We performed a comparison between Microsoft Entra ID and Tools4ever HelloID based on real PeerSpot user reviews.
Find out in this report how the two Identity and Access Management as a Service (IDaaS) (IAMaaS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It's not intuitive and we use it mainly for our Office 365 files. The integration between the two is interesting. However, the learning curve is high."
"The valuable features I use daily are enterprise application, conditional access, identity governance, password monitoring, and a password reset."
"It also has features that help improve security posture. The most important of these features include multifactor authentication, which is very useful for connecting to the organization, especially from outside the boundaries of the organization. That is very helpful when it comes to user security."
"If you want to replicate a website at the frontend in Azure, it's very easy to do it globally."
"We use BitLocker for policy enforcement. And now, because of the Microsoft 365 Business Premium package, we get Intune as a part of it. That's very useful for us for setting policies and managing the systems. The biggest strength of Azure AD is Intune."
"The scalability capabilities are quite high."
"All of the features are amazing, such as identity governance and privileged identity management."
"The solution offers business to business and client to business support."
"The most valuable feature is the option to use SSO from different sources such as Microsoft AD, ADFS, Azure AD, SAML, form-based, etc."
"Now we can easily control who has access to which client or client application."
"You don't need to be a specialist in Identity and Access Management solutions to understand the software and configure it."
"The Single Sign-On capabilities are endless and we haven't found a single app so far that couldn't be set up for SSO."
"Its area of improvement is more about the synchronization of accounts and the intervals for that. Sometimes, there're customers with other network challenges, and it takes a while for synchronization to happen to the cloud. There is some component of their on-prem that is delaying things getting to the cloud. The turnaround time for these requests is very time-sensitive. I don't mean this as derogatory for this service, but in my experience, that happens a lot."
"In a hybrid deployment, when we update a license by changing the UPN or email address of a user, it does not get updated automatically during normal sync. This means that we have to update it manually from Azure, which is something that needs to be corrected."
"When you fix the rules and permissions, working directly on the manifest, you really need to have in-depth knowledge. If there were a graphical user interface to update the manifest, that would be good."
"From time to time it takes a little bit of time to replicate, with some of the applications—something like five to 10 minutes. I know that the design is not supposed to enable real-time replication with some of the applications. But, as an administrator, I would like to run a specific change or modification in Azure Active Directory and see it replicated almost immediately."
"I want to see more features to improve security, such as integrated user behavior analysis."
"At the free or basic level of service, Azure should provide identity protection features including single sign-on and multifactor authentication."
"Overall, it's not a very intuitive solution."
"The solution could be improved when it comes to monitoring and logging as these are the most critical areas in case something was to go wrong."
"I would like to have the built-in provisioning module improved."
"Integration with other Tools4ever applications such as SSRPM and IAM would be nice."
"When something needs to be changed with the sign-on policies, we have to apply this manually to every client environment that we have."
"Sometimes it generates a username that is not unique, but at the time of this writing, it is not possible to generate a new one that is unique."
Earn 20 points
Microsoft Entra ID is ranked 1st in Identity and Access Management as a Service (IDaaS) (IAMaaS) with 190 reviews while Tools4ever HelloID is ranked 27th in Identity and Access Management as a Service (IDaaS) (IAMaaS). Microsoft Entra ID is rated 8.6, while Tools4ever HelloID is rated 9.8. The top reviewer of Microsoft Entra ID writes "Saves us time and money and features Conditional Access policies, SSPR, and MFA". On the other hand, the top reviewer of Tools4ever HelloID writes "A flexible solution for application management, and facilitated centralization of our IAM". Microsoft Entra ID is most compared with Microsoft Intune, Google Cloud Identity, CyberArk Privileged Access Manager, Ping Identity Platform and Okta Workforce Identity, whereas Tools4ever HelloID is most compared with Imprivata OneSign, Okta Workforce Identity and Microsoft Entra External ID. See our Microsoft Entra ID vs. Tools4ever HelloID report.
See our list of best Identity and Access Management as a Service (IDaaS) (IAMaaS) vendors and best Single Sign-On (SSO) vendors.
We monitor all Identity and Access Management as a Service (IDaaS) (IAMaaS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.