- Social Sign On
- Single Sign-On (SSO)
- User Activity Monitoring
- Role Management
- Multi-factor Authentication
Secure your user credentials with the best authentication software
(13 ratings)
Overview
Features
Pricing
Alternatives
Media
FAQs
Support
8.1/10
Spot Score
With Salesforce Identity, user can accurately attribute users and assign permission roles in online applications. Access to the information user needs from anywhere is important, so the solution is designed to simplify the way organizations manage users and permissions wherever ... Read More
Single sign-on (SSO) allows users to log in to various applications with a single set of credentials, making it safe and straightforward. It's an authentication method in which users are provided only one set of login credentials to make the procedure easier. This eliminates the need for users to log in and out of different applications independently.
Multi-factor authentication (MFA) is a security mechanism that verifies a user's identity for a login or other transaction by requiring multiple ways of verification from separate categories of credentials. Multi-factor authentication combines two or more distinct credentials: what the user knows, such as a password; what the user owns, such as a security token; and who the user is, as determined by biometric verification methods. The purpose of multi-factor authentication is to construct a layered defense that makes it more difficult for an unauthorized person to access a target, such as a physical location, computing device, network, or database. Even if one element is compromised or damaged, the attacker still needs to get through at least one or more barriers before breaking into the target.
Managers plan, coordinate, regulate, and lead operations that assure compliance with laws and standards through compliance management. It is the process of continuously monitoring and evaluating systems to verify that they meet industry and security standards and corporate and regulatory policies and mandates. This entails assessing infrastructure to detect noncompliant systems due to regulatory, policy, or standard changes, misconfiguration, or other factors. Noncompliance can lead to penalties, security breaches, certification revocation, and other company consequences. Staying on top of compliance changes and updates keeps your business processes running smoothly and saves you money.
Screenshot of the Salesforce Identity Pricing Page (Click on the image to visit Salesforce Identity 's Pricing page)
Disclaimer: The pricing details were last updated from the vendor website and may be different from actual. Please confirm with the vendor website before purchasing.
Salesforce Identity
Oracle Identity Management
Salesforce Identity
SailPoint IdentityIQ
Salesforce Identity
AWS IAM
Salesforce Identity
WSO2 Identity Server
Contact
+1 800-667-6389
Customer Service
Online
Location
San Francisco, California
With Salesforce Identity, user can accurately attribute users and assign permission roles in online applications. Access to the information user needs from anywhere is important, so the solution is designed to simplify the way organizations manage users and permissions wherever the cloud is located. Integration with Salesforce Connect is easy, boosting productivity for the large team by giving on-demand access so user can complete projects without delay.
Disclaimer: This research has been collated from a variety of authoritative sources. We welcome your feedback at [email protected].