In the sweet spot
Updated October 29, 2021

In the sweet spot

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Modules Used

  • Auth0 Platform

Overall Satisfaction with The Okta Identity Cloud

It is used by our department. It acts as an authentication layer for our APIs. It is extremely easy to use and quite intuitive. We may be looking at our whole organization to use this in the future. It ensures that we don't have to spend time developing our own security wrappers for our APIs.
  • Clean UI
  • Effective security
  • Good help
  • Comprehensive protection
  • Better documentation
  • Feature advertising
  • Would like to see internal architecture blogs to understand how it works.
  • Expand out of the security space into more services.
  • Improved login times.
  • Improved security.
  • Improved the confidence of users about authentication.
Auth0 is extremely easy to use; it is also quite affordable. After reading some blogs, documentation, and reviews, it seems to me that the authentication, authorization, and security that it offers is also superior to Microsoft Azure Active Directory and The Okta Identity Cloud, especially when the price point is taken into account.
Auth0 is extremely well suited for providing authentication and authorization to API endpoints, as it ensures that the company does not need to write its own security wrappers. It is probably not suitable where the use case is something specific in which case they will need to write their own auth layer for protection.

The Okta Identity Cloud Feature Ratings

ID-Management Access Control
7
ID Management Single-Sign On (SSO)
7
Multi-Factor Authentication
7
Password Management
6
Account Provisioning and De-provisioning
6
ID Risk Management
6

Configuring The Okta Identity Cloud

I think the product exposes some interesting configuration options. While they can sometimes feel extensive, I think they are quite useful to a developer who knows the product well and in general has a fair bit of experience with the authentication, authorization, and security domains. That said, it could be streamlined so it seems less complex for the average user.