user interface as well as requests for new features.
  • I wish the setup for Centrify MDM with Android for Work was more streamlined like the way they have the Office 365 federation. This may be something that Centrify can't improve since it involves Google.
  • We have had a few issues with mobile devices not updating their settings as quickly as we would want.
  • I would love to see a client-side application for use with FIDO devices such as YubiKey.
  • It's difficult to really provide many cons for Centrify since they trend to be very proactive. At least half the time that I have a suggestion for them, it turns out that they have just released or are about to release the feature I'm requesting. Like I said in the pros section of this review, Centrify has the best support team I have encountered in over 20 years of being an IT professional.
  • I would love it if Centrify were to release a hosted SSLVPN solution so that we could get away from needing a dedicated on-prem SSLVPN appliance.
Centrify is a great solution for anyone looking to start using Office 365. It is also a great solution for anyone wanting to provide their users with an SSO solution using OAUTH, Federation, or SAML for any hosted service. If you are looking to use Centrify for MDM but you aren't using a hosted/hybrid email solution such as Office 365, there are better on-premise options that should be explored.
Jeremiah Miller | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use Centrify to provide single-sign on services for our users. Our users can log in to Centrify and gain access to a variety of different applications without having to remember multiple passwords or sign in again. Centrify also allows us to implement multi-factor authentication.
  • Multi factor authentication.
  • Broad support for a variety of applications.
  • Customer service.
  • I'd like to see support for a few more SSO technologies, like OAuth.
SAML integration is great, it makes a good identity provider for all of your applications that support this. It's also great if you want to share an application between multiple users without them having to know the password, for example a corporate Facebook or Twitter account.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We're using Centrify across our organization to easily implement SSO with multiple vendors, including Office365 and Dropbox. The ability for our users to change their password in one place has been excellent.
  • Easy to use on both desktop and mobile.
  • Enables SSO with multiple vendors.
  • Could be easier to add new services.
It's excellent if you're planning to implement multiple online services which you'd like to authenticate with Active Directory.
Debbie Brannan | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized

Mobility management for tablets in use by various County departments. Increased secure use of mobile devices by providing security configuration with enforcement and ability to wipe device if needed. Remote device location provides ability to locate missing devices and also provides an added security feature allowing us to track and find employees in the field if in distress.

SSO for on premise applications using federation with Active Directory. SSO, user provisioning, and license management for cloud applications.

Provides users with ability to perform Password Reset.


  • Easy User Password Reset
  • Provisioning and protecting enterprise mobile devices
  • Integration with Office 365
  • Location services for Centrify administrators should be enhanced
  • Centrify browser extension becomes unstable and needs to be reinstalled

Well suited for any applications that are Active Directory integrated.

Cloud applications that require password changes due to inactivity or require passwords to be changed after X number of days.

Keith Ryan | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We've implemented Centrify Identity Service across our entire organization and it has solved multiple day to day tasks such as SSO and MDM. It makes Mobile Device Management incredibly easy so that employees can enroll their own devices. It's a common thing for an employee to damage their cell phone or tablet, get it replaced and then add their own device onto our network and set up their email by enrolling it through the Centrify Portal. It really makes my job easier.
  • It's a common thing for an employee to damage their cell phone or tablet, get it replaced and then add their own device onto our network and set up their email by enrolling it through the Centrify Portal. It really makes my job easier.
  • If an employee loses their device, Centrify gives them the ability to lock, wipe, and even locate their device.
  • Centrify gives employees the ability to change their AD password easily via the Centrify portal.
  • The device enrollment process could be a little better. For the average user and the less than average user the process is a little cumbersome. It could be made a bit easier as it is a little lengthy. For the above average user it is not a problem.
  • I think creating a security question should not be an option. It should be mandatory since it is the easiest way to authenticate. If SSO is enabled and a user cannot get into their Office 365 account and does not have their security question set up or a device enrolled then the only option is to send them an email to authenticate then they are locked out and need the help of an administrator.
Centrify gives you SSO and MDM all wrapped up in one package making the administrator's job a bit easier. However, the end user may struggle a bit with authentication if they cannot log into their account and they don't have a device enrolled to use mobile authentication, or they didn't set up a security question.
July 19, 2016

Perfect integration

George Trujillo | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
The computer environment is mostly PC Windows/LDAP , we use centrify to bind and migrate our OSX/MACs into this environment, it works flawlessly and allows our employees to work without issue.
  • Integration, being able to use apple computers in our environment without the usual sticky points
  • Security, increased our ability to provide security
  • Access, allowed our users to access the information such as team drives, and cross platform cooperative work
  • Cloud features could use some small improvements,
  • Mobile application integration could be improved
  • Easier instruction fro deployment usage would be preferable, or a way to save setup settings
Any environment that wants to deploy MAC/OSX in a predominantly windows environment, this is a god-send and works perfectly.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We currently use Centrify on our MacBooks and as our MDM for Iphones. Centrify allows us to lock down and if needed remotely lock/wipe devices.
  • Allows you to push windows group policy to Macbooks
  • Allows you to remote lock/wipe macbooks and iphones
  • Is a quick easy Mobile Device Management solution for iphones.
  • n/a
  • n/a
  • n/a
We are a small to medium organization and Centrify has been fairly easy to set up and deploy to our devices.
Score 5 out of 10
Vetted Review
Verified User
Incentivized
We use it solely with Office 365 to replace on premise DirSync. It gives us a SSO for Office 365 and auto license provisioning.
  • Does well with SSO for Office 365.
  • Mobile device management seems to work pretty well.
  • It seems like features break or change on a somewhat regular basis and there is a disconnect with internally with Centrify with these ongoing changes regarding best practices for setting up and configuring Centrify.
  • Would love to see impersonation feature under admin portal to be able to troubleshoot user logins. OneLogin currently has this feature and comes in handy.
We have had a few instances where functionality that was working with Centrify, all the sudden does not anymore with us not making any changes to the Centrify portal. When it's working though, it seems to work fine.
Mike Flegel B.Sc CISSP CEDS | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use it as a platform for all cloud and/or web based applications, and application of consistent access policy. It is also used to streamline administration of application access. As well, it will also be used to manage all mobile devices in the near future.
  • It's very intuitive - extremely important when trying to get users to do something totally different than they have been used to their whole careers. User acceptability has been extremely high.
  • The 'value' of the product is very obvious. The amount of time and resources used to administer access control is sharply down and the level of detailed reports and metrics provides senior management with the information they need.
  • Adding legacy internal applications is quite difficult. Some of these are going to be around for a few years yet so it would be nice if they could be added in a much simpler fashion. Perhaps as an alternative, make it possible to add an icon for the legacy app on the SSO portal but it would just take you to the legacy application sign on screen. At least, it would keep all the applications together on one screen.
  • Some people still use Blackberries and likely always will so long as that company stays solvent (just saying).
I think for companies that are in a transitional plan of moving systems to the cloud, having an IAM/SSO system earlier rather than later would be ideal. This system should be included as part of that transitional plan. If a company's cloud strategy is still uncertain, I would say just the opposite.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Centrify is used throughout our entire organization. One of the primary business problems addressed by Centrify for end users is access management. With Centrify, we've been able to centralize access management for users, thereby reducing the need to remember multiple passwords for a variety of systems. Additionally, we use Centrify for automatic provisioning and de-provisioning of user accounts for Office 365, Salesforce, and more. This has drastically improved the efficiency and effectiveness of our internal process for on-boarding and off-boarding of users.
  • User provisioning is accurate, effective, and fully customizable.
  • Custom configuration of applications for SSO and provisioning is easy using fully customizable scripts to address your exact need.
  • The user interface is clean and easy to navigate.
  • Support is helpful and prompt.
  • More robust Mobile Device Management solution.
Centrify Identity Service is well suited for nearly any organization, especially ones utilizing Active Directory for user management. It is especially well suited for organizations looking to reduce internal resource use, because it's easy to maintain and manage. Its features also allow you to free up resources previously dedicated to the provisioning and deprovisioning of Office 365/Salesforce users (as well as other applications).
Score 9 out of 10
Vetted Review
Verified User
Incentivized
As a predominately "Windows" shop, we realized that the Macintosh OS was a sore spot. After much research, I realized that Centrify was a perfect fit as a scalable, easy to use way to reign these devices in. I'm implementing this solution across all lines of business.
  • Allows central "group policy" administration, much like Windows.
  • Easy to use tools and methods of management.
  • Great support staff!
  • Maybe a little more in initial setup assistance.
  • Maybe allow for some central patch compliance reporting.
  • More straight forward logging?
Any environment with a Macintosh/UNIX population would benefit from this solution if your backbone lies with Microsoft. If the OSX devices under your control number less than a dozen, it may not be necessary but the ability to make large scale changes on these elusive computers is worth a fortune!
July 16, 2014

Centrify for Mac

James Bainter | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
For my Apple focused group, we see Centrify as a great fit for organizations that have concerns with binding Macs into Active Directory. For many IT departments, AD is THE way they manage users through group policy. Therefore, the ability to extend that out to Macs is a huge plus. They continue to "live" in AD and do not have to learn a new application, or go to another dashboard to do their job.
  • Active Directory integration for Mac user authentication and user and group management.
  • Smart card login to Active Directory provides strong authentication and SSO to enterprise services
  • Includes a cloud-based architecture for managing remote Macs that leverages Apple's mobile device support and profile-based management
  • It would be nice if an end user could open a helpdesk ticket directly from the App in Mac
There are multiple ways to accomplish what a customer is looking to do. The most important thing is to dig in and find out what that is. If managing Macs through Active Directory is the final objective, then I would highly recommend Centrify for Mac.
Return to navigation