Alternatives to Active Roles

Compare Active Roles alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Active Roles in 2026. Compare features, ratings, user reviews, pricing, and more from Active Roles competitors and alternatives in order to make an informed decision for your business.

  • 1
    ManageEngine ADManager Plus
    ADManager Plus is a simple, easy-to-use Windows Active Directory (AD) management and reporting solution that helps AD administrators and help desk technicians in their day-to-day activities. With a centralized and intuitive web-based GUI, the software handles a variety of complex tasks like bulk management of user accounts and other AD objects, delegates role-based access to help desk technicians, and generates an exhaustive list of AD reports, some of which are an essential requirement to satisfy compliance audits. This Active Directory tool also offers mobile AD apps that empower AD admins and technicians to perform important user management tasks, on the move, right from their mobile devices. Create multiple users and groups in Office 365, manage licenses, create Exchange mailboxes, migrate mailboxes, set storage limits, add proxy addresses, and more.
    Compare vs. Active Roles View Software
    Visit Website
  • 2
    SecurEnds

    SecurEnds

    SecurEnds

    SecurEnds cloud software enables the world’s most forward-thinking companies to automate: User Access Reviews, Access Certifications, Entitlement Audits, Access Requests, and Identity Analytics. Load employee data from a Human Resources Management System (e.g., ADP, Workday, Ultipro, Paycom) using built-in SecurEnds connectors or files. Use built-in connectors and flex connectors to pull identities across enterprise applications (e.g., Active Directory, Salesforce, Oracle), databases (e.g., SQL Server, MySQL, PostreSQL), and cloud applications (e.g., AWS, Azure, Jira). Perform user access reviews by role or attribute as frequently as needed. Application owners can use delta campaigns to track any changes since the last campaign. Send remediation tickets directly to application owners to perform access updates. Auditors can also be granted access to review dashboards and remediations.
  • 3
    Microsoft Entra ID
    Microsoft Entra ID (formerly known as Azure Active Directory) is a comprehensive identity and access management cloud solution that combines core directory services, application access management, and advanced identity protection. Safeguard your organization with a cloud identity and access management solution that connects employees, customers, and partners to their apps, devices, and data. Protect access to resources and data using strong authentication and risk-based adaptive access policies without compromising user experience. Provide a fast, easy sign-in experience across your multicloud environment to keep your users productive, reduce time managing passwords, and increase productivity. Manage all your identities and access to all your applications in a central location, whether they’re in the cloud or on-premises, to improve visibility and control.
  • 4
    JumpCloud

    JumpCloud

    JumpCloud

    JumpCloud® delivers a unified open directory platform that makes it easy to securely manage identities, devices, and access across your organization. With JumpCloud, IT teams and MSPs enable users to work securely from anywhere and manage their Windows, Apple, Linux, and Android devices from a single platform. Everything in One Platform Grant users Secure, Frictionless Access™ to everything they need to do their work however they choose. Manage it all in one unified view. Cross-OS Device Management Manage Windows, macOS, Linux, iOS, iPad, and Android devices. One Identity for Everything Connect users to thousands of resources with one set of secure credentials. Comprehensive Security Enforce device policies, patches, MFA, and other security and compliance measures. Automated Workflows Connect to whatever resources you need, including Microsoft Active Directory, Google Workspace, HRIS platforms, and more.
  • 5
    Netwrix GroupID
    The user accounts and groups in your Active Directory and Microsoft Entra ID (formerly Azure AD) provide access to your sensitive data and systems. But trying to manage groups and users manually is a huge burden on your precious IT resources and often leads to errors that create security vulnerabilities. Netwrix GroupID automates and delegates group and user management to ensure your directories remain current, empowering you to enhance security while increasing IT productivity. Create queries that dynamically determine group membership based on users’ current attributes. In addition, ensure any attribute change to a parent group is automatically reflected in its child groups. Automatically provision and deprovision user accounts by syncing data from an authoritative source such as your HRIS platform. Sync changes to groups and users across identity stores in near real time — without any third-party connector.
  • 6
    Microsoft Entra Verified ID
    Start your decentralized identity journey with Microsoft Entra Verified ID—included free with any Azure Active Directory (Azure AD) subscription. Microsoft Entra Verified ID is a managed verifiable credentials service based on open standards. Digitally validate identity information to ensure trustworthy self-service enrollment and faster onboarding. Quickly verify an individual’s credentials and status to grant least-privilege access with confidence. Replace support calls and security questions with a streamlined self-service process to verify identities. Ensure that credentials are interoperable and reusable with a solution that supports open standards. Confidently issue and verify workplace credentials, citizenship, education status, certifications, or any unique identity attributes in a global ecosystem designed for more secure interaction between people, organizations, and things.
  • 7
    DSRAZOR for Microsoft Cloud

    DSRAZOR for Microsoft Cloud

    Visual Click Software

    Reporting and Management for Microsoft 365. Azure Active Directory, SharePoint Online and Exchange Online. Single view vs multiple portal windows. Multi-Tenant Reporting and Management in single pane of glass! Azure Account Provisioning and Deprovisioning - Easily create and delete users with time saving options. Azure User and Group Reporting - Customizable User reporting to show exactly what you need! Azure User Management - Customizable User Management! Azure Group Membership Management - Easily add and remove members in a Group Azure Secure Permissions Delegation - Remove native change permissions for your helpdesk! Exchange Online Reporting - Easily document your Online Exchange Mailboxes. SharePoint Online Reporting - Easily document your Online SharePoint Sites. Company/Tenant Reporting and Management.
    Starting Price: $500 per year
  • 8
    PowerSyncPro

    PowerSyncPro

    PowerSyncPro

    PowerSyncPro is a directory synchronization and workstation migration software tool that helps IT teams synchronize, migrate, and manage identity data across multiple directory services, including on-premises Active Directory, Azure Active Directory (Entra ID), and hybrid environments with minimal scripting or manual intervention. The DirSync component enables seamless syncing of users, groups, and contacts between directories, supporting bi-directional password sync, SID history, and cross-tenant scenarios, so organizations can maintain unified identity stores during mergers, acquisitions, divestitures, or IT modernizations without prolonged downtime or complex tooling. PowerSyncPro uses a central “metaverse” design to import and compare directory data, run configurable synchronization logic, and apply changes consistently, offering pre-populated templates and rule-based controls to simplify configuration and reduce errors in large-scale migrations.
  • 9
    Azure-AD-External-Identities
    Azure Active Directory External Identities, part of Microsoft Entra, provides highly secure digital experiences for partners, customers, citizens, patients, or any users outside your organization with customization controls. Combine external identities and user directories in one portal to seamlessly manage access across the organization. Give both onsite and remote employees seamless access to all their apps so they can stay productive anywhere. Automate workflows for easy user lifecycle management and provisioning. Save admin time and resources with self-service identity management for external users. Simplify access to thousands of pre-integrated software as a service (SaaS) applications with single sign-on from any location, on any device.
    Starting Price: $0.00325 per month
  • 10
    Microsoft Identity Manager
    Microsoft Identity Manager (MIM) builds on the identity and access management capabilities of Forefront Identity Manager and predecessor technologies. MIM provides integration with heterogeneous platforms across the datacenter, including on-premises HR systems, directories, and databases. MIM augments Azure AD cloud-hosted services by enabling the organization to have the right users in Active Directory for on-premises apps. Azure AD Connect can then make available in Azure AD for Microsoft 365 and cloud-hosted apps. Automatic identity and group provisioning based on business policy and workflow-driven provisioning. Integration of the contents of directories with HR systems and other sources of authority. Synchronizing identities between directories, databases, and on-premises applications through common APIs and protocols, Microsoft-delivered connectors, and partner-delivered connectors.
  • 11
    Adaxes

    Adaxes

    Softerra

    Adaxes is a management and automation solution that provides enhanced administration experience to Active Directory, Exchange and Microsoft 365 environments. Adaxes features a rule-based platform for Active Directory, Exchange and Microsoft 365 automation, provides an enhanced web-based management environment, gives you a role-based access control model for delegating privileges, adds security with approval-based workflow, allows enforcing corporate data standards and much more. With Adaxes all user lifecycle management procedures can be fully automated, including provisioning, re-provisioning and deprovisioning in Active Directory and connected systems, such as Exchange, Microsoft 365 and Skype for Business. Adaxes Web Interface allows managing Active Directory from any device via a standard web browser. It provides a clean and intuitive UI for admins, help desk and other staff to execute their AD administration tasks and a self-service portal for regular users.
    Starting Price: $1,600 one-time payment
  • 12
    Hire2Retire
    RoboMQ’s Hire2Retire is a comprehensive workforce lifecycle management solution that manages the entire JML lifecycle events, such as hiring, department transfers, terminations, and long-term leaves. It is an Identity and Access Management platform that synchronizes HR with IT infrastructure, including Active Directory (AD), Okta, and Google Workspace. Hire2Retire enables organisations to effectively manage employee access and privileges throughout their work cycle. 
 Hire2Retire integrates with 27 HR and ATS systems, identity providers (IdP) like Active Directory, Entra ID, Okta, and Google Workspace, along with 10+ leading Service Management platforms like ServiceNow, Salesforce, SolarWinds, and FreshService.
    Starting Price: $5/month/employee
  • 13
    Delinea Server Suite
    Easily consolidate complex and disparate identities for Linux and Unix within Microsoft Active Directory. Minimize the risk of a breach and reduce lateral movement with a flexible, just-in-time privilege elevation model. Advanced session recording, auditing, and compliance reporting aid forensic analysis into abuse of privilege. Centralize discovery, management, and user administration for Linux and UNIX systems to enable rapid identity consolidation into Active Directory. Privileged Access Management best practices are easy to follow with the Server Suite. The results are higher levels of identity assurance and a significantly reduced attack surface with fewer identity silos, redundant identities, and local accounts. Manage privileged user and service accounts from Windows and Linux in Active Directory. Just-in-time, fine-grained access control with RBAC and our patented Zones technology. Complete audit trail for security review, corrective action, and compliance reporting.
  • 14
    Activate

    Activate

    Activate

    Activate is an enterprise management and automation solution that manages a user's Identity, Access and Digital Workspace. It's fully integrated with Microsoft Suite offerings such as Active Directory, Office 365 and Azure AD. Activate enables users to request, approve and manage common IT systems like Active Directory, Exchange, Office 365 and Azure for themselves and other users in the organization. Activate's integration of Identity Management and Service Management into a single product enables stream-lined management of a User's Lifecycle from On-boarding to Off-boarding. Activate's virtual LDAP technology allows Azure AD to be managed in the same way as Active Directory. This means that services can be transitioned from on-premise to the cloud in a seamless manner without user service interruptions.
    Starting Price: $5.00/one-time/user
  • 15
    Quest Security Guardian
    Quest Security Guardian is an Active Directory (AD) security tool designed to enhance identity threat detection and response and improve your AD security posture. Operating from a streamlined, unified workspace, it alleviates alert fatigue by prioritizing vulnerabilities and configurations, making it easier to maximize hybrid AD security. Powered by Azure AI and deep machine learning, and seamlessly integrated with Microsoft Security Copilot, Security Guardian quickly identifies what happened, if you're exposed, and how to remediate. It allows you to benchmark your AD and Entra ID configurations against industry best practices, lock down critical objects such as Group Policy Objects (GPOs) from misconfiguration and compromise, and continuously monitor for anomalous user activities and emerging hacker tactics. By leveraging cross-product AI insights from Microsoft Security Copilot, it simplifies and accelerates threat detection and response.
  • 16
    DSRAZOR for Windows

    DSRAZOR for Windows

    Visual Click Software

    Quickly document user and/or group NTFS effective and share permissions. Discover file ownership throughout your shared disk space. Report on users, groups, computers, permissions. Make sure your Active Directory object attributes match your enterprise standard. Find accounts that are locked, disabled, expired or unused for x days. Automate common Active Directory management tasks. Automatically synchronize your Student Information System (SIS) to Active Directory. Create/Import/Update users, groups and computers including bulk management. Effectively manage Active Directory - no scripting required! Delete/Move unused users, groups and computers. Reset passwords in bulk. Perform mass object imports from a CSV file. Modify trustee permissions for desired Folders. Document and manage Office 365 accounts. Allow non-admins to perform Active Directory management functions. Delegate the small stuff, focus on the big stuff.
    Starting Price: $500/year
  • 17
    ManageEngine M365 Manager Plus
    M365 Manager Plus is an extensive Microsoft 365 tool used for reporting, managing, monitoring, auditing, and creating alerts for critical activities. With its user-friendly interface, you can easily manage Exchange Online, Azure Active Directory, Skype for Business, OneDrive for Business, Microsoft Teams, and other Microsoft 365 services all from one place. M365 Manager Plus provides exhaustive preconfigured reports on Microsoft 365 and helps you perform complex tasks including bulk user management, bulk mailbox management, secure delegation, and more. Monitor Microsoft 365 services around the clock, and receive instant email notifications about service outages. M365 Manager Plus eases compliance management with built-in compliance reports and offers advanced auditing and alerting features to keep your Microsoft 365 setup secure.
    Starting Price: $345 per year
  • 18
    Microsoft Configuration Manager
    ​Microsoft Configuration Manager is a comprehensive systems management solution that enhances IT productivity by automating tasks such as the secure deployment of applications, software updates, and operating systems across servers, desktops, and laptops. It offers real-time device management, cloud-powered analytics for both on-premises and internet-based devices and compliance settings management. It integrates seamlessly with Microsoft technologies including Intune for co-managing diverse mobile device platforms, Azure for hosting cloud services, and Windows Server Update Services (WSUS) for software update management. Additionally, it utilizes Active Directory Domain Services and Microsoft Entra ID for security and configuration, as well as SQL Server for database management, integrating with SQL Server Reporting Services (SSRS) for comprehensive reporting.
  • 19
    Veeam Data Cloud for Microsoft 365
    Veeam Data Cloud for Microsoft 365 provides unified, future-ready data protection for Microsoft 365 and Entra ID in a single, modern SaaS solution. Designed for organizations of all sizes, Veeam safeguards your critical Microsoft 365 workloads—including Exchange, SharePoint, OneDrive, Teams, and Entra ID—against cyber threats, accidental deletions, retention policy gaps, and misconfigurations. Veeam Data Cloud stands out with: - Single platform simplicity: Manage and protect Microsoft 365 and Entra ID data from an intuitive interface. - Granular, rapid recovery: Restore exactly what you need, from individual emails and files to full Entra ID attributes, groups, and logs. - Unlimited storage: Always included, with clear, predictable per-user pricing and no hidden fees. - Zero-trust security foundation: Benefit from service-level immutability, MFA, strong encryption, and role-based access controls integrated with Entra ID.
  • 20
    EmpowerID

    EmpowerID

    EmpowerID

    EmpowerID is the award winning all-in-one identity management and cloud security suite developed by The Dot Net Factory, LLC dba "EmpowerID". Responsible for managing millions of internal and external cloud and on-premise identities for organizations around the globe, EmpowerID delivers the broadest range of ready to use IAM functionality. In-depth out of the box solutions include: single sign-on, user provisioning, identity governance, group management, role mining, delegated identity administration, password management, privileged access management, access management for SharePoint, and an identity platform for application developers. All solutions leverage a single sophisticated role and attribute-based authorization engine that handles complex organizations and even multi-tenant SaaS providers. We provide a highly scalable, fully customizable IAM infrastructure that delivers results in a more time and cost-efficient manner for your enterprise.
    Starting Price: $2 per user per month
  • 21
    IDSync

    IDSync

    IDSync

    Active Directory To Active Directory Identity Synchronizer Software. Solves Password Sharing Problems, Overly Broad “rights” for IT staff and supports user enablement/disablement for Customer’s Active Directory. The Identity Syncronizer Active Directory to Active Directory platform enables an MSP to connect its on-premise Active Directory to its customers’ Active Directories for purposes of provisioning and synchronizing user metadata and passwords for its technicians, those who will be accessing the customers’ Active Directory and networks. IDSync provides an interface through which the MSP can identify those technicians for provisioning, identify target Active Directories into which the technicians will be provisioned or de-provisioned. Provisioning and synchronization can be maintained at the individual user level or can be accomplished in bulk via security groups.
  • 22
    Atlassian Crowd
    Single sign-on and user identity that's easy to use. Manage users from multiple directories - Active Directory, LDAP, OpenLDAP or Microsoft Azure AD - and control application authentication permissions in one single location. Make life easy for your users by giving them one username and password to log in to all the applications they need access to. Seamlessly integrate all your Atlassian products - like Jira, Confluence, and Bitbucket- to give your users one simple single sign-on (SSO) experience. Map any combination of directories to a single application – perfect for managing users not in your main directory - and manage authentication permissions in the same place. Get started with connectors for AD, LDAP, Microsoft Azure AD, Novell eDirectory, and more. You can even create your own custom connector. Can't make group changes in your directory? Keep your users in LDAP and define their authentication permissions in Crowd.
    Starting Price: $10 one-time fee
  • 23
    AWS IAM Identity Center
    AWS IAM Identity Center simplifies centralized access management across multiple AWS accounts and business applications. It enables users to access assigned accounts and applications from a unified portal. Administrators can manage user permissions centrally, assigning them based on job functions and customizing as needed. IAM Identity Center integrates with various identity sources, including Microsoft Active Directory, Okta, Ping Identity, JumpCloud, and Microsoft Entra ID, and supports standards like SAML 2.0 and SCIM for user provisioning. It facilitates attribute-based access control by allowing selection of user attributes such as cost center, title, or locale from the identity source. It supports multi-factor authentication (MFA) using methods like FIDO-enabled security keys, biometric authenticators, and time-based one-time passwords.
  • 24
    IAM Cloud

    IAM Cloud

    IAM Cloud

    IAM Cloud’s world-leading drive management tool for cloud storage. It provides secure direct access (no sync) to OneDrive for Business, MS Teams and SharePoint Online. Great for desktop and VDI environments alike. Our simple & secure sign-on platform. Provides single sign-on (SSO), multi-factor authentication (MFA), Surp4ss! password management, and basic identity sync & provisioning from Active Directory. Everything you need from an SSO solution without the premium price. IAM Cloud is an identity company at heart. With IDx you can connect & sync identities across all kinds of systems, allowing the full automation of the Joiner, Mover and Leaver process. IDx integrates with on-prem, cloud and custom-built HR, ERP, CRM, MIS & Directory systems. Cloud-based data migrator. Supports to-the-cloud and from-cloud-to-cloud migrations for Office 365. Merge multiple Office 365 tenancies into one tenant. Split tenancies.
    Starting Price: $2.40 per month
  • 25
    Cayosoft Administrator
    Purpose-built for hybrid and cloud Microsoft environments, Cayosoft Administrator secures, automates, and streamlines day-to-day IT administration. Cayosoft Administrator is the only complete management solution for your entire cloud IT journey, from on-premises to hybrid, to the cloud. Every step of the way, Cayosoft Administrator improves security, efficiency, and compliance in the day-to-day management of Active Directory, Exchange, Office 365, and beyond! Role-based delegation provides complete control of what day-to-day administrators and help desk staff can see and do. Cayosoft allows you to delegate across and between systems with one unified set of easy-to-configure Roles enforce a granular, least-privileged administrative model over all of the systems being managed, even in complex hybrid environments. Roles do not require the user to hold native permissions, dramatically reducing the number of individuals requiring Domain, Enterprise, or Global Admin access.
  • 26
    ManageEngine RecoveryManager Plus
    The enterprise backup and restoration tool. No IT environment is immune to accidental deletions or modifications; on-premises Active Directory (AD), Azure Active Directory, Microsoft Office 365, and Exchange environments are no exception. RecoveryManager Plus can help you overcome any disaster caused by unwanted changes in your IT environment. Back up your AD, Azure Active Directory, Microsoft Office 365, and Exchange environments from a single console and restore any object, site, or mailbox whenever you need it. Back up all changes made to schema classes and attributes, and instantly restore them when needed. Back up all AD objects like users, groups, GPOs, OUs, Exchange attributes, DNS information, computers, and contacts, and restore them either partially or completely. Perform recovery operations without having to restart your DCs, thus ensuring continuous availability of DCs.s.
  • 27
    CionSystems

    CionSystems

    CionSystems

    Over 74% of all breaches involve access to a privileged account. The mass migration to remote workforce enterprise operations has created more security gaps and risks than ever before. Enterprise identity manager is an “out of the box” solution to dramatically harden, simplify, and secure enterprise Active Directory deployments, no scripts or code required. EIM enables swift transition of Active Directory to handle large remote workforces, with real-time tracking of all changes with defined notifications. Over 90% of enterprises, worldwide, run Active Directory. Cloud migration and synchronization is complex, resulting in major security gaps. Cloud Office 365 streamlines the arduous task of Internet user account management, dramatically reducing the time required for provisioning and de-provisioning users, providing real-time tracking of all changes, and dramatically reducing unused and untracked license costs.
  • 28
    AWS Directory Service
    AWS Directory Service for Microsoft Active Directory, also known as AWS Managed Microsoft Active Directory (AD), enables your directory-aware workloads and AWS resources to use managed Active Directory (AD) in AWS. AWS Managed Microsoft AD is built on actual Microsoft AD and does not require you to synchronize or replicate data from your existing Active Directory to the cloud. You can use the standard AD administration tools and take advantage of the built-in AD features, such as Group Policy and single sign-on. With AWS Managed Microsoft AD, you can easily join Amazon EC2 and Amazon RDS for SQL Server instances to your domain, and use AWS End User Computing (EUC) services, such as Amazon WorkSpaces, with AD users and groups. AWS Managed Microsoft AD makes it easy to migrate AD-dependent applications and Windows workloads to AWS. With AWS Managed Microsoft AD, you can use Group Policies to manage EC2 instances and run AD-dependent applications in the AWS Cloud.
  • 29
    Microsoft Agent 365
    Microsoft Agent 365 introduces a unified control plane that allows organizations to deploy, manage, and secure AI agents with the same confidence they apply to user management. It gives enterprises full visibility into all agents, including Entra-verified agents, self-registered agents, and shadow agents running across the environment. Built on Microsoft’s trusted ecosystem, Agent 365 extends familiar tools like Entra, Defender, Purview, Power Apps, and Microsoft 365 to support identity, security, governance, and productivity for agents. With Work IQ, organizations can connect agents directly to their unique company data and workflows, enabling smarter, more context-aware automation. IT admins can access Agent 365 early via Frontier, Microsoft’s early access program, and activate it at the tenant or user level. Designed to scale with modern AI adoption, Agent 365 ensures that enterprise agentic systems remain secure, compliant, and manageable from day one.
  • 30
    XIA Automation

    XIA Automation

    CENTREL Solutions

    XIA Automation is a powerful, network task automation tool that helps organizations automate user provisioning and IT tasks. Automatically provision user accounts into Active Directory, Exchange, Office 365, Google and more with our user provisioning software XIA Automation. Enable-IT support staff to automate or delegate common network management tasks. Manage users and change passwords from a web interface or mobile device. Fully automate the management of your Active Directory user accounts, groups, and organizational units. Reset Active Directory user passwords from your mobile or delegate this task to non-administrators to free up your time. Save time by bulk provisioning from CSV into AD, Exchange, Google, Office 365 and more. Automatically create mailboxes for thousands of users on Microsoft Exchange in minutes. Automatically manage Windows directories including sharing and security settings.
    Starting Price: $800 one-time payment
  • 31
    Active Directory
    Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the basis for a logical, hierarchical organization of directory information. This data store, also known as the directory, contains information about Active Directory objects. These objects typically include shared resources such as servers, volumes, printers, and the network user and computer accounts. For more information about the Active Directory data store, see Directory data store. Security is integrated with Active Directory through logon authentication and access control to objects in the directory. With a single network logon, administrators can manage directory data and organization throughout their network, and authorized network users can access resources anywhere on the network. Policy-based administration eases the management of even the most complex network.
    Starting Price: $1 per user per month
  • 32
    Cayosoft Guardian
    Your Active Directory (AD) or Azure Active Directory (Azure AD) contain vital user identities that are crucial to ensuring your business operates without interruption. Whether from malicious actions, like cyberattacks and malware, or mistakes, like accidental deletions and misconfigurations, corruption of your Active Directory can stop your business in its tracks and cause costly outages that can last hours, days, or even weeks. Cayosoft Guardian was designed to reduce the complexity of hybrid Active Directory security, by combining threat detection, monitoring, and recovery into one comprehensive solution. Cayosoft Guardian continuously monitors directories and services, allowing you to isolate suspect changes and immediately recover unwanted changes made to both objects and settings. This is done across on-premises AD, hybrid AD, Azure AD, Office 365, Microsoft Teams, and Exchange Online, all from Cayosoft Guardian’s single, unified console.
  • 33
    Azure Tenant Checker
    Azure Tenant Checker is a subscription-based SaaS solution that delivers a full audit of your Microsoft Entra tenant in seconds. Whether you're an IT service provider, a consultant, or an internal IT department, you gain instant insights into MFA, PIM, license usage, inactive users, secure score, and more without deploying any infrastructur
    Starting Price: $29/month/user
  • 34
    Tenable Identity Exposure
    Unleash a new level of end-to-end protection from identity-based attacks. Collapse enterprise silos and unify identities across Active Directory and Entra ID. Evaluate your identities using risk scoring to locate the riskiest ones that require attention. Use step-by-step prioritization to rapidly close security gaps with the highest likelihood of identity-based exploits. Identities are the new perimeter, compromised identities are at the center of nearly every successful cyberattack. By exposing and closing the security gaps where identity-based exploits thrive, Tenable Identity Exposure strengthens your security posture and confidently prevents attacks before they occur. Tenable Identity Exposure continuously validates your Active Directory and Entra ID environments for weaknesses, misconfiguration, and activity that can lead to damaging attacks. Integrating deep identity context into the Tenable One exposure management platform can further help you see risky toxic combinations.
  • 35
    Proget

    Proget

    Proget Sp. z o.o

    Proget simplifies mobility management for modern enterprises by offering cross-platform management from a single interface. It is compatible with popular operating systems such as Android, iOS, iPadOS, macOS, and Windows. Key features include automated device registration, geofencing capabilities, remote access, device and user grouping functions, secure app management, and an intuitive user interface. This makes Proget a practical tool for IT administrators overseeing various mobile devices. With Proget, employees can quickly and easily access data and applications from any device and location. It supports VPN configuration, MTP profiles, remote desktop access, password policies,Microsoft Entra log-in, and Active Directory access.
    Starting Price: $4.5 per device/month
  • 36
    Password Reset PRO
    Self service password reset software (SSPR) and identity management for Active Directory 2012, 2016, 2019 domain users. Secure for password self service outside of the domain by remote users. Easy to install. Perfect for Office 365, OWA, VPN, Azure, Mobile, BYOD users. Rapid deploy – No Databases – Use it free for a month! Server 2003 through 2019 supported. Password Reset PRO is the only enterprise-class web based self service software designed specifically for secure external (public) access by end users, allowing them to quickly change or reset their domain password and unlock their account without IT intervention. It is very easy to install, test and deploy, no databases required or changes to the domain, no disturbing users.
    Starting Price: $598.00/one-time/user
  • 37
    Delinea Cloud Suite
    Simplify user authentication to servers from any directory service, including Active Directory, LDAP, and cloud directories such as Okta. Enforce the principle of least privilege with just-in-time and just enough privilege to minimize the risk of a security breach. Identify abuse of privilege, thwart attacks, and quickly prove regulatory compliance with a detailed audit trail and video recordings. Delinea’s cloud-based SaaS solution applies zero-trust principles to stop privileged access abuse and reduce security risks. Experience elastic scalability and performance, supporting multi-VPCs, multi-cloud, and multi-directory use cases. Single enterprise identity to securely log in anywhere. A flexible, just-in-time model with privilege elevation. Centrally manage security policies for users, machines, and applications. Apply MFA policies consistently across all your regulated and business-critical systems. Watch privileged sessions in real-time and instantly terminate suspicious sessions.
  • 38
    Veeam Backup for Microsoft Entra ID
    Veeam Backup for Microsoft Entra ID is a dedicated solution designed to protect and recover data within Microsoft Entra ID environments. It enables organizations to create backups of critical components such as users, groups, administrative units, roles, applications, and service principals, storing them securely in PostgreSQL databases. The solution also facilitates the backup of audit and sign-in logs, ensuring comprehensive data protection and compliance readiness. With capabilities for granular restoration, Veeam Backup for Microsoft Entra ID allows for the precise recovery of individual items or their properties, minimizing downtime and maintaining business continuity.
  • 39
    PeoplePlatform

    PeoplePlatform

    Web Active Directory

    PeoplePlatform allows you to automate and delegate all the common tasks associated with Identity Management. Stop spending time on provisioning, deprovisioning and directory updates, instead empower your organization to handle these tasks through a simple web interface. Built from the ground up to be customizable, create simple web interfaces to handle even the most complex identity management tasks in your organization. Single and Bulk Deprovisioning – remove access of individual users to your organization’s resources. Handle Workflows – Workflow jobs can be set-up to run after an object is provisioned.
  • 40
    Devolutions PAM

    Devolutions PAM

    Devolutions

    Devolutions Privileged Access Manager (PAM) discovers privileged accounts, automates password rotation, approves check-outs, enforces just-in-time (JIT) privilege elevation, and records every session—giving small and midsize businesses (SMBs) enterprise-grade control without enterprise-grade hassle. Bundle PAM with the Privileged Access Management package and it slots straight into Devolutions Hub delivered as SaaS (Software-as-a-Service) or a self-hosted on-premises (on-prem) Devolutions Server, while Remote Desktop Manager provides one-click launches and Gateway supplies secure tunnels. One integrated stack takes you from standing privileges to true zero-standing-privilege—all under a single pane of glass, complete with granular RBAC (Role-Based Access Control) and tamper-proof audit logs.
    Starting Price: $50/month/user
  • 41
    NiCE Active 365 Management Pack

    NiCE Active 365 Management Pack

    NiCE IT Management Solutions GmbH

    Microsoft 365 deployments are complex, with interconnected components like Teams, SharePoint, Exchange, and Entra ID. While failures are rare, they can’t be ruled out. Even if the M365 Service Health Dashboard shows no issues, users may still report login problems. The NiCE Active 365 Management Pack cuts through this complexity, pinpointing performance issues across users, groups, mailboxes, locations, and devices. The Auto-Discovery maps your entire hybrid or cloud-only deployment, from tenants to users, SharePoint sub-sites, Teams channels, OneDrive folders, and Exchange queues. Gain instant insights into Microsoft 365 performance, including licensing, user activity, identity service health, mobile device management, portal status, client applications, and the latest Microsoft Secure Score. Enhance visibility with any dashboarding tool within your System Center environment.
    Starting Price: on request
  • 42
    Netwrix Recovery for Active Directory
    Fine-grained rollback and recovery for Active Directory. Malicious or accidental changes to AD represent a significant security and performance risk. As the primary authentication and authorization service for the majority of IT systems, the importance of Active Directory (AD) integrity and availability is paramount. Rolling back or recovering changes – whether from human error or malicious intent – leveraging native AD capabilities is difficult at best, and in some cases impossible. While the AD Recycle Bin, when enabled, can recover a deleted object, Microsoft does not offer an out-of-the-box way to rollback changes to directory objects to a previous state. Netwrix Recovery for Active Directory enables organizations to quickly and easily rollback and recover unintended directory changes. e. Easily browse multiple snapshots and leverage granular full text search to effortlessly rollback and recover only the information that is required.
  • 43
    Amazon Cognito
    Amazon Cognito lets you add user sign-up, sign-in, and access control to your web and mobile apps quickly and easily. Amazon Cognito scales to millions of users and supports sign-in with social identity providers, such as Facebook, Google, and Amazon, and enterprise identity providers via SAML 2.0. Amazon Cognito User Pools provide a secure user directory that scales to hundreds of millions of users. As a fully managed service, User Pools are easy to set up without any worries about standing up server infrastructure. With Amazon Cognito, your users can sign in through social identity providers such as Google, Facebook, and Amazon, and through enterprise identity providers such as Microsoft Active Directory via SAML. Amazon Cognito User Pools is a standards-based Identity Provider and supports identity and access management standards, such as Oauth 2.0, SAML 2.0, and OpenID Connect. HIPAA eligible and PCI DSS, SOC, ISO/IEC 27001, ISO/IEC 27017, ISO/IEC 27018, and ISO 9001 compliant.
  • 44
    Simply Sync Password

    Simply Sync Password

    GoodWorks Communications

    Simply Sync Password allows organizations to synchronize their passwords and active directory properties from their local Active Directory site to an external Active Directory sites or other external systems. Simply Sync Password is a great alternative for organizations that do not want the added complexity and cost that comes with establishing a trust relationship between Active Directory sites or deploying an AD FS infrastructure. AD FS is great for large organizations, but in many cases it just doesn’t make sense for small and medium-size organizations. The role of the Password Capture Agent is to intercept password changes as they occur on the domain controllers. Since you don’t know which domain controller a user is going to use to reset their password, the Password Capture Agent must be installed on all domain controllers. The Password Capture Agent does not interfere with the password change process, it simply intercepts the change request as it happens.
    Starting Price: $20 per user per month
  • 45
    Zoho Directory
    Zoho Directory is a cloud-based identity and access management platform designed to streamline authentication, authorization, and user management for organizations. It offers Single Sign-On (SSO) capabilities, allowing employees to access multiple applications with a single set of credentials, thereby enhancing security and user convenience. The platform supports Multi-Factor Authentication (MFA), adding an extra layer of protection against unauthorized access. Device authentication ensures secure access to both applications and devices, enabling employees to use the same credentials across platforms. Zoho Directory also provides robust provisioning features, allowing IT administrators to create and manage user profiles across various applications directly from the platform, reducing the time spent on repetitive tasks. Integration with existing directories, such as Microsoft Active Directory and Azure AD, is facilitated through directory stores.
    Starting Price: $1.70/user/month
  • 46
    Nuvolex

    Nuvolex

    Nuvolex

    Nuvolex Enables IT Organizations to simplify daily administration across all M365 and Azure workloads, leveraging extensive workflow automation. IT Organizations can easily manage all of their Users, Tenants, Licenses and Microsoft Cloud Services through the ManageX™Single Pane Of Glass administration portal. Ability to push multiple M365 configuration changes and Polices to any number of tenants in just a few mouse clicks. Save M365 service configurations and Policies as a template to ensure consistent and compliant configuration policies for all the end tenants managed by your team. Gain valuable insight into all of your Tenant’s data to drive increased security and lower TCO of your Cloud Services. View a single consolidated report to gain insight into your tenants usage, metrics and licensing.
  • 47
    Visual Guard
    Visual Guard is an advanced identity and access management (IAM) tool offering a complete solution for securing sensitive applications and data. With centralized management of users and permissions, Visual Guard facilitates the implementation of robust, standards-compliant security policies. User management : Create, modify & delete user accounts Integration with LDAP or Active Directory directories Automatic synchronization of user information Access control : Precise definition of access rights to features and resources Role and Permission Management Multi-factor authentication (MFA) Single Sign-On (SSO) Security Audit and Monitoring : Permission Matrix Detailed Event log Real-time and Historical Graphs Integration & compatibility : Compatibility with major development platforms, frameworks, and protocols. .NET API Benefits : Simplified access management Enhanced data security Improved regulatory compliance Reduce identity management cost
    Starting Price: 1.55/month/user
  • 48
    Microsoft Graph
    Microsoft Graph is the gateway to data and intelligence in Microsoft 365. It provides a unified programmability model that you can use to access the tremendous amount of data in Microsoft 365, Windows, and Enterprise Mobility + Security. Use the wealth of data in Microsoft Graph to build apps for organizations and consumers that interact with millions of users. What's in Microsoft Graph? Microsoft Graph exposes REST APIs and client libraries to access data on the following Microsoft cloud services: - Microsoft 365 core services: Bookings, Calendar, Delve, Excel, Microsoft 365 compliance eDiscovery, Microsoft Search, OneDrive, OneNote, Outlook/Exchange, People (contacts), Planner, SharePoint, Teams, To Do, Viva Insights - Enterprise Mobility + Security services: Advanced Threat Analytics, Advanced Threat Protection, Azure Active Directory, Identity Manager, and Intune - Windows services: activities, devices, notifications, Universal Print - Dynamics 365 Business Central
  • 49
    ADREPLSTATUS

    ADREPLSTATUS

    Microsoft

    The Active Directory Replication Status Tool (ADREPLSTATUS) analyzes the replication status for domain controllers in an Active Directory domain or forest. ADREPLSTATUS displays data in a format that is similar to REPADMIN /SHOWREPL * /CSV imported into Excel but with significant enhancements. Expose Active Directory replication errors occurring in a domain or forest. Prioritize errors that need to be resolved in order to avoid the creation of lingering objects in Active Directory forests. Help administrators and support professionals resolve replication errors by linking to Active Directory replication troubleshooting content on Microsoft TechNet. Allow replication data to be exported to source or destination domain administrators or support professionals for offline analysis. Use FIPS 140 compliant cryptographic algorithms, including encryption, hashing and signing algorithms.
  • 50
    Specops Deploy

    Specops Deploy

    Specops Software

    Specops Deploy simplifies the installation of operating systems, software, and applications in your Microsoft Active Directory environment. Extending the functionality of Group Policy, the solution lets you target any number of computer objects within Active Directory. Use Specops Deploy to save user state during installation, manage local user settings, or capture operating system images. Specops Deploy removes time-consuming manual tasks and improves IT efficiency through a simplified software deployment process. Whether you are installing applications on multiple devices, or upgrading your computers to a new operating system, it is the key to ensuring your time is well spent. Specops Deploy uses existing technologies such as Active Directory, Group Policy, Windows Deployment Services (WDS), Windows Assessment and Deployment Kit (Windows ADK), and Microsoft Deployment Toolkit (MDT).