Overview
CyberArk Workforce Identity is a SaaS-delivered solution designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce and B2B Access and Identity Management solutions in a single offering. CyberArk Workforce & B2B Access solutions ensure that the right users have secure access to the right resources at the right times.
Organizations can use CyberArk Workforce solution to authenticate, authorize, and audit access to applications and IT systems, including AWS IAM and AWS SSO, with a security-first mindset. Strengthen security and reduce risk by protecting workforce and customer credentials and tightly controlling access to on-premises and cloud-based applications, services, and IT infrastructure.
CyberArk Workforce Identity solution include:
-CyberArk Single Sign-On: Enables one-click secure access to all the applications and resources including AWS IAM and AWS SSO -CyberArk Adaptive Multi-Factor Authentication: Enable a passwordless user experience with a comprehensive range of user-friendly, context and risk aware authetication methods. -CyberArk Secure Web Sessions: Protect identities beyond the login and gain visibility into every action users take within web applications. -CyberArk Workforce Password Management: Securely store, manage and share business application credentials. -CyberArk B2B Identity: Extends secure and seamless access for your business partners, vendors, and clients. -CyberArk Identity Lifecycle Management and compliance: Streamline identity lifecycle events, orchestrate identity workflows, and automate access reviews and compliance requierments.
For custom orders please contact AWS-Marketplace@cyberark.comÂ
Latest Release notes: https://docs.cyberark.com/identity/latest/en/content/releasenotes/ReleaseNotes-Latest.htmÂ
Highlights
- Identity Security Platform: CyberArk Workforce Identity includes deep integrations with CyberArk PAM, thousands of pre-integrated applications, and comprehensive support for MFA mechanisms, including the newest passwordless factors and technologies.
- Architected for the modern enterprise: Leverages scalable CyberArk Identity Cloud Directory to unify user management across the enterprise, reduce identity silos, and simplify migration to the cloud.
- With Identity Flows and Compliance eliminate manual tasks and processes by automating complex identity management workflows. Ensure all access rights are properly assigned and continually certified across the extended enterprise.
Unlock automation with AI agent solutions

Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Free trial
Dimension | Description | Cost/12 months |
---|---|---|
Workforce Identity Std. | Workforce Identity users - 100 users | $12,528.00 |
Workforce Password Mgmt | Workforce Password Mgmt - 200 users | $14,400.00 |
Vendor refund policy
For refund policy, visit <www.cyberark.com/terms-service-saas/Â >
Custom pricing options
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Support
Vendor support
Ensuring your CyberArk Workforce Identity is up to date and running efficiently is a priority. If you encounter a technical problem, contact CyberArk support 24x7, using our ticketing system at https://cyberark-customers.force.com - Phone and email support are also available. Further details are available at <www.cyberark.com/customer-support/#contact-supportContact >
For support related questions: <www.cyberark.com/customer-support/Â >
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

Standard contract
Customer reviews
Has strengthened privileged access control and improved audit visibility through session monitoring and password rotation
What is our primary use case?
The main use cases for CyberArk Identity help us to strengthen security to protect sensitive data centers and systems. We can store sensitive credentials, user credentials, and privileged accounts inside our CyberArk PAM tool. This helps us rotate passwords for privileged account credentials and monitor sessions. It is very useful for audit purposes. If there are any unsuspected activities happening, we can review the log files and identify where issues are occurring. It is very helpful for monitoring and strengthening security levels.
What is most valuable?
The best features in CyberArk Identity that I appreciate most are the recent updates that have added features in the cloud privilege environment. In the SAS solutions, they have added connectors. Except for PSM and CPM , they have included SIA, Secure Infrastructure Access, Secure Cloud Access, and Secure Web Sessions. These are additional features I have seen in the recent updates.
For multi-factor authentication, we use CyberArk Identity's multi-factor authentication integrations, LDAP integration and SSO , Azure SSO , LDAP and SIM. These authentication mechanisms we implement. Mostly, we use LDAP and Azure SSO.
Just-in-time access, also called ephemeral access, is especially beneficial, particularly with SIA and SCAÂ features. The recent updates from CyberArk Identity have been impressive. If a requester needs access to a platform, such as Windows, Linux, or any database, the request goes to the approval level for a particular time period. The approver can approve the request within that set time frame, granting just-in-time access to the end user.
Session monitoring is beneficial as it detects if the user is trying to log in and records all activities stored in the vault. It gives us more insights into what activities are happening inside. If there are any breaches or issues arise, I can go back to the log report and check all those activities that are captured, where it failed exactly, and what the issue was. From there, I can find and fix it.
What needs improvement?
On the identity product side, it is awesome. However, they can improve in the documentation parts. For example, if there is a migration process, I can see the maximum customers are moving from self-hosted to on-premises or from on-premises to the cloud. It would be helpful if they released a generalized document for processes such as migration. A clear overview document would assist us in understanding more about the tool, configurations, and automations to enhance our security.
Regarding the initial setup of CyberArk Identity, I faced some challenges. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components. I could not find the proper documentation in the community portal.
For how long have I used the solution?
I have been working with the identity product using CyberArk PAM tool for more than two years.
What do I think about the stability of the solution?
When it comes to performance and stability, I find it very reliable.
What do I think about the scalability of the solution?
CyberArk Identity is highly scalable as there are many things to learn. There is no limitation. When delving deep into the concepts, there is a lot to address and learn, especially when facing real-time scenarios. It may seem simple at first glance but once you get into the depth of the concepts, you realize how much there is to learn and there are no limitations in that regard.
How are customer service and support?
My experience with technical support has been very good. When I reached out to them, I received prompt responses and support, which I would rate as very good.
How would you rate customer service and support?
Positive
How was the initial setup?
I faced some challenges during the initial setup of CyberArk Identity. At some points, I could not find proper documentation for deploying, enhancing, or integrating with other components. I could not find the proper documentation in the community portal.
What other advice do I have?
If I can share advice or recommendations for other companies considering CyberArk Identity, I would highlight the most powerful features in CyberArk PAM such as password rotation, session recordings, and just-in-time access as the best aspects of this product. On a scale of one to ten, I would rate this solution an eight.
Have increased security by regenerating credentials after each use and gained confidence through session oversight
What is our primary use case?
It's not being purchased through AWS , but we're using CyberArk Identity as a SaaS solution. I think it's running on AWS , but we bought it directly from CyberArk.
What is most valuable?
The straight-through approach of CyberArk Identity is very easy to start with. After you start with it, you can very easily onboard your privileged accounts. From there on, you can advance further and make it more and more secure. I think that the easy way to start with CyberArk Identity is one of the benefits of using it.
The best feature for us is the regeneration of passwords after every use that we have implemented with CyberArk Identity. The two-factor authentication is very important, but the fact that every account is being regenerated every time we use it is the most important security feature for us.
Session monitoring with CyberArk Identity is helping in making us feel secure with our vendors. We're also using the vendor implementation. The fact that we know that we can look back and that we tell that to our vendors gives us a good secure feeling. We haven't really found it necessary to look back, but the fact that we know that we can makes us feel secure.
What needs improvement?
We do not specifically use the password vaulting feature of CyberArk Identity.
The centralized user dashboard of CyberArk Identity has not been that important for us.
If it would be possible to share accounts between vaults in CyberArk Identity, that would be very beneficial. Account sharing between vaults is one of the most important aspects for us.
It was pretty complex to implement CyberArk Identity. We had some help from a partner, and that helped a lot. But even for the partner, it was really difficult to streamline the process of implementing. We had sometimes an issue that really took days during the implementation to fix. That was something that I did not appreciate about the whole implementation. It should be much more straightforward, specifically because you're doing a SaaS implementation.
I rate it a seven because vendor support is difficult to get. Basically, you have to go through a partner to get support with CyberArk Identity. That's another thing that they could improve.
For how long have I used the solution?
This is the second time I'm implementing CyberArk Identity. The first time was for a different customer. With the current customer, we're using it for about nine months now.
What do I think about the stability of the solution?
I rate the stability of CyberArk Identity regarding downtime, bugs, and glitches a 10. We haven't had any downtime or any problems with availability.
What do I think about the scalability of the solution?
I would consider CyberArk Identity to be just as scalable as you want to be. You can scale it out pretty easily, and you can implement it very small. I would rate it a nine.
What about the implementation team?
I'm not an end-user or a partner. I'm just an independent consultant helping with the implementation.
Which other solutions did I evaluate?
We've compared CyberArk Identity for our other customer and did a real peer review between BeyondTrust and CyberArk Identity. It was very close. In the end, CyberArk Identity had a better offer for us and was a little bit cheaper. That's why we decided to go with CyberArk Identity at the other customer. This customer already decided they wanted CyberArk Identity because it's a government agency and they've got a lot of other governments using CyberArk Identity. There was a lot of trust in CyberArk Identity, and there wasn't very much experience with BeyondTrust. It was a very quick choice to use CyberArk Identity for them.
What other advice do I have?
The feature of just-in-time access in managing privileged accounts and security is going to be important, but not right now because we're only using CyberArk Identity for nine months. We're still in the phase of onboarding all the privileged accounts and making sure that everybody is on board. After that, we're going to decrease the amount of rights that each account has and we're going to use named accounts instead of personal accounts. That's when we're going to implement just-in-time.
I don't think CyberArk Identity is cheap, but if you look at the security advantages that you get, I think it's the right price.
My clients are medium and enterprise, not small.
I would definitely recommend CyberArk Identity to other users because even though the implementation is difficult, the fact that you get so much more security is really a no-brainer for me. I think that everybody with multiple privileged accounts should implement at least a PAM solution CyberArk Identity, and CyberArk Identity is very good.
I would rate CyberArk Identity overall an eight out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Simplifies digital asset management and offers great performance and security features
What is our primary use case?
We are a civil and social organization. CyberArk Identity provides security to our digital access. It makes it easy and helps our organization control who can access our apps and data. Overall, it is our gatekeeper.
How has it helped my organization?
CyberArk Identity has improved my organization by helping us attain the culture of secure access to all our apps, making it easy to create access identities that determine who is allowed to access certain assets. When doing a project, not everyone is involved, so we are able to know who can access all the details of that project and who to remove from accessing those projects.
What is most valuable?
The best feature of CyberArk Identity is Single Sign-On because it removes the hassle of remembering many passwords in different apps. You just log in once and get access to all your apps.Â
Another valuable feature is Multi-Factor Authentication, which applies for both our cloud and on-premises apps.
What needs improvement?
The area that has room for improvement in CyberArk Identity is the onboarding process. What I have found is that if you are not an IT person or you are just new to that industry, it requires specialized knowledge for you to have a smooth onboarding journey.Â
The configuration and setup procedures are a bit complex. However, on my side, I am very comfortable because I have dealt with IT-related matters. I am primarily referring to new users who are unfamiliar with the IT department.
For how long have I used the solution?
I have been using CyberArk Identity for five years.
What do I think about the stability of the solution?
It is very stable, rating a perfect 10 out of 10.
What do I think about the scalability of the solution?
For scalability and reliability, it rates a perfect 10 out of 10.
We have about 35 users using the solution.
How are customer service and support?
They have an amazing customer care community. They always respond on time and offer 24/7 support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I previously used Microsoft Entra IDÂ . In terms of security, CyberArk Identity is excellent, reliable, and provides more advanced security features.
How was the initial setup?
On my side, it was easy.
It took less than three weeks for deployment. In another department of our company, they hired a specialized person, and it took two months.
The solution requires low to medium maintenance.
What was our ROI?
In terms of return on investment, I have seen an 85% savings in resources.
What's my experience with pricing, setup cost, and licensing?
CyberArk Identity's pricing is fairly flexible and affordable.
What other advice do I have?
I would highly recommend CyberArk Identity to any type of organization or individual users. The performance is great, and the security features are excellent and modern. Two features that greatly impressed me are the Single Sign-On feature (SSO) and the MFA feature.Â
I would rate this solution 10 out of 10.
Which deployment model are you using for this solution?
Reduces IT team's workload while offering comprehensive identity security features
What is our primary use case?
The solution is mostly used for financial services.
How has it helped my organization?
The solution covers all key pillars of Identity security and governance. It reduces IT team workload by managing employee transitions, allocating rights, implementing least privilege, and ensuring people have only the necessary access rights. The role-based access and secure resource access principles are automated within organizations, especially when integrated with HR systems, enabling quick resource provisioning and decommissioning.
Once the solution is deployed, the customer can immediately see benefits. Typically, the first phase involves securing high-risk areas. Once the protection for privileged access identities is in place, the customer can then focus on securing the rest of the workforce, as well as protecting sensitive communications between machines, endpoints, and workstations. The time to realize value from this solution is quite short because it is a comprehensive solution. As soon as it is implemented, it fundamentally changes how users access systems, providing immediate security benefits. In summary, the value becomes apparent right away.
What is most valuable?
CyberArk Identity offers Single Sign-On , Adaptive MFA, Web Password Manager, and Secure Web Sessions for recording sessions from web applications. It also provides federated services, Directory Service integration with popular IDPs, and management of joiners, leavers, and movers in an organization.
What needs improvement?
They have been working to improve areas such as Identity Governance and Assurance (IGA ), but integration with new acquisitions into a single stack could be enhanced. While CyberArk Identity is a leader in Identity Security, the integration of multiple components could be improved.
I would suggest focusing on the integration of the multiple components. Currently, we have a unified platform, but with the recent acquisitions, I would like to see more seamless integration of those new entities. Additionally, I’m curious to see how the recent acquisition by Palo Alto will play out. I am interested in understanding how both companies can benefit from each other moving forward.
Additional improvements could include more out-of-the-box plugins for key systems. Though they are the largest privileged access company with numerous integrations, coverage could be expanded for certain database clients and other systems.
For how long have I used the solution?
I have been using CyberArk Identity for a year and a half.
How are customer service and support?
Their support is very good, with a huge community. I would rate it as a nine out of ten.
How would you rate customer service and support?
Positive
What's my experience with pricing, setup cost, and licensing?
The subscription licensing model, which provides identity features within the privileged access license, is quite affordable for most customers. The full stack available through one subscription license works particularly for customers in Africa, where the acquiring rate remains healthy.
What other advice do I have?
I would rate CyberArk Identity an eight out of ten.
UI simplification and robust support enhance user provisioning and authentication efficiency
What is our primary use case?
We are using CyberArk Identity for user provisioning, and we have integrated multiple applications, most of them being SAML-based authentication ones.Â
We are also provisioning users to target applications and using CyberArk Identity as an authentication method for two-factor authentication.
I have worked on multiple projects where we have integrated external IdPs with CyberArk Identity. We have also implemented AD integration to get users from Active Directory to CyberArk Identity. We are using the reporting functionality and role-based access control.Â
We have created several roles for one client where I was working. It was an all-suite ISPS model that CyberArk has where CyberArk Identity, Privileged Cloud, and all those applications were present. In this case, we were using roles from CyberArk Identity to grant users access to their respective safes in the Privileged Cloud.
What is most valuable?
The UI is very simplified, and the documentation of CyberArk Identity is very crisp and clear. The support of CyberArk Identity is also really good.Â
From the support perspective, there is an excellent feature for identity verification.Â
When someone calls with identity issues, CyberArk Identity has provided one of the best features where we can use MFA verification. It sends a code to the user and validates the caller.
CyberArk Identity can be integrated with applications such as Secure Hub, Secrets Hub, Conjur, and Privileged Cloud. However, getting usage reports for specific applications is difficult. Tracking user activity across different integrated applications is challenging as the logs don't provide detailed information about which application users accessed.
What needs improvement?
The reporting functionality is somewhat complicated. While I would rate CyberArk Identity and Okta on the same level, Okta's reporting is crisper and clearer. For CyberArk Identity, you need knowledge of their scripting language to pull different sets of reports.Â
Though the out-of-the-box reports are good, they should simplify the reporting process to make it easier to pull all reports. The documentation for the reporting functionality is not very clear, which creates conflicts.Â
Additionally, CyberArk Identity needs to enhance features such as import scheduling and document clarity for new aspects such as Flows.
For how long have I used the solution?
I have been using CyberArk Identity in my career for almost four years.
What do I think about the stability of the solution?
As part of maintenance, we haven't faced any downtime with CyberArk Identity. If there are any outages, CyberArk is responsible, and they usually address them very quickly. The services were operational 24/7.Â
Previously, we faced some issues where when users were provisioned and we tried to delete them, the entry was deleted from the back end, however, a ghost entry still existed in CyberArk Identity. We did not have an option to delete that particular user, which caused issues when trying to provision the same user again from AD.
How are customer service and support?
The quality of support is really good. They respond immediately when requests are raised, and they are always available for priority one tickets. The only requirement is having access to their community portal to raise cases. The support is comparable to other SaaS products such as Okta.
How would you rate customer service and support?
How was the initial setup?
The initial deployment was straightforward. CyberArk provides the tenant, and the documentation for integrating with Active Directory is clear. You need to build the server and set up the agent. The AD integration itself takes about ten minutes, but the complete process, including server build and approvals, takes a couple of days. If all resources are ready, the actual integration is very straightforward and takes only five to ten minutes.
What about the implementation team?
We are partners providing services to other clients. I am an implementation engineer responsible for designing, architecting, and deploying solutions for clients.
What's my experience with pricing, setup cost, and licensing?
I am not certain about CyberArk Identity's exact pricing model. For comparison, Okta was around five dollars per user. CyberArk Identity offers good discounts to some clients, which influences their decision to choose the solution.
Which other solutions did I evaluate?
Okta is a more mature product compared to CyberArk Identity. Policies and customization are easier with Okta. Integration with different applications through the Okta Integration Network is straightforward, with clear guides and steps. CyberArk Identity could improve in these areas. The main difference is in the UI and some features.Â
The reporting functionality in Okta is superior. In Okta, you can control imports and manually import users from AD, applications, or CSV files. These options and the ability to schedule periodic imports are not available in CyberArk Identity.
What other advice do I have?
Comparing CyberArk Identity with products such as Ping, Okta, and RSA, CyberArk Identity still needs product development, as Okta offers additional features. Some features of CyberArk Identity are excellent, however, Okta is more user-friendly. The reporting functionality and Flows are areas for improvement. Since Flows is a new product, it needs to mature. They should conduct training, educate people, and provide clear documentation for better utilization.
In the Identity user portal, you can create secure notes, upload passwords or keys, and create bookmark applications. We have encountered some glitches when sharing applications with others, where users face issues despite having correct permissions.
I rate CyberArk Identity eight out of ten.