TrustRadius Insights for Oracle Cloud Infrastructure Identity Access Management (OCI IAM) are summaries of user sentiment data from TrustRadius reviews and, when necessary, third party data sources.
Pros
User-Friendly Interface: Reviewers have found the employee identity and access management solution easy to understand and configure, enabling them to comply with regulatory requirements. The intuitive design of the solution has facilitated the implementation process, leading to task completion without unnecessary complexities.
Effective Reporting Feature: Users appreciated the robust reporting functionality integrated into the solution. This feature has proven useful in monitoring and managing user identities, providing valuable insights for enhancing overall security measures.
Enhanced Security Measures: Users valued the Multi-Factor Authentication solution provided by Oracle IDCS for its role in bolstering application security against unauthorized access attempts. This security measure has significantly contributed to safeguarding sensitive data and applications from potential threats.
With DJSIR Oracle Identity Cloud Service, we have centralized user management, automated user provisioning, and de-provisioning, and enforced strong authentication and access controls to OACS, APEX, and ERP applications. Oracle Identity Cloud Service helps us to comply with regulatory requirements around user identity management, access control, and data protection. And the scope of our use is employee, customer, partner, and vendor identity and access management, as well as compliance and regulatory requirements.
Pros
DJSIR Employee identity and access management to oracle applications
Comply with DJSIR's regulatory requirements around user identity management, access control, and data protection
MFA options for Oracle application logins
Cons
DJSIR Oracle Identity Cloud Service is federated with DJSIR SSO. When an employee leaves the company an office account will get deleted but it's not reflecting in Oracle Identity Cloud Service or the profile is not getting deleted from Oracle Identity Cloud Service console.
Oauth setup for the application is a bit confusing
Increase the number of reports available
Likelihood to Recommend
Oracle Identity Cloud Service helped us to manage user access and privileges across multiple cloud-based applications and services. DJSIR Oracle Identity Cloud Service is fully federated with AZUR AD. The federation and management of users are fairly easy even though we are managing multiple Oracle Identity Cloud Service stripes. We regularly get notifications for certificate renewals or rule updates in the Oracle Identity Cloud Service console.
We decided to introduce IDCS in our application framework in order to address SSO issue. In detail our need was to create a SSO between an identity provider and some applications that didn't support this IDP and OCI PAAS and Oracle SAAS These use cases was successfully solved .
Pros
Simple to understand
Simple to configure
Good Reporting
For now we didn't have unavailable of service
Intuitive during the user experience
Fast to implement
Cons
Increase the number of reports available
Likelihood to Recommend
Only scenario where IDCS is well suited and in detail we create a federation between Google IDP, IDCS and Oracle SaaS . Simple to implement and simple to maintain.
Verified User
Manager in Information Technology (1001-5000 employees)
Oracle cloud service is used as our SaaS provided for identity and access management. This is the front door for constituents to access State systems. We are addressing identity and access management regulatory requirements and securing access based on our policy and standards.
Pros
Provides technical engineering to ensure configured and tuned to meet volumes
Provides a turnkey type IDaaS solution allowing our staff to concentrate on application integrations
Provides security controls to protect our applications and users
Cons
Their first line help desk support. They seem to not try to assist in solving issues but often just refer to documents we are already using before we opened the ticket.
Likelihood to Recommend
We are using this for our resident facing applications. Areas they need to improve is building in more of the OIG functionality into their cloud service. This hinders us for managing identities that require multi-value attributes.
Oracle Identity Cloud Service has proven to be an invaluable asset for DP World, helping us address critical business problems while enhancing our security and efficiency. By embracing IDCS, we have successfully positioned our organisation to meet the demands of a rapidly evolving digital landscape and ensure the continued success of our global enterprise. IDCS quickly became a best-in-class solution for DP World, increasing their efficiency, safety, and agility. The cloud-based solution provided numerous benefits, from gaining flexibility, reducing provisioning and management time for identities across their rapidly growing and changing user population, and greater access controls, making DP World more secure throughout.
Pros
Oracle IDCS provides a seamless SSO experience across all applications and devices
Oracle IDCS offers a robust MFA solution that helps organizations secure their applications and data against unauthorized access
Oracle IDCS makes it easy to manage user identities throughout their lifecycle
Oracle IDCS provides comprehensive access management and governance capabilities to help organizations enforce security policies and compliance requirements
Cons
As the end customer, we want Oracle IDCS to have better reporting and analytics tools built in.
Another area where Oracle Identity Cloud Service could improve is in its support for external identity providers.
Enhanced customisation options and out of the box integrations
Likelihood to Recommend
Scenarios where IDCS is well suited:
Oracle Identity Cloud Service is well-suited for organizations that require a centralized approach to managing user access and authentication across multiple applications and services.
Organizations with strict compliance requirements
Scenarios where IDCS might be less appropriate:
Organizations with limited customization requirements
Verified User
Team Lead in Information Technology (10,001+ employees)
We use Oracle IDCS across our enterprise for Identity Management as well as single sign-on using our company's ADFS system. It provide our users single sign on capabilities across different application with the organization. Also, with MFA and other security features like Network perimeters, we restrict access to the application on business justification.
Pros
Restrict access to the applications outside our organization network.
Multiple IDP configurations make it easy for us to authorize access.
The adaptive security feature lets us know high-risk users.
Cons
Branding is the one that I feel could be improved and be provided with more options.
Groups and user creation and adding users to groups could become more streamlined.
More reporting features should be provided to download the diagnostic reports instead of using REST APIs.
Likelihood to Recommend
The advantage of Oracle IDCS comes in when we have other Oracle PAAS platforms and our other custom applications which we need to provide single sign-on functionality for. The custom API's provided by Oracle IDCS comes in very handy to achieve the single sign-on functionality with our custom applications.
Verified User
Consultant in Information Technology (10,001+ employees)
OIM
is implemented as the backbone of the company’s single sign-on infrastructure,
interfacing with Active Directory to achieve a finely defined authorization architecture. This has enabled us to consolidate the user roles across all the systems in the company. It has also been
scaled up to handle a B2B environment and has enough redundancy to mitigate failures. The ease of
implementation and Oracle’s security patching regime were the key factors in picking this product.
Pros
Ability to configure multiple directories into a virtual directory so as to manage them as one Identity store.
LDAP based synchronization with Microsoft Active Directory with minimum lag between the directories.
Ease of implementation and maintenance.
Cons
The web interface has gotten better over the years, but some functionality is still being handled via shell commands.
SSL setup can be simplified into one place instead of having to navigate to multiple pages and update different key-stores or wallets.
Migrating and or replicating between versions can be more intuitive with a side-by-side comparison of schema/attributes.
Likelihood to Recommend
Oracle Identity Management is a great product, especially when working with multiple directories. It is best suited in a company that has multiple business divisions catering to different objectives. And not all companies would be able to utilize all of its features, especially if the users base is too small or the business model is restricted into one area.
Verified User
Consultant in Information Technology (501-1000 employees)
We use Oracle Identity Management as a single sign-on for almost all applications. Internal systems are connected through Oracle Identity Management to provide a single sign-on experience to our internal customers, that includes, but is not limited to, our GRP system, HR, and Talent Management. It's also been extended to an external system for printing certificates for contractors in Dubai. That system is more critical than all other internal systems due to its use by business and external users.
Pros
Simple installation
Good user experience
Stable performance
Cons
Auto switch to DR (Very key and not yet been experienced or implemented well)
Ability to connect with other legacy systems
Mobile friendly
Likelihood to Recommend
I've always preferred to have a single solution for identity access management for both internal and external. In our case, we started with this project to have an internal single sign-on that worked very well. However, the external services were further integrated with the city-wide single sign system. Oracle Identity Management was an easy integration with the city identity management
We currently use Oracle Identity Cloud Service as the main identity provided for a variety of applications. The applications are build using Oracle Visual Builder, Oracle Integration Cloud, Oracle Process Cloud, Oracle Dev Cloud, Oracle Storage Cloud, and others. We federated IDCS with our active directory so we really just use it as an extension of AD. Also, we have configured Okta SSO with it.
Pros
Identity Management
Authentication
Authorization
Cons
RESTful services
SOAP Services
CLI
Likelihood to Recommend
A good use of Oracle Identity Cloud Services is as an authentication and authorization platform sitting in front of your cloud, on-premise, and hybrid Oracle solutions. It is well suited to integrate with your on-premise or cloud directory services and your single sign-on provider. It is useful for OIC, SOA, OCI, etc.
We used OIM for zero-day provisioning, same day de-provisioning, with various connectors like Active Directory, Exchange, Sametime, etc. We used OIA for analytics of access. OIA helped us perform role certification.
Pros
OIM was working for us for several years, but we had a lot of custom code we had to write to use it effectively.
OIA was able to help us perform role and access reviews periodically, in a scheduled fashion.
The product had an OK user interface.
Cons
The entitlements catalog was not robust enough for our needs. We ended up keeping an internal system to catalog our entitlements. This meant more integration code was necessary than we'd like.
We evaluated the access request functionality, but again, it was not flexible enough and had a bunch of strange quirks (unnecessary button presses, etc).
OIA was pretty slow and users would complain about it repeatedly. We tried working with Oracle to improve the performance, but didn't get anywhere after months of troubleshooting.
Likelihood to Recommend
It's good if you have a small number of entitlements to catalogue/review, or systems to integrate with. It was not a good fit for our enterprise needs because it was missing connectors or required too much customization which we'd rather do ourselves using custom code.
Verified User
Engineer in Information Technology (5001-10,000 employees)