Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

58 AWS reviews

External reviews

332 reviews
from and

External reviews are not included in the AWS star rating for the product.


4-star reviews ( Show all reviews )

    MYKOLA CHEBAN

Secure remote access has enabled single sign-on and centralized control for all company users

  • March 04, 2026
  • Review from a verified AWS customer

What is our primary use case?

I am currently working with OpenVPN Access Server for approximately 20 users. We use OpenVPN Access Server to connect to our company services from one IP address to secure these connections. OpenVPN Access Server is very lightweight, and the installation process is equally lightweight.

Single sign-on is very important for me because it is one of the principles of zero-trust architecture. In this architecture, each user has minimum privilege and uses one login and one password to connect to any services.

How has it helped my organization?

It is very easy to install and set up OpenVPN Access Server within the organization. Installing and using this service is very easy. OpenVPN Access Server provides a very detailed guide for installing it on your own server and integrating it with Google or Microsoft, making the process straightforward.

What is most valuable?

The best feature of OpenVPN Access Server is single sign-on, which is a very secure feature for information security.

Access control is effective in providing precise access to user groups and devices. In our company, we use a couple of services to control devices and users. One of these is a mobile device management solution such as Miradore or JumpCloud, and another solution to secure the channel to connect to company services is OpenVPN Access Server. Through the admin console, we can manage user rights and connections to company services.

What needs improvement?

I have no answer regarding what I would like to see improved in OpenVPN Access Server. I am not aware of future features, but the current features in the interface and the functionality of OpenVPN Access Server are very good. Everything in OpenVPN Access Server is very good, but the price is expensive.

For how long have I used the solution?

I have been working with OpenVPN Access Server for around three years across two companies where I worked.

What do I think about the stability of the solution?

I find it very stable. All the issues were from my own mistakes, not from OpenVPN Access Server.

What do I think about the scalability of the solution?

I find OpenVPN Access Server scalable and have not seen any limitations with it. The stability was very good, and I have no issues or problems. When we deploy and install OpenVPN Access Server, the principle is to install and forget.

How are customer service and support?

Regarding technical support for OpenVPN Access Server, it is very good and very fast. Any issue was solved in five to ten minutes, or they sent me a description to solve my issue when I could not determine the problem myself. The technical support is very fast and very good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I previously used L2TP/IPsec on my home router, and I am currently testing WireGuard for my home network because WireGuard is faster than OpenVPN Access Server.

How was the initial setup?

The user interface of OpenVPN Access Server is very easy. It has two buttons: a download button and a cancel button, along with a checkbox to download only the profile. There are no additional settings, only log out and download options with the checkbox. This is a very simple interface that is very good for users, very good for admins, and very good for security.

What about the implementation team?

We purchased OpenVPN Access Server directly from the OpenVPN market. I found it on the internet, researched it, connected to the company, and after testing, my chief decided to buy this solution for secure connection to our services. Our first purchase was from OpenVPN Access Server, and the next purchase was for the admin panel of OpenVPN Access Server, which was deployed on our rented server as a standalone server.

What was our ROI?

The main benefits that I have seen from using OpenVPN Access Server are that it is simple, easy, and secure.

What's my experience with pricing, setup cost, and licensing?

I find it not cost-effective. It is not worth the money from a pricing perspective. However, it is a good investment for security and company information security. It is a good investment overall.

Which other solutions did I evaluate?

Apart from speed considerations, I use OpenVPN Access Server only for enterprise use and do not have a plan to use it for my home network. This is an enterprise solution and enterprise service, but not for a home user.

What other advice do I have?

For authentication, we use SAML to authenticate users from Microsoft Entra ID or Google Workspace. SAML and single sign-on serve the same purpose. We use SAML and local authentication for the admin, and the admin can authenticate through SAML with a checkbox in the admin panel or user panel.

I have a recommendation that I can share with other organizations considering OpenVPN Access Server. From my previous job, we used OpenVPN Access Server, and when I moved to a new job, I proposed using OpenVPN Access Server, and the chief decided to implement it. In the future, when I see that my friends or friendly corporations or friendly structures want to use a VPN, I will recommend OpenVPN Access Server.


    Oleksii Pavliuk

Secure access for remote teams has enabled private network work and compliance

  • March 04, 2026
  • Review from a verified AWS customer

What is our primary use case?

My main use case for OpenVPN Access Server is to allow our employees to access the private network and external web services that are whitelisted to our network.

A specific example of how my team uses OpenVPN Access Server is that developers are accessing private development services, microservices, or resources on AWS, while the business team or sales has access to some specific services launched and implemented on our private network that are closed from internet access.

External parties or partners whitelist our IP addresses, and our employees use VPN to access those services as well.

What is most valuable?

I believe the best features OpenVPN Access Server offers are 2FA authorization and its connection with Google Workspace, which allows for good synchronization.

I use the 2FA authentication and Google Workspace synchronization, and the benefits of these features for my team are that Google accounts of our employees can be synchronized and authorized through SSO, which makes it easier to set up and configure VPN for our employees. If they have a Google account, they can connect to VPN easily. 2FA adds an additional layer of authorization that enhances security.

OpenVPN Access Server has positively impacted my organization by allowing access to our private services, enhancing security, and enabling remote work from anywhere, as I just need to connect to the VPN to have encrypted traffic to our private resources.

What needs improvement?

I think the most difficult part of OpenVPN Access Server that I would improve is the management of the network, particularly the configuration on the admin side of the network and subnets, which is quite complicated.

Some services, such as YouTube, occasionally become unavailable because it seems to be a bot detection issue from YouTube related to the VPN, and I believe that can be improved to ensure other services do not misidentify OpenVPN Access Server as a bot.

I would describe the user interface of OpenVPN Access Server as fine, but sometimes it requires reloading the whole page to see changes, which can be annoying. In cluster mode, I cannot see what node the user is connected to from the cluster without checking each node individually, which could be improved.

For how long have I used the solution?

I have been working in my current field for seven years.

What do I think about the stability of the solution?

OpenVPN Access Server is stable.

What do I think about the scalability of the solution?

OpenVPN Access Server's scalability is somewhat hard to manage, but it remains scalable overall, primarily due to its cluster mode.

Which solution did I use previously and why did I switch?

We did not use a previous solution; however, I could mention WireGuard, which could have been an option but lacked 2FA authorization and Google authorization and operates only on Layer 3, while OpenVPN Access Server works on Layer 7, which is important for business users.

How was the initial setup?

I find it easy to install OpenVPN Access Server, and there are no issues. It is just a couple of clicks or using the package from the Ubuntu package registry, and the documentation is clear on how to do that.

What about the implementation team?

I did not purchase OpenVPN Access Server through the AWS Marketplace; it was set up manually as a self-hosted solution.

What was our ROI?

I have not seen a return on investment in terms of fewer employees needed, money saved, or time saved.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing for OpenVPN Access Server is that the license was for 10 people and it was fine on a yearly basis.

Which other solutions did I evaluate?

WireGuard was another option considered before choosing OpenVPN Access Server.

What other advice do I have?

OpenVPN Access Server remains stable and works well despite a couple of things that can be improved or enhanced, and the documentation is good with no issues on that side. My impression of the connection speed when using OpenVPN Access Server compared to other VPN solutions is that it is medium; it is not fast and it is not slow, but in some cases, it could be slow.

My advice for others looking into using OpenVPN Access Server is to consider if they need a VPN or just zero trust network access. If they want to route traffic to specific domains, OpenVPN Access Server may not be suitable, but for a secure, safe, and stable VPN with good service integrations such as Google for SAML authorization, it works well and I would recommend it. I would rate OpenVPN Access Server an eight on a scale of one to ten.

Which deployment model are you using for this solution?

Private Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Emmanuel Chebukati

Secure remote access has protected diverse users while access controls provide precise permissions

  • March 03, 2026
  • Review from a verified AWS customer

What is our primary use case?

My primary use case for OpenVPN Access Server is providing secure, centralized access to hybrid cloud environments. Whenever I set up hybrid cloud infrastructure for clients, deploying Access Server is a natural next step. It acts as a gateway, allowing us to securely connect to the private network for routine administration, system updates, and accessing internal dashboards and tools.

How has it helped my organization?

The main benefit I have seen from using OpenVPN Access Server is secure access to private resources over the public internet. That is the key benefit whenever it is set up, and it applies to all types of users. It applies to technical users who want to administer servers, internal users who are working, and executives who want to view internal dashboards. OpenVPN Access Server allows users to feel secure, and indeed, a lot of their traffic is secure. At the same time, if you configure OpenVPN Access Server correctly, users can continue to access non-corporate websites over the public internet, which is beneficial. If they are using Facebook or other personal activities on their phone, they can continue to do that, and that traffic will not be transferred over OpenVPN Access Server. Only when they try to access internal resources will that be accessed over OpenVPN Access Server. I really appreciate that aspect of OpenVPN Access Server.

What is most valuable?

The best features in OpenVPN Access Server for me are the integrations with single sign-on providers so that users can maintain a single corporate identity. I also appreciate the administration dashboard, which allows you to fairly easily provision subnets for different groups. Performance-wise, it is quite performant. OpenVPN Access Server supports both TCP and UDP protocols, and you can decide which to turn on or off. It is fairly performant and reliable. You can trust that once you are in the network, you will access your resources.

What needs improvement?

The user interface of OpenVPN Access Server is good but can be improved. I would prefer to see it become more intuitive. I use Twingate as an alternative, and in Twingate, you see resources, while in OpenVPN Access Server, those would be IP addresses. You get to see dashboards and access views of who can access a particular resource or subnet. You can see who can access what resources from the user view, but you can also see the reverse, which is which resource can be accessed by what users. That reverse view would be a nice addition to have in a dashboard. Additionally, access logs associated with that resource would be helpful, so it would be beneficial to have different views for the same content.

Beyond the positive aspects, I would like to see improvements in OpenVPN Access Server. Twingate offers a different approach to the same problem by moving more towards resource-specific resources and fine-grained zero-trust access, as opposed to entire subnets and entire networks. I would prefer to see views on resources. In the same way that we can define subnets, perhaps we could have views that describe what this particular subnet does and what this particular resource does. Then we can assign those resources and subnets to individual users and groups. It is more about granularizing the resources that can be accessed rather than simply bundling them under subnets or a list of subnets, which is the current approach.

Apart from that, I would like to see UI enhancements in OpenVPN Access Server in the future. Making it more modern would be beneficial.

For how long have I used the solution?

I have been using OpenVPN Access Server for over eight years since 2018.

What do I think about the stability of the solution?

Regarding stability, I have not had any crashes, performance issues, or stability issues with OpenVPN Access Server. That is one thing I appreciate the most about OpenVPN Access Server. Once you set it up correctly, it works and continues to work reliably. I do not recall ever experiencing OpenVPN Access Server crashing or the OpenVPN Access Server client crashing personally.

What do I think about the scalability of the solution?

Regarding scalability, I find OpenVPN Access Server scalable with some caveats. It is scalable on AWS because it is a matter of increasing the instance size and increasing the number of licenses. However, sometimes your license disappears or gets wiped out when you scale the infrastructure, which can be quite annoying, and requires reaching out to support to get set up again. Inherently it is scalable, but the process of scalability can be enhanced.

How are customer service and support?

I would evaluate OpenVPN's technical support and customer service teams as providing standard support. You send a ticket or create a ticket, and somebody responds, and they seem to know what they are doing. The service is adequate. I would rate the technical support an eight on a scale of one to ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

In comparison with other products and solutions such as Twingate or other VPN services, the key differences between OpenVPN Access Server and competitors include access to resources versus subnets, focusing on fine-grained access. Another difference is the ability to see logs specific to the resource that has been accessed. Compared to other products such as Cisco, the advantages include reliability and the protocol—OpenVPN Access Server uses HTTPS and UDP, which are universal. Some of the other protocols that other VPN providers use are not guaranteed. OpenVPN Access Server has advantages there. There should be a move more towards zero trust, where you are accessing a specific resource, defining a specific server or subnet, and assigning access to those resources to individual users or groups. That approach would be better.

How was the initial setup?

The ease of installing and setting up OpenVPN Access Server within the organization depends on the skillset of the person conducting the setup. On AWS, I would say it is medium difficulty because you have to select the right license and the right instance size, and it is not inherently clear what instance size to use. On-premise, it is fairly easy to set up. The setup for clients depends on the client that the end user is using. On mobile devices, sometimes I find that Mac users and iPhone users find it easier to set up than Android users. Overall, I would characterize the setup difficulty as medium. It is not too difficult and also not too easy.

What's my experience with pricing, setup cost, and licensing?

My experience with the pricing, setup cost, and licensing cost of OpenVPN Access Server is that the licensing is fair for the value provided. My experience is mostly on AWS, and there, I think the pricing is quite fair.

What other advice do I have?

I utilize the Access Controls feature of OpenVPN Access Server by provisioning users into groups and then provisioning access to those groups. The effectiveness of OpenVPN Access Server in providing precise access to users, groups, or devices is quite effective and reliable. I would not say it is the most intuitive specifically because there are default access groups, then you have overrides, and it is not inherently clear for someone just getting started with the product. However, if you are more experienced, it is straightforward to set up. Once you set it up, it is reliable, and you have confidence that whatever access you provision for that group of users will be maintained.

I purchase OpenVPN Access Server for my clients through the AWS Marketplace. Given my extensive experience with OpenVPN Access Server, I would recommend that before any organization implements it, they really need to define what their networks and subnets are and what is connected to what. Consider whether your on-premise infrastructure is connected to your cloud and whether your cloud is connected to another cloud. It is essential to have a good understanding of your network. Make sure there are no overlapping subnets, and then decide where to provision OpenVPN Access Server. The key advice is to understand your network before you even provision this resource, because where you provision it will determine what users can access. You certainly want to have a good amount of coverage where possible so that you can access your internal resources securely. I would rate this product an eight overall.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)


    Girraj Godia

Has improved internal app access by allowing secure user onboarding and simplified network whitelisting

  • October 08, 2025
  • Review from a verified AWS customer

What is our primary use case?

The main use case for OpenVPN Access Server is making internal web applications and using them within our organization. We have many internal apps, such as Re:dash for analytics, and internal peering and accessing different VM machines and internal servers.

I have hosted OpenVPN Access Server in my VM for one of those internal apps. From that VM, I have done the VPC peering to our different VPCs. And I have hosted, for example, Re:dash, an analytics tool for our internal company members. So we use VPN to whitelist them, and then they can internally use Re:dash for the analytics dashboard, querying, and connecting to the different databases and all.

What is most valuable?

The best features OpenVPN Access Server offers is whitelisting members in my company who have joined recently. It is really easy to use, and it is really easy to set up OpenVPN Access Server as an internal app.

When whitelisting members, I just add the name of the user. I go into User Permissions, add the name of the person I'm going to whitelist, and send them the credentials. They are able to log in and authenticate using an authenticator app and are easily able to onboard on OpenVPN Access Server and access internal apps.

It is easy to whitelist new apps that I'm going to host or when I've created a new VPC. I will do the VPC peering where I have hosted OpenVPN Access Server, and I can easily add the IP or CIDR of that particular new VPC or subnet which I'm going to use for my new app in the UI.

Before using OpenVPN Access Server, only developers mainly had access to databases. We can create read-only users for databases and internally give them access using OpenVPN Access Server. It has been really useful, as we don't have to give access to everyone, and just give access to OpenVPN Access Server, and they are able to access databases or internal websites.

The change has mainly led to the onboarding process being more smoothed out. It is really fast and saves developers' time. It saves my time as a DevOps engineer, setting up things for people.

What needs improvement?

The plan for OpenVPN Access Server could be improved. When adding new people, better plans for startups would be beneficial. I'm working in a startup and sometimes people think we should take the enterprise plan or not. If there was a dedicated plan for startups, it would be really helpful. For instance, providing store credit for OpenVPN Access Server through a startup program, similar to YC's program which gives credit to new startups.

UI-wise, OpenVPN Access Server is easy to manage, but the overall overview dashboard in the admin portal could be improved. Currently, you have to go through dropdowns to find where to add users or whitelist IPs. Creating an onboarding dashboard where an admin person can find these things easily would be beneficial.

For how long have I used the solution?

I have been using OpenVPN Access Server for around two years.

What do I think about the stability of the solution?

OpenVPN Access Server has been stable since the last six months with no issues.

What do I think about the scalability of the solution?

I have hosted OpenVPN Access Server in a VM. It does not utilize much memory or CPU on the VM. So far, I have been using around 40 users, and I did not need to scale it up. I think just scaling the VM would help in case it is needed.

How are customer service and support?

I haven't used customer support from OpenVPN Access Server.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I haven't used any other solutions on the VPN side. OpenVPN Access Server was the first tool I have used for whitelisting people, but it did not give me any reason to move to any other product. It has been good.

How was the initial setup?

I found some open-source documentation for setting up OpenVPN Access Server. It was really easy to set up initially. I got some networking issues from the VPC peering side, but it was resolved from open-source references.

What about the implementation team?

I have utilized the access controls feature of OpenVPN Access Server, including an auto-login feature. For some developers who are heavily using OpenVPN Access Server, I allow an auto-login feature. For others, they still have to put the MFA code from the authenticator app.

What was our ROI?

I haven't seen exact numbers from the investment side, but OpenVPN Access Server has been really useful and saved a lot of time for developers.

What's my experience with pricing, setup cost, and licensing?

The experience with pricing, setup cost, and licensing for OpenVPN Access Server is really good, not that expensive. I am easily able to add new users from the OpenVPN Access Server official website. I would suggest adding a startup plan for small startups would be really helpful.

Which other solutions did I evaluate?

Before choosing OpenVPN Access Server, I haven't evaluated any other options. Some of my colleagues recommended OpenVPN Access Server, and I went through it, and it has been really useful.

What other advice do I have?

I would suggest for others looking into using OpenVPN Access Server, people find it difficult sometimes to self-host. Find the right documentation and go through it. Mostly it is all about networking. If your basics of networking are clear, you will be able to host it easily.

On a scale of one to ten, I rate OpenVPN Access Server a nine.


    reviewer2748576

Secures access to AWS resources with straightforward setup and a clean admin interface while lacking an official Linux client

  • August 07, 2025
  • Review from a verified AWS customer

What is our primary use case?

I use OpenVPN Access Server to restrict access to internal AWS-hosted resources.

How has it helped my organization?

I have been using OpenVPN Access Server for several months as a lightweight, cost-effective VPN solution deployed on an EC2 instance. My primary requirement was to secure access to internal AWS resources without adding unnecessary complexity or overhead. OpenVPN Access Server met that need well.

What is most valuable?

The setup process is straightforward, with good support for common operating systems. The admin interface is clean, making configuration and user management easy even for teams without deep networking expertise.

What needs improvement?

The lack of an official Linux client is a clear gap. The community-maintained alternative is functional but not as stable or polished as the official Windows and macOS clients.

For how long have I used the solution?

I have used this solution for 3 years.

What do I think about the stability of the solution?

There were no stability issues.

What do I think about the scalability of the solution?

There were no scalability issues.

What other advice do I have?

Having an officially supported Linux client would significantly improve usability and reliability across all platforms.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)


    reviewer2711823

Setup and cross-platform integration simplify secure network access

  • May 28, 2025
  • Review from a verified AWS customer

What is our primary use case?

My main use case for OpenVPN Access Server is access to private subnets.

What is most valuable?

What I appreciate the most about OpenVPN Access Server is that it's very easy to set up.

OpenVPN Access Server has helped in meeting my organization's security requirements. I get to keep everything in the cloud private. People on the outside cannot see it, and this I use to connect.

What needs improvement?

There are ways OpenVPN Access Server could be improved. There are many small things, such as resetting MFA. There are tasks that require logging onto the server to run commands, which is not intuitive through the UI. If they had a one-click setup where you provide credentials instead of manually running commands, that would be beneficial. But it remains quite simple, which is why people appreciate it.

I assess the compatibility of OpenVPN Access Server with different client software and operating systems as quite easy. It's very good and simple to use. That's one of the reasons we use it. It's easy to set up the server side and the client side for users. It doesn't matter if it's Windows, Apple, Mac, or Linux - they're all very easy.

For how long have I used the solution?

I have been using OpenVPN Access Server for seven to eight years.

What do I think about the scalability of the solution?

OpenVPN Access Server scales with the growing needs of my organization. I have had some clients who expanded their usage, starting with three users, then increasing to 10, then to 20 users, each one in a different cloud with different licenses. It's not very easy to expand, and it would be beneficial if the process were simpler.

How are customer service and support?

I had to use their customer service and technical support for OpenVPN Access Server. It was very good, and I would rate it an eight.

How would you rate customer service and support?

Positive

What was our ROI?

I have not really seen any ROI from OpenVPN Access Server. It's very hard to measure ROI as it's just a method of connection.

Which other solutions did I evaluate?

I had considered other solutions before choosing OpenVPN Access Server, such as AWS VPN and others, but OpenVPN Access Server is simply easier to use.

What other advice do I have?

Regarding OpenVPN Access Server's advanced monitoring and reporting tools, I have not seen many features. They have a basic log, which is sufficient most of the time.

I found the setup and pricing of OpenVPN Access Server very easy since I've set it up many times. Even the first time wasn't particularly complicated.

I use the feature for hybrid deployment on OpenVPN Access Server in the cloud, not on-premises.

Overall, my experience with OpenVPN Access Server on a scale of one to 10 is a nine.


    Deniz Uzun

Easy to use and helps communicate with office servers

  • April 18, 2024
  • Review from a verified AWS customer

What is our primary use case?

We use the solution to communicate with our servers located in the office.

What is most valuable?

OpenVPN Access Server is a simple and easy-to-use solution that I can use myself without anybody's help.

What needs improvement?

The solution should provide a faster connection, and its security could be improved. The solution’s stability could be improved.

For how long have I used the solution?

I have been using OpenVPN Access Server for two to three years.

What do I think about the stability of the solution?

I rate the solution a seven or eight out of ten for stability.

What do I think about the scalability of the solution?

Around 50 users use the solution regularly in our organization.

I rate the solution’s scalability an eight or nine out of ten.

How was the initial setup?

The solution's initial setup is easy.

On a scale from one to ten, where one is complex and ten is easy, I rate the solution's initial setup a seven or eight out of ten.

What about the implementation team?

The solution’s deployment did not take much time.

What other advice do I have?

The solution was deployed on the cloud in our organization. More than 100 people are needed for the solution's deployment and maintenance.

Overall, I rate the solution an eight out of ten.


    MF

Great service. Lives up to its billing

  • October 21, 2023
  • Review from a verified AWS customer

As long as you are familiar with AWS, setting it up is not a problem. Good product for its value and is very recognized.


    Naveen

What about the security

  • July 30, 2021
  • Review from a verified AWS customer

what about the security who takes care of it
Imagine is instance is compromised
The OS on which VPN is running is the image CIS bench marked


    Ed

Simple and Easy

  • December 24, 2020
  • Review from a verified AWS customer

Used this AMI to replace our existing DirectAccess infrastructure (Windows) and am pretty happy with the reliability and performance of the product.

It is easy to use and setup as long as you have some VPN knowledge. However, the reporting capabilities can be lacking (i.e. I have no idea if we hit our licensing limit at a given time) and wish they offered a failover mode support for AWS.

Regardless, i'm happy about the switchover.