Reviews from AWS customer

5 AWS reviews

External reviews

60 reviews
from and

External reviews are not included in the AWS star rating for the product.


    Mahesh dattatray malve

Centralized delegation has streamlined ad administration and now reduces privileged access risks

  • May 19, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Active Roles is for centralized Active Directory administration and life cycle management; most of the day-to-day activities revolve around user provisioning, account modification, and modification group management, access delegation, and handling the joiner mover leaver process.

One common example of how I use it for user provisioning in my daily work is during new employee onboarding; when HR shares the employee details, we use predefined templates in One Identity Active Roles to create user accounts with standard attributes such as department, designation, email format, and reporting manager, and based on the employee's role, the required security groups are automatically assigned instead of adding everything manually.

What is most valuable?

One important thing from day-to-day usage is that tools such as One Identity Active Roles are not just about account creation or access management; they help bring consistency into operations in large environments, as one small manual mistake in Active Directory can create bigger issues later, especially during audits or access reviews, and from my experience, the biggest practical benefit has been reducing repetitive manual work and maintaining standardized processes across teams.

The best feature of One Identity Active Roles is delegation administration with role-based access control; it allows an organization to give limited and controlled access to different IT teams without exposing full Active Directory permissions, which is very important from a security perspective.

Role-based access control has helped me mainly by reducing unnecessary privileged access, as earlier, in some environments, multiple admins had broad Active Directory permissions which increased the risk of accidental changes or unauthorized actions, and with One Identity Active Roles, this access could be delegated so teams only got permissions required for their tasks.

One thing worth adding about the features is that as identity and access governance become more important and organizations are handling hybrid environments with cloud and on-premise systems together, tools such as One Identity Active Roles help bring structure to that, especially for managing identity-related operations in a controlled way.

One positive impact we noticed from One Identity Active Roles was improved operational efficiency; earlier, many user management tasks were handled manually, which took more time and sometimes created inconsistencies, but using intelligent role-based workflows and automation made onboarding and access modification faster and more standardized, and we also saw better control over privileged access since permissions were delegated properly, reducing high-level administrative rights, which improved accountability and balanced security with operational speed.

Measurable improvements were noticed over time; for onboarding activities, the creation and access assignment process became much faster because templates and automation group assignments reduced manual work, and earlier, some requests would take a few hours depending on complexity, but with streamlined workflows, standard tasks became much quicker with fewer follow-ups, and from an audit perspective, preparing for access reviews or compliance checks was easier because all changes were logged properly, meaning the teams spent less time collecting manual evidence due to the clear audit process.

We utilized the fine-grained permission control feature of One Identity Active Roles, especially for delegating administration and limiting unnecessary privileged access; one major impact was better implementation of the least privilege principle, as instead of giving broad Active Directory permissions to multiple teams, access is assigned based on specific responsibilities, allowing the helpdesk team to perform limited tasks such as password resets or account unlocks, while application teams manage only their own security groups without broad administrative access.

The automation capabilities of One Identity Active Roles are one of its stronger areas, especially for reducing repetitive administrative tasks and improving consistency; a common example is user onboarding and offboarding workflows where predefined templates automatically populate user attributes, assign appropriate groups, and apply naming standards based on department or role, significantly reducing manual effort and minimizing configuration mistakes.

One Identity Active Roles has had a significant effect on the complexity and workload of day-to-day Active Directory administration, as earlier, many Active Directory-related tasks depended heavily on experienced administrators making direct changes in Active Directory users and computers, which increased the risk of inconsistency and human error; after implementing One Identity Active Roles, administrative tasks became more structured through delegated access, templates, and automated workflows.

What needs improvement?

One Identity Active Roles is strong operationally, but there are a few areas where it could improve, such as cloud-native integration; since many organizations are moving towards hybrid and multi-cloud environments, a tighter and simpler integration with more cloud platforms would enhance the overall experience.

One practical pain point I encountered around workflow customization and change management is that the tool is powerful, but when organizations want highly customized approval flows based on business logic, implementation can become complex and often relies on experienced administrators or consultants.

For how long have I used the solution?

I have been using One Identity Active Roles for three years.

What do I think about the stability of the solution?

One Identity Active Roles is a stable and reliable platform.

What do I think about the scalability of the solution?

From my experience, One Identity Active Roles is quite scalable, especially for medium to large enterprises that have a high volume of Active Directory administrative operations, as the architecture is designed to scale Active Directory delegation and administration.

How are customer service and support?

I found the customer support experience with One Identity generally positive, especially for enterprise-level support cases, as their support team has strong technical knowledge of Active Directory and IAM issues which is crucial for solving issues.

Which solution did I use previously and why did I switch?

Before using One Identity Active Roles, a large portion of administrative work was handled with native Active Directory tools and manual operational processes, and the main reason for moving towards One Identity Active Roles was the increasing complexity of user and access management as the organization scaled.

How was the initial setup?

The ease of integrating One Identity Active Roles with our existing IT infrastructure and directory services was moderately manageable, as it was not extremely difficult but required proper planning and understanding of the existing infrastructure; since our organization is heavily based on Active Directory and Microsoft technologies, the core integration was relatively smooth, allowing straightforward onboarding, synchronization, delegation, administration, and policy configuration once the architecture was properly designed.

What about the implementation team?

The implementation was done in-house by our IT team.

What was our ROI?

The organization has seen a positive return on investment, though the return on investment is more operational and security-focused than just a cost reduction; we also observed fewer operational errors related to account provisioning and group assignments due to standardized templates and workflows reducing inconsistencies, meaning even a small reduction in manual administration and troubleshooting effort adds up.

What's my experience with pricing, setup cost, and licensing?

Pricing for One Identity Active Roles is a bit on the higher side compared to other options in the market.

Which other solutions did I evaluate?

During the evaluation phase, I considered a few other IAM and Active Directory management solutions; the comparison was mainly about delegation capabilities, automation, and audit, including Microsoft's native Active Directory administration approach combined with scripting and Group Policy management, as well as tools such as Microsoft Entra ID, NetIQ, SailPoint, and CyberArk, depending on the use case.

What other advice do I have?

My advice for others looking into using One Identity Active Roles is to first understand your internal identity and access management processes before implementing the tool, and I recommend starting with clear delegation and automation goals instead of trying to customize everything immediately. I would rate this product an 8.5 out of 10.


    Himanshu Gawai

Automation has transformed user provisioning and governance and now streamlines daily administration

  • May 18, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Active Roles is Active Directory user and group management with automation and delegated administration. For example, in daily work, I use it to automate user provisioning, deprovisioning, manage security group access, and enforce naming and compliance policies across AD environments.

What is most valuable?

The best features for One Identity Active Roles in my experience are automation, delegated administration, RBAC, dynamic group management, and policy enforcement. I also appreciate centralized management for AD and Entra ID, along with auditing and change tracking which helps significantly during compliance reviews.

One Identity Active Roles has made the biggest impact in automation and delegated administration. It reduced manual AD tasks, minimized provisioning errors, and accelerated user onboarding and offboarding significantly in day-to-day operations.

One Identity Active Roles has positively impacted our organization by improving AD administration efficiency, reducing manual errors, strengthening access governance, and helping to standardize user provisioning and compliance processes across the team.

Since implementing One Identity Active Roles, we have seen faster user provisioning and deprovisioning, a noticeable reduction in manual AD efforts, and significant time savings for routine administrative tasks. It also improved audit readiness through better tracking and policy enforcement.

What needs improvement?

One Identity Active Roles could be improved with a more modern and intuitive UI, faster performance for large environments, simpler reporting customization, and smoother integration with cloud-native identity platforms and APIs.

For how long have I used the solution?

I have been using One Identity Active Roles for around a year, mainly for AD automation, user provision, group management, and access governance tasks.

What do I think about the stability of the solution?

One Identity Active Roles is very stable.

What do I think about the scalability of the solution?

The scalability of One Identity Active Roles is strong in my experience. It handles large and complex Active Directory environments efficiently, supports multiple domain and hybrid setups, and maintains performance even with a high number of users and objects when properly configured. It is well-suited for enterprise-scale identity management.

How are customer service and support?

Support for One Identity Active Roles is generally good. We have a positive experience with response time and technical assistance for both configuration and troubleshooting. Documentation and support portal resources are also helpful, though some complex issues may require escalations.

How was the initial setup?

The integration of One Identity Active Roles with our existing Active Directory and IT infrastructure was fairly straightforward. I connected smoothly with our directory services, and most configurations were manageable with standard setup and policies. Some advanced customization required learning, but overall, the integration effort was moderate.

What was our ROI?

We have clearly seen the ROI for One Identity Active Roles. We reduced manual Active Directory administration efforts, improved provisioning speed, and minimized errors that previously required rework. While exact figures vary, the biggest gains were in the time saved for routine tasks and reduced workload on the AD team, allowing us to focus on higher value work instead of repetitive user management.

What's my experience with pricing, setup cost, and licensing?

We found the pricing, setup cost, and licensing for One Identity Active Roles to be on the enterprise side, but justified by the capabilities. Initial setup, some planning, and integration effort with Active Directory and licenses are typically based on managed user objects. Overall, the cost made sense considering the automation, governance, and long-term reduction in manual administration.

What other advice do I have?

My advice for others looking into One Identity Active Roles is to clearly define your Active Directory structure and governance model before implementing it. Invest time in designing roles and workflows properly, as most of the value comes from there. Also, plan the integration carefully and involve the AD and security team early to ensure smooth adoption.

One Identity Active Roles has been a reliable and effective solution for managing Active Directory at scale. It improved security, reduced manual work, and brought consistency to the identity operations. The main value comes from proper design and automation setup, which pays off long-term. I would rate this review a 10 out of 10.


    AnandJoshi

Centralized identity automation has streamlined onboarding and improves access control

  • May 17, 2026
  • Review provided by PeerSpot

What is our primary use case?

Our main use case for One Identity Active Roles is centralized Active Directory management and user provisioning. It helps automate user account creation, group management, role-based access control, and administrative tasks while improving security and reducing the manual workload for IT teams.

One common use case for One Identity Active Roles is onboarding new employees. Our team uses it to automatically create Active Directory accounts, assign the correct groups and permissions based on their job roles, and apply standardized policies. This reduces manual configuration errors and speeds up the provisioning process for the IT teams.

What is most valuable?

The best features for One Identity Active Roles are automated user provisioning, role-based access control, delegated administration, and centralized Active Directory management. It also provides strong auditing and compliance capabilities, which help reduce manual administrative work, improve security, and maintain consistent access policies across the organization.

The feature we rely on the most in One Identity Active Roles is automated user provisioning. It has the biggest day-to-day impact because it streamlines employee onboarding and access management by automatically creating accounts, assigning groups, and applying permissions based on predefined roles. This saves time, reduces manual errors, and ensures users get the correct access quickly and consistently.

One Identity Active Roles has positively impacted our organization by simplifying Active Directory administration and reducing the amount of manual work required for user and access management. Automation improved onboarding efficiency, reduced configuration errors, strengthened access control, and helped maintain better compliance and auditing across the environment.

After implementing One Identity Active Roles, we saw a noticeable reduction in onboarding and account management time because many tasks became automated. It also helped reduce manual provisioning errors and improved consistency in access assignment. The auditing and reporting features made compliance review easier by providing better visibility into administrative changes and user access activity.

What needs improvement?

One Identity Active Roles could be improved with a modern and intuitive user interface, simpler configuration for complex workflows, and faster performance in large environments. Better cloud integration and easier customization for reporting and automation would also enhance the overall experience.

For how long have I used the solution?

I have been using One Identity Active Roles for the last 1.2 years.

What do I think about the stability of the solution?

One Identity Active Roles is stable.

What do I think about the scalability of the solution?

One Identity Active Roles scales very well for our organization with growing Active Directory environments and large user bases. It supports centralized management, delegated administration, and automation across complex enterprise infrastructure, making it effective for handling increasing numbers of users, groups, and access management tasks efficiently.

How are customer service and support?

Customer support was good.

How was the initial setup?

Integrating One Identity Active Roles with our existing IT infrastructure and Active Directory environment was relatively straightforward. Since it is designed to work closely with Microsoft environments, the core integration process was smooth. Though some planning and customization were needed for workflows, permissions, and integration with other enterprise tools. Overall, the deployment effort was manageable for our IT team.

What was our ROI?

We have seen a positive return on investment from One Identity Active Roles. Automation significantly reduced the time spent on user provisioning, onboarding, and access management tasks, which lowered the administrative workload and improved operational efficiency.

What's my experience with pricing, setup cost, and licensing?

Our experience with pricing and licensing for One Identity Active Roles was positive overall. The setup required some initial planning and configuration, but the licensing and cost were justified by the automation, reduced administrative workload, and improved access management efficiency it provided.

What other advice do I have?

My advice for organizations considering One Identity Active Roles is to plan the role structure, workflows, and delegation policies carefully before deployment. Taking time to align the automation and access controls with business processes helps to maximize efficiency, reduce administrative workload, and improve long-term identity management and security operations. I have given this review a rating of 10.


    Abhishek Pol

Automated governance has transformed onboarding and now cuts manual access work in half

  • May 17, 2026
  • Review provided by PeerSpot

What is our primary use case?

One Identity Active Roles is primarily used for centralized Active Directory management, user provisioning, and automated access control. It streamlines user account creation, role-based administration, group management, and policy enforcement while reducing manual administrative effort and improving security compliance.

A common day-to-day use case involves onboarding new employees. One Identity Active Roles automated user account creation, group assignments, mailbox setup, and permission allocation based on department rules. This process was previously manual and time-consuming, but One Identity Active Roles reduced setup time significantly and helped avoid configuration mistakes and permission inconsistencies.

Integrating One Identity Active Roles with the existing Active Directory environment was relatively straightforward. The solution integrates very well with Microsoft-based infrastructure and directory services, although the initial configuration and policy setup required careful planning and technical expertise for smooth deployment.

What is most valuable?

The best features of One Identity Active Roles are automated user provisioning, delegated administration, and role-based access control. It reduces manual Active Directory management tasks, improves security through fine-grained permissions, and provides centralized auditing and policy enforcement. The automation workflows and approval-based access management are especially valuable for maintaining consistency and compliance in large enterprise environments.

The automation workflows help the team automate repetitive identity management tasks such as user onboarding, account updates, password resets, and de-provisioning. Approval-based access management adds an extra security layer by requiring manager or admin approval before sensitive permissions or group memberships are granted. This reduces manual effort, minimizes human errors, improves compliance, and ensures proper access governance across the organization.

One Identity Active Roles significantly reduces the complexity and workload of Active Directory management by automating repetitive tasks such as user provisioning, group management, password resets, and access changes. It simplifies delegated administration and centralized policy management, allowing the IT team to handle Active Directory operations more efficiently with fewer manual errors.

What needs improvement?

One Identity Active Roles could be improved with a more modern and intuitive user interface, faster performance during large-scale directory operations, and simpler initial deployment and configuration.

For how long have I used the solution?

One Identity Active Roles has been used for approximately seven months.

What do I think about the stability of the solution?

One Identity Active Roles is stable.

What do I think about the scalability of the solution?

One Identity Active Roles is highly scalable and works well in medium to large enterprise environments. It can efficiently manage a large number of users, groups, and directory objects while maintaining centralized administration, automation, and policy enforcement across multiple domains and complex Active Directory infrastructures.

How are customer service and support?

Customer support for One Identity Active Roles is excellent.

Which solution did I use previously and why did I switch?

The organization mainly consolidated Active Directory administration, user provisioning, access governance, and role-based access management using One Identity Active Roles. It helps centralize identity management tasks that were previously handled through multiple manual tools and scripts.

How was the initial setup?

Integrating One Identity Active Roles with the existing Active Directory environment was relatively straightforward. The solution integrates very well with Microsoft-based infrastructure and directory services, although the initial configuration and policy setup required careful planning and technical expertise for smooth deployment.

What about the implementation team?

Careful planning of the initial deployment and role structure before implementation is recommended. One Identity Active Roles delivers the most value when automation workflows, delegated administration, and access policies are properly designed according to organizational needs.

What was our ROI?

A clear return on investment was realized after implementing One Identity Active Roles. Automated provisioning and access management reduced manual administrative effort by nearly 50 to 60%, which saved significant onboarding time and lowered the number of access-related errors and support tickets.

What's my experience with pricing, setup cost, and licensing?

The pricing and licensing experience with One Identity Active Roles was generally reasonable for an enterprise IAM solution. Initial setup required some planning and technical resources, but the long-term operational efficiency and automation benefits provided good overall value.

What other advice do I have?

After implementing One Identity Active Roles, user provisioning and access management time was reduced by nearly 50 to 60%. The automation workflows helped lower manual configuration errors and improved compliance by maintaining proper approval trails and access governance records.

The automation capabilities of One Identity Active Roles are impressive because they significantly reduce repetitive administrative work and improve consistency. Employee onboarding workflows were automated, so new users automatically receive the correct accounts, group memberships, and permissions based on their department and role. Automated de-provisioning is also used to quickly disable accounts and revoke access when employees leave the organization, improving both efficiency and security.

The review rating provided for One Identity Active Roles is 10 out of 10.


    Nitin Yadav

Structured automation has transformed directory tasks and now speeds secure user onboarding

  • May 15, 2026
  • Review provided by PeerSpot

What is our primary use case?

One Identity Active Roles is my primary solution for managing Active Directory efficiently and securely, with a focus on day-to-day tasks such as user account credentials, password reset and account unlock, group membership management, and automating AD tasks.

When a new employee joins, I use One Identity Active Roles to create the AD account using a template and automatically assign groups based on department, set mailbox and permissions, apply naming conventions, and policy.

What is most valuable?

One Identity Active Roles offers me several best features, including automation workflow, which saves a lot of manual AD work during onboarding and offboarding, and its role-based delegations that allow the help desk to perform limited tasks without full admin rights, as well as change history and auditing that make it easy to track who can change what in AD.

The automation feature has made the biggest difference in my day-to-day work, which assists in designing auditing benefits. Tasks such as user onboarding, offboarding, group assignment, and mailbox provisioning are significantly improved.

One Identity Active Roles has positively impacted my organization by enabling faster onboarding and offboarding through automations, reducing manual AD errors and permission mistakes, and lightening the workload for the infrastructure help desk team. Tasks that used to take 20 to 30 minutes manually can now be completed within 5 to 10 minutes.

The time savings facilitated by One Identity Active Roles have allowed my team to focus more on higher-value work instead of repetitive admin tasks. Instead of spending hours on account provisioning, password issues, or manual permission changes, the team can now concentrate on projects, security improvement, and user support, which has also reduced stress during busy periods because workflows are standardized and less error-prone.

What needs improvement?

One Identity Active Roles could be improved with better cloud-native management and SaaS options, simpler reporting, and easier customization.

I wish for simpler reporting and easier customization as additional needed improvements.

For how long have I used the solution?

I have been using One Identity Active Roles for the last one and a half years.

How was the initial setup?

I assess the ease of integrating One Identity Active Roles with my existing IT infrastructure and directory services as generally good, as it integrates well with Active Directory, making the core setup straightforward. However, the initial configurations, policy roles, and workflows are complex and require AD expertise. Once deployed, day-to-day operations and synchronizations are quite reliable.

What other advice do I have?

One Identity Active Roles has significantly reduced both the complexity and workload of administrative tasks related to Active Directory, particularly for data tasks such as user creation, group changes, and account management.

My experience with the delegation of administrative tasks through One Identity Active Roles has been that it has made the workflow much more structured and controlled, with tightly scoped permissions so users receive only what they need.

My main advice to others looking into using One Identity Active Roles is to properly plan your directory structure first before configuring anything. It is essential to invest time in establishing an appropriate Active Directory structure beforehand and to use the least privilege design as a default concept. I would rate my overall experience with One Identity Active Roles as a nine out of ten.


    Nishant Patil

Role-based administration has streamlined onboarding, reduced errors, and improves security

  • May 14, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Active Roles is role-based administration, where different IT teams can give limited permission based on their responsibilities, which improves security and control.

I can give you a specific example of how I use role-based administration with One Identity Active Roles: when a new employee joins a company or organization, One Identity Active Roles can automatically create the user account, assign the required groups, mailbox, and permissions based on the employee's department. Similarly, when an employee leaves, access can be disabled quickly from one place. This saves time and reduces security risk.

What is most valuable?

In my opinion, the best features One Identity Active Roles offers include centralized Active Directory management, role-based access control, easy password management, auditing and reporting. Additionally, it reduces manual administrative tasks.

I find myself relying on centralized management the most out of those features, as the IT team can manage all user groups, permissions, and Active Directory related tasks from one single platform instead of handling everything manually from different servers or tools. With One Identity Active Roles, administrators can create users, reset passwords, assign permissions, manage groups, and disable accounts.

One Identity Active Roles has impacted my organization positively by reducing manual work, improving security, saving administrative time, and reducing human errors. The best feature I can highlight is that the organization helps in reducing human error and standardizing the user management process. Apart from this, it enhances overall operational efficiency.

What needs improvement?

One Identity Active Roles is a very strong solution for Active Directory management and automation. I do not have improvements to suggest for this product since I have been using it and feel better about it. I do not wish to add more about needed improvements, even small things that could make my experience smoother.

For how long have I used the solution?

I have been using One Identity Active Roles for seven to eight months.

What do I think about the stability of the solution?

One Identity Active Roles is stable.

What do I think about the scalability of the solution?

For scalability, I find it good for the future.

How are customer service and support?

My impression of customer support is good. I can rate the customer support as an eight on a scale of ten.

Which solution did I use previously and why did I switch?

I have not used any other solution before One Identity Active Roles. I have not used or evaluated any other options before choosing One Identity Active Roles.

How was the initial setup?

One Identity Active Roles is deployed on-premises only, with the deployment starting by installing the One Identity Active Roles server on a Windows server.

What was our ROI?

I cannot speak extensively on ROI, but I can mention that IT administrative effort was reduced, user onboarding and offboarding became faster, security and compliance improved, and the help desk workload decreased. Operational efficiency has been increased.

What's my experience with pricing, setup cost, and licensing?

Regarding pricing, my experience is that things are much higher priced, so pricing should be less.

What other advice do I have?

For those looking into using One Identity Active Roles, my advice is that for time-consuming manual work, One Identity Active Roles can save time and reduce human errors. It is much easier, much more secure, and more efficient for organizations. I would rate this review a nine overall.


    Sonusingh Singh

Centralized delegation has transformed daily directory tasks and now streamlines secure access control

  • May 14, 2026
  • Review provided by PeerSpot

What is our primary use case?

Our main use case for One Identity Active Roles is centralized Active Directory administration and user lifecycle management. We primarily use it for automated user provisioning and de-provisioning, role-based access control, group management, and delegating administrator tasks securely without giving full domain admin rights.

One common scenario is delegating password reset and user account unlock tasks to the service desk team using One Identity Active Roles.

Another valuable aspect for our use case with One Identity Active Roles is automation and standardization. We use it to apply consistent user provisioning policies, naming conventions, and group assignments across the organization.

How has it helped my organization?

One Identity Active Roles has had a positive impact on our organization by improving security and simplifying Active Directory management. One of the biggest benefits has been secure delegation. We no longer need to provide full domain administrator access for routine tasks, which has reduced security risk and improved operational control. Help desk and regional IT teams can handle common user management activities within their assigned scope without affecting critical systems.

We have seen noticeable operational and security improvements after implementing One Identity Active Roles. One major improvement was the reduction in manual administrator effort for tasks such as user provisioning, password resets, group assignments, and account deactivation, which became much faster through automation and delegation. This has reduced the workload on senior administrators and improved response times for end users.

What is most valuable?

The best features of One Identity Active Roles are its automated delegation and centralized Active Directory management capabilities. Based on my experience, these are the most valuable features, including role-based access control and automated workflows, dynamic group management, change tracking, and auditing, hybrid environment management, and access templates and policy enforcement.

The feature that made the biggest difference for us with One Identity Active Roles is the role-based delegation. Automation workflow, automated user provisioning, de-provisioning, group management, and policy enforcement reduce manual work and human error. Dynamic group management, such as automatically adding or removing users from groups based on predefined rules and attributes, also contributes significantly.

What needs improvement?

One area where One Identity Active Roles could be improved is the user interface. A more modern and simplified interface would help reduce the learning curve and improve day-to-day management efficiency.

I would also appreciate improvements in cloud-focused management and integration. Many organizations now operate in a hybrid or cloud-first environment, so having more intuitive Microsoft 365 and Entra ID management workflows would improve operational efficiency.

There are still a few areas where improvements could be made to One Identity Active Roles, such as a more modern user interface experience. The interface is powerful but can be dated and complex. A cleaner, more intuitive UI would make daily admin tasks faster and easier, particularly for new administrators. It also needs a strong cloud-native experience and simplified workflows and reporting setup.

For how long have I used the solution?

I have worked in this field for the last seven years.

What do I think about the stability of the solution?

One Identity Active Roles is very stable.

What do I think about the scalability of the solution?

Its scalability is good.

How are customer service and support?

Customer support is good, and I rate customer support a nine.

Which solution did I use previously and why did I switch?

Before selecting One Identity Active Roles, we evaluated several other options, including Active Directory management and IAM solutions, such as Microsoft native tools, AD Entra, ManageEngine ADManager Plus, NetIQ, SailPoint, Okta, and JumpCloud. While other tools were very strong, especially in areas including governance and cloud IAM, One Identity Active Roles stood out for operational AD management, particularly secure delegation, which was our primary requirement. We chose One Identity Active Roles based on this evaluation.

How was the initial setup?

Integrating One Identity Active Roles with an existing IT infrastructure and directory services is generally of moderate difficulty. It is not overly complex, but it does require proper planning and Active Directory expertise.

What about the implementation team?

We have seen a clear return on investment from the implementation, mainly in time savings, reduced help desk load, and improved Active Directory operations. The typical ROI outcomes we have observed include time savings in user provisioning, which previously took twenty to thirty minutes per request. After implementing One Identity Active Roles, we reduced this to approximately five to ten minutes using templates and automation. This alone represents a sixty to seventy percent time reduction per request.

What was our ROI?

We have seen a clear return on investment from the implementation, mainly in time savings, reduced help desk load, and improved Active Directory operations.

What's my experience with pricing, setup cost, and licensing?

Our experience with pricing, setup costs, and licensing indicates that it is on the higher side but justified by the enterprise value. The licensing model is typically subscription-based and usually calculated based on the number of managed user accounts.

What other advice do I have?

Our experience with delegation in One Identity Active Roles has been very positive and has fundamentally changed how we manage Active Directory operations. With delegation, we have implemented role-based delegation to assign specific administrator responsibilities to different IT teams, such as the help desk team for password resets, account unlocks, and basic user attribute updates; the regional IT team for user and group management; and the AD administrator for higher-level tasks including policy changes, schema-related operations, and domain controller control.

The key advice I would recommend is to invest time in design before implementation, redefine your role model and UI structure, start small and expand gradually, and keep your delegation strategy role-based.

One Identity Active Roles has significantly reduced both the complexity and the workload for Active Directory administration in our environment. The impact on workload has been a major reduction in manual AD tasks. Routine activities such as user creation, password resets, group updates, and account disabling and enabling are now largely automated and delegated to various roles.

The automation capabilities are generally very strong, especially for Active Directory lifecycle management and role-based access control. One Identity Active Roles is designed to reduce manual IT administration by turning repetitive identity tasks into policy-driven and workflow-based automation.

Fine-grained permission control in One Identity Active Roles has been a key part of implementing least privilege access in our environment. We use it to define very specific permissions at a granular level, such as allowing the help desk team to reset passwords and unlock access only within their assigned organizational units, restricting group management rights so that users can only modify specific security or distribution groups, and limiting attribute-level changes. The impact on least-privilege implementation has been reduced over-privileged accounts, a strong security posture, clear accountability, better compliance alignment, and operational efficiency without risk trade-offs.

I rate this review an eight overall.


    Hunny Bhadana

Centralized automation has streamlined daily account administration and improved access control

  • May 14, 2026
  • Review provided by PeerSpot

What is our primary use case?

Our main use case for One Identity Active Roles is centralized Active Directory management and administrative automation. We use it mainly for user account management, group management, access control, and password-related tasks because it helps simplify daily Active Directory operations by allowing administrators and support teams to handle routine tasks through a controlled workflow instead of managing everything manually through native Active Directory tools. It is also useful for improving permissions, reducing manual errors, and maintaining better control over user provisioning and access-related activities.

One common example is user onboarding and access management for new employees. Earlier, creating accounts, assigning groups, configuring permissions, and updating access was mostly done manually through native Active Directory tools, which took more time and increased the chance of configuration mistakes. With One Identity Active Roles, the process becomes much more streamlined. We can use predefined workflows and delegated administration to create accounts. For example, recently during onboarding for multiple department users, the account creation, access creation, and access management process was completed much faster because the required permission and group policies were already standardized within Active Directory roles.

What is most valuable?

Overall, One Identity Active Roles has helped improve the efficiency and control of our Active Directory administration. It simplified many routine administrative tasks through centralized management, delegation, and automation, which reduced the manual workload for IT teams.

In my experience, some of the best features of One Identity Active Roles are centralized Active Directory management, delegated administration, automation workflows, and access control management. One of the most useful features is delegated administration because it allows specific teams or administrators to manage only the users or groups they are responsible for without giving unnecessary permissions. Another strong feature is policy-based management, which helps maintain consistency and better control over permissions and administrative activities.

Delegated administration has positively improved how responsibilities are handled within the IT team. Earlier, many Active Directory-related tasks had to be handled directly by senior administrators, even for routine requests like password resets, user updates, or group membership changes. With delegated administration, specific responsibilities can now be assigned to the appropriate support team with control permissions. This means teams can handle their own operational tasks without requiring full administrative access.

It has positively impacted the organization by improving efficiency, control, and consistency in Active Directory administration. It helped reduce the amount of manual work involved in routine administrative tasks such as user provisioning, access updates, and password management. Another positive impact was better operational efficiency because many repetitive tasks become standardized through workflow and delegated administration, which reduced administrative delays and minimized configuration errors. Overall, it made the identity and access management process more organized, secure, and easier for the IT team to manage on a daily basis.

What needs improvement?

In my opinion, One Identity Active Roles is a strong solution for Active Directory management, but there are still some areas where improvements could help. One area could be simplifying certain parts of the interface and administrative workflows, especially for new administrators who are still learning the platform. Some advanced configuration and policy management tasks can take time to fully understand, so a more streamlined user experience and easier navigation would be beneficial. It could also improve reporting and dashboard customization to provide more flexible visibility into administrative activities and access-related changes.

The reason I would not give it a full 10 is mainly because some advanced configuration and interface-related areas could still be more streamlined and user-friendly.

For how long have I used the solution?

I have been using One Identity Active Roles for the last one year.

What do I think about the stability of the solution?

One Identity Active Roles is stable in my experience. Once properly configured and integrated with the Active Directory environment, it has performed reliably for day-to-day identity and access management operations.

What do I think about the scalability of the solution?

In my experience, One Identity Active Roles is quite scalable.

How are customer service and support?

In my experience, the customer support experience has been generally good. For most technical issues or configuration-related queries, the support team was responsive and provided useful guidance.

I would rate the customer support an 8 to 10. Overall, the support experience was helpful, especially for technical guidance and issue resolution.

Which solution did I use previously and why did I switch?

I did not use any solutions previously. This is my first solution, and I have purchased it to manage Active Directory user updates, access updates, and group assignments from one standardized location.

How was the initial setup?

Overall, the integration process was relatively smooth because One Identity Active Roles integrates well with existing Active Directory environments. The deployment required proper planning, especially around directory structure, administrative roles, policies, and delegated permissions. However, technically, the integration itself was not difficult. Since it is designed to work closely with Active Directory, it aligned well with our existing directory service and administrative process. The initial configuration and policy setup required careful testing, but after implementation, the environment became much easier to manage operationally.

What was our ROI?

From an operational perspective, we have definitely seen a positive return in terms of time savings and administrative efficiency. While I was not directly involved in financial calculations or staffing decisions, technically, we noticed that many routine Active Directory tasks were completed much faster compared to manual administration. For example, user onboarding, group assessment, access updates, and password-related tasks became more streamlined through workflow and delegated administration. We also saw a reduced administrative workload and fewer permission-related errors because the process became standardized instead of being handled manually each time.

What's my experience with pricing, setup cost, and licensing?

While I do not have exact financial metrics, operationally, we noticed a clear improvement in efficiency and reduced administrative effort. For example, user onboarding and access provisioning tasks that previously required multiple manual steps became much faster through a standardized workflow and delegated administration. We also noticed fewer permission-related mistakes and better consistency in group assignment and access management because many tasks followed predefined policies. Overall, it improved productivity for the IT team and made daily Active Directory management more organized and efficient.

Which other solutions did I evaluate?

I have not chosen any other solutions. I was not directly involved in the product evaluation or final selection process, so I cannot comment in detail on all the solutions that were compared. Ultimately, One Identity Active Roles aligned well with our organization's operational and administrative requirements for identity and access management.

What other advice do I have?

My impression of the automation capabilities is very positive because they helped reduce repetitive manual administrative work and improved operational consistency. For example, during user onboarding, account creation, group assignment, and basic access provisioning could be handled in a more standardized and automated way instead of manually configuring each step through native Active Directory tools. It was also useful for handling tasks such as password-related operations, user attribute updates, and access modification requests more efficiently. The automation helped save time, reduce the chances of manual errors, and improved consistency across the administrative process.

Before implementation, many activities such as user provisioning, permission updates, group management, and account administration were handled manually through native Active Directory tools, which required more time and administrative effort. With One Identity Active Roles, many of these tasks became centralized, standardized, and partially automated through workflows and delegated administration. This reduced repetitive manual work for administrators and made day-to-day management more efficient and organized.

My advice would be to first properly understand your access management requirements before implementation. I would also recommend starting with a structured deployment approach and testing workflows. I would give this product an overall rating of 8 out of 10.


    Chetan Bhati

Centralized automation has streamlined onboarding, delegation, and secure access management

  • May 14, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for One Identity Active Roles is managing Active Directory users and groups in a centralized way, and I primarily use it for provisioning, access management, password reset, onboarding and off-boarding processes, and delegated administration.

During employee onboarding, I use One Identity Active Roles to create user accounts, assign the required group membership, apply department-based permissions, and configure account policies from a centralized console. For delegated administration, specific tasks such as password reset or basic account management can be assigned to a specific support team without giving them full domain admin access, which improves security and also reduces workload for senior administrators.

Apart from onboarding and access management, I also use One Identity Active Roles for account lifecycle management, such as disabling accounts during off-boarding and updating permissions during role changes. It helps with maintaining consistency through policy-based administration and reduces manual effort for repetitive Active Directory tasks.

What is most valuable?

A valuable feature of One Identity Active Roles is delegated administration because it allows different teams to handle specific tasks without giving full Active Directory access. I also find that centralized user and group management very useful since it simplifies onboarding, off-boarding, permission updates, and account management from a single interface. The strong feature is automation and workflow management, which helps reduce manual effort and improve consistency and minimize administrative errors.

Account creation, group assignment, and permission management can all be handled from one place instead of manually configuring everything in Active Directory, making it much faster. Delegated administration also makes support operations easier because basic tasks of password reset and account unlocks can be securely handled by the support team without requiring administrative privileges. These features improve visibility and help maintain better control over administrative changes.

One Identity Active Roles has impacted my organization by simplifying centralized Active Directory management and improving efficiency for user provisioning, access management, and routine administrative tasks. It also enhanced security through delegated administration because teams can perform specific tasks without needing full domain admin rights. Another positive impact is reduced manual errors and faster onboarding and off-boarding processes, which improved overall operational efficiency for my IT team.

What needs improvement?

Troubleshooting could be more streamlined when dealing with detailed administrative changes or resolving synchronization issues. Additionally, improving the overall performance and simplifying some workflow configurations would make day-to-day operations easier.

For how long have I used the solution?

I have been using One Identity Active Roles for around one year.

What do I think about the stability of the solution?

One Identity Active Roles has been a stable solution for day-to-day Active Directory administrative and identity management tasks in my experience, as I have been able to use it reliably for user provisioning, delegated administration, and access management with consistent performance. As with any enterprise solution, proper configuration and maintenance are important, but overall, it has been stable in my environment.

What do I think about the scalability of the solution?

One Identity Active Roles is scalable and is actually designed specifically for large enterprise environments and hybrid environments, so it has centralized multi-domain management tailored for large enterprises.

How are customer service and support?

Customer support for One Identity Active Roles is generally rated as good but not perfect, so it really depends on the type of issues and how my environment is set up.

Which solution did I use previously and why did I switch?

Previously, most of the administration was handled directly through native Active Directory tools and manual processes. My organization moved to One Identity Active Roles to improve centralized management, delegation, and automation, which also helped improve security and reduce manual workload through better control over permissions.

How was the initial setup?

The integration process was relatively easy because One Identity Active Roles integrates well with existing Active Directory environments. The initial setup and configuration required proper planning and understanding of the directory structure, but once configured, it worked well with the existing IT infrastructure, making the centralized management and policy-based administration easier to align with my current identity management process.

What was our ROI?

From an operational perspective, I have seen a positive return in terms of time-saving and administrative efficiency. For example, routine tasks of user onboarding, permission updates, and account management are completed much faster now compared to manual Active Directory administration. While I was not directly involved in financial calculation, it has definitely improved efficiency and reduced manual effort for my IT teams.

Which other solutions did I evaluate?

I was not involved directly in the product evaluation or selection process, so I cannot comment in detail on all the alternatives that were evaluated. However, from my understanding, the decision was mainly based on improving centralized Active Directory management.

What other advice do I have?

After using One Identity Active Roles, onboarding account management tasks become noticeably faster. For example, creating a user account and assigning permissions that previously took around fifteen to twenty minutes manually can be completed in just a few minutes through centralized workflows. I have also noticed fewer permission-related mistakes and improved consistency because policies and templates are applied in a standardized way.

My advice for anyone evaluating One Identity Active Roles is that if you are planning to use Active Roles, the most important thing to understand is that it is not just a tool; it is an identity management framework for Active Directory and hybrid environments. Success depends more on design and implementation than the product itself.

One Identity Active Roles is deployed in an on-premises environment integrated with my Active Directory infrastructure. I use One Identity Active Roles for Active Directory administration and identity management tasks, so it is mainly consolidated around centralized user management and delegated administration.

I have utilized the fine-grained permission control feature in One Identity Active Roles mainly through delegated administration, which helped implement least privilege principles by allowing teams to perform only the specific task required for their role, such as a password reset or account unlock, without providing full Active Directory administrative access. This improved security, reduced unnecessary privileged access, and helped maintain better control and accountability over administrative activities.

My impression of the automation capabilities is very positive because they help reduce repetitive manual administrative tasks and improve consistency in user management. For example, during onboarding, account creation, group assignment, and applying standard permissions can be handled through predefined workflows and policies, which saves time and reduces configuration errors. Automation also helped during off-boarding processes by quickly disabling accounts and removing access in a centralized way, improving both efficiency and security.

Administrative tasks related to Active Directory, such as user provisioning, group management, password reset, and access updates, become more streamlined and easier to handle. It also reduced manual workload for administrators because many repetitive tasks can be completed through workflows and delegated administration instead of handling everything directly in native Active Directory tools. It has significantly reduced the complexity of many Active Directory administrative tasks by centralizing management and automating routine operations.

I think the pricing structure will be suitable. I have given this review an overall rating of nine.


    Ujjwal Pal

Centralized identity management has improved onboarding speed and strengthened access governance

  • May 12, 2026
  • Review provided by PeerSpot

What is our primary use case?

One Identity Active Roles serves as my centralized Active Directory management and identity administration solution within our enterprise environment. The platform helps us streamline routing identity management tasks such as user creation, password management, account modification, and access governance, while reducing manual administrative effort.

How has it helped my organization?

One Identity Active Roles has positively impacted our organization by improving the efficiency, security, and consistency of identity and access management operations within the Active Directory environment. It also improves security and governance by enforcing role-based access control and provides better visibility into administrative activities through auditing and reporting capabilities.

We observed several operational improvements after implementing One Identity Active Roles, including user onboarding and administrative efficiency and access management consistency. One noticeable improvement was the reduction in onboarding and account provisioning time. Tasks such as creating user accounts, assigning group membership, and applying access permissions became much faster due to centralized management and workflow automation. This helped reduce delays for new employees and improved our overall productivity.

What is most valuable?

One Identity Active Roles offers several valuable features, but one of the best is centralized Active Directory management. Another strong feature is delegated administration, which allows our organization to assign specific administrative tasks to designated teams without granting full domain-level privilege.

When it comes to centralized Active Directory management, One Identity Active Roles simplifies user administration, group management, and access control from a single platform. This significantly reduces manual administrative effort in our enterprise environment.

One Identity Active Roles delivers role-based access control and auditing as additional strengths of the platform. Active Roles provides detailed visibility into administrative actions and helps support our compliance and governance requirements by maintaining audit trails and enforcing controlled access management.

What needs improvement?

One area of improvement is the user interface and overall usability. Some administrative functions and configuration can feel complex for new users, especially in large enterprise environments. A more modern and intuitive dashboard would make navigation and task management easier.

The other improvement would be better integration and support for hybrid and cloud-native identity environments, especially as our organization continuously moves towards cloud-based infrastructure and identity management solutions.

For how long have I used the solution?

I have been using One Identity Active Roles for approximately one to two years.

What do I think about the stability of the solution?

One Identity Active Roles is stable.

What do I think about the scalability of the solution?

The platform is capable of handling centralized administrative tasks across multi-user, group, organizational unit, and delegated administrative roles without significantly increasing operational complexity. As the environment grows, One Identity Active Roles helps maintain consistent identity governance and access management processes through automation and policy-based administration. One Identity Active Roles has demonstrated good scalability in our experience.

How are customer service and support?

Customer support is good.

Which solution did I use previously and why did I switch?

We did not use any previous solution before using One Identity Active Roles.

How was the initial setup?

The initial deployment and integration process required proper planning around directory structure, administrative roles, permission, and policy configuration, but the overall implementation was straightforward for our structured enterprise environment. The platform integrates well with our existing Active Directory infrastructure and helps centralize our identity management operations effectively.

What was our ROI?

We have seen a positive return on investment using One Identity Active Roles, mainly through reduced administrative workload, improved operation, time-saving, and identity management. We also observed fewer manual configuration errors after the implementation of One Identity Active Roles because the policy-driven access management process became centralized. This improved consistency in user provisioning, group assignment, and permission management. The platform also improved our audit readiness and compliance visibility by providing centralized reporting and tracking of administrative activities, which simplifies our internal governance and access review processes.

What's my experience with pricing, setup cost, and licensing?

The setup cost and pricing of One Identity Active Roles was generally positive for an enterprise identity and access management solution. The initial setup and licensing cost can be considerable depending on the size of the Active Directory environment. The setup process required proper planning around Active Directory integration. Licensing is typically based on organization environment and user requirement, so careful evaluation of scalability and future needs is important before deployment.

Which other solutions did I evaluate?

Before choosing One Identity Active Roles, we did not evaluate other options because what we wanted for Active Directory administrative management, One Identity Active Roles already had that feature in it, so we did not pursue other options.

What other advice do I have?

My advice to organizations considering One Identity Active Roles would be to first clearly assess the structure, identity governance requirements, and administrative workflows. The platform provides the most value where user provisioning, access management, and Active Directory administration have become complex or difficult to manage manually. Proper planning around delegated administration, role-based access control, and workflow automation is very important for successful deployment. I would also recommend starting with a well-defined access governance strategy and reviewing existing administrative permission before implementation. I would rate this solution an 8 out of 10.