OneLogin acts as a centralized identity backbone for our fragmented enterprise stack and is a reliable workforce identity engine that simplifies lifecycle management of the work. Its structure, policy structure, and developer experience are flawless. We have used it for primary cases like automated lifecycle management, secure single sign-on (SSO) because centralizing access control with Smart Factor Authentication is very useful, and directory integration, which includes real-time synchronization with Active Directory and LDAP via lightweight connectors.
OneLogin Workforce Identity
One IdentityExternal reviews
External reviews are not included in the AWS star rating for the product.
Centralized identity has automated contractor onboarding and cuts access bottlenecks for our teams
What is our primary use case?
What is most valuable?
The best features OneLogin offers include Smart Factor Authentication, automated lifecycle management provision, and high availability directory connectors like lightweight active directory connectors (ADC) and LDAP bridges, which establish reliable, real-time synchronization with on-premises directories. It provides a clean, single source of truth without requiring heavy infrastructure modifications, which is advantageous because many tools have complex setups, but OneLogin gives us a seamless experience for setting it up, serving as a single source for everything without any complex synchronization scripts.
The biggest impact for us comes from automated contractor provisioning, specifically the automated lifecycle management via the Active Directory connector (ADC), which delivers the most significant operational impact. When deploying short-term, cross-domain contractors into our high-security staging environments bridging legacy on-premises networks and AWS, manual setup bottlenecks our engineering team for days. By leveraging OneLogin's pre-built application catalog, we completely automate the pipeline so that the moment any external account is created in the directory, access to the specific developer tools is provisioned instantly, slashing our team's onboarding administrative hurdles by roughly 70%.
The key strength I would suggest is the multi-tiered security policies, and the administrative UI is very crucial for helping our developers set things up and track everything together.
The core operational impact of OneLogin is eliminating access bottlenecks, and our biggest win comes from automating lifecycle management when spinning up the environments for 150 or more short-term, cross-domain contractors, which used to stall our engineering team for days. By leveraging OneLogin's pre-built application catalog and ADC, we automate that pipeline, which helps us significantly.
Additionally, its Smart Factor authentication method uses machine learning risk scoring to evaluate across any context, seamlessly bypassing MFA for low-risk internal developer logins while instantly triggering biometric challenges for anomalous remote connections, marking our biggest wins.
From a pure availability standpoint, OneLogin's core single sign-on engine is highly dependable. During high-traffic periods across our banking and logistic portals, the primary authentication path rarely drops while processing risk scores, maintaining consistent uptime without adding systematic latency.
What needs improvement?
There are some tweaks we could make to the administrative UI that could improve workflow administration, along with metrics that could be added to the dashboard which are already available in the platform.
For how long have I used the solution?
I have been working in the artificial intelligence field for around three to three and a half years.
What do I think about the stability of the solution?
OneLogin remains stable across team usage. Our networking and engineering team uses OneLogin almost every day without any issues to date.
How are customer service and support?
OneLogin support effectively maintains standard operations, while their enterprise tier engineering depth fosters good relations with high-velocity development teams during debugging of complex hybrid pipelines. For account holders, the SAML and OIDC configuration assistance, along with general billing inquiries, generally sees predictable and quick response times. The documentation almost answers every question and covers standard SaaS integrations well, allowing even a junior system administrator to navigate basic setups without needing to open a ticket.
Which solution did I use previously and why did I switch?
Before standardizing on OneLogin, we relied heavily on Okta. While Okta boasts an extensive app ecosystem and mature API access management, we strategically switched to OneLogin to optimize our operational efficiency across a hybrid infrastructure.
How was the initial setup?
OneLogin provides a highly seamless, low-friction end-user authentication experience. The single sign-on portal stands out as exceptionally clean for the end-user, and the standout feature is Smart Factor Authentication, which suppresses MFA prompts entirely. It only triggers strict biometric challenges when an anomaly or remote connection is detected. This ensures that the end-user does not face bottlenecks from a painful developer setup, resulting in a seamless experience.
Once actually configured, the sign-in SSO completely automates the user access pipeline, reducing onboarding login hurdles by 70%. It delivers a top-tier end-user experience, provided our engineering team handles the necessary backup setup required to deploy it.
What was our ROI?
There are multiple metrics to share. One is engineering time saved, as the 70% cut in the onboarding process brought it down from six days to about five to six hours. We also needed fewer employees to accomplish the work by replacing manual script maintenance, thereby avoiding the hiring of two full-time IAM and system admin engineers, saving us about 18 lakhs to 24 lakhs annually. Another significant metric is reduced help desk ticket volume, where centralized self-service password resets and Smart Factor Authentication for our low-risk internal network slashed login-related support tickets by 45%. The security ROI is undeniable, evidenced by zero credential stuffing breaches since deployment and zero alert fatigue due to context-aware gating.
What's my experience with pricing, setup cost, and licensing?
From an AML infrastructure perspective, navigating OneLogin's licensing requires calculating operational cost taxes. The base seat cost is reasonable, typically scaling to around three dollars per user per month for a basic plan, while we used a ten dollars per user plan for enterprise, which was quite reasonable for us considering our on-premises setup. Although OneLogin brands itself as a cloud-first IAM backbone, our hybrid architecture across networking and logistics across different domains necessitated integrating with legacy infrastructure.
The Active Directory and LDAP bridged themselves on on-premises server licensing fees, making our life easier by flattening the standard per-user cost. Additionally, internal engineering hours are effectively bridged to the cloud control plane with the physical data center.
Which other solutions did I evaluate?
We evaluated Okta, and then we considered Microsoft Entra ID.
What other advice do I have?
OneLogin is a highly pragmatic workforce identity engine that eliminates manual authentication debt across fragmented infrastructure securely. My strategic advice is to audit your API requirements early. If your architecture relies heavily on IAM driven entirely by code, especially for automatic complex event stream auditing or real-time webhooks, be ready to attach those securely. OneLogin's REST API handles basic CRUD operations well, with deep technical documentation addressing almost every potential question.
Be prepared to go through the documentation, and also leverage Smart Factor to avoid alert fatigue. Maximizing the Smart Factor Authentication system while properly configuring it allows you to suppress MFA prompts for standard and low-risk internal logins, ensuring the best-in-world protection while safeguarding the environment and infrastructure without burning out your team. This review has been given a rating of ten out of ten.
Centralized access has simplified secure logins and automated user lifecycle management
What is our primary use case?
OneLogin serves as our centralized identity access management solution, and we use it primarily for single sign-on, multi-factor authentication, and user provisioning across cloud applications.
We implemented single sign-on so that employees can securely access applications like Microsoft 365, Salesforce, VPN tools, HR platforms, and collaboration applications using one centralized identity. In a typical day-to-day scenario, an employee logs into their work session using corporate credentials and then accesses multiple approved applications directly through OneLogin portal without repeatedly entering passwords. Multi-factor authentication has also been a major part of our deployment. For example, when users access sensitive applications remotely or from an unrecognized device, OneLogin automatically enforces an additional authentication factor such as a push notification or OTP verification. This adds a stronger security layer without making the login experience overly complicated. OneLogin also helps us streamline onboarding and offboarding when a new employee joins. IT can provision accounts and assign application access through centralized policies. Likewise, when someone leaves the organization, disabling the user in OneLogin immediately revokes access to connected systems, reducing security risk and administrative effort.
Overall user experience while still strengthening security is important, and employees appreciate having a single consistent login experience across applications, which reduces password-related frustration and support tickets. From the IT and security side, centralized identity management gives us much better control over user access, policy enforcement, and compliance. It also makes supporting remote and hybrid users much easier because authentication and access management can be handled securely from anywhere without relying heavily on traditional on-premises infrastructure.
What is most valuable?
Some of the best features offered by OneLogin are its single sign-on, multi-factor authentication, centralized user provisioning, and strong directory integration capabilities. These features help us simplify identity management while improving overall security and user experience. The single sign-on functionality is probably one of the most valuable features because it allows employees to securely access multiple business applications using one set of credentials. This reduces password fatigue, minimizes login-related support tickets, and improves employee productivity, since users no longer need to remember separate passwords for every platform.
Another strong feature is automated user provisioning and de-provisioning. When employees join, change roles, or leave the organization, access rights can be managed centrally through OneLogin. This reduces manual administration work and improves security by ensuring that access is granted or revoked quickly and consistently across connected systems. One of the most impactful aspects of OneLogin is its ability to integrate smoothly with the applications and services we are already using. A good example is the integration with Microsoft 365 and several internal business applications. Before OneLogin, users had separate authentication processes for different platforms, which created inconsistent access management and increased password-related issues. After integrating these applications with OneLogin, employees can access everything through a centralized portal using single sign-on.
This not only simplifies the user experience but also gives the IT team centralized control over authentication, MFA enforcement, and user lifecycle management. It significantly reduces login-related support tickets and makes onboarding and offboarding much more effective. The VPN integration also makes a big difference for remote employees, where we can apply strong authentication policies for remote access without adding too much complexity for the end users. The integration of phishing-resistant device trust in OneLogin has a very positive impact on our authentication process, particularly from a security and risk management perspective. It adds an extra layer of assurance by verifying not only the user identity but also the trustworthiness of the device being used during authentication.
What needs improvement?
OneLogin has been a strong solution overall, but there are a few areas where it could improve. One challenge we experience is that some advanced configuration and policy settings can become more complex, especially in large environments with many applications, custom authentication workflows, or hybrid infrastructure. The platform is very powerful, but there can be a learning curve for administrators when dealing with more advanced identity and access management scenarios. We also notice that troubleshooting integration and synchronization issues occasionally requires more effort than expected.
While many popular applications have pre-built connectors, certain custom or legacy integrations still need additional configuration and testing to work smoothly. Another area for improvement is reporting and analytics. The platform provides useful authentication and audit data, but more flexible reporting customization and deeper real-time visibility into user activity and security events would make monitoring and compliance management even stronger.
Before purchasing OneLogin, I would advise conducting thorough research on your user count and what kind of features you would want to implement, because the main initial phase is to implement and have a better understanding of your organization where you can get the most out of OneLogin. OneLogin is a very strong tool, but without knowing proper deployment or any features which you would be looking for, it may feel more complex at the time of installation.
For how long have I used the solution?
I have been using OneLogin for more than a year now.
What do I think about the stability of the solution?
Our experience is that OneLogin has been very stable and reliable in production. We use it daily for single sign-on, multi-factor authentication, and user provisioning across multiple business applications, and we have not faced any major stability issues that impact business continuity. Most of the time, the platform runs smoothly in the background without requiring intervention.
What do I think about the scalability of the solution?
Scalability for OneLogin has been very strong in our experience. It handles growth in both users and applications quite smoothly. As our organization expands and moves more workloads to the cloud, we can onboard new employees, contractors, and additional SaaS applications without needing major changes to the underlying identity infrastructure. The platform scales well as our user base increases, and authentication performance remains stable even as login volumes grow across remote and hybrid work environments.
How are customer service and support?
Customer support for OneLogin has been generally good, but somewhat mixed depending on the type of issue. For standard requests such as single sign-on setup, MFA configuration, or basic troubleshooting, the support team has been responsive and helpful. We usually receive clear guidance and timely resolution for common issues, especially during initial deployment and routine maintenance.
However, for more complex or escalated issues such as advanced integration problems, directory synchronization conflicts, or custom authentication flows, the response time can be slower than expected. These cases often require multiple follow-ups or escalation to higher technical teams, which can extend resolution time. Overall, I would describe the support experience as reliable for day-to-day needs, but with room for improvement in faster escalation and more consistent handling of advanced enterprise-level issues.
Which solution did I use previously and why did I switch?
Before implementing OneLogin, we were primarily using a combination of traditional on-premises Active Directory authentication along with separate authentication methods for different cloud applications. As the organization adopts more SaaS applications and remote work becomes more common, the existing setup becomes difficult to scale and manage efficiently. Employees have to maintain multiple credentials across systems, which leads to password fatigue, more login-related support tickets, and fragmented user experience. We decided to switch to OneLogin mainly because we wanted a centralized cloud-based identity and access management platform that can provide strong single sign-on, adaptive MFA, automated provisioning, and better integration across cloud applications.
How was the initial setup?
Setting up OneLogin involves integration planning and effort due to directory synchronization and application integration. Organizations with more complex hybrid environments or custom applications may require additional professional services or consulting support during deployment.
What was our ROI?
We definitely see a positive return on investment after implementing OneLogin, particularly in areas of operational efficiency, security management, and reduction in support overhead. One of the most measurable improvements is the reduction in password-related help desk tickets after rolling out single sign-on. Credential-related authentication, password resets, and login support queries decrease by roughly around fifty percent.
We also see major time savings in onboarding and offboarding processes. Before OneLogin, provisioning user access across applications was largely manual and could take several hours, depending on the employee role. With automated provisioning tied directly to directory and HR workflows, onboarding time is reduced to less than an hour.
Another important ROI factor is improved productivity from end users. Employees no longer have to manage multiple credentials across business applications, which reduces login friction and saves time during daily work. Overall, the combination of automation, reduced support effort, strong security, and improved user productivity provides a clear and measurable return on investment over time.
What's my experience with pricing, setup cost, and licensing?
Our experience with OneLogin's setup cost and licensing is generally positive. The total cost depends heavily on the feature set, user count, and integration requirements. The license model is primarily subscription-based and typically charges per user per month. The pricing scales based on the capabilities included, such as single sign-on, MFA, smart factor authentication, HR-driven identity management, and advanced directory synchronization.
From a setup cost perspective, the cost is more related to the implementation effort and integration planning than infrastructure investment because the platform is cloud-based. We spend most of the time and effort on directory synchronization and application integration.
Which other solutions did I evaluate?
Before selecting OneLogin, we evaluated several other identity and access management solutions to ensure we chose the right fit for our environment. The main alternatives we considered include Okta, Microsoft Entra ID, and Ping Identity. We compared them based on factors such as ease of deployment, integration with our existing applications, pricing, scalability, and support for hybrid environments. Okta is very comprehensive but is more expensive for our requirements. Entra ID is attractive because of its deep integration with Microsoft services, but it makes more sense for organizations fully standardized on the Microsoft stack.
What other advice do I have?
OneLogin has a very positive impact on our organization, especially in the areas of security, user experience, and operational efficiency. Before implementing OneLogin, managing users' access across multiple applications was more fragmented and time-consuming. Employees had to maintain several passwords, and the IT team spent a significant amount of time handling password resets, account provisioning, and access-related support queries.
After deploying OneLogin, one of the biggest improvements is the simplification of user access through single sign-on. Employees can securely access multiple business applications using one centralized login, which improves productivity and reduces password fatigue. From a security perspective, implementing multi-factor authentication significantly strengthens our access controls, especially for remote and hybrid employees accessing sensitive systems. Operationally, automated provisioning and de-provisioning create major efficiency gains for the IT team. New employees can be onboarded faster with pre-formed application access based on roles, while offboarding becomes more secure because disabling a user account in OneLogin immediately revokes access to connected systems.
Overall, OneLogin improves both the employee experience and the organization management by centralizing identity and access control into a more scalable and manageable platform. I would rate my overall experience with OneLogin as a nine out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Centralized access has streamlined onboarding and has reduced password-related support work
What is our primary use case?
OneLogin serves as our centralized identity and access management platform. We previously used it as single sign-on, so users could access multiple business applications with one set of credentials instead of managing separate logins for everything. We also use it for user provisioning and de-provisioning to make onboarding and offboarding more efficient. One practical benefit is reducing password-related issues and giving users a smoother experience. At the same time, one challenge we notice is that integration can vary depending on the application. Standard cloud applications are usually straightforward, but some legacy or custom applications need additional configuration and testing. So it is not always a completely plug-and-play process.
Beyond SSO and access management, OneLogin also helps from a user experience and security perspective. Having a single place of authentication reduces password fatigue for users and cuts down on password reset requests, which can take up a lot of IT support time. At the same time, identity management is rarely a one-time setup. As organizations grow, applications change, and access requirements evolve. One challenge is maintaining the role structure and ensuring users continue to have the right level of access over time. Even with OneLogin, periodic access reviews and cleanup are still important because automation can help with efficiency, but governance still needs ongoing attention.
What is most valuable?
Single sign-on is the most valuable feature I find in OneLogin. From a user perspective, it makes daily work easier because employees do not have to remember different credentials for multiple applications. It improves productivity, but it also reduces password reset requests from the IT team, which can become a frequent support issue.
Another useful feature is automated provisioning and de-provisioning. Once users are linked to a role or group, application access could be assigned more effectively, and access removal becomes more controlled during offboarding. I would also mention MFA, multiple factor authentication, and adaptive authentication. Having an additional authentication step for higher-risk logins adds an extra security layer without applying the same restriction everywhere.
One practical advantage is the large application integration catalog because it simplifies connecting common enterprise applications. At the same time, in a real environment, there are still gaps that no identity platform fully solves. Modern cloud applications usually integrate smoothly, but some legacy systems or applications without proper federation support can still require manual processes. I have had situations where offboarding for non-integrated systems needed separate tracking, which can create security and audit concerns if not monitored properly.
What needs improvement?
OneLogin works well for centralized identity and access management, but there are a few areas where I think improvements could help, especially in larger or more complex environments. One area is integration with legacy or highly customized applications. Modern cloud applications are usually easier to connect, but older systems can still require additional configuration or workarounds. Having more flexibility and simpler integration options for those cases would help. I think reporting and visibility could also always improve. Organizations often want more detailed insight around user activity, access patterns, and audit information without needing additional tools or custom work. Another area is simplifying administration for complex environments. As companies grow, role structures and access policies can become difficult to manage. Small changes can sometimes have a wider impact and clear visibility into access relationships and dependencies would be useful. I would also say this is not only OneLogin's challenge but an industry-wide one. Balancing security and user experience is crucial. Organizations want stronger authentication and tighter controls, but users also want fast and simple access. Finding that balance is still something many identity platforms continue to improve.
For how long have I used the solution?
I have been using OneLogin for the last four years.
What do I think about the stability of the solution?
In my experience, I would describe OneLogin as generally stable for day-to-day operations. Most of the time, authentication, SSO, and user access processes work consistently, and users typically do not notice issues during normal usage. From an operational perspective, stability is especially important because identity platforms become a centralized dependency. If OneLogin has an issue, users can suddenly lose access to multiple applications at the same time. So reliability matters a lot.
What do I think about the scalability of the solution?
In my experience, OneLogin handles scalability reasonably well and adapts well as the environment grows. As we add more users, applications, and access requirements, we do not see a major need to redesign OneLogin itself. The cloud-based model helps because scaling users and applications feels more like expanding configuration rather than adding infrastructure. OneLogin is designed for enterprise-scale identity management and has been used across large environments with sustainable authentication volumes.
How are customer service and support?
My experience with customer support is generally okay, but I would describe it as a mixture rather than consistently exceptional. For standard questions or routine issues, responses are usually helpful and documentation covers many common scenarios. So not every issue requires opening a ticket. User review platforms generally rate OneLogin support positively overall, though experiences vary across customers. We do contact support occasionally for things like integration questions or troubleshooting authentication behavior. For straightforward issues, the experience is usually fine. More complex cases sometimes take longer because they need additional investigation or escalation.
Which solution did I use previously and why did I switch?
Before moving to OneLogin, we were using a more traditional setup with a combination of directory services and some application-specific authentication methods, rather than a fully centralized identity platform. The main reason for moving was to simplify access management and improve the user experience. Managing authentication separately across multiple applications was becoming difficult as the environment grew. Users had multiple credentials to manage, onboarding required more manual work, and maintaining access consistency across systems became harder. OneLogin helped by bringing everything into a more centralized model with SSO and more automated identity processes. That reduced some operational overhead and gave better visibility into user access.
One thing I have noticed is that migrations themselves can also be challenging. Moving users or reconfiguring application integration and ensuring a smooth user transition takes planning. So even when a new solution is better long-term, there is still some effort involved during the change.
How was the initial setup?
The setup itself is generally straightforward for standard integration. One thing I notice, though, is that regardless of the cloud provider, the bigger challenge is usually not connecting OneLogin itself. It is maintaining consistency, access policies, and integration as the environment grows. Once organizations start using many applications across different teams, access management can become more complex over time.
What about the implementation team?
OneLogin is primarily deployed in a hybrid environment in our case. OneLogin itself is cloud-based, but we still have a mix of cloud applications along with some on-premises or legacy systems that need to be integrated. That setup works well because it allows us to use the benefit of OneLogin as a cloud identity platform while continuing to support existing systems that the organization could not immediately migrate. In reality, many companies are in a similar situation where everything is not fully cloud-native yet. One practical challenge with a hybrid setup is that it can add some complexity around integration, synchronization, and maintaining consistent access policies across different environments. Modern SaaS applications usually integrate more smoothly, while older systems may require additional configuration or ongoing maintenance.
What was our ROI?
We did see ROI, although I would describe it more in terms of operational efficiency and time saving rather than saying we reduce headcount. We do not suddenly need fewer employees. Instead, the IT team spends less time on repetitive tasks and more time on higher-priority work. If I had to give a rough estimate from what we observe, password and login-related support requests likely reduce around thirty to forty percent and onboarding provisioning activity becomes noticeably faster once automation and centralized access management are in place. OneLogin also reports that organizations commonly see significant reductions in help desk volume and provisioning effort.
What's my experience with pricing, setup cost, and licensing?
From my perspective, I am not directly involved in the procurement or contract negotiation, so I have more visibility into usage and implementation than the exact pricing details. But my general impression is that OneLogin's pricing model is fairly standard for an identity and access management platform and is typically based on factors like the number of users and the selected features. For setup costs, it all depends on the environment's complexity rather than just the product itself. If an organization mainly has standard cloud applications, the setup feels more straightforward. On licensing, one thing I notice is that organizations sometimes need to plan beyond current requirements. Features such as advanced security capabilities, additional integrations, or future growth can affect overall costs over time. One practical challenge I have heard discussed across teams is that OneLogin's license cost is often only part of the overall investment. Time spent on implementation, administration, and maintaining integration can also become important factors when looking at the total cost of ownership.
Which other solutions did I evaluate?
We looked at a few other identity and access management options during the evaluation process, including Okta, Microsoft Entra ID, and solutions like Ping Identity. The comparison was not only about features because most mature IAM platforms cover core capabilities such as SSO, MFA, and user lifecycle management. The bigger discussion was around things such as integration effort, compatibility with other existing environments, ease of administration, user experience, and overall cost. OneLogin felt like a reasonable balance for our requirements at the time. It covered the functionality we needed without making the environment feel overly complex.
What other advice do I have?
Single sign-on has the biggest impact for our team on a daily basis. It is one of those changes that people notice pretty quickly because employees no longer have to keep track of multiple usernames and passwords. Support tickets related to password resets and login issues also become less frequent. So the IT team spends less time on repetitive tasks and can focus on other work. For MFA and adaptive authentication, the experience is generally straightforward for users. The idea is not to challenge users for every single login. For example, if someone logs in from their usual device or normal location, the process feels almost seamless. But if there is a login attempt from a new device, unusual location, or something that looks higher risk, additional verification could be triggered. Initially, there is some adjustment because users sometimes see the extra authentication step as inconvenient. We had a few questions around things such as changing phones, registering devices, or getting prompted unexpectedly. But once people understand that it is mainly for protecting accounts rather than adding extra work, adoption improves.
One thing I would add about features generally is that technology itself is usually only part of the solution. Features can work really well, but user awareness and process consistency still matter. A common challenge in many organizations is balancing security and user convenience. If controls become too strict, users get frustrated. If they are too relaxed, security risks increase. Finding that balance is still something many teams continue to work on.
The reduction in password reset and login-related tickets was probably somewhere around thirty to forty percent over time. It was not an overnight change because users still need time to adapt, but once SSO becomes part of daily usage, the support load definitely becomes lighter. In terms of time-saving, onboarding that previously could take several hours, especially when multiple applications and approvals were involved, becomes much faster. A good portion of the access setup could be completed automatically based on roles or groups. So in many cases, users could get access the same day without as much back and forth between teams. From a security and compliance perspective, centralized access management also improves visibility. During audits, it becomes easier to review who had access to what because information was more consolidated instead of spread across different systems. We also reduce the chances of inactive accounts being missed during offboarding. I would not say OneLogin completely eliminates security incidents because many risks still come from phishing, weak user practices, or unmanaged applications outside OneLogin. But having MFA and stronger access control definitely reduces some common risks related to compromised passwords. One ongoing industry challenge is that the identity environment can become complex as organizations grow. Over time, role structures, exceptions, and temporary access requests can pile up. So governance still requires continued cleanup and review. The tool helps a lot, but maintaining long-term access hygiene is still something many companies struggle to get on top of.
As environments become larger, managing access can become more complex than expected. The initial setup may be straightforward, but over time, organizations add more applications, users, and exceptions, and maintaining everything can require ongoing effort. Another point that sometimes comes up is troubleshooting. When authentication issues happen, especially across multiple integrated applications, teams may want faster root cause visibility. Sometimes the issue is not with OneLogin itself. It could be an application configuration, directory sync issue, or policy setting, but identifying exactly where the problem is still takes time. I have also heard discussions around making automation smarter. For example, many organizations still rely on role-based rules, but in real environments, user responsibilities change frequently. There is still a broader industry challenge around dynamically adjusting access based on changing roles, projects, or user behavior without creating unnecessary complexity.
We primarily use Azure alongside OneLogin. It fits well with the environment because a lot of our applications and user management processes are already connected to the Microsoft ecosystem. OneLogin works as a centralized identity layer while integrating with different applications and services.
HR-driven identity management plays an important role because it helps connect employee lifecycle events with access management processes. Instead of IT manually tracking every employee change, information from the HR system acts as a source for identity-related actions. For example, when a new employee joins, HR data such as department, role, or job title helps trigger account creation and assign initial access automatically. Similarly, when someone changes roles internally, access can be updated based on the new position, and when an employee leaves the organization, offboarding actions can start more quickly. The biggest benefit is reducing manual effort and improving consistency. It also helps avoid situations where access requests are delayed or someone retains access longer than needed. I would say HR-driven identity management helps streamline employee handling significantly, but good data quality and coordination between HR and IT remain important for it to work effectively.
The impact of phishing-resistant device trust is mainly around strengthening security without creating a completely different login experience for users. Phishing-resistant device trust adds another layer of confidence by considering not only who the user is, but also whether the device itself is trusted and meets security requirements. From an authentication perspective, it helps make decisions more context-aware. For example, if a login comes from a recognized and compliant device, the process remains smoother. If the device is unknown or does not meet certain conditions, additional verification or restrictions could be applied.
I would rate OneLogin around eight out of ten overall. The reason I would not give it a perfect score is that it does a good job with core areas such as SSO, MFA, centralized access management, and improving user experience. It can save time and simplify identity-related tasks in day-to-day operations. I give it an eight because it performs well in the areas it is mainly designed for. It improves access management, simplifies authentication with SSO, and helps reduce manual effort for onboarding and offboarding. For day-to-day use, it provides real value and generates a better experience for both users and the IT team. The reason I did not rate it higher is not because of a major issue, but because there are still areas that can become challenging in real environments. As organizations grow, managing complex role structures, handling exceptions, and integrating older or custom applications can take more effort than expected. For OneLogin to move closer to a ten for me, I would like to see even stronger automation and easier management for complex environments. Better troubleshooting visibility would also help, where administrators can quickly identify whether an issue comes from policy, integration, synchronization, or the application itself.
Centralized onboarding has saved time and reduced errors but pricing still needs improvement
What is our primary use case?
Using OneLogin, our time reduces and the efficiency increases compared to the previous process. The time has been reduced and the efficiency is increased in the onboarding and offboarding process compared to my old method.
In the first onboarding, we can now do up to five or six employees, which is around 40 to 50 percent more efficient than before.
In a single click, the user loses all access and is terminated from all the applications, leaving no point of login left behind while using OneLogin.
How has it helped my organization?
It has helped in saving time, improving security, and reducing errors for our organization. Around 30 to 40 percent of time is saved since using OneLogin, and the error has been reduced because a single login manages all the applications, significantly cutting down on errors.
If one person has left the company but is still logged on to all the applications, leaving one application active might be a security risk for the company or result in data loss. Using OneLogin helps us to terminate access from all the applications in a single click.
What is most valuable?
OneLogin's dynamic nature helps in making my day-to-day work smoother. When I say dynamic, I mean the way OneLogin adapts to changes, such as when I have to change a user from one role to another because they received a promotion, and I have to change some credentials.
The single sign-on is good and easy to use, and the integration is also easy, which I appreciate.
What needs improvement?
For how long have I used the solution?
What do I think about the stability of the solution?
What other advice do I have?
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Single sign-on has simplified secure access and reduces password resets across our apps
What is our primary use case?
OneLogin is used for secure login and helps manage the difficulties faced while logging in by providing a better solution for one-click login. It is most efficient with single sign-on functionality.
OneLogin is used to sign in on different apps and platforms without requiring password entry repeatedly. Single sign-on functionality allows integration with Salesforce and other third-party applications, making OneLogin very efficient and secure.
The main use case is single sign-on and security for login credentials.
What is most valuable?
OneLogin offers flexibility and easy-to-use functionality with straightforward features.
Password vaulting and one-click termination to provide authorized access from government accounts are features that make OneLogin easy to use for my team. These features make it easy to use for my teammates as well.
Strong authentication is a quite underrated but very beneficial feature, as it provides very strong authentication whenever signing in on any website, which improves security. This is one robust feature of OneLogin.
OneLogin has impacted my organization positively by being simpler to use than other alternatives.
OneLogin has impacted my organization positively by reducing costs as well as increasing efficiency.
Fewer password reset requests is one measurable result that has happened after starting to use OneLogin, with significantly fewer password reset requests occurring.
Enforcing multi-factor authentication at the desktop level has positively impacted my organization.
What needs improvement?
OneLogin needs to improve as sometimes there are glitches in the software. When integrated with Salesforce, sometimes glitches and errors occur when trying to login through OneLogin. Compatibility with third-party software needs to be improved, and customer care needs to be more efficient and responsive.
The two major pain points are customer support needing improvement and the integration with third-party software needing to be more flexible.
For how long have I used the solution?
I have been using OneLogin for the last one year.
What other advice do I have?
OneLogin was deployed using public cloud with AWS as the cloud provider.
OneLogin was purchased through AWS Marketplace.
The user identity synchronization across directories functionality is very good, as user identity is mapped across different third-party software, increasing workflow and making it more manageable and fluid.
The seamless end-user experience for signing in and authenticating is very good when logging in using OneLogin, providing a seamless experience and quite good user experience.
Vigilance AI has not been used yet, but my organization is working on it and will surely implement it in the coming few months.
I am not very familiar with the HR functions, so I do not have any knowledge about these features.
My overall review rating for OneLogin is 9 out of 10.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Centralized access has improved security and streamlines onboarding with automated workflows
What is our primary use case?
OneLogin is primarily used for identity and access management, including single sign-on, multi-factor authentication, and centralized user authentication across multiple applications and systems.
A common day-to-day use of OneLogin is managing secure access to multiple cloud applications through single sign-on. Employees can log in once and securely access tools including email, collaboration platforms, and internal applications without needing separate credentials for each service. During employee onboarding and offboarding, user accounts and access permissions could be provided or removed quickly through centralized identity management, which reduced manual work for the IT team and improved overall security.
What is most valuable?
OneLogin's best features include single sign-on, multi-factor authentication, and centralized identity management capabilities. These features make it much easier to manage secure access across multiple applications while improving the overall user experience. OneLogin's wide range of integrations with cloud applications, directories, and security tools also makes deployment and day-to-day management much more efficient for IT teams.
The single sign-on feature has made the biggest difference for our team. It simplified accessing multiple applications, allowing users to authenticate once and securely access all the tools they need from a centralized portal. This also made access management more consistent and secure across the organization.
OneLogin has positively impacted our organization by improving both security and operational efficiency. The platform has helped our IT team automate user provisioning and access management tasks, which reduced manual administrative work and improved consistency during onboarding and offboarding. Overall, it strengthened security through multi-factor authentication while improving the user experience across the organization.
Noticeable improvements were observed after implementing OneLogin. Password-related support requests were reduced significantly because employees could securely access multiple applications through single sign-on. The use of multi-factor authentication strengthened security and helped reduce the risk of unauthorized access.
What needs improvement?
OneLogin could be improved with a more intuitive admin interface and simpler configuration for advanced integrations and policies. Some setup and troubleshooting processes can be slightly complex for new administrators. More customizable reporting, enhanced analytics, and faster customer support response times for complex technical issues would also be helpful.
Another area where OneLogin could improve is deeper customization for user access workflows and more flexibility in policy management for large enterprise environments. Better documentation for advanced configuration and more detailed real-time monitoring features would also help administrators troubleshoot issues and manage security issues more effectively.
For how long have I used the solution?
I have been working in my current field for the last 5.5 years.
What do I think about the stability of the solution?
OneLogin has not experienced stability issues.
What do I think about the scalability of the solution?
OneLogin has scaled well as our organization and user base has grown. It handles an increasing number of users, applications, and authentication requests efficiently while maintaining reliable performance and centralized access management.
How are customer service and support?
Customer support is good.
How was the initial setup?
The initial setup process was straightforward and the platform integrated well with our existing infrastructure and applications.
What was our ROI?
A positive return on investment has been seen with OneLogin. The biggest benefits were reduced password-related support requests, faster onboarding and offboarding processes, automated user provisioning, and centralized access management.
What's my experience with pricing, setup cost, and licensing?
The experience with OneLogin pricing, setup cost, and licensing was very positive. The initial setup process was straightforward and the platform integrated well with our existing infrastructure and applications.
What other advice do I have?
The integration of phishing-resistant device trust in OneLogin has significantly strengthened our authentication process by ensuring that only trusted and verified devices can access sensitive applications and resources. It added an extra layer of security beyond passwords and standard MFA, helping reduce the risk of phishing attacks and unauthorized access.
Our impression of OneLogin has been very positive in terms of end-user experience. The single sign-on functionality makes accessing multiple applications simple and convenient, allowing users to log in once and securely access all the tools they need without repeatedly entering credentials.
For organizations considering OneLogin, planning the identity and access management strategy clearly before deployment and fully utilizing its SSO, MFA, and authorization automation features is recommended. It is especially valuable for organizations managing multiple applications and users because it improves both security and user experience while reducing administrative workload.
Our impression of the user identity synchronization across directories feature in OneLogin is very positive. It helps keep user identities, group memberships, and access permission consistent across multiple directories and connected applications, which greatly simplifies identity management. It has also helped improve accuracy and consistency in access control across both cloud and on-premises systems.
The review rating for OneLogin is 10 out of 10.
Centralized access has improved secure sign-on and simplifies automated user lifecycle management
What is our primary use case?
I primarily use OneLogin for Identity and Access Management, including Single Sign-On (SSO), Multi-Factor Authentication, and centralized user access control across multiple business applications.
A common day-to-day use of OneLogin is managing employee access to cloud applications through Single Sign-On. Team members can securely access tools like email, collaboration platforms, and internal applications using one set of credentials, which improves convenience and reduces password-related issues. I also use it regularly for enforcing Multi-Factor Authentication and quickly provisioning or de-provisioning user access when employees join or leave the organization.
How has it helped my organization?
OneLogin has positively impacted my organization by improving both security and user convenience. The centralized access management and Single Sign-On features reduce password issues, simplify user authentication, and improve productivity for the employees.
I have seen noticeable improvements by implementing OneLogin. Password-related support requests were reduced because employees could access multiple applications using Single Sign-On, which saved time for both users and the IT team. Security also improved through centralized access control and Multi-Factor Authentication, helping reduce the risk of unauthorized access while making user onboarding and offboarding much faster and more consistent.
What is most valuable?
The best features of OneLogin in my experience are its Single Sign-On, Multi-Factor Authentication, and centralized identity management capabilities. The platform makes user management simple while improving security across multiple applications and environments. Another standout feature is automated user provisioning and de-provisioning, which helps streamline onboarding and offboarding processes.
The Single Sign-On feature of OneLogin has had the biggest impact for my team. It simplified access to multiple applications to one secure login, which improved user experience and reduced password-related support requests for the IT team. It also improved productivity because employees could access the required tools faster while maintaining strong security through centralized authentication and access control.
Another valuable aspect of OneLogin is how easy it is to integrate with different cloud applications and directory services. The centralized dashboard and automated user management features make administration much more efficient, especially for growing organizations with multiple users and applications.
The integration of phishing-resistant device trust in OneLogin has strengthened my authentication process by adding an extra layer of security beyond passwords and standard MFA. It helps ensure that only trusted and verified devices can access sensitive applications, which reduces the risk of phishing attacks and unauthorized access.
My impression of the user identity synchronization across directory feature in OneLogin has been very positive. It helps keep user information consistent across different directories and applications, which simplifies identity management and reduces manual administrative work.
HR-driven identity management in OneLogin plays an important role in streamlining employee onboarding and offboarding processes in my organization. By integrating HR systems with identity management workflows, user accounts and access permissions can be automatically created, updated, or removed based on employee status changes.
What needs improvement?
OneLogin could be improved by offering a more intuitive admin interface and simpler configuration for advanced features and integrations. Some setup and troubleshooting processes can be slightly complex for new administrators. It would also be helpful to have more detailed reporting, faster support response times, and additional customization options for access policies and user management workflows.
For how long have I used the solution?
I have been working in my current field for the last seven months.
I have been using OneLogin for the last six months.
What do I think about the stability of the solution?
OneLogin has not presented any stability issues for my organization.
What do I think about the scalability of the solution?
OneLogin has scaled well as my organization and user base has grown. It has been able to handle increasing numbers of users, applications, and authentication requests without major performance issues. The centralized identity management and automation features made it easier to manage access across expanding cloud and on-premises environments, which helped maintain efficiency as my infrastructure became more complex.
How are customer service and support?
I have not experienced any customer service issues with OneLogin.
How was the initial setup?
My experience with OneLogin pricing and licensing was generally positive. The setup process was straightforward and the licensing model was flexible enough for my organization's needs. While the pricing can be slightly premium compared to some alternatives, the security, automation, and ease of management provide good overall value.
What was our ROI?
I have seen a positive return on investment with OneLogin. The biggest benefits were time saving and reduced administrative workload through automated user provisioning, centralized access management, and Single Sign-On. I also saw fewer password-related support requests and faster onboarding and offboarding processes, which improved overall efficiency and helped the IT team focus on higher-priority tasks.
What other advice do I have?
My impression of OneLogin has been very positive in terms of end-user experience. The Single Sign-On functionality makes accessing multiple applications simple and convenient, allowing users to authenticate once and securely access the tools they need without repeatedly entering credentials. The login process is generally smooth and reliable, and features such as Multi-Factor Authentication are integrated in a way that maintains security without creating too much friction for users.
I would suggest for organizations considering OneLogin to clearly plan their Identity and Access Management requirements before deployment and take advantage of its automation and integration capabilities from the beginning. I would also recommend spending some time on proper configuration and user training to get the most value from the platform. I would rate OneLogin a ten out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Single sign-on has improved security and simplifies managing access across all business apps
What is our primary use case?
OneLogin's main use case is in a company where employees use multiple applications like Microsoft 365, Salesforce, VPN, and HRMS. Without OneLogin, employees would need a separate username and password for every application. By implementing OneLogin, the organization can enable SSO, which is Single Sign-On. Employees log in once and securely access all the authorized applications from one dashboard.
For example, if an employee leaves the company, the IT team can disable the OneLogin account once, and access to all the connected applications is automatically revoked. This improves security, saves administrative time, and also reduces the chances of unauthorized access. Overall, OneLogin improves productivity, strengthens security, and simplifies user management.
For the main use case, another important aspect is MFA, which adds an extra security layer.
How has it helped my organization?
OneLogin has positively impacted us by saving time, and it also reduces administration work.
The biggest impact was the reduction in password-related issues because employees could access multiple applications using SSO. This reduced helpdesk tickets and also saved IT time. Apart from this, the organization benefited through better security, less administrative effort, and reduced downtime for users. There is also a better user experience.
Time has been saved significantly. It is quite beneficial because it helps the organization save both time and cost.
What is most valuable?
The best features OneLogin offers are SSO, basically Single Sign-On, where a user can access multiple applications with one login. As I mentioned, MFA is there, which adds an extra security layer. Then, there is directory integration, which works well with Active Directory and also LDAP. Apart from this, there is a centralized access control dashboard that is easy for administration to manage users and permissions.
For centralized day-to-day tasks, we can basically use it for monitoring purposes. It is easy for administration. We can see and monitor users as needed. Whatever permissions we have to give, for example, if an organization has applications like Outlook, VPN, Salesforce, or any other cloud services, the administrator does not need to log into each application individually to manage users. Everything can be controlled from the OneLogin dashboard. I can add or remove users, reset passwords, and give or revoke application access anytime I want. Apart from this, I can monitor login activities.
What needs improvement?
In terms of improvement, there is not much to improve, but the biggest improvement was the reduction of password-related issues because employees could access multiple applications. Overall, the organization's experience is good regarding the improved security and reduced administrative effort. Better productivity is evident. OneLogin is a strong IAM solution with minimal areas for improvement.
For how long have I used the solution?
I have been using OneLogin for the last 1.5 years.
What do I think about the scalability of the solution?
OneLogin is scalable, which is good and better for the future.
How are customer service and support?
Customer support is excellent. It supports us every time, 24/7.
What other advice do I have?
I would recommend OneLogin because it is user-friendly, secure, and scalable. It simplifies identity management for IT teams while giving users a smooth login experience. OneLogin is very effective in improving both security and operational efficiency.
I have already mentioned that it provides better security. It is also reliable and very useful for an organization managing multiple applications and users. My review rating for OneLogin is 9 out of 10.
Centralized authentication has improved secure access and simplified daily logins for all employees
What is our primary use case?
One practical example of how we use OneLogin for centralized authentication and secure access management in our organization is for centralized access to multiple enterprise and cloud-based applications through single sign-on. Instead of maintaining separate credentials for different platforms, OneLogin allows authentication through a single centralized identity system. When employees log into the organization environment, they can securely access authorized applications using a single authentication process combined with MFA. This simplifies the login experience for users while improving security by enforcing centralized access policy and strong authentication control.
We also use OneLogin for role-based access management and user provisioning. When a user joins the organization or changes roles, access permissions can be managed centrally, helping ensure users only receive operational accesses based on business requirements.
We have used Smart Factor Authentication to adjust authentication flows based on login risk scores, and it has been very effective in balancing security and usability. What stood out most is that low-risk users can log in with minimum friction while suspicious login attempts automatically trigger additional MFA checks or access restrictions. This reduces unnecessary MFA prompts for regular users while still strengthening protection against risky access attempts, which improved both user satisfaction and overall security posture.
The integration of phishing-resistant Device Trust has strengthened our authentication process by ensuring that only verified and trusted devices can access company resources. It significantly reduces the risk of credential phishing and unauthorized access. Overall, it improves confidence in remote access security while supporting a smoother and more secure user experience for day-to-day logins.
We have used adaptive login flows with Vigilance AI, and they significantly improved our ability to detect risky behavior and respond dynamically during authentication. For example, low-risk logins usually proceed smoothly while suspicious items trigger stronger MFA challenges or access restrictions, helping us improve security without creating unnecessary friction for normal users.
What is most valuable?
For our team, the seamless single sign-on feature stands out the most because it significantly reduces the hassle of managing multiple passwords and logging into different applications every day. It improves productivity since employees can access all the required tools through one secure login, which saves time and reduces login-related support tickets. In daily workflow, it made onboarding new users much faster and created a smoother experience for both remote and in-office teams.
OneLogin provides the most value in environments where the organization needs centralized authentication, MFA, SSO, and simplified access management across multiple cloud and enterprise applications.
OneLogin has positively impacted our organization by improving both security and operational efficiency. Since implementation, we have noticed fewer password reset requests, faster onboarding and offboarding of employees, and smoother access management across multiple applications. It also helped enhance user experience for employees while giving the IT team better visibility and control over authentication and security policies.
We have seen a positive return on investment primarily through reduced administrative workload, improved authentication efficiency, and time saving for both users and the IT team.
What needs improvement?
OneLogin is a strong identity and access management platform, but there are a few areas where improvement could enhance the overall experience and functionality. One area is the user interface and the administrative dashboard experience. While the platform is generally manageable, some advanced configuration and policy management tasks can feel complex, especially for organizations managing large environments with multiple integrations. Another area of improvement is integration flexibility and support for certain third-party legacy applications where additional customization and configuration may sometimes be required.
For how long have I used the solution?
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
How are customer service and support?
Which solution did I use previously and why did I switch?
Before choosing OneLogin, we did not evaluate any other options.
What was our ROI?
What's my experience with pricing, setup cost, and licensing?
What other advice do I have?
My impression of OneLogin's user identity synchronization across directories functionality is very positive.
My impression of OneLogin's ability to provide a seamless end-user signing and authentication experience is very positive.
I recommend organizations first clarify and evaluate their authentication access requirements before implementation. OneLogin provides the most value in environments where organizations need centralized authentication, MFA, single sign-on, and simplified access management across multiple cloud and enterprise applications. Smart Factor Authentication provides a good balance between security and usability, especially in environments where organizations want strong authentication control without creating unnecessary friction for users.
I give this review a rating of ten out of ten.
Centralized access management has strengthened authentication and simplified daily user workflows
What is our primary use case?
My main use case for OneLogin is managing secure user authentication and single sign-on across multiple business applications and for user provisioning, user control, and multi-factor authentication.
A specific example of how I use OneLogin for those purposes in my day-to-day work includes identity and access management, especially for single sign-on and secure user authentication across multiple applications and services.
I do use the solution's Smart Factor Authentication to adjust authentication flows in real-time depending on the risk score associated with the login attempt, and I assess it as very effective from a security perspective because high-risk or unusual login attempts trigger stronger authentication controls. The balance between security and usability is one of the strongest points of Smart Factor Authentication because it improves protection while minimizing friction for the end user in day-to-day operations.
My impression of the user identity synchronization features in OneLogin is very positive; it works well for synchronizing users across different directories such as Active Directory, LDAP, cloud directories, and HR systems.
The integration of phishing-resistant device trust impacts my authentication processes by reducing the risks of phishing-based attacks, credential theft, and unauthorized access because authentication decisions are based not only on passwords but also on device trust and user behavior.
I have not used the adaptive login flows with Vigilance AI.
When employees change departments or leave the organization, access permissions and accounts are automatically updated or revoked, although I do not use HR-driven identity management.
What is most valuable?
I would like to add that the multi-factor authentication features in OneLogin help improve account security by adding an extra layer of protection beyond just passwords.
The best features OneLogin offers, in my opinion, include centralized identity and access management, a simple and user-friendly dashboard, secure remote access for users working from different locations, and good reporting and monitoring features for security and compliance.
Out of those features, I find myself relying on multi-factor authentication the most because it helps improve account security by adding an extra layer of protection beyond just passwords, and the centralized dashboard and automation features also help reduce manual work related to user provisioning, password management, and access review.
OneLogin has positively impacted my organization by allowing users to securely access multiple applications with a single sign-on, improving user experience, and reducing password-related issues and support tickets.
From a security perspective, features such as MFA and authentication help reduce the risks of unauthorized access and improve visibility into suspicious login activities, which contributes to measurable drops in password-related support tickets and time saved for our IT team after implementing OneLogin.
What needs improvement?
I believe support response time and troubleshooting for complex integrations could be improved in some cases for OneLogin.
I have noticed that customization of reports and alerts would make daily operations even smoother for security and IT teams.
For how long have I used the solution?
I have been using OneLogin for the last one year.
What do I think about the stability of the solution?
OneLogin is stable.
What do I think about the scalability of the solution?
OneLogin's scalability is quite stable and works well for growing organizations and enterprise environments; in our case, it handles an increasing number of user applications and authentication requests effectively.
How are customer service and support?
Customer support is good.
Which solution did I use previously and why did I switch?
Before implementing OneLogin, we were mainly using traditional Active Directory-based authentication, and we switched to OneLogin to get centralized identity and access management, single sign-on, and multi-factor authentication.
How was the initial setup?
My experience with pricing, setup cost, and licensing for OneLogin has been generally positive. The initial setup required proper planning, especially for integrating Active Directory, and we also saw value from reduced password-related support tickets.
What about the implementation team?
OneLogin was implemented through the organization's standards licensing and procurement process, and not purchased through the Azure Marketplace.
What was our ROI?
We have seen a good return on investment after implementing OneLogin, with the biggest improvements being reduced support efforts, faster user management, and stronger security controls.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing for OneLogin has been generally positive.
Which other solutions did I evaluate?
We evaluated a few other IAM and SSO solutions such as Okta and Microsoft Entra ID before choosing OneLogin.
What other advice do I have?
I would advise organizations considering OneLogin to first understand their application environment, user access requirements, and user provisioning needs, as this helps make the implementation smoother and more effective. I would rate this review as a 9.