+
+

Related Products

  • Uniqkey
    178 Ratings
    Visit Website
  • FusionAuth
    159 Ratings
    Visit Website
  • Cisco Duo
    1,360 Ratings
    Visit Website
  • Auth0
    907 Ratings
    Visit Website
  • Keeper Security
    1,696 Ratings
    Visit Website
  • ManageEngine ADManager Plus
    531 Ratings
    Visit Website
  • Kinde
    50 Ratings
    Visit Website
  • Veriam
    3 Ratings
    Visit Website
  • StrongDM
    91 Ratings
    Visit Website
  • Satori
    86 Ratings
    Visit Website

About

AWS Identity and Access Management (IAM) enables you to manage access to AWS services and resources securely. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources. IAM is a feature of your AWS account offered at no additional charge. You will be charged only for use of other AWS services by your users. IAM enables your users to control access to AWS service APIs and to specific resources. IAM also enables you to add specific conditions such as time of day to control how a user can use AWS, their originating IP address, whether they are using SSL, or whether they have authenticated with a multi-factor authentication device. Protect your AWS environment by using AWS MFA, a security feature available at no extra cost that augments user name and password credentials. MFA requires users to prove physical possession of a hardware MFA token or MFA-enabled mobile device by providing a valid MFA code.

About

Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams that need a comprehensive IAM solution to improve their process operations

Audience

IT teams in organizations around the world seekinga solution to manage their networks

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$1 per user per month
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Amazon
Founded: 1994
United States
aws.amazon.com/iam/

Company Information

Microsoft
Founded: 1975
United States
azure.microsoft.com/en-us/services/active-directory/

Alternatives

Alternatives

SailPoint

SailPoint

SailPoint Technologies
Passly

Passly

IDAgent

Categories

Categories

Authentication Features

Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On

Integrations

Access Auditor
Azure Marketplace
CentreStack
Chronicle SOAR
Clarity Security
DataClarity Unlimited Analytics
Indent
Josys
Lyftrondata
RadiantOne
Aline
Cherwell HR Service Management
Clarify
Compass
IT Portal
PolicyManager
Rizkly
ThreatAware
UbiCast
iVision Plus

Integrations

Access Auditor
Azure Marketplace
CentreStack
Chronicle SOAR
Clarity Security
DataClarity Unlimited Analytics
Indent
Josys
Lyftrondata
RadiantOne
Aline
Cherwell HR Service Management
Clarify
Compass
IT Portal
PolicyManager
Rizkly
ThreatAware
UbiCast
iVision Plus
Claim AWS Identity and Access Management (IAM) and update features and information
Claim AWS Identity and Access Management (IAM) and update features and information
Claim Active Directory and update features and information
Claim Active Directory and update features and information