Listing Thumbnail

    Descope Authentication Platform Enterprise Edition

     Info
    Sold by: Descope 
    Deployed on AWS
    Descope is a drag-and-drop authentication and user management platform designed for developers. With our no-code workflows, SDKs, and APIs, you can easily create secure, frictionless authentication flows for every interaction a user has with your B2B or B2C application.
    4.8

    Overview

    Play video

    Descope is a drag-and-drop authentication and user management platform designed for developers. With our no-code workflows, SDKs, and APIs, you can easily create secure and frictionless authentication flows for every interaction a user has with your B2B or B2C application.

    Built by security experts, Descope also helps stop bot attacks on login pages, protects against account takeover, and enables apps to easily add MFA and step-up authentication.

    Highlights

    • Quick and flexible authentication: Use drag-and-drop workflows, SDKs, and APIs to easily create and customize passwordless login experiences.
    • Enhanced user protection: Easily embed multi-factor authentication (MFA), step-up controls, and bot protection into your existing authentication flows.
    • Full user management for B2B apps: Add SAML SSO, role-based access control, tenant management, and automated user provisioning (SCIM) to your business app.

    Details

    Sold by

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Trust Center

    Trust Center
    Access real-time vendor security and compliance information through their Trust Center powered by Drata. Review certifications and security standards before purchase.

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Descope Authentication Platform Enterprise Edition

     Info
    Pricing is based on the duration and terms of your contract with the vendor, and additional usage. You pay upfront or in installments according to your contract terms with the vendor. This entitles you to a specified quantity of use for the contract duration. Usage-based pricing is in effect for overages or additional usage not covered in the contract. These charges are applied on top of the contract price. If you choose not to renew or replace your contract before the contract end date, access to your entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    12-month contract (1)

     Info
    Dimension
    Description
    Cost/12 months
    Annual Commit
    Annual commit fee to use the descope service
    $5,000.00

    Additional usage costs (1)

     Info

    The following dimensions are not included in the contract terms, which will be charged based on your usage.

    Dimension
    Cost/unit
    Consumption fee for service per user or per tenant
    $0.10

    Vendor refund policy

    All amounts payable for Descope Services, Support or Consulting Services are non-refundable except as required by law.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    50
    In Device Security
    Top
    25
    In Centralized Identity Management, Cloud Governance

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    25 reviews
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Passwordless Authentication
    Drag-and-drop workflows and APIs enabling passwordless login experiences without traditional password-based authentication.
    Multi-Factor Authentication
    Built-in multi-factor authentication (MFA) and step-up authentication controls that can be embedded into existing authentication flows.
    Bot Attack Prevention
    Bot protection mechanisms designed to stop bot attacks on login pages and prevent unauthorized access attempts.
    Enterprise User Management
    SAML SSO, role-based access control (RBAC), tenant management, and automated user provisioning via SCIM protocol for B2B applications.
    Account Takeover Protection
    Security features designed to protect against account takeover attacks and unauthorized account access.
    Multi-Factor Authentication
    Supports implementation of Multi-Factor Authentication (MFA) for enhanced security without requiring custom code development.
    Single Sign-On Protocol Support
    Integrates with standard protocols including SAML, OIDC, and OAuth to enable Single Sign-On (SSO) functionality across applications.
    Passwordless Authentication
    Enables passwordless login mechanisms as a modern authentication method for both on-premises and cloud-based applications.
    Identity Provider Integration
    Connects with multiple identity providers including Amazon Cognito, Microsoft Entra ID, Azure AD B2C, Okta, and Auth0 for flexible access control.
    No-Code Implementation
    Delivers authentication capabilities without requiring custom code development, applicable to both legacy and new applications.
    Passwordless Authentication
    Extends single sign-on (SSO) capabilities to enable passwordless authentication for nonstandard applications without requiring password managers.
    Identity Provider Integration
    Leverages identity providers to manage authentication and access control across applications through centralized identity governance.
    User Lifecycle Management
    Automates user onboarding, offboarding, and management operations at scale through streamlined administrative workflows.
    Multi-Factor Authentication Automation
    Automates two-factor authentication (2FA) enrollment and management across applications.
    Privileged Account Security
    Provides secure management and access control for privileged accounts across SaaS applications.

    Contract

     Info
    Standard contract
    No

    Customer reviews

    Ratings and reviews

     Info
    4.8
    82 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    93%
    7%
    0%
    0%
    0%
    0 AWS reviews
    |
    82 external reviews
    External reviews are from G2 .
    Lior T.

    Effortless Setup, Reliable for Multi-Tenancy

    Reviewed on Jan 12, 2026
    Review provided by G2
    What do you like best about the product?
    I really like Descope for the 'out of the box impersonation' feature. It lets us see the app through the eyes of our customers and spot bugs and issues fast. I also appreciate that everything worked fine for us and the initial setup was very easy, making the experience smooth and satisfying.
    What do you dislike about the product?
    Nothing
    What problems is the product solving and how is that benefiting you?
    Descope provides a reliable solution for authorization, user management, and multi-tenancy. It also offers out-of-the-box impersonation, allowing me to see the app through customers' eyes to quickly spot bugs and issues.
    Arun K.

    Works great for our multi-tenant B2B auth needs

    Reviewed on Jan 09, 2026
    Review provided by G2
    What do you like best about the product?
    Descope has been a great fit for our multi-tenant B2B authentication needs — we use it for social login and SSO, multi-tenant user management, and RBAC policies. Flows have also been genuinely helpful for us: our login page is powered through a Flow, and even without heavy customization it’s been easy to make quick changes and iterate without much engineering effort. The overall experience has been seamless in production so far, and the platform has been consistently available. The docs are detailed and typically sufficient to self-serve, and the team is very responsive whenever we have questions or need help. We also like how Access Keys and unified JWTs work seamlessly with Flows and RBAC, making it easy to handle different identity types (including test users) consistently.
    What do you dislike about the product?
    We ran into a couple of rough edges while setting things up — particularly around Microsoft social login and fine-grained whitelabeling options for the Flow-based hosted login page. That said, the Descope team was proactive and provided timely support to help us resolve these at the earliest, and we haven’t had major issues beyond that.
    What problems is the product solving and how is that benefiting you?
    We use Descope as the authentication provider for our B2B application, primarily using Flows for login, social and SSO authentication, and multi-tenant user management with RBAC policies. We also use Access Keys and a unified JWT approach across access keys, real users, and test users, which makes protected flows and RBAC enforcement consistent across all identity types. Overall, Descope helped us avoid building and maintaining authentication in-house, enabled us to ship quickly, and gives us flexibility to evolve the login experience as our product and enterprise needs grow.
    Joshua M.

    Intuitive, Flexible, and Supportive—Descope Shows Us A Promising Future

    Reviewed on Nov 10, 2025
    Review provided by G2
    What do you like best about the product?
    Descope is more approachable and intuitive than a lot of other products we evaluated. Some seemed really good on their website, but the experience didn't hold up. Descope was the one that really clicked when we started trying to fit it to our organizational needs. Descope's sales engagement was very helpful in making us comfortable that their multi-tenant solution would meet our complex needs as a multi-tenant SaaS application with a variety of products to unify under one identity system. We are in the early stages of integrating Descope into our applications, but so far it seems very straightforward for a typical web app. Unfortunately for us, we need to bring our code up to standard to really take advantage of Descope's features. We look forward to using the power of their auth flows to enhance our users' sign on experience and centralize our identity management across products.
    What do you dislike about the product?
    While auth flows are very powerful, it's a bit difficult to reconcile in your mind how their flows, which orchestrate the entire sign on experience, translate into standard OIDC handoffs. It's easy to consume a flow logically, but understanding how to plug in a more generic auth provider flow into their custom flows still is muddy to me. Thankfully, their onboarding support has been very hands-on and responsive as we encounter questions like this. Also, as a .NET shop, their SDK for .NET is needing work to be production ready. We are still deciding whether to implement our own or work with Descope to improve theirs. I believe some of their other SDKs are more mature. Fortunately, their API is easy enough to work with, and our initial attempts at coding our own shows promise.
    What problems is the product solving and how is that benefiting you?
    Our main product uses a proprietary auth system, and we are building or acquiring other products that have their own disparate auth, too. As we try to build a multi-product application suite, we clearly need a unified customer identity experience, and we don't have the capacity or expertise to build it ourselve. We need an identity partner that can provide us the powerful SSO auth flows without us needing to be auth experts. We need to focus on our business and let Descope take care of the auth and identity management. Descope has been great to work with and has already taken our feedback to improve their product.
    Ahsan Y.

    Effortless Login and Account Management, Seamless User Experience

    Reviewed on Nov 08, 2025
    Review provided by G2
    What do you like best about the product?
    What I like best about Descope is how simple it makes logging in and managing accounts. I love that it handles security without me having to worry about all the complicated backend stuff. What’s most helpful is how fast and easy it is to set up, and the upsides are that my users have a smooth experience, and I can focus on building features instead of dealing with authentication headaches.
    What do you dislike about the product?
    The primary drawback of Descope is that, despite its robust capabilities, certain advanced features require time to thoroughly grasp and implement. While the documentation is generally helpful, there are times when I need to experiment or contact support to achieve the precise results I’m aiming for. The most challenging aspect tends to be handling edge cases or customizations not addressed in the standard guides, which can cause minor delays in the implementation process.
    What problems is the product solving and how is that benefiting you?
    Descope addresses the challenge of creating secure and adaptable authentication systems without the need to build them from the ground up. It manages features such as passwordless login, multi-factor authentication, and social logins in a manner that is both dependable and straightforward to integrate. This has been beneficial for me, as it saves development time, minimizes potential security risks, and provides my users with a smooth, seamless login experience. As a result, I am able to concentrate more on developing new features instead of spending time managing authentication.
    Information Technology and Services

    Solid Authentication Solution for Modern Apps

    Reviewed on Oct 30, 2025
    Review provided by G2
    What do you like best about the product?
    Descope offers exceptional ease of use with reliable authentication solutions that integrate seamlessly into our applications. The platform provides smooth integrations, excellent documentation, and a well-designed interface that makes implementation straightforward for developers.
    What do you dislike about the product?
    While mostly satisfactory, there's occasional complexity during initial setup and configuration. Better pre-built templates for common use cases would streamline the onboarding process further.
    What problems is the product solving and how is that benefiting you?
    Descope effectively solves our authentication and access management challenges by providing a comprehensive, modern solution. This has eliminated the complexity of managing multiple authentication providers, reduced security vulnerabilities, and streamlined our developer workflows significantly.
    View all reviews