We performed a comparison between Microsoft Entra ID and Tools4ever HelloID based on real PeerSpot user reviews.
Find out in this report how the two Identity and Access Management as a Service (IDaaS) (IAMaaS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We do not have to deploy lots of machines all over the place to run things as a service, which is how we like to deploy things, just as a service."
"The solution adds an extra layer of security."
"It helps with privacy control of identity data. It makes security very easy."
"Microsoft Azure AD is easy to install and is a stable solution."
"The performance is good."
"The cloud security part is very valuable. Security is the most important thing in today's world. With Azure Active Directory, there are some features that tell you how you need to improve your security level. It informs you if you set up certain policies, e.g., this is where my users sign in. It tends to let you know if your organization has been breached with this security set up. Therefore, it is easier to know when you have been breached, especially if you set up a Conditional Access policy for your organization."
"In terms of identity management, it helps to improve security posture. It generally helps in terms cloud security, simplicity, and single sign-on for multiple apps."
"Conditional access is a very important feature where a specific user can be restricted such that they cannot connect to the application if they travel outside of the US."
"The most valuable feature is the option to use SSO from different sources such as Microsoft AD, ADFS, Azure AD, SAML, form-based, etc."
"The Single Sign-On capabilities are endless and we haven't found a single app so far that couldn't be set up for SSO."
"You don't need to be a specialist in Identity and Access Management solutions to understand the software and configure it."
"Now we can easily control who has access to which client or client application."
"For the end users, it can be confusing if they have worked for another company that had the Authenticator app. It is tricky if they have already had the Authenticator app and then work somewhere else. If they have to download it again and use it again on their phone, it is something that gets complicated. I know how to get through it. They just need to uninstall and reinstall the application, but for them, sometimes, it is confusing."
"Its integration with open-source applications can be improved. I know that they are working on open-source authentication methods for integration with open-source applications, but they can make it more open."
"The dashboard and interface could be better. It would be ideal if it was easier to use."
"One thing that bothers me about Azure AD is that I can't specify login hours. I have to use an on-premises instance of Active Directory if I want to specify the hours during which a user can log in. For example, if I want to restrict login to only be possible during working hours, to prevent overtime payments or to prevent lawsuits, I can't do this using only Azure AD."
"I want to see new functionalities for the active directory."
"The downside is that we now have all our eggs in one basket with Microsoft. We have this great authentication and single sign-on, but if Microsoft has an outage in North America or globally, on Outlook or Teams, we're dead in the water... We get some type of hiccup once a quarter."
"The only issue with Azure AD is that it doesn't have control over the wifi network. You have to do something more to have a secure wifi network. To have it working, you need an active directory server on-premises to take care of the networks."
"Technical support could be faster."
"Integration with other Tools4ever applications such as SSRPM and IAM would be nice."
"Sometimes it generates a username that is not unique, but at the time of this writing, it is not possible to generate a new one that is unique."
"When something needs to be changed with the sign-on policies, we have to apply this manually to every client environment that we have."
"I would like to have the built-in provisioning module improved."
Earn 20 points
Microsoft Entra ID is ranked 1st in Identity and Access Management as a Service (IDaaS) (IAMaaS) with 190 reviews while Tools4ever HelloID is ranked 27th in Identity and Access Management as a Service (IDaaS) (IAMaaS). Microsoft Entra ID is rated 8.6, while Tools4ever HelloID is rated 9.8. The top reviewer of Microsoft Entra ID writes "Saves us time and money and features Conditional Access policies, SSPR, and MFA". On the other hand, the top reviewer of Tools4ever HelloID writes "A flexible solution for application management, and facilitated centralization of our IAM". Microsoft Entra ID is most compared with Microsoft Intune, Google Cloud Identity, CyberArk Privileged Access Manager, Ping Identity Platform and Okta Workforce Identity, whereas Tools4ever HelloID is most compared with Imprivata OneSign, Okta Workforce Identity and Microsoft Entra External ID. See our Microsoft Entra ID vs. Tools4ever HelloID report.
See our list of best Identity and Access Management as a Service (IDaaS) (IAMaaS) vendors and best Single Sign-On (SSO) vendors.
We monitor all Identity and Access Management as a Service (IDaaS) (IAMaaS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.