Skip to main content
TrustRadius
CyberArk Workforce Identity

CyberArk Workforce Identity
Formerly Idaptive Next-Gen Access

Overview

What is CyberArk Workforce Identity?

CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security,…

Read more
Recent Reviews

TrustRadius Insights

Fast implementation: Users have found the implementation of Centrify's solution for federation with Azure/Office 365 to be significantly …
Continue reading
Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is CyberArk Workforce Identity?

CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor…

Entry-level set up fee?

  • $4 per user/per month
    Optional
For the latest information on pricing, visithttps://www.centrify.com/products/appli…

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

3 people also want pricing

Alternatives Pricing

What is Microsoft Entra ID?

Microsoft Entra ID (formerly Microsoft Azure Active Directory or Azure AD) is a cloud-based identity and access management (IAM) solution supporting restricted access to applications with Azure Multi-Factor Authentication (MFA) built-in, single sign-on (SSO), B2B collaboration controls, self…

What is The Okta Identity Cloud?

Okta is an enterprise grade identity management service, built in the cloud. IT can manage access across any application, person or device. Whether the people are employees, partners or customers or whether the applications are in the cloud, on premises or on a mobile device, Okta helps IT become…

Return to navigation

Product Details

What is CyberArk Workforce Identity?

CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security, and credential management. Identity Management capabilities include lifecycle management, identity orchestration, and identity governance. With CyberArk Identity, organizations can secure workforce access to applications, endpoints, and infrastructure and protect themselves from the leading cause of data breaches – compromised credentials.

CyberArk Identity is part of the CyberArk Identity Security Platform. Built for the dynamic enterprise, CyberArk Identity Security Platform secures access for any identity to any resource or environment from anywhere using any device.  The CyberArk Identity Security Platform enables operational efficiencies with a single admin portal, streamlines meeting compliance requirements with unified audit capabilities, and delivers Identity Security Intelligence for continuous identity threat detection and protection.

Workforce Access solutions:

  • CyberArk Single Sign-On (SSO) is a solution for one-click access to cloud, mobile, and legacy apps. CyberArk SSO enables a secure and frictionless sign-in experience for both internal and external users that adjusts based on risk.

  • CyberArk App Gateway is an add-on to the Single Sign-On solution that enables VPN-less access to legacy applications. It allows companies to set up per-application, per-user access to individual legacy applications hosted on-premises.

  • CyberArk Adaptive Multi-Factor Authentication (MFA) helps strengthen security and prevent attacks involving compromised credentials by requiring users to present multiple forms of evidence to gain access to your applications. CyberArk Adaptive MFA uses AI-powered behavioral analytics and contextual information to determine which authentication factors to apply to a particular user in a specific situation.

  • CyberArk Secure Web Sessions is a cloud-based service that enables organizations to monitor, record, and audit end-user activity within high-risk and high-value web applications. Security and compliance specialists can use Secure Web Sessions to search recorded sessions using free text input and quickly filter events by users, dates, and actions.

  • CyberArk Workforce Password Management is an enterprise-focused password manager providing a user-friendly solution to store business application credentials in a centralized vault and securely share them with other users in the organization.

Identity Management Services:

  • CyberArk Identity Lifecycle Management provides a way to route application access requests, create application accounts, manage entitlements for those accounts, and revoke access when necessary.

  • CyberArk Identity Flows is an identity orchestration solution that improves security, efficiency, and productivity by automating identity data and events. With Identity Flows, organizations can automate complex identity management workflows and synchronize identity data across diverse applications, directory stores, and repositories.

  • CyberArk Identity Compliance solution continuously discovers access, streamlines access certifications, and provides comprehensive identity analytics. Identity Compliance automates manually intensive, error-prone administrative processes, ensuring all workforce and privileged access rights are properly assigned and continually certified across enterprises.

CyberArk Workforce Identity Screenshots

Screenshot of Admin PortalScreenshot of Identity LoginScreenshot of SWS PortalScreenshot of UBA PortalScreenshot of User Portal

CyberArk Workforce Identity Videos

CyberArk Workforce Identity Competitors

CyberArk Workforce Identity Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationApple iOS, Android, Mobile Web
Supported CountriesAmericas, Israel, UK, Canada, France, GMBH, Spain, Netherlands, Italia (Milan), Italia (Rome), Turkey, Australia, Asia Pacific, Japan, India, Denmark
Supported LanguagesArabic, German, English, Spanish, French, Italian, Japanese, Korean, Dutch, Portuguese, Brazil Portuguese, Russian, Serbian, Swedish, Thai, Vietnamese, Chinese, Simplified Chinese - Traditional

Frequently Asked Questions

The Okta Identity Cloud, OneLogin by One Identity, and PingOne from Ping Identity are common alternatives for CyberArk Workforce Identity.

Reviewers rate ID-Management Access Control and Account Provisioning and De-provisioning and ID Management Workflow Automation highest, with a score of 9.

The most common users of CyberArk Workforce Identity are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(73)

Attribute Ratings

Reviews

(1-13 of 13)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use CyberArk Workforce Identity to easily and securely log in to the apps. The platform is easy to implement, offers great features like frictionless login, AI-powered authentication, making it easy to detect anomalies against security breaches, and integrates with most frequently used apps like ZOOM. .
  • Reset passwords in all software is really easy and simple.
  • Integrations to more than 120 external applications.
  • Easy to use and implement.
  • Reports.
  • Custom reports don't always support SQL input.
CyberArk Workforce Identity gives small and non-small businesses the ability to protect their data and applications. Identity management allows my organization to classify and label data to make it easier to assign permissions based on user roles. It also allows you to track activity on shared applications and data, so you know exactly who is accessing what files.It offers great identity management features to help find exactly what we need.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
Idaptive is the secure access platform being used for access to certain production systems. This is being adopted over time by my project. The business problems it solves are resolving identity and access management issues over the enterprise systems and having a better way to record all actions on the production machine.
  • Identify.
  • Access management.
  • Audit.
  • Interface.
  • The complexity of the set-up.
Idaptive is well suited in situations where you have many people accessing a production system and need to control access and be able to prove audibility for compliance. It is less appropriate and unnecessary for smaller organizations.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Centrify is being used across the whole organization, we started implementing it to work with a IT service desk we are rolling out to users. It allows us to roll out the ticketing system without having yet another password. We also will be rolling it out to other departments that utilize a high number of SAAS/websites.
  • Multiple Active Directory sources
  • Provisioning users into connected apps
  • Reporting and security policies
  • Attribute Mapping
  • Online directory for internet down/server down scenarios
  • Provisioning requires basic programming/scripting knowledge if you want to include additional user details
Centrify Application Services is well suited is well suited as an SSO, MFA on windows computers for compliance needs. Reporting to backup compliance requirements. Security policies that are customization to your environment. Scenarios where it is less appropriate would be sites/regions where multiple internet service providers are not an option or have limited options, the SSO is a real time authentication and if that connection is unavailable so is the login to whatever is pulling from it.
Alex Kim | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
I use it to log into most programs and to access a dashboard of programs that are available to us. It's steady and reliable. It allows us to not have to remember or store multiple passwords to log into our programs, and allows the organization to track logins.
  • It's clean, steady, reliable, and secure.
  • It always works which is important.
  • It's easy to integrate with other programs, like Zoom.
  • Occasionally, I get logged out of Gmail, sometimes in the middle of an email. I'm not sure why it happens, but I think it has something to do with timing out. Which is strange because I'm on email all day. Not sure why.
It's great for large enterprises, and maybe unnecessary for smaller businesses with only a handful of users.
April 12, 2018

Great SSO provider

Patrick Breznak | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use Centrify SSO across the board in my organization. We use it for most of our applications and it makes using the applications easier than remembering a ton of extra passwords. The MFA is great for sensitive applications and the implementation was a breeze. The customer support is fantastic, especially for applications that take a bit more loving than the ones with templates. Admin portal is easy to understand and navigate. Overall great decision.
  • Single sign-on (SSO)
  • Multi-Factor Authentication (MFA)
  • Secure access and self-help password portal
  • Not many cons. Great price and solution.
Implementing SSO for a range of applications. Templates make it easy to implement and understand and customer support is fantastic if you have any issues. Great application, and will be implementing the solution for all applications and all future applications. More secure applications like ADP that we will implement with MFA for an additional level of security.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Centrify is used as an Identity Provider for several applications in the whole organization. On one hand, it provides our internal users a single sign-on experience to many applications, on the other hand, it helps us to keep our environment secure with Multi-Factor-Authentication and Condition-based Authentication rules. Additionally, it provides multiple options to provision user, groups or roles to the connected applications.
  • flexible usage of authentication rules
  • easy to use for users and admins
  • great reporting and troubleshooting features
  • great support
  • admin Portal performance (partial)
  • cloud Connector usage (connectors are chosen randomly, not per location)
  • logout URL customization
well suited...
- for any company size, as it is very scalable
- for any company that is looking for an IdP to set up SSO and wants to secure Access to MFA

less appropriate...
- for companies that are satisfied with their current, alternative IdP or don't have the need of an IdP (which is hard to believe :))
Melaney Reimer | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use Centrify as our SSO and to manage identities across the entire organization. We continue to move more applications to the Centrify portal to manage onboarding and offboarding individuals in our organization.
  • We appreciate that we can push apps to our entire user base and individuals can add their own.
  • This helps us manage shadow IT systems access and deactivation upon termination.
  • Even though we don't have a single Active Directory, we were able to create a more seamless experience for our users.
  • As much as I like the tool, it is another point of possible failure.
  • More apps would be great. I'd like Centrify to be more aggressive in bring more applications into their menu.
Debbie Brannan | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized

Mobility management for tablets in use by various County departments. Increased secure use of mobile devices by providing security configuration with enforcement and ability to wipe device if needed. Remote device location provides ability to locate missing devices and also provides an added security feature allowing us to track and find employees in the field if in distress.

SSO for on premise applications using federation with Active Directory. SSO, user provisioning, and license management for cloud applications.

Provides users with ability to perform Password Reset.


  • Easy User Password Reset
  • Provisioning and protecting enterprise mobile devices
  • Integration with Office 365
  • Location services for Centrify administrators should be enhanced
  • Centrify browser extension becomes unstable and needs to be reinstalled

Well suited for any applications that are Active Directory integrated.

Cloud applications that require password changes due to inactivity or require passwords to be changed after X number of days.

Score 6 out of 10
Vetted Review
Verified User
Incentivized
Centrify is being used across our entire organization to enforce an encryption policy on all of our Mac workstations. This allows us to control and secure our Mac machines in the same way that we can manage our PCs through Group Policy
  • Active Directory joining
  • Password reset
  • User notification of password reset
  • A more simplified process for installing Centrify and joining machines
  • More descriptive and useful error messaging and logging
  • Ability to manage machines through secured wireless connections
Centrify is well suited for hybrid Mac/PC environments where equivalent levels of administrator control are required. It may not be as well suited for organizations with lots of remote users - we have run into issues with user account lockouts that are more easily resolved with local user, but can be difficult with remote users
Daniel Czuchra | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We are using Centrify across our entire company. Centrify solves several problems in our organization. First it helps improve our security by creating a secure, easy to use user authentication service across applications that would have previously required separate login credentials. This allows our users to only remember one password for multiple applications, reducing the possible security risks of password reuse and credential sharing. Centrify helps our IT Support staff by reducing the number of support calls for password management. Centrify also provides excellent credential management for our *NIX users as they often do not use Windows machines.
  • Centrify does an excellent job of supporting multiple platforms. Windows, Macs, Linux, iOS and Android are all well supported.
  • Ease of use. Centrify is easy and self explanatory for our users. Centrify is also great at integrating non SAML or LDAP systems into its service.
  • Centrify does a great job at uptime. The uptime provided is outstanding and ensures our users can always access their systems anywhere.
  • Centrify support could use more transparency in its actions. I've made provisioning changes and been burned in the past by them.
  • Centrify could support more browsers to integrate apps with.
  • Centrify could provide a user focused education platform to help users understand what CIS is and how it helps them.
Centrify is great in most organizations that do not have the resources to build their own SAML/ADFS authentication platform. It allows for the quick rollout and integration of SAML, AD, LDAP and more applications into the environment. CIS may not be appropriate in use cases where there are a large number of proprietary login methods or systems that require their own 2 factor auth mechanisms.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use the Identity portion across the entire organization for SSO and user provisioning across multiple applications and multiple platforms.
  • Admin portal is very easy and straightforward to use.
  • Centrify team is well-versed and very helpful in application integration.
  • Although the administrative portal is easy to use, there are times when you can get lost in all of the advanced options.
Suited well for companies/departments with many diverse applications where account creation is a hassle.
Joseph Politi | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Centrify Identity Service is used for single sign on to the majority of our corporate applications. It is used across the entire organization. We utilize Centrify identity Service for critical applications such as Office 365, Salesforce and our ticketing system. In addition, we leverage Centrify for provisioning user accounts into a couple of SSO apps including Office 365. Centrify addresses a number of key business problems revolving around identity management including the lifecycle management of user identities as well as the ease of access to key applications for our business users.
  • Centrify makes it simple to ramp up new applications to the Identity Service. Case in point, Office 365 took a fraction of the time to set up when compared to the traditional ADFS configuration.
  • Centrify Support and Account Success Management have been far and away the best experience compared to other vendors.
  • The ability for Centrify to provision accounts for a couple of critical applications has really helped streamline our account creation and termination process.
  • I would like to see more detailed error reporting when it comes to sync reports in order to quickly identify the root cause of directory sync issues.
Applications that can be configured to provision accounts using Centrify are well suited for the service since it further streamlines identity management. The Advanced Scripting feature in the Identity service makes it easier to configure applications that require certain attributes and is another scenario where the Centrify Service shines.
July 16, 2014

Centrify for Mac

James Bainter | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
For my Apple focused group, we see Centrify as a great fit for organizations that have concerns with binding Macs into Active Directory. For many IT departments, AD is THE way they manage users through group policy. Therefore, the ability to extend that out to Macs is a huge plus. They continue to "live" in AD and do not have to learn a new application, or go to another dashboard to do their job.
  • Active Directory integration for Mac user authentication and user and group management.
  • Smart card login to Active Directory provides strong authentication and SSO to enterprise services
  • Includes a cloud-based architecture for managing remote Macs that leverages Apple's mobile device support and profile-based management
  • It would be nice if an end user could open a helpdesk ticket directly from the App in Mac
There are multiple ways to accomplish what a customer is looking to do. The most important thing is to dig in and find out what that is. If managing Macs through Active Directory is the final objective, then I would highly recommend Centrify for Mac.
Return to navigation