Sign in Agent Mode
Categories
Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

28 AWS reviews

External reviews

29 reviews
from and

External reviews are not included in the AWS star rating for the product.


    Diego Uchofen

Centralized access control has improved security and now streamlines privileged user access

  • April 23, 2026
  • Review provided by PeerSpot

What is our primary use case?

OneLogin is primarily used for privileged access to applications. OneLogin enables access to applications without needing to use a single sign-on, as it connects seamlessly between systems.

For the end user, the experience with OneLogin is transparent. Previously, users had to log in to Office and then log in again to another application such as Monday. When synchronizing or running OneLogin together with those applications, the user only needs to be redirected to OneLogin by the application itself, and with that single sign-on they can then connect to other applications.

What is most valuable?

OneLogin offers the ability to update role permissions, which makes the task easier when disabling a user or changing their role or lowering their privileges. This is straightforward to manage from the same console.

OneLogin offers dynamic MFA, where the platform can decide, based on user behavior, whether or not to ask for MFA. This helps significantly. Additionally, intelligent flows, known as Smart Flows, help create highly customized authentication flows all from within OneLogin itself.

Another relevant feature of OneLogin is role assignment, which allows us not only to create the user in the final application, but also for OneLogin to assign the roles, groups, and permissions of those apps, attributed or associated with Active Directory.

OneLogin helps improve security posture. We base ourselves on ISO 27001, and they require us to have controls for secure access control, which OneLogin has helped us with. Another benefit is user productivity, because users do not have to enter multiple passwords in different applications to access them. One password is sufficient, and if OneLogin detects that the user is benign or not malicious, it makes it easier for them to access the other applications. There was also a reduction in support tickets. Although initially there were quite a few as a result of the tool's implementation, the reduction became clear as users fully learned how to use the tool, so there are no issues from that point of view.

What needs improvement?

OneLogin could benefit from additional dynamic security enhancement. The solution itself can decide whether or not to require MFA from users based on the user's behavior, where they are connecting from, their IP, what device, and what time. It allows us to identify and automatically trigger an MFA flow or simply deny access due to the dynamic risk that the user may present.

In terms of OneLogin, integrations or the integration list could be improved. There are applications that perhaps do not use the REST API, so providing the ease of being able to integrate more applications would be beneficial.

For how long have I used the solution?

OneLogin has been used for approximately a year and a half.

What other advice do I have?

The idea of implementing OneLogin was also to keep users under control and also to protect the applications they access with OneLogin by protecting them from the identity side. Though exact figures are not available, this impact can be described as positive for our organization.


    Mahesh Malve

Centralized access management has transformed onboarding and strengthened daily security

  • April 20, 2026
  • Review from a verified AWS customer

What is our primary use case?

The main reason we use OneLogin is to securely manage employee access to different applications from a single platform. It helps us streamline logins through single sign-on, so users do not have to remember multiple passwords. At the same time, it strengthens security with features like multi-factor authentication. Overall, it is a combination of improving user convenience and ensuring secure access to all internal applications.

One specific example of how OneLogin helped with this was during employee onboarding. Earlier, when a new employee joined, we had to manually create accounts for multiple applications and share separate login credentials. It was time-consuming and sometimes led to delays or errors. After implementing OneLogin, we streamlined this process using centralized user provisioning. Now, when a new employee is added, they automatically get access to all the required applications through single sign-on. It made onboarding much faster and more efficient.

Apart from onboarding, offboarding is another area where OneLogin has been really useful. When an employee leaves, we can instantly revoke their access to all applications from a single dashboard. This is critical from a security standpoint. It removes the risk of any leftover or unauthorized access.

What is most valuable?

The best feature of OneLogin is definitely its single sign-on. It makes a big difference in day-to-day work because employees can access multiple applications using just one login, which improves both productivity and the user experience. Another feature that stands out is multi-factor authentication. It adds an extra layer of security, especially for sensitive applications, and helps protect against unauthorized access.

OneLogin's integration and user management features have been very useful for us.

OneLogin has had a very positive impact on our organization, especially in terms of efficiency and security. From a time-saving perspective, it has significantly reduced the effort required for managing user accesses. Tasks like onboarding, offboarding, and updating permissions are now much faster because everything is handled from a single platform instead of multiple systems. In terms of security, features like multi-factor authentication and centralized access have helped reduce the risk of unauthorized access. We have better visibility over who is accessing what, which makes monitoring and compliance easier. It has also improved employee experience. With single sign-on, users do not have to remember multiple passwords, so login issues have reduced and productivity has improved.

What needs improvement?

Overall, OneLogin is a strong solution, but there are a few areas where it could be improved. One area is the user interface. It is functional, but at times, it can feel a bit less intuitive, especially for new users or administrators who are just getting started. Another is integration customization. While it offers many pre-built connectors, for some custom or less common applications, the setup can require additional effort and technical understanding. Making that process simpler would be helpful. Also, reporting features could be more flexible.

A couple of additional areas come to mind. In terms of support, while the overall experience is good, sometimes response times for more complex issues can be a bit slow. Faster resolution for critical cases would definitely improve the experience. Regarding documentation, most basics are covered, but for more advanced configurations or troubleshooting, the documentation could be more detailed and easier to follow. That would help teams implement and manage the solution more independently. Pricing is another aspect. While it offers strong features, it can feel a bit on the higher side for smaller teams or organizations, especially when scaling up users. More flexible pricing options would make it more accessible.

Apart from the points mentioned earlier, there are a few smaller improvements that could make a difference. One thing that would help is if the admin experience could be more customized. For example, having more flexibility in dashboards or quicker access to frequently used settings would improve day-to-day efficiency. Another small improvement could be more granular control or easier configuration for certain policies like conditional access or role-based rules to make them quicker to implement without too many steps.

For how long have I used the solution?

I have been using OneLogin for the last two years.

What do I think about the stability of the solution?

Overall, OneLogin has been quite stable and reliable for our organization. Since it is a core identity platform, reliability is critical, and in our experience, it has performed consistently well for day-to-day operations.

What do I think about the scalability of the solution?

OneLogin has scaled quite well with our organization's needs. As we have grown both in terms of users and number of applications, it has handled the expansion smoothly. Since it is a cloud-based IAM platform, scaling is much easier compared to traditional systems. We have been able to onboard more users, integrate new applications, and manage access across departments without any major performance issues.

How are customer service and support?

Overall, my experience with OneLogin's customer support has been mostly positive, but with some challenges. For standard issues or basic inquiries, the support team is generally responsive and helpful. They have been able to resolve common configuration or access-related issues without much difficulty.

Which solution did I use previously and why did I switch?

Before OneLogin, we were primarily relying on a more manual setup with Active Directory and basic authentication mechanisms. While it worked for internal systems, it was not very efficient for managing access to multiple cloud applications. As our organization started using more SaaS tools, we needed a centralized identity and access management solution. That is when we moved to OneLogin.

What was our ROI?

We have definitely seen a positive return on investment, mainly through time savings, reduced support effort, and improved security. For example, onboarding and offboarding access management tasks have become much faster. What used to take thirty to forty minutes per user is now down to about ten to fifteen minutes. Over multiple hires, that adds up to a significant time saving for the IT team. We have also seen a reduction in helpdesk tickets, especially related to password-related issues, roughly around thirty to forty percent fewer login-related requests.

What's my experience with pricing, setup cost, and licensing?

Overall, our experience with pricing and licensing was fairly straightforward, but there were a few areas that required careful understanding. Since OneLogin follows a subscription-based model, pricing is typically based on the number of users and the features selected, like MFA or advanced security options. The structure itself is clear, but you need to plan properly to choose the right package based on your requirements.

Which other solutions did I evaluate?

Before finalizing OneLogin, we did evaluate a few other identity and access management solutions, mainly Okta and Microsoft Azure Active Directory. Both are strong platforms, but our decision came down to a few factors. OneLogin offered a good balance between ease of use, required features such as SSO and MFA, and overall cost-effectiveness for our organization.

What other advice do I have?

My advice would be to first clearly understand your organization's identity and access requirements before implementing OneLogin. It is a powerful platform, but you will get the most value when your users' roles, access policies, and application needs are well-defined from the start. I would rate this review nine out of ten.


    reviewer2814237

Unified login has simplified daily access and has strengthened secure authentication workflows

  • April 19, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for OneLogin is managing all my logins in one place securely. It has really helped me with single sign-on, so I do not have to remember multiple passwords.

For example, earlier I had to switch between multiple tools such as email, dashboard, and internal apps. With SSO, I just log in once and get access to everything instantly, which saves a lot of time and avoids repeated logins.

Apart from SSO, I also use OneLogin for secure access management and keeping all credentials organized in one place. It just makes things smoother and more secure without much effort on my end.

What is most valuable?

The best features OneLogin offers are single sign-on and multi-factor authentication. SSO makes access super easy and MFA adds that extra security layer so everything stays safe without feeling complicated.

The multi-factor authentication is pretty easy to use and does not take too much time. Sometimes there is a slight delay in getting the code, but overall it is smooth and reliable.

I really appreciate how OneLogin handles secure access management. It gives good control over who can access what without being complicated. The credential organization is clean, so it is easy to find and manage all logins in one place.

OneLogin has definitely saved a lot of time since we do not have to deal with multiple logins anymore. Security has improved a lot, and overall the workflows feel smoother and more efficient now.

What needs improvement?

I think the UI could be a bit more user-friendly and modern, especially for new users. Also, faster OTP delivery and a smoother mobile experience would make OneLogin even better overall.

Better integration with more third-party tools would be helpful so OneLogin can work more seamlessly. Improved reporting for access logs would make it easier to review usage and security insights.

One small thing would be better performance during peak login times because sometimes it feels slightly slower. Other than that, most of the core features already work well for my use case.

For how long have I used the solution?

I have been using OneLogin for around a year now.

What do I think about the stability of the solution?

OneLogin is generally considered stable and reliable for most organizations and for us, it is stable.

What do I think about the scalability of the solution?

OneLogin scales very well in enterprise environments, especially because it is built on a cloud-based multi-tenant architecture designed for horizontal scaling. It can handle growing users and login traffic by adding more resources instead of needing a full system redesign.

How are customer service and support?

Based on my feedback and my colleague's feedback, I would rate OneLogin customer support around seven out of ten.

Which solution did I use previously and why did I switch?

Before OneLogin, we were using more basic single sign-on and directory-based systems. We switched mainly because it did not have strong adaptive security and was more difficult to manage at scale.

How was the initial setup?

From what I have seen and experienced, the setup and licensing feel fairly straightforward and not too heavy compared to other enterprise tools.

What about the implementation team?

OneLogin is deployed as a cloud-based solution in our organization. We mainly access it over the internet, so there is no on-premises setup involved.

What was our ROI?

I am not in a role where I can measure the exact ROI numbers for Smart Factor Authentication, but from what I observed, it definitely improves both security and efficiency.

Which other solutions did I evaluate?

Before finalizing OneLogin, we did evaluate a few other identity platforms such as Okta, Microsoft Entra ID, and Ping Identity. In the end, OneLogin stood out mainly because it was simpler to deploy and easier for our team management compared to others.

What other advice do I have?

A good way to look at OneLogin is through time savings, IT workload reductions, and security impact rather than just direct financial numbers. I would rate this review as an eight out of ten.


    Antara R Deolekar

Centralized access has reduced password tickets and has streamlined secure user onboarding

  • April 19, 2026
  • Review from a verified AWS customer

What is our primary use case?

Our main use case for OneLogin is centralized identity and access management, especially SSO across cloud applications. I rely on this solution most for secure user authentication, automatic user provisioning and de-provisioning, and enforcing MFA on policy.

What is most valuable?

Many features stand out for me, including Single Sign-On, adaptive multi-factor authentication as a smart factor, automated user provisioning and de-provisioning, Directory Sync, Identity Lifecycle Management, app catalog, and easy integration.

OneLogin has had a positive impact by improving both security and operational efficiency. Since adopting it, we have reduced the number of password-related tickets significantly because users rely on SSO instead of managing multiple credentials. This freed up the IT team to focus on higher-priority work instead of routine access issues. We are also faster at onboarding and offboarding. New hires get access to required applications automatically based on their role on day one, without manual setup. Similarly, when someone leaves, disabling their account in the directory immediately removes access across all connected apps, which has strengthened our security posture and reduced the risk of orphaned accounts. Overall, the biggest outcome has been reduced administrative overhead, quicker user access, and stronger, more consistent access control across applications.

What needs improvement?

There are no areas for improvement at this time.

For how long have I used the solution?

I have been using OneLogin for less than one year.

What do I think about the stability of the solution?

OneLogin is stable.

What do I think about the scalability of the solution?

OneLogin has very good scalability. It meets our requirements as we grow and there are changes.

How are customer service and support?

We have not reached out to our customer support for related issues. If we get a chance, I will definitely reach out to customer support and update my review based on my result and justification.

Which solution did I use previously and why did I switch?

We were previously doing all tasks manually. This is the first time we evaluated and selected OneLogin.

How was the initial setup?

The setup is very helpful, and my IT team can have other priority work which is related to something else. The time saved is the biggest benefit, and I can utilize my resources on something else, so there is no need to hire a new resource for the same purpose. Financially, it also saved significant money as well as time.

A recent example was adding a new SaaS ticketing tool. Instead of manually creating accounts, we used OneLogin's pre-built connector to enable SSO and mapped it to our Active Directory group. This setup took a few minutes instead of hours of manual work and ensures MFA access policies were applied automatically.

What about the implementation team?

We are a reseller.

What was our ROI?

We saw a noticeable improvement after moving to OneLogin with SSO. Before OneLogin, password resets and account lockouts were one of the top ticket categories, averaging around 20 to 25 tickets per week. After rolling out SSO and MFA, that dropped to roughly 5 to 8 tickets per week, which represents approximately a 60% to 70% reduction in tickets. In terms of time saved, each password-related ticket used to take around 10 to 15 minutes between verification, resetting, and follow-up. The reduction saves about 3 to 4 hours per week for the IT team. Over a month, that adds up to 12 to 16 hours, which is impressive. The IT team can now focus on other productive work.

Previously, in my review, I mentioned that we have saved around 14 to 16 hours dealing with tickets related to credentials. It is very helpful, and my IT team can have other priority work which is related to something else. The time saved is the biggest benefit, and I can utilize my resources on something else, so there is no need to hire a new resource for the same purpose. Financially, it also saved significant money as well as time.

What's my experience with pricing, setup cost, and licensing?

The licensing model is very good. Since I am from a sales background, I am confident that the pricing is also very good and competitive. An end user or customer can consider it for their needs. The setup cost and license are very straightforward, and our overall experience is very good with these aspects.

Which other solutions did I evaluate?

HR-driven identity management streamlines employee lifecycle handling by using the HRIS as a source of truth. When HR creates, updates, or terminates an employee, OneLogin automatically provisions access, adjusts permissions for role changes, and removes access during offboarding. It reduces manual work and improves security. This is very impactful and plays a key role for HR.

Smart Factor Authentication adjusts authentication flows in real-time based on the risk score of each login attempt. It has been very effective for balancing security and usability. For example, when a user logs in from a known device, corporate IP range, and during normal working hours, Smart Factor treats it as low-risk and allows access with just SSO. When a user logs in from another country on an unmanaged device or outside of working hours, the risk score increases, and OneLogin automatically requests MFA. In the highest-risk cases, we can restrict access to sensitive applications until verification is completed. This approach helps us avoid enforcing MFA on every single login, which reduces user friction. At the same time, we get stronger protection where it matters, such as for our finance application or VPN access.

What other advice do I have?

My impression is that OneLogin is reliable for keeping user identities consistent between systems such as Active Directory, our HR platform, and cloud applications without manual updates. For example, we use Active Directory as a source of truth, and OneLogin syncs user changes in near real-time. When a user's department, title, or group membership changes in Active Directory, those updates are automatically reflected in OneLogin and then pushed to connected applications. This eliminates manual updates and ensures app access rights stay current, which reduces friction and saves time.

The integration of phishing-resistant device trust has strengthened our authentication process by allowing us to verify not just the user, but also the security posture of the device before granting access. Instead of relying only on passwords and MFA, OneLogin checks whether a device is managed, trusted, and meets our security requirements. Overall, phishing-resistant device trust has added an extra layer of zero-trust security. It reduces the chance of unauthorized access from compromised credentials and minimizes MFA fatigue for users on compliant devices.

We have used Vigilance AI's adaptive login flow, and they have improved how we detect risky behavior and dynamically adjust authentication requirements. For example, Vigilance AI evaluates signals such as unfamiliar location, new devices, impossible travel scenarios, and unusual login attempts. When something looks suspicious, such as a user logging in from a different country shortly after a local login, the risk score increases automatically. Instead of just allowing access, OneLogin requires stronger MFA and re-verification before access is granted. The biggest impact has been better detection of anomalous logins and more intelligent responses. Low-risk logins remain seamless, while high-risk attempts are challenged automatically. This has reduced the chance of unauthorized access from compromised credentials and improved our overall confidence in our authentication process without increasing friction.

Prioritize the solution over cost if it provides better security.

My impression is positive, mainly because of centralized SSO and consistent authentication flow across applications. Users sign in once to OneLogin portal and can access their assigned applications without needing to re-enter credentials, which reduces friction and saves time. Overall, OneLogin delivers a smooth login experience while still enforcing security policies behind the scenes, which has helped improve user adoption and reduce authentication-related friction. I have given this review a rating of 8 out of 10.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Vishal Koovaparambil

Unified access has streamlined logins and has boosted security with adaptive authentication

  • April 17, 2026
  • Review from a verified AWS customer

What is our primary use case?

In my role, I use OneLogin mainly to connect users with different applications through a single login flow. OneLogin acts like a bridge between our directory and the cloud applications. This is really helpful to manage access without handling multiple credentials.

Our use cases include one portal for all applications, the Smart Factor Authentication, and the sync with directory services. In a real example, a user logs in from an office network and gets access without any issues. If the same user accesses or tries from a different country, additional verification is triggered. This automatically works without manual checks.

What is most valuable?

In my point of view, the best features are Vigilance AI features, the Smart Factor features, and the application access assignment. These are key features, as well as the automation features that really reduce the manual work in assigning application access.

The automation features like user provisioning and de-provisioning are one of the best reasons to choose OneLogin. Instead of manually creating users in AD, email, or applications, it automatically creates accounts based on HR input, assigns the correct roles and responsibilities. This work is fully automated and done in a second, and it assigns role-based access assignment. This automation feature is really impacting our organization very positively.

OneLogin has really impacted our organization positively. It has reduced the complexity in managing multiple logins. Users have a smoother experience with the solution and it has really improved the security and the user experience.

We have seen significant positive outcomes with OneLogin. Security has increased, users are able to smoothly log in, and their productivity has increased.

The adaptive authentication in OneLogin helps adjust the authentication flow in real-time based on the user risk level and behavior. Instead of applying the same login process for everything, the system evaluates factors like user location and device, login time, and patterns. Based on this, it dynamically decides whether to allow the access or require any MFA.

I have had a great experience with the directory synchronization in OneLogin. There is no challenge with it, and it synchronizes in real-time.

The integration of phishing-resistant device trust has a very positive impact on my authentication processes and really provides visibility in the authentication. This is a powerful feature set of OneLogin.

The adaptive AI in OneLogin really helps us in observing the login patterns and identifying any unusual behavior of the users. It really keeps us secure with risky behavior and visibility.

What needs improvement?

I do not see any improvement needed for OneLogin as of now. It might be that based on future requirements, future challenges might necessitate any improvement, but as of now it is working well and is a powerful solution with great features.

I think the reporting part can be more improved and more customized for OneLogin.

For how long have I used the solution?

It has been more than two years since I have been using OneLogin.

What do I think about the stability of the solution?

OneLogin is stable.

What do I think about the scalability of the solution?

OneLogin is a scalable solution and can really handle the organization growth.

How are customer service and support?

Customer support for OneLogin is very rich in technical aspects and able to provide resolution within timeline.

Which solution did I use previously and why did I switch?

Since starting, I have been using OneLogin only.

What was our ROI?

I have seen a positive return on investment after implementing OneLogin. I am getting reduced help desk tickets by 50% and it is reportedly saving the IT team time by 70 to 80%.

What other advice do I have?

I rate OneLogin eight out of 10.

I gave OneLogin eight because it delivers a strong balance between security and ease of use with the feature set like automation. The single sign-on experience is smooth and users can access multiple applications. That is why I have selected a good rating.

I am getting very good feedback from the end users regarding OneLogin. They are very happy and say this experience they are getting with this solution is excellent.

I would recommend OneLogin as a solution to consider. Start with the basic single sign-on features and deployment, and then start with the more advanced features, use cases, and understand your basic requirements, authentication, and plan properly.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    reviewer2516757

Automated onboarding has reduced approval delays and frees my team to focus on critical security work

  • April 16, 2026
  • Review from a verified AWS customer

What is our primary use case?

My full name is Dhiren Jetva, and I'm currently working at Digital Track Solution Private Limited as a Network and Security Team lead. I have been working in my current field for more than three years. I have been using OneLogin for between six to 10 months.

My main use cases for OneLogin include Single Sign-On, Multi-Factor Authentication, user provisioning and deprovisioning, direct integration with LDAP, secure remote work access, and role-based access control, among others.

For example, in my organization, I have over 20 SaaS tools that employees log into using OneLogin instead of accessing each one separately. Instead of managing separate usernames and passwords for each application, OneLogin provides a single credential that allows me to log into any of the 20 applications. This illustrates one of the use cases for Single Sign-On.

What is most valuable?

In my opinion, the best features OneLogin offers include user provisioning and deprovisioning through an automated process.

The automated user provisioning and deprovisioning process for my team works as follows: previously, when a user joined, several approvals were required, which took time. Now, when a user joins, an account is automatically created via our HR CRM, and with a simple email approval from the manager, the user instantly receives their username, password, and IT asset allocation. Similarly, when an employee leaves, their access is revoked instantly to reduce IT workload and security risks. This feature significantly benefits my team.

I would also like to mention that OneLogin's LDAP integration or Active Directory integration is a straightforward, one-click process that can easily sync with Microsoft Azure Directory or any AD servers, making it easier to manage user groups in larger organizations.

OneLogin positively impacts my organization by significantly reducing the time required for user onboarding. Previously, this process took one to two days, while now, it is accomplished within an hour. The dependency on management has decreased because the process is simplified. Additionally, my IT team can now focus on other critical tasks, which has improved overall effectiveness and reduced manpower costs for the organization.

Previously, onboarding took around three to four days, and now it is done in half an hour to one hour. Regarding the escalation matrix, I previously had four employees for these tasks, and I now work with two. Thus, two employees are available for other work, which contributes to cost savings for the organization.

What needs improvement?

I am still exploring the product, so I cannot make a judgment on improvements at this time. However, I am currently satisfied with OneLogin and the services it provides. If any issues arise in the future, I will make sure to provide feedback.

For how long have I used the solution?

I have been using OneLogin for between six to 10 months.

What do I think about the stability of the solution?

OneLogin is very stable.

What do I think about the scalability of the solution?

Scalability for OneLogin is very good.

How are customer service and support?

I haven't needed to open a ticket with customer support, so I don't have experiences to share. In the future, if any issues arise, I will provide feedback based on my experience.

Which solution did I use previously and why did I switch?

There was no previous solution used before OneLogin.

How was the initial setup?

private cloud

What about the implementation team?

AWS

What was our ROI?

OneLogin positively impacts my organization by significantly reducing the time required for user onboarding. Previously, this process took one to two days, while now, it is accomplished within an hour. The dependency on management has decreased because the process is simplified. Additionally, my IT team can now focus on other critical tasks, which has improved overall effectiveness and reduced manpower costs for the organization.

Previously, onboarding took around three to four days, and now it is done in half an hour to one hour. Regarding the escalation matrix, I previously had four employees for these tasks, and I now work with two. Thus, two employees are available for other work, which contributes to cost savings for the organization.

What's my experience with pricing, setup cost, and licensing?

I am not the right person to comment on pricing, setup costs, and licensing since it's managed by another team. However, I can say that licensing is straightforward and good, while the setup cost is acceptable.

Which other solutions did I evaluate?

I haven't evaluated any other options before choosing OneLogin.

What other advice do I have?

I use OneLogin's Smart Factor Authentication, which replaces traditional MFA with a dynamic security approach. It assesses login attempts using a risk engine called Vigilance AI, analyzing factors like geographic location, IP addresses, device trustworthiness, working hours, and user behavior to assign a risk score that helps determine access.

OneLogin provides a smooth experience for signing in and authenticating to the necessary applications for my team. SSO enables users to avoid remembering multiple credentials since they only need their email or AD credentials to access various SaaS applications, resulting in a positive user appreciation due to minimal latency.

I am currently exploring the integration of phishing-resistant device trust, so I cannot comment on its impact just yet.

HR-driven identity management plays a vital role in making identity handling easier in my organization, particularly during onboarding or offboarding. When HR updates employee data, OneLogin automatically reflects these changes across all systems, streamlining the process and earning HR's appreciation.

For others considering OneLogin, I advise focusing on security features rather than just the cost. While budget constraints are important, investing in a good solution is essential.

I would rate my overall experience with OneLogin a 9 out of 10.


    Nitin Yadav

Centralized access has strengthened security with adaptive authentication and smoother user logins

  • April 16, 2026
  • Review from a verified AWS customer

What is our primary use case?

I typically use OneLogin for single sign-on and multifactor authentication. I use OneLogin to provide single sign-on access to my users for multiple apps in my day-to-day work.

We basically rely on SSO and MFA with OneLogin. Most of our team connects OneLogin with Active Directory and HR SSO, so new joiners automatically get access to the required apps, and role changes update permissions instead.

What is most valuable?

OneLogin's best features in my experience are the one login SSO and its integration with Active Directory. The integration between Active Directory and OneLogin is quite stable and functions in a real environment in a completely plug and play manner, making it easy to manage.

Using OneLogin, I have noticed an increase in the security posture of my organization, enforcing MFA across VPN, firewall, and cloud apps while centralizing authentication. Smart Factor Authentication is a strong feature when implemented properly as it adapts risk-based authentication, allows access while triggering MFA for security purposes, and blocks suspicious logins automatically.

My impression of the user identity synchronization across directories functionality is that it is definitely one of its strong capabilities, and synchronization between Active Directory and cloud directory is stable. It especially provides centralized identity across apps, which is useful when managing multiple systems, VPNs, and firewalls.

The integration of phishing-resistant device trust provides strong protection against phishing by detecting device-bound authentication and checking certificate trusted devices, ensuring that attackers cannot log in without the trusted device. In my experience, the user experience for signing in and authenticating to needed applications with OneLogin is generally very smooth as users log in once and access all the apps through a single portal.

We use adaptive login flows with AI in OneLogin, which typically has a meaningful impact on both threat detection and dynamic authentication control.

What needs improvement?

Overall, OneLogin is solid, but we can implement some improvements with Active Directory connectors. I believe there is a need for flexibility, better dashboards, and more proactive alerts.

Additional improvements needed for OneLogin include real-time visibility into impact and improvement, more details, a real-time status dashboard, and tenant-specific impact.

For how long have I used the solution?

I have been using OneLogin for one and a half years.

What do I think about the stability of the solution?

OneLogin is more stable than other solutions.

What do I think about the scalability of the solution?

OneLogin is generally considered highly scalable, especially for organizational growth and large enterprises. It has strong technical capabilities designed to be horizontally scalable, easily supporting a large user base without the need for manual infrastructure upgrades.

How are customer service and support?

The customer support is really good.

Which solution did I use previously and why did I switch?

Before using OneLogin, we used Cisco Duo. We decided to switch from Cisco Duo to OneLogin because we faced issues on iPhone devices with Cisco Duo, which worked fine on Android devices but had issues on iPhone and Mac devices.

How was the initial setup?

I have seen a good return on investment because it is beneficial for the organization and the setup is very easy, quick, and straightforward.

What about the implementation team?

We are the reseller for this vendor.

What was our ROI?

I measured the improvement in my security posture by reducing manual work.

What's my experience with pricing, setup cost, and licensing?

The setup and licensing cost for OneLogin depends on the per-user cost.

Which other solutions did I evaluate?

Before choosing OneLogin, I took a demo of Okta.

What other advice do I have?

My advice to others looking into using OneLogin is that it is a good product. I recommend trying it once and seeing the results as it is really a good solution for multifactor authentication and single sign-on. I gave this review a rating of 9.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Bhavesh Jha

Unified login has simplified daily access and reduced support tickets through risk-based policies

  • April 16, 2026
  • Review from a verified AWS customer

What is our primary use case?

In day-to-day operations, the main use case for OneLogin is to implement single sign-on and unified central authentication for my application. It connects directly to services like Active Directory and SaaS platforms, which helps manage user access from a single point.

OneLogin allows users to authenticate once and access multiple systems using federation protocols such as SAML, which reduces credential management. Additionally, it employs policy-based authentication where authentication rules are defined based on conditions such as user role, device, and location to control how users log in, thereby improving security.

What is most valuable?

The best features OneLogin offers include SmartFactor Authentication, which is very useful because it adjusts security based on login risk and avoids forcing multifactor authentication for every login. This improves both usability and security.

The authentication feature of OneLogin stands out compared to other solutions I have used because it is very user-friendly, balancing strong security with a smooth user experience.

OneLogin has positively impacted my organization in multiple ways. It has simplified authentication and reduced password-related issues. Users can access multiple applications easily through single sign-on, and security has improved with multifactor authentication and defined policies.

I have seen fewer support tickets after implementing OneLogin, which have been reduced by 60 to 70 percent compared to the previous method. The organization is also noticing a significant improvement in security with less effort, making this a very good example of time-saving for us.

What needs improvement?

OneLogin is working well for us currently. However, the initial custom integration could be simplified, as it is somewhat complex.

For how long have I used the solution?

I have been using OneLogin for more than four years.

What do I think about the stability of the solution?

OneLogin is stable.

What do I think about the scalability of the solution?

Scalability-wise, OneLogin is outstanding and really balances the requirements of the organization based on real-time needs.

How are customer service and support?

Customer support for OneLogin is very interactive, and they are good at their technical aspects, being able to resolve issues and guide us in technical matters.

What was our ROI?

I have seen a very good return on investment, such as money saved and time saved as a result of using OneLogin.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup costs, and licensing for OneLogin has been great with the vendor sales team.

What other advice do I have?

My advice for others looking into using OneLogin is to consider the login process, plan your identity strategy, and ensure proper integration before deployment. I would rate this review an 8 out of 10.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Naved Ansari

Centralized access has strengthened security and saves time with streamlined user provisioning

  • April 15, 2026
  • Review from a verified AWS customer

What is our primary use case?

Our primary use case for OneLogin is to have central management of the solution across all our cloud and on-premises applications. For example, an employee logs in once and gets access to all their approved applications such as Salesforce, Zoom, or Workplace, and we use it to provision access automatically based on their roles when someone joins.

How has it helped my organization?

OneLogin has highly impacted our organization positively because it provides full customized control of user access and multi-factor authentication with great supported methods such as SMS OTP or email OTP, which are the key positive things we are getting from this solution. Since we started using OneLogin, we can clearly see it saving our time and we have seen a great reduction in security incidents.

What is most valuable?

The best feature OneLogin offers is its single sign-on combined with the app catalog, as it has thousands of pre-built app integrations which makes it take less time in the setup of SSO when we need to add or integrate Salesforce or Zoom. This feature also provides centralized visibility, so I can see every app, every user, and every access policy from one place, making this kind of control an excellent feature of this solution.

It has made the troubleshooting easier as well as the management, and it also helps for audit purposes.

What needs improvement?

OneLogin is a great solution with great features and I do not see any improvement needed at this time. One thing that can be improved is that we got some false positives when remote employees were switching networks in the first week, which took some time to fine-tune and settle as per our environment, so that can be more simplified in the initial start.

For how long have I used the solution?

It has been more than four years since I started using OneLogin.

What do I think about the stability of the solution?

OneLogin is stable.

What do I think about the scalability of the solution?

OneLogin's scalability is excellent, as it is matching our growth over time.

How are customer service and support?

OneLogin customer support is very supportive and good in their technical parts. I would rate OneLogin customer support nine out of ten.

Which solution did I use previously and why did I switch?

From the start, we have only used OneLogin, and did not previously use a different solution.

How was the initial setup?

My experience with OneLogin regarding pricing, setup cost, and licensing is straightforward, and we got a very positive response from the vendor team. It was straightforward to use OneLogin's single sign-on feature, as we have integrated it with our Active Directory, which is on-premises.

What about the implementation team?

We are a partner with OneLogin and have a business relationship with this vendor other than being a customer.

What was our ROI?

We have seen the time saved as well as the money saved for the organization since implementing OneLogin, indicating a clear return on investment.

What's my experience with pricing, setup cost, and licensing?

My experience with OneLogin regarding pricing, setup cost, and licensing is straightforward, and we got a very positive response from the vendor team.

Which other solutions did I evaluate?

We have not gone for an evaluation of other options before choosing OneLogin.

What other advice do I have?

My advice to others looking into using OneLogin is that it is a very useful and powerful solution, so every organization can go for the POC and then procure the solution. I would rate this review nine out of ten.


    Arkajit Das

Centralized access has improved security workflows and still needs better visibility and UX

  • April 14, 2026
  • Review provided by PeerSpot

What is our primary use case?

Our main use case for OneLogin is managing secure and centralized access across our HealthTech and FinTech platforms, primarily in real-life scenarios when team members need access to tools like the patient management system, financial dashboard, or different admin panels. OneLogin allows us to help them log in and securely access everything they need, and it also helps us enforce role-based security access controls, ensuring sensitive data points are protected.

OneLogin helps us manage role-based security controls by allowing us to define and enforce different access policies based on various user roles, scopes, and attributes, with a primary focus on security. In practice, we generally map users, such as clinicians and support staff or the finance team, to specific roles, with a focus on the HealthTech workflow. For example, whenever a clinician needs to access patient records at the treatment tool, the finance team should not have access to that data, while the finance team would have access to financial data. These are straightforward scenarios, and OneLogin also supports automated user provisioning and de-provisioning, which is really helpful. Whenever a user role changes or they leave the organization, their access is updated or revoked instantly, depending on the workflow.

What is most valuable?

The primary feature that we value about OneLogin is the security access control, and apart from that, there are many management features. First is Single Sign-On, or SSO, which allows users to access multiple platforms and applications with a single login. Then there is MFA, including risk detection, where the smart factor for risk-based authentication is very helpful for us. User provisioning and lifecycle management are also crucial, as they automate the onboarding and offboarding process, creating, updating, and removing access based on role changes. This reduces manual errors and ensures compliance, particularly in regulated environments like healthcare.

OneLogin has positively impacted our organization by improving security efficiency and access control. Implementing MFA and role-based access control has significantly reduced the risk of unauthorized access, especially with sensitive health records or FinTech data. We have seen improvements in our user lifecycle management; for example, onboarding and offboarding are much faster and more consistent. The system provides visibility and control, allowing us to manage access effectively and stay compliant with internal policies.

What needs improvement?

There are a couple of areas for improvement in OneLogin. While it is strong overall, the key areas that could be worked on include the ease of configuration for advanced workflows, as setting up complex role-based policies or integration across different systems in the HealthTech market requires considerable technical effort. A more intuitive setup process or guided configuration would be beneficial.

Visibility is another area that could improve, as determining where problems lie with OneLogin is not always straightforward. Additional logs, clearer error messaging, and better debugging tools would help. Additionally, UI and UX could be streamlined. The integration flexibility with niche platforms can also be improved, but the three key areas I have mentioned are focusing on visibility during troubleshooting and making debugging easier.

For how long have I used the solution?

I have been using OneLogin for almost four years.

What do I think about the scalability of the solution?

OneLogin is a highly scalable system.

How are customer service and support?

Customer support is pretty good.

Which solution did I use previously and why did I switch?

Before OneLogin, we relied on Microsoft Active Directory, managing multiple credentials across systems. We also evaluated Okta but ultimately chose OneLogin for the balance of features, ease of deployment, and competitive cost, allowing us to centralize identity management and automate workflows effectively. I previously used Microsoft Active Directory and evaluated Okta, but chose OneLogin for centralized identity management, which supports faster processing for user onboarding, offboarding, and role provisioning.

What was our ROI?

When analyzing our investment return, there is a clear return regarding measurable time savings and reduced operational overhead, despite any concerns about cost. The comparison of previous manual tasks, which used to take one to two hours, is now reduced to ten to fifteen minutes. From a security standpoint, ROI is also significant, as security breaches cost companies billions each year.

Which other solutions did I evaluate?

My advice for those looking into OneLogin is to research other options like Okta or Microsoft Entra. Make use of features like SSO, MFA, and SmartFactor, but configure them thoughtfully to balance security and user experience. It is crucial to plan your identity architecture carefully to avoid disruption during rollout or operation. Invest the time upfront in planning, as this will be very beneficial.

What other advice do I have?

I would rate customer support a seven out of ten, which I think is pretty good. My overall review rating for OneLogin is seven out of ten.