We performed a comparison between Auth0 and WSO2 Identity Server based on real PeerSpot user reviews.
Find out in this report how the two Customer Identity and Access Management (CIAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature is that it is simple to integrate, irrespective of your codebase."
"It supports identity federation, FSO and multi-tenancy."
"I simply use the JWT from the client on the server side to process requests and push updated profile data to a database/queue as needed and end the process without having to persist data in the web server (sessions)."
"It's a very powerful platform. It has the ability to do the usual stuff, according to modern protocols, like OIDC and OAuth 2. But the real benefit of using the platform comes from its flexibility to enhance it with rules and, now, with what they call authentication pipelines. That is the most significant feature, as it allows you to customize everything regarding the authentication and authorization process."
"The most valuable feature is interface application integration, but we haven't fully used it yet. We'll need it in the future for a few potential clients."
"It is very scalable because it provides a new environment for companies based on their number of users and other factors. The tool can take a lot of users."
"It is easily connected and easy to put our app in single sign-on."
"The most valuable feature of the product is scalability."
"It's very easy to implement everything."
"The product provides easy integration between API manager and IT server components."
"The keystore feature has been most valuable for us."
"Some of the valuable features of the solution are the easy integration with processes, such as Single Sign-On. Overall WSO2 is straightforward and does not need customization."
"Comprehensive ecosystem."
"The single sign-on procedure itself, as well as the ability to connect to external user sources such as Microsoft Active Directory and LDAP servers, are the solution's most valuable features."
"I would rate the solution's stability eight or nine out of ten."
"I think they can do a better job in explaining what you're supposed to do next in order to correctly follow an idiomatic approach to using the solution beyond simply passing a JWT token to a server and having the server check then signature to validate the token."
"When they introduced the Organizations feature they did support different login screens per organization. However, they introduced a dependency between this feature and another called the New Universal Login Experience. The New Experience is a more lightweight login screen, but it is much less customizable. For example, today, we are able to fully customize our login screen and even control the background image according to the time of day. We have code to do that. But we are not able to write code anymore in the New Experience."
"This is a costly solution and the price of it should be reduced."
"The tool's price should be improved."
"The Management API could be improved so it's easier to get user information."
"The price modelling is a bit confusing on the site and can be costly."
"The product support for multi-tenancy could be improved."
"The product could use a more flexible administration structure"
"There needs to be a good support model and easy-to-understand documentation."
"The high availability architecture has to be improved."
"I found the initial setup to be very complex."
"The solution could improve its development from a user perspective."
"This solution requires extensive knowledge to be used effectively as certain areas of its use are not user friendly."
"This solution does not have BPM workflows already integrated, we had to integrate the BPM module externally. They do not provide full-featured auditing and certification modules out of the box."
"Sometimes working with the code is difficult because I search for documentation about the code and how to work with the code, which is where I believe they should improve, by providing some documentation on how to work with the code."
Auth0 is ranked 1st in Customer Identity and Access Management (CIAM) with 14 reviews while WSO2 Identity Server is ranked 6th in Customer Identity and Access Management (CIAM) with 7 reviews. Auth0 is rated 8.2, while WSO2 Identity Server is rated 8.0. The top reviewer of Auth0 writes "Has good documentation but improvement is needed in MFA and application configurations ". On the other hand, the top reviewer of WSO2 Identity Server writes "Provides valuable API management features, but its technical documentation needs improvement". Auth0 is most compared with Microsoft Entra ID, Amazon Cognito, Frontegg, Cloudflare Access and CyberArk Privileged Access Manager, whereas WSO2 Identity Server is most compared with Amazon Cognito, SAP Identity Management, CyberArk Privileged Access Manager, SailPoint IdentityIQ and F5 BIG-IP Access Policy Manager (APM). See our Auth0 vs. WSO2 Identity Server report.
See our list of best Customer Identity and Access Management (CIAM) vendors.
We monitor all Customer Identity and Access Management (CIAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.