TrustRadius: an HG Insights company

Oracle Access Management

Score8 out of 10

340 Reviews and Ratings

What is Oracle Access Management?

Oracle Access Management delivers risk-aware, end-to-end multifactor authentication (MFA) and single sign-on (SSO) that integrate identities and systems across cloud and on-premises.

Oracle Access Management Experience

Use Cases and Deployment Scope

It helps us leverage our platform services to include services management, organizing context, enhanced analytics and risk management, quality controls and auditing which is uber important in protecting our customer and employee information. Additionally providing restricted access to confidential information is paramount given the implication of not having such properly secured.

Pros

  • Auditing
  • Controls
  • Analytics

Cons

  • Ease of adoption
  • Usability for new users
  • Implementation

Return on Investment

  • Efficiency
  • Effectiveness
  • Data protection

Usability

Other Software Used

Oracle Analytics Cloud, NICE CXone Mpower, Oracle API Manager

Utility User

Use Cases and Deployment Scope

We use this product to ensure our group of users who are on a very generous hybrid work schedule have the support they need when they need it. Most importantly we need to make sure the right person is accessing our system and with the correct authentication. This is important given it prevent bad actors.

Pros

  • authenticate access
  • Manage users
  • Validate users

Cons

  • Better customization
  • Better integration
  • user interface

Return on Investment

  • Cloud access
  • Management capabilities
  • Resource management

Usability

great tool for security and compliance

Use Cases and Deployment Scope

It create and manage security policies to control access to web applications and resources, and enforce these policies at runtime. OAM provides a range of authentication and authorization mechanisms, including username and password, multi-factor authentication, and OAuth-based authentication.

which enables users to access multiple web applications with a single set of credentials, and Identity Federation, which allows organizations to extend their identity management capabilities beyond their own network to include partner networks.

Pros

  • it provides a centralized framework for managing access to web applications and resources, enabling organizations to define and enforce security policies across their entire IT environment.
  • it is designed to scale with the needs of organizations, providing support for large-scale deployments with thousands of users and applications.

Cons

  • it is complex to set up and configure, which may require significant expertise and resources. Simplifying the installation and configuration process could make it easier for organizations to adopt and use OAM.
  • OAM's performance can be slow, especially when handling large volumes of user requests or transactions. Improving performance could enhance user experience and reduce the risk of downtime.

Most Important Features

  • provides a range of authentication and authorization mechanisms
  • which enables users to access multiple web applications with a single set of credentials

Return on Investment

  • it has a negative impact for small businesses as it can prove costly and reduce the ROI

Easy and secure authentication

Use Cases and Deployment Scope

I was using Oracle Access Management at the previous company I worked for, and it was a very secure way to share access and prevent fraud, it can detect high-risk activities based on device, location, and behavior which is really important to keep the company data secure.

Pros

  • Two-step authentication.
  • Easily share access.
  • Advanced fraud detection.

Cons

  • A bit pricey but worth it.

Return on Investment

  • Securely storing credentials and preventing unauthorized access is priceless.

Alternatives Considered

OneLogin

Other Software Used

Stripe, FL Studio, Dropbox Business, HelloSign

Great tool for controlling and detecting deemed activity when logging in to company applications and services

Pros

  • Multi-factor authentication on company applications and services enables that data is not accessed by third-party users. MFA is available in multiple methods such as TOTP, SMS and email authentication.
  • By increasing login requirements reduces risks for users based on location, devices and behavior of the user when access is suspected to be high-risk.
  • By accessing company data from company on-premises and cloud applications, we are able to save time, which improves productivity.

Cons

  • The cost is a bit expensive for small and mid-sized companies.
  • Changing master password doesn’t apply automatically in all third-party services and applications.

Return on Investment

  • Login validation eradicates cases of cyber attacks.
  • Accessing data in one single location from multiple repositories through SSO reduces technical procedures.
  • Two-step authentication is a great tool that ensures only the right business users are accessing our information.

Alternatives Considered

IBM Tivoli Federated Identity Manager

Other Software Used

Adobe Marketing Cloud, Amazon Advertising Sponsored Products, Adobe Campaign