Centralized access management has transformed onboarding and strengthened daily security
What is our primary use case?
The main reason we use
OneLogin is to securely manage employee access to different applications from a single platform. It helps us streamline logins through single sign-on, so users do not have to remember multiple passwords. At the same time, it strengthens security with features like multi-factor authentication. Overall, it is a combination of improving user convenience and ensuring secure access to all internal applications.
One specific example of how OneLogin helped with this was during employee onboarding. Earlier, when a new employee joined, we had to manually create accounts for multiple applications and share separate login credentials. It was time-consuming and sometimes led to delays or errors. After implementing OneLogin, we streamlined this process using centralized user provisioning. Now, when a new employee is added, they automatically get access to all the required applications through single sign-on. It made onboarding much faster and more efficient.
Apart from onboarding, offboarding is another area where OneLogin has been really useful. When an employee leaves, we can instantly revoke their access to all applications from a single dashboard. This is critical from a security standpoint. It removes the risk of any leftover or unauthorized access.
What is most valuable?
The best feature of OneLogin is definitely its single sign-on. It makes a big difference in day-to-day work because employees can access multiple applications using just one login, which improves both productivity and the user experience. Another feature that stands out is multi-factor authentication. It adds an extra layer of security, especially for sensitive applications, and helps protect against unauthorized access.
OneLogin's integration and user management features have been very useful for us.
OneLogin has had a very positive impact on our organization, especially in terms of efficiency and security. From a time-saving perspective, it has significantly reduced the effort required for managing user accesses. Tasks like onboarding, offboarding, and updating permissions are now much faster because everything is handled from a single platform instead of multiple systems. In terms of security, features like multi-factor authentication and centralized access have helped reduce the risk of unauthorized access. We have better visibility over who is accessing what, which makes monitoring and compliance easier. It has also improved employee experience. With single sign-on, users do not have to remember multiple passwords, so login issues have reduced and productivity has improved.
What needs improvement?
Overall, OneLogin is a strong solution, but there are a few areas where it could be improved. One area is the user interface. It is functional, but at times, it can feel a bit less intuitive, especially for new users or administrators who are just getting started. Another is integration customization. While it offers many pre-built connectors, for some custom or less common applications, the setup can require additional effort and technical understanding. Making that process simpler would be helpful. Also, reporting features could be more flexible.
A couple of additional areas come to mind. In terms of support, while the overall experience is good, sometimes response times for more complex issues can be a bit slow. Faster resolution for critical cases would definitely improve the experience. Regarding documentation, most basics are covered, but for more advanced configurations or troubleshooting, the documentation could be more detailed and easier to follow. That would help teams implement and manage the solution more independently. Pricing is another aspect. While it offers strong features, it can feel a bit on the higher side for smaller teams or organizations, especially when scaling up users. More flexible pricing options would make it more accessible.
Apart from the points mentioned earlier, there are a few smaller improvements that could make a difference. One thing that would help is if the admin experience could be more customized. For example, having more flexibility in dashboards or quicker access to frequently used settings would improve day-to-day efficiency. Another small improvement could be more granular control or easier configuration for certain policies like conditional access or role-based rules to make them quicker to implement without too many steps.
For how long have I used the solution?
I have been using OneLogin for the last two years.
What do I think about the stability of the solution?
Overall, OneLogin has been quite stable and reliable for our organization. Since it is a core identity platform, reliability is critical, and in our experience, it has performed consistently well for day-to-day operations.
What do I think about the scalability of the solution?
OneLogin has scaled quite well with our organization's needs. As we have grown both in terms of users and number of applications, it has handled the expansion smoothly. Since it is a cloud-based
IAM platform, scaling is much easier compared to traditional systems. We have been able to onboard more users, integrate new applications, and manage access across departments without any major performance issues.
How are customer service and support?
Overall, my experience with OneLogin's customer support has been mostly positive, but with some challenges. For standard issues or basic inquiries, the support team is generally responsive and helpful. They have been able to resolve common configuration or access-related issues without much difficulty.
Which solution did I use previously and why did I switch?
Before OneLogin, we were primarily relying on a more manual setup with Active Directory and basic authentication mechanisms. While it worked for internal systems, it was not very efficient for managing access to multiple cloud applications. As our organization started using more SaaS tools, we needed a centralized identity and access management solution. That is when we moved to OneLogin.
What was our ROI?
We have definitely seen a positive return on investment, mainly through time savings, reduced support effort, and improved security. For example, onboarding and offboarding access management tasks have become much faster. What used to take thirty to forty minutes per user is now down to about ten to fifteen minutes. Over multiple hires, that adds up to a significant time saving for the IT team. We have also seen a reduction in helpdesk tickets, especially related to password-related issues, roughly around thirty to forty percent fewer login-related requests.
What's my experience with pricing, setup cost, and licensing?
Overall, our experience with pricing and licensing was fairly straightforward, but there were a few areas that required careful understanding. Since OneLogin follows a subscription-based model, pricing is typically based on the number of users and the features selected, like MFA or advanced security options. The structure itself is clear, but you need to plan properly to choose the right package based on your requirements.
Which other solutions did I evaluate?
Before finalizing OneLogin, we did evaluate a few other identity and access management solutions, mainly Okta and
Microsoft Azure Active Directory. Both are strong platforms, but our decision came down to a few factors. OneLogin offered a good balance between ease of use, required features such as
SSO and MFA, and overall cost-effectiveness for our organization.
What other advice do I have?
My advice would be to first clearly understand your organization's identity and access requirements before implementing OneLogin. It is a powerful platform, but you will get the most value when your users' roles, access policies, and application needs are well-defined from the start. I would rate this review nine out of ten.
Centralized access has reduced password tickets and has streamlined secure user onboarding
What is our primary use case?
Our main use case for OneLogin is centralized identity and access management, especially SSO across cloud applications. I rely on this solution most for secure user authentication, automatic user provisioning and de-provisioning, and enforcing MFA on policy.
What is most valuable?
Many features stand out for me, including Single Sign-On, adaptive multi-factor authentication as a smart factor, automated user provisioning and de-provisioning, Directory Sync, Identity Lifecycle Management, app catalog, and easy integration.
OneLogin has had a positive impact by improving both security and operational efficiency. Since adopting it, we have reduced the number of password-related tickets significantly because users rely on SSO instead of managing multiple credentials. This freed up the IT team to focus on higher-priority work instead of routine access issues. We are also faster at onboarding and offboarding. New hires get access to required applications automatically based on their role on day one, without manual setup. Similarly, when someone leaves, disabling their account in the directory immediately removes access across all connected apps, which has strengthened our security posture and reduced the risk of orphaned accounts. Overall, the biggest outcome has been reduced administrative overhead, quicker user access, and stronger, more consistent access control across applications.
What needs improvement?
There are no areas for improvement at this time.
For how long have I used the solution?
I have been using OneLogin for less than one year.
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
OneLogin has very good scalability. It meets our requirements as we grow and there are changes.
How are customer service and support?
We have not reached out to our customer support for related issues. If we get a chance, I will definitely reach out to customer support and update my review based on my result and justification.
Which solution did I use previously and why did I switch?
We were previously doing all tasks manually. This is the first time we evaluated and selected OneLogin.
How was the initial setup?
The setup is very helpful, and my IT team can have other priority work which is related to something else. The time saved is the biggest benefit, and I can utilize my resources on something else, so there is no need to hire a new resource for the same purpose. Financially, it also saved significant money as well as time.
A recent example was adding a new SaaS ticketing tool. Instead of manually creating accounts, we used OneLogin's pre-built connector to enable SSO and mapped it to our Active Directory group. This setup took a few minutes instead of hours of manual work and ensures MFA access policies were applied automatically.
What about the implementation team?
What was our ROI?
We saw a noticeable improvement after moving to OneLogin with SSO. Before OneLogin, password resets and account lockouts were one of the top ticket categories, averaging around 20 to 25 tickets per week. After rolling out SSO and MFA, that dropped to roughly 5 to 8 tickets per week, which represents approximately a 60% to 70% reduction in tickets. In terms of time saved, each password-related ticket used to take around 10 to 15 minutes between verification, resetting, and follow-up. The reduction saves about 3 to 4 hours per week for the IT team. Over a month, that adds up to 12 to 16 hours, which is impressive. The IT team can now focus on other productive work.
Previously, in my review, I mentioned that we have saved around 14 to 16 hours dealing with tickets related to credentials. It is very helpful, and my IT team can have other priority work which is related to something else. The time saved is the biggest benefit, and I can utilize my resources on something else, so there is no need to hire a new resource for the same purpose. Financially, it also saved significant money as well as time.
What's my experience with pricing, setup cost, and licensing?
The licensing model is very good. Since I am from a sales background, I am confident that the pricing is also very good and competitive. An end user or customer can consider it for their needs. The setup cost and license are very straightforward, and our overall experience is very good with these aspects.
Which other solutions did I evaluate?
HR-driven identity management streamlines employee lifecycle handling by using the HRIS as a source of truth. When HR creates, updates, or terminates an employee, OneLogin automatically provisions access, adjusts permissions for role changes, and removes access during offboarding. It reduces manual work and improves security. This is very impactful and plays a key role for HR.
Smart Factor Authentication adjusts authentication flows in real-time based on the risk score of each login attempt. It has been very effective for balancing security and usability. For example, when a user logs in from a known device, corporate IP range, and during normal working hours, Smart Factor treats it as low-risk and allows access with just SSO. When a user logs in from another country on an unmanaged device or outside of working hours, the risk score increases, and OneLogin automatically requests MFA. In the highest-risk cases, we can restrict access to sensitive applications until verification is completed. This approach helps us avoid enforcing MFA on every single login, which reduces user friction. At the same time, we get stronger protection where it matters, such as for our finance application or VPN access.
What other advice do I have?
My impression is that OneLogin is reliable for keeping user identities consistent between systems such as Active Directory, our HR platform, and cloud applications without manual updates. For example, we use Active Directory as a source of truth, and OneLogin syncs user changes in near real-time. When a user's department, title, or group membership changes in Active Directory, those updates are automatically reflected in OneLogin and then pushed to connected applications. This eliminates manual updates and ensures app access rights stay current, which reduces friction and saves time.
The integration of phishing-resistant device trust has strengthened our authentication process by allowing us to verify not just the user, but also the security posture of the device before granting access. Instead of relying only on passwords and MFA, OneLogin checks whether a device is managed, trusted, and meets our security requirements. Overall, phishing-resistant device trust has added an extra layer of zero-trust security. It reduces the chance of unauthorized access from compromised credentials and minimizes MFA fatigue for users on compliant devices.
We have used Vigilance AI's adaptive login flow, and they have improved how we detect risky behavior and dynamically adjust authentication requirements. For example, Vigilance AI evaluates signals such as unfamiliar location, new devices, impossible travel scenarios, and unusual login attempts. When something looks suspicious, such as a user logging in from a different country shortly after a local login, the risk score increases automatically. Instead of just allowing access, OneLogin requires stronger MFA and re-verification before access is granted. The biggest impact has been better detection of anomalous logins and more intelligent responses. Low-risk logins remain seamless, while high-risk attempts are challenged automatically. This has reduced the chance of unauthorized access from compromised credentials and improved our overall confidence in our authentication process without increasing friction.
Prioritize the solution over cost if it provides better security.
My impression is positive, mainly because of centralized SSO and consistent authentication flow across applications. Users sign in once to OneLogin portal and can access their assigned applications without needing to re-enter credentials, which reduces friction and saves time. Overall, OneLogin delivers a smooth login experience while still enforcing security policies behind the scenes, which has helped improve user adoption and reduce authentication-related friction. I have given this review a rating of 8 out of 10.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Unified access has streamlined logins and has boosted security with adaptive authentication
What is our primary use case?
In my role, I use OneLogin mainly to connect users with different applications through a single login flow. OneLogin acts like a bridge between our directory and the cloud applications. This is really helpful to manage access without handling multiple credentials.
Our use cases include one portal for all applications, the Smart Factor Authentication, and the sync with directory services. In a real example, a user logs in from an office network and gets access without any issues. If the same user accesses or tries from a different country, additional verification is triggered. This automatically works without manual checks.
What is most valuable?
In my point of view, the best features are Vigilance AI features, the Smart Factor features, and the application access assignment. These are key features, as well as the automation features that really reduce the manual work in assigning application access.
The automation features like user provisioning and de-provisioning are one of the best reasons to choose OneLogin. Instead of manually creating users in AD, email, or applications, it automatically creates accounts based on HR input, assigns the correct roles and responsibilities. This work is fully automated and done in a second, and it assigns role-based access assignment. This automation feature is really impacting our organization very positively.
OneLogin has really impacted our organization positively. It has reduced the complexity in managing multiple logins. Users have a smoother experience with the solution and it has really improved the security and the user experience.
We have seen significant positive outcomes with OneLogin. Security has increased, users are able to smoothly log in, and their productivity has increased.
The adaptive authentication in OneLogin helps adjust the authentication flow in real-time based on the user risk level and behavior. Instead of applying the same login process for everything, the system evaluates factors like user location and device, login time, and patterns. Based on this, it dynamically decides whether to allow the access or require any MFA.
I have had a great experience with the directory synchronization in OneLogin. There is no challenge with it, and it synchronizes in real-time.
The integration of phishing-resistant device trust has a very positive impact on my authentication processes and really provides visibility in the authentication. This is a powerful feature set of OneLogin.
The adaptive AI in OneLogin really helps us in observing the login patterns and identifying any unusual behavior of the users. It really keeps us secure with risky behavior and visibility.
What needs improvement?
I do not see any improvement needed for OneLogin as of now. It might be that based on future requirements, future challenges might necessitate any improvement, but as of now it is working well and is a powerful solution with great features.
I think the reporting part can be more improved and more customized for OneLogin.
For how long have I used the solution?
It has been more than two years since I have been using OneLogin.
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
OneLogin is a scalable solution and can really handle the organization growth.
How are customer service and support?
Customer support for OneLogin is very rich in technical aspects and able to provide resolution within timeline.
Which solution did I use previously and why did I switch?
Since starting, I have been using OneLogin only.
What was our ROI?
I have seen a positive return on investment after implementing OneLogin. I am getting reduced help desk tickets by 50% and it is reportedly saving the IT team time by 70 to 80%.
What other advice do I have?
I rate OneLogin eight out of 10.
I gave OneLogin eight because it delivers a strong balance between security and ease of use with the feature set like automation. The single sign-on experience is smooth and users can access multiple applications. That is why I have selected a good rating.
I am getting very good feedback from the end users regarding OneLogin. They are very happy and say this experience they are getting with this solution is excellent.
I would recommend OneLogin as a solution to consider. Start with the basic single sign-on features and deployment, and then start with the more advanced features, use cases, and understand your basic requirements, authentication, and plan properly.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Centralized access has strengthened security with adaptive authentication and smoother user logins
What is our primary use case?
I typically use OneLogin for single sign-on and multifactor authentication. I use OneLogin to provide single sign-on access to my users for multiple apps in my day-to-day work.
We basically rely on SSO and MFA with OneLogin. Most of our team connects OneLogin with Active Directory and HR SSO, so new joiners automatically get access to the required apps, and role changes update permissions instead.
What is most valuable?
OneLogin's best features in my experience are the one login SSO and its integration with Active Directory. The integration between Active Directory and OneLogin is quite stable and functions in a real environment in a completely plug and play manner, making it easy to manage.
Using OneLogin, I have noticed an increase in the security posture of my organization, enforcing MFA across VPN, firewall, and cloud apps while centralizing authentication. Smart Factor Authentication is a strong feature when implemented properly as it adapts risk-based authentication, allows access while triggering MFA for security purposes, and blocks suspicious logins automatically.
My impression of the user identity synchronization across directories functionality is that it is definitely one of its strong capabilities, and synchronization between Active Directory and cloud directory is stable. It especially provides centralized identity across apps, which is useful when managing multiple systems, VPNs, and firewalls.
The integration of phishing-resistant device trust provides strong protection against phishing by detecting device-bound authentication and checking certificate trusted devices, ensuring that attackers cannot log in without the trusted device. In my experience, the user experience for signing in and authenticating to needed applications with OneLogin is generally very smooth as users log in once and access all the apps through a single portal.
We use adaptive login flows with AI in OneLogin, which typically has a meaningful impact on both threat detection and dynamic authentication control.
What needs improvement?
Overall, OneLogin is solid, but we can implement some improvements with Active Directory connectors. I believe there is a need for flexibility, better dashboards, and more proactive alerts.
Additional improvements needed for OneLogin include real-time visibility into impact and improvement, more details, a real-time status dashboard, and tenant-specific impact.
For how long have I used the solution?
I have been using OneLogin for one and a half years.
What do I think about the stability of the solution?
OneLogin is more stable than other solutions.
What do I think about the scalability of the solution?
OneLogin is generally considered highly scalable, especially for organizational growth and large enterprises. It has strong technical capabilities designed to be horizontally scalable, easily supporting a large user base without the need for manual infrastructure upgrades.
How are customer service and support?
The customer support is really good.
Which solution did I use previously and why did I switch?
Before using OneLogin, we used Cisco Duo. We decided to switch from Cisco Duo to OneLogin because we faced issues on iPhone devices with Cisco Duo, which worked fine on Android devices but had issues on iPhone and Mac devices.
How was the initial setup?
I have seen a good return on investment because it is beneficial for the organization and the setup is very easy, quick, and straightforward.
What about the implementation team?
We are the reseller for this vendor.
What was our ROI?
I measured the improvement in my security posture by reducing manual work.
What's my experience with pricing, setup cost, and licensing?
The setup and licensing cost for OneLogin depends on the per-user cost.
Which other solutions did I evaluate?
Before choosing OneLogin, I took a demo of Okta.
What other advice do I have?
My advice to others looking into using OneLogin is that it is a good product. I recommend trying it once and seeing the results as it is really a good solution for multifactor authentication and single sign-on. I gave this review a rating of 9.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Unified login has simplified daily access and reduced support tickets through risk-based policies
What is our primary use case?
In day-to-day operations, the main use case for
OneLogin is to implement single sign-on and unified central authentication for my application. It connects directly to services like Active Directory and SaaS platforms, which helps manage user access from a single point.
OneLogin allows users to authenticate once and access multiple systems using federation protocols such as SAML, which reduces credential management. Additionally, it employs policy-based authentication where authentication rules are defined based on conditions such as user role, device, and location to control how users log in, thereby improving security.
What is most valuable?
The best features OneLogin offers include SmartFactor Authentication, which is very useful because it adjusts security based on login risk and avoids forcing multifactor authentication for every login. This improves both usability and security.
The authentication feature of OneLogin stands out compared to other solutions I have used because it is very user-friendly, balancing strong security with a smooth user experience.
OneLogin has positively impacted my organization in multiple ways. It has simplified authentication and reduced password-related issues. Users can access multiple applications easily through single sign-on, and security has improved with multifactor authentication and defined policies.
I have seen fewer support tickets after implementing OneLogin, which have been reduced by 60 to 70 percent compared to the previous method. The organization is also noticing a significant improvement in security with less effort, making this a very good example of time-saving for us.
What needs improvement?
OneLogin is working well for us currently. However, the initial custom integration could be simplified, as it is somewhat complex.
For how long have I used the solution?
I have been using OneLogin for more than four years.
What do I think about the stability of the solution?
OneLogin is stable.
What do I think about the scalability of the solution?
Scalability-wise, OneLogin is outstanding and really balances the requirements of the organization based on real-time needs.
How are customer service and support?
Customer support for OneLogin is very interactive, and they are good at their technical aspects, being able to resolve issues and guide us in technical matters.
What was our ROI?
I have seen a very good return on investment, such as money saved and time saved as a result of using OneLogin.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup costs, and licensing for OneLogin has been great with the vendor sales team.
What other advice do I have?
My advice for others looking into using OneLogin is to consider the login process, plan your identity strategy, and ensure proper integration before deployment. I would rate this review an 8 out of 10.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?