Reviews from AWS customer

35 AWS reviews

External reviews

41 reviews
from and

External reviews are not included in the AWS star rating for the product.


    NagendraK

Centralized authentication has improved secure access and simplified daily logins for all employees

  • May 14, 2026
  • Review provided by PeerSpot

What is our primary use case?

OneLogin serves as our main identity and access management solution, particularly for centralized authentication, single sign-on, and secure access management across enterprise applications and systems.

One practical example of how we use OneLogin for centralized authentication and secure access management in our organization is for centralized access to multiple enterprise and cloud-based applications through single sign-on. Instead of maintaining separate credentials for different platforms, OneLogin allows authentication through a single centralized identity system. When employees log into the organization environment, they can securely access authorized applications using a single authentication process combined with MFA. This simplifies the login experience for users while improving security by enforcing centralized access policy and strong authentication control.

We also use OneLogin for role-based access management and user provisioning. When a user joins the organization or changes roles, access permissions can be managed centrally, helping ensure users only receive operational accesses based on business requirements.

We have used Smart Factor Authentication to adjust authentication flows based on login risk scores, and it has been very effective in balancing security and usability. What stood out most is that low-risk users can log in with minimum friction while suspicious login attempts automatically trigger additional MFA checks or access restrictions. This reduces unnecessary MFA prompts for regular users while still strengthening protection against risky access attempts, which improved both user satisfaction and overall security posture.

The integration of phishing-resistant Device Trust has strengthened our authentication process by ensuring that only verified and trusted devices can access company resources. It significantly reduces the risk of credential phishing and unauthorized access. Overall, it improves confidence in remote access security while supporting a smoother and more secure user experience for day-to-day logins.

We have used adaptive login flows with Vigilance AI, and they significantly improved our ability to detect risky behavior and respond dynamically during authentication. For example, low-risk logins usually proceed smoothly while suspicious items trigger stronger MFA challenges or access restrictions, helping us improve security without creating unnecessary friction for normal users.

What is most valuable?

In my experience, the best part of OneLogin is its seamless single sign-on, which makes accessing multiple apps very easy and saves lots of time. The MFA and adaptive security features also provide strong protection without making the login process complicated. I also appreciate its easy integration with Active Directory and cloud apps, along with the automated user provisioning that simplifies user management for IT teams.

For our team, the seamless single sign-on feature stands out the most because it significantly reduces the hassle of managing multiple passwords and logging into different applications every day. It improves productivity since employees can access all the required tools through one secure login, which saves time and reduces login-related support tickets. In daily workflow, it made onboarding new users much faster and created a smoother experience for both remote and in-office teams.

OneLogin provides the most value in environments where the organization needs centralized authentication, MFA, SSO, and simplified access management across multiple cloud and enterprise applications.

OneLogin has positively impacted our organization by improving both security and operational efficiency. Since implementation, we have noticed fewer password reset requests, faster onboarding and offboarding of employees, and smoother access management across multiple applications. It also helped enhance user experience for employees while giving the IT team better visibility and control over authentication and security policies.

We have seen a positive return on investment primarily through reduced administrative workload, improved authentication efficiency, and time saving for both users and the IT team.

What needs improvement?

One area that could be improved in OneLogin is the user interface and administrative dashboard experience.

OneLogin is a strong identity and access management platform, but there are a few areas where improvement could enhance the overall experience and functionality. One area is the user interface and the administrative dashboard experience. While the platform is generally manageable, some advanced configuration and policy management tasks can feel complex, especially for organizations managing large environments with multiple integrations. Another area of improvement is integration flexibility and support for certain third-party legacy applications where additional customization and configuration may sometimes be required.

For how long have I used the solution?

I have been using OneLogin for the last one year.

What do I think about the stability of the solution?

OneLogin is stable.

What do I think about the scalability of the solution?

The scalability of OneLogin is positive.

How are customer service and support?

The customer support of OneLogin is positive.

Which solution did I use previously and why did I switch?

Before choosing OneLogin, we did not evaluate or choose any other solutions.

Before choosing OneLogin, we did not evaluate any other options.

What was our ROI?

I have seen a return on investment from using OneLogin, primarily through reduced administrative workload, improved authentication efficiency, and time saving for both users and the IT team. We also experienced operational efficiency improvements through centralized authentication and automated user provisioning and de-provisioning processes, which improved visibility into login activity and reduced risk associated with weak or compromised credentials.

What's my experience with pricing, setup cost, and licensing?

The experience with OneLogin's pricing, setup cost, and licensing was positive.

What other advice do I have?

OneLogin is deployed in our organization on-premises.

My impression of OneLogin's user identity synchronization across directories functionality is very positive.

My impression of OneLogin's ability to provide a seamless end-user signing and authentication experience is very positive.

I recommend organizations first clarify and evaluate their authentication access requirements before implementation. OneLogin provides the most value in environments where organizations need centralized authentication, MFA, single sign-on, and simplified access management across multiple cloud and enterprise applications. Smart Factor Authentication provides a good balance between security and usability, especially in environments where organizations want strong authentication control without creating unnecessary friction for users.

I give this review a rating of ten out of ten.


    Sarang Repale

Centralized access management has strengthened authentication and simplified daily user workflows

  • May 13, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for OneLogin is managing secure user authentication and single sign-on across multiple business applications and for user provisioning, user control, and multi-factor authentication.

A specific example of how I use OneLogin for those purposes in my day-to-day work includes identity and access management, especially for single sign-on and secure user authentication across multiple applications and services.

I do use the solution's Smart Factor Authentication to adjust authentication flows in real-time depending on the risk score associated with the login attempt, and I assess it as very effective from a security perspective because high-risk or unusual login attempts trigger stronger authentication controls. The balance between security and usability is one of the strongest points of Smart Factor Authentication because it improves protection while minimizing friction for the end user in day-to-day operations.

My impression of the user identity synchronization features in OneLogin is very positive; it works well for synchronizing users across different directories such as Active Directory, LDAP, cloud directories, and HR systems.

The integration of phishing-resistant device trust impacts my authentication processes by reducing the risks of phishing-based attacks, credential theft, and unauthorized access because authentication decisions are based not only on passwords but also on device trust and user behavior.

I have not used the adaptive login flows with Vigilance AI.

When employees change departments or leave the organization, access permissions and accounts are automatically updated or revoked, although I do not use HR-driven identity management.

What is most valuable?

I would like to add that the multi-factor authentication features in OneLogin help improve account security by adding an extra layer of protection beyond just passwords.

The best features OneLogin offers, in my opinion, include centralized identity and access management, a simple and user-friendly dashboard, secure remote access for users working from different locations, and good reporting and monitoring features for security and compliance.

Out of those features, I find myself relying on multi-factor authentication the most because it helps improve account security by adding an extra layer of protection beyond just passwords, and the centralized dashboard and automation features also help reduce manual work related to user provisioning, password management, and access review.

OneLogin has positively impacted my organization by allowing users to securely access multiple applications with a single sign-on, improving user experience, and reducing password-related issues and support tickets.

From a security perspective, features such as MFA and authentication help reduce the risks of unauthorized access and improve visibility into suspicious login activities, which contributes to measurable drops in password-related support tickets and time saved for our IT team after implementing OneLogin.

What needs improvement?

I believe support response time and troubleshooting for complex integrations could be improved in some cases for OneLogin.

I have noticed that customization of reports and alerts would make daily operations even smoother for security and IT teams.

For how long have I used the solution?

I have been using OneLogin for the last one year.

What do I think about the stability of the solution?

OneLogin is stable.

What do I think about the scalability of the solution?

OneLogin's scalability is quite stable and works well for growing organizations and enterprise environments; in our case, it handles an increasing number of user applications and authentication requests effectively.

How are customer service and support?

Customer support is good.

Which solution did I use previously and why did I switch?

Before implementing OneLogin, we were mainly using traditional Active Directory-based authentication, and we switched to OneLogin to get centralized identity and access management, single sign-on, and multi-factor authentication.

How was the initial setup?

My experience with pricing, setup cost, and licensing for OneLogin has been generally positive. The initial setup required proper planning, especially for integrating Active Directory, and we also saw value from reduced password-related support tickets.

What about the implementation team?

OneLogin was implemented through the organization's standards licensing and procurement process, and not purchased through the Azure Marketplace.

What was our ROI?

We have seen a good return on investment after implementing OneLogin, with the biggest improvements being reduced support efforts, faster user management, and stronger security controls.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing for OneLogin has been generally positive.

Which other solutions did I evaluate?

We evaluated a few other IAM and SSO solutions such as Okta and Microsoft Entra ID before choosing OneLogin.

What other advice do I have?

I would advise organizations considering OneLogin to first understand their application environment, user access requirements, and user provisioning needs, as this helps make the implementation smoother and more effective. I would rate this review as a 9.


    Ujjwal Pal

Centralized access has simplified authentication and has improved security with strong MFA

  • May 13, 2026
  • Review provided by PeerSpot

What is our primary use case?

OneLogin serves as our main identity and access management solution, particularly for centralized authentication, single sign-on, and secure access management across enterprise applications and systems.

One practical example of how we use OneLogin for centralized authentication and secure access management in our organization is for centralized access to multiple enterprise and cloud-based applications through single sign-on. Instead of maintaining separate credentials for different platforms, OneLogin allows authentication through a single, centralized identity system. When employees log in to the organization environment, they can securely access authorized applications using a single authentication process combined with multi-factor authentication. This simplifies the login experience for users while improving security by enforcing centralized access policy and strong authentication control.

We also use OneLogin for role-based access management and user provisioning. When a user joins the organization or changes roles, access permissions can be managed centrally, helping ensure users only receive operational access based on business requirements.

OneLogin is primarily deployed as a cloud-based identity and access management solution within our organization.

What is most valuable?

OneLogin's best features include its single sign-on, MFA, multi-factor authentication, and centralized approach, which improve operational efficiency, reduce password-related support issues, strengthen authentication security, and provide better visibility into user access activity across the environment.

Single sign-on, combined with centralized access management, stands out as the most valuable feature for me. The biggest advantage is that it simplifies authentication for users while still maintaining strong security control. Instead of managing multiple usernames and passwords across different applications, users can securely access authorized systems through a single centralized authentication process. This significantly improves the user experience and reduces password-related support requests and administrative overhead.

Another feature worth highlighting is the platform's strong integration capability with cloud applications, enterprise systems, and identity providers. This makes it easier to centralize authentication and access management across different environments without requiring complex manual administration. The user provisioning and de-provisioning capabilities are also very valuable because they help automate access management processes and reduce the risk of outdated and unnecessary access remaining active within the environment.

OneLogin has positively impacted our organization by improving authentication security, simplifying access management, and enhancing the overall user experience for accessing enterprise applications and systems. The platform also strengthens security through centralized authentication policy and multi-factor authentication, helping improve access control and reduce risks related to weak and compromised credentials.

What needs improvement?

OneLogin is a strong identity and access management platform, but there are a few areas where improvement could enhance the overall experience and functionality. One area that could be improved is the user interface and administrative dashboard experience. While the platform is generally manageable, some advanced configuration and policy management tasks can feel complex, especially for organizations managing large environments with multiple integrations. Another area of improvement is integration flexibility and support for certain third-party and legacy applications where additional customization or configuration may sometimes be required.

For how long have I used the solution?

I have been using OneLogin for more than two years.

What do I think about the stability of the solution?

OneLogin is stable.

What do I think about the scalability of the solution?

OneLogin's scalability has been especially effective for organizations managing growing cloud environments, multiple enterprise applications, and an increasing number of users. The platform handles centralized authentication, single sign-on, multi-factor authentication, and user provisioning effectively as the environment expands. As more applications and users are added, OneLogin helps maintain consistent access management and authentication policies without significantly increasing administrative complexity. The platform's integration capability with cloud applications, directories, and enterprise systems also supports scalability by simplifying identity synchronization and access governance across multiple environments.

How are customer service and support?

The customer support is positive.

Which solution did I use previously and why did I switch?

We did not use any solution before using OneLogin.

How was the initial setup?

My experience with OneLogin pricing, setup cost, and licensing is generally positive, especially considering the value it provides in centralized identity, access management, single sign-on, and multi-factor authentication. The initial setup and licensing costs are very reasonable for an enterprise identity platform. The total cost can vary depending on the number of users, authentication features, integration, and advanced security capabilities being used.

What was our ROI?

We have seen a positive return on investment from using OneLogin, primarily through reduced administrative workload, improved authentication efficiency, and time savings for both users and the IT team. We also experience operational efficiency improvements through centralized authentication and automated user provisioning and de-provisioning processes. Another important benefit was strong authentication security through MFA and adaptive authentication policies, which improve visibility into login activity and reduce risks associated with weak or compromised credentials.

Which other solutions did I evaluate?

Before choosing OneLogin, we did not evaluate other options.

What other advice do I have?

I recommend that organizations first clarify and evaluate their authentication and access requirements before implementation. OneLogin provides the most value in environments where organizations need centralized authentication, MFA, SSO, and simplified access management across multiple cloud and enterprise applications. I recommend starting with a well-defined access management strategy and identifying which applications, directories, and user groups will be integrated into the platform.

Smart Factor Authentication provides a good balance between security and usability, especially in environments where organizations want strong authentication control without creating unnecessary friction for users. This makes it effective in its adapting and risk-based authentication approach. For example, if a user logs in from a trusted device and normal location, the authentication process remains smooth and user-friendly. However, if the login attempt appears unusual, such as from an unfamiliar device, unusual location, or suspicious network behavior, the platform can automatically trigger strong MFA requirements or additional verification steps.

My impression of the user identity synchronization functionality in OneLogin is very positive, especially for organizations managing users across multiple directories, cloud applications, and enterprise systems. The synchronization capability helps maintain centralized identity consistency by automatically managing user account information, access permissions, and authentication data across connected systems. This significantly reduces manual administrative effort and minimizes the risk of inconsistent or outdated user information across environments.

The integration of phishing-resistant device trust has had a positive impact on our authentication process by strengthening access security while improving confidence in user and device verification. One of the biggest benefits is the reduction of risk associated with credential theft, phishing attacks, and unauthorized device access. This support adds an additional layer of security to the authentication workflow because even if credentials are compromised, access from a trusted and managed device can still be restricted or challenged with strong authentication requirements.

OneLogin's ability to provide a seamless end-user experience for signing in and authenticating to needed applications is very positive. The platform does a good job of simplifying access to enterprise applications while maintaining strong security controls in the background. Single sign-on capability is one of the biggest strengths because it allows users to access multiple authenticated applications through a single authentication process without needing to repeatedly enter credentials for each system.

We have evaluated and utilized adaptive authentication capabilities similar to Vigilance AI, risk-based authentication, and strong access security within the environment. For example, when a user authenticates from a trusted device, it is effective. However, if we log in suspiciously, such as from an unknown device or abnormal access pattern, additional authentication factors or strong verification requirements can be triggered automatically. The adaptive login flow functionality has been valuable for identifying potentially risky authentication behavior based on contextual factors such as device information, login location, IP reputation, unusual access patterns, and user behavior.

I would rate this review a 9 out of 10.


    Aditya Vishwakarma

Centralized access has simplified single sign-on and strengthened adaptive MFA for all users

  • May 12, 2026
  • Review from a verified AWS customer

What is our primary use case?

I mainly use OneLogin for single sign-on, MFA enforcement, and centralized user access management across SaaS applications.

I use OneLogin to give employees one secure login for applications like Microsoft 365, Atlassian, and internal SaaS tools, while enforcing MFA policies based on user roles and access location.

I use OneLogin as a cloud-based IAM platform integrated with both on-premises and cloud applications in a hybrid environment.

What is most valuable?

OneLogin made a difference for me during remote work expansion because it centralized authentication and MFA policies across cloud apps without adding too much complexity for users.

The best features for me are the single sign-on experience and its ability to offer centralized access management for a large number of pre-integrated SaaS applications. SmartFactor adaptive authentication feature is especially useful because it adjusts security requirements based on logic, risk, and user behavior.

SmartFactor has worked well because it adds extra verification only when login behavior looks risky. Users are not constantly dealing with MFA prompts during normal day-to-day access.

The integration library is definitely one of the strongest parts of the platform.

OneLogin has improved user access management, simplified the login experience for employees, and strengthened MFA enforcement across cloud applications without adding too much administrative overhead.

Onboarding and application access provisioning are much faster now, and I have also reduced password-related support tickets because users can access most applications through a single login portal.

Identity synchronization works well overall and helps keep user accounts, groups, and access permissions consistent across connected directories and cloud applications with minimal manual effort.

The adaptive login feature with Vigilance AI has been useful for identifying unusual login patterns and automatically applying stronger authentication when the risk level increases.

Enforcing MFA at the desktop level has strengthened endpoint security significantly because users still need strong authentication even when devices are offline. This helps reduce the risk of unauthorized local access.

What needs improvement?

More granular reporting and customization options would make administration even better.

The reporting and the dashboard customization could be more flexible, and troubleshooting federation or integration issues can sometimes take more effort than expected.

The UI is very easy to use, but some admin sections feel a bit outdated, and more detailed troubleshooting documentation would help during complex integrations.

There is still room for improvement in reporting, advanced customization, and some administrative workflows.

For how long have I used the solution?

I have been using OneLogin for one year.

What do I think about the stability of the solution?

OneLogin is stable.

What do I think about the scalability of the solution?

OneLogin scales well for enterprise environments, especially for organizations managing a large number of users and cloud applications. The centralized SaaS integration modules make expansion fairly straightforward.

How are customer service and support?

The customer support is excellent.

I would rate the customer support a nine on a scale of one to ten.

Which solution did I use previously and why did I switch?

I mainly used native application logins and some Microsoft ADFS services, but I switched to get simpler cloud-based SSO, stronger MFA capabilities, and easier SaaS integration management.

How was the initial setup?

The setup was relatively straightforward for the standard SSO deployments, although more advanced integration and policies required additional planning and configuration effort.

What was our ROI?

I have seen a good ROI mainly through reduced password-related support tickets, faster onboarding, and less time spent managing user access across multiple SaaS applications. The centralized SSO and MFA management also reduced a lot of repetitive admin work for the IT team.

What's my experience with pricing, setup cost, and licensing?

The pricing is competitive compared to other enterprise IAM platforms.

Which other solutions did I evaluate?

I evaluated Okta, Microsoft Entra ID, and Ping Identity before choosing OneLogin.

What other advice do I have?

I advise others looking into using OneLogin to plan your application integrations and MFA policies carefully from the beginning because OneLogin works best when access management and authentication workflows are standardized early on. I would rate this review a nine on a scale of one to ten.


    Satyamkumar Prajapati

Centralized access has simplified daily logins and has improved secure user lifecycle management

  • May 12, 2026
  • Review provided by PeerSpot

What is our primary use case?

My use case for OneLogin is centralized identity and access management, particularly for secure single sign-on and user authentication across enterprise applications.

What is most valuable?

In my experience, some of the best features OneLogin offers are Single Sign-On, SSO, Multi-Factor Authentication that is MFA, centralized identity management, and automated user provisioning.

The feature that stands out the most for us is Single Sign-On, SSO. It has made a significant difference by simplifying access management for employees who use multiple enterprise applications daily. Before implementing SSO, users had to manage separate credentials for different systems, which often resulted in password-related issues, login delays, and increased support requests.

One feature that became more valuable over time was the automated user provisioning and de-provisioning capability. Initially, I focused mainly on SSO for authentication improvements, but later I realized how automated lifecycle management could improve operational efficiency and security. It helps streamline onboarding based on user role and position changes.

OneLogin has positively impacted our organization by improving security, productivity, and access management efficiency. Employees can securely access multiple enterprise applications with a single authentication process, which reduces login friction and minimizes password-related issues.

What needs improvement?

OneLogin is a strong identity and access management platform overall, but there are a few areas where it could be improved. One challenge is that some advanced integration and configuration settings can become complex, especially in large enterprise environments with multiple applications and custom authentication requirements.

The administrative interface could also be improved further to make navigation, reporting, and policy management more intuitive for new users. While the platform is feature-rich, certain configuration and troubleshooting activities can take time to understand. Another area for improvement is reporting and analytics. More customizable dashboards for visibility into authentication trends, access activity, and security events could help administrators monitor its efficiency.

For how long have I used the solution?

I have been working with OneLogin for around two years.

What do I think about the stability of the solution?

OneLogin is stable.

What do I think about the scalability of the solution?

OneLogin is scalable with good uptime and reliable performance, especially for standard authentication and user access management activities. Its cloud-based architecture also helps support scalability and availability for distributed and hybrid work environments.

How are customer service and support?

Customer support is good.

What was our ROI?

I have seen a positive return on investment from using OneLogin, mainly through improved operational efficiency, reduced support overhead, and strong centralized access management. I also saw time savings through automated user provisioning and de-provisioning workflows. New employees get access faster because access permissions are assigned automatically.

What other advice do I have?

My advice to organizations considering OneLogin would be to spend time planning their identity management architecture, application integration, and access policies before deployment. I would also recommend involving security, infrastructure, and application teams early in the implementation process, especially in enterprise environments with multi-cloud applications. I would rate this product an 8 out of 10.


    Utkarsh Dixit

Centralized access has simplified secure single sign-on and strengthened adaptive authentication

  • May 11, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for OneLogin is single sign-on and MFA enforcement with centralized user access management across SaaS applications.

A specific example of how I use OneLogin for single sign-on and user access management in my daily work is that we use it for new employees to provide one secure login for applications like Microsoft 365, VPN access, and internal SaaS tools while enforcing MFA policies based on user roles and access location.

OneLogin made a difference for us during the remote work expansion because it centralized authentication and MFA policies across cloud apps without adding too much complexity for users.

What is most valuable?

The best features that OneLogin offers for my team are the single sign-on experience, adaptive MFA, centralized access management, and the large number of pre-built integrations with SaaS applications. The Smart Factor adaptive authentication feature is especially useful because it adjusts security management based on login risk and user behavior.

The adaptive authentication feature makes things easier or more secure for my team because Smart Factor adds extra verification only when login behavior looks risky, so users are not constantly dealing with MFA prompts during normal day-to-day access.

What needs improvement?

The integration library is definitely one of the strongest parts of the platform, but more granular reporting and customization options would make administration even better.

Based on my experience, improvements needed for OneLogin include better granular policy controls and more advanced analytics for authentication activity, which would be especially useful for larger enterprise environments.

For how long have I used the solution?

I have been using OneLogin for two years.

What do I think about the stability of the solution?

OneLogin is stable in my experience.

What do I think about the scalability of the solution?

OneLogin scales well for enterprise environments, especially for organizations managing large numbers of users and cloud applications, and the centralized SaaS integration module makes expansion fairly straightforward.

How are customer service and support?

Customer support is excellent.

Which solution did I use previously and why did I switch?

Before OneLogin, we mainly used native application logins and some Microsoft ADFS, but we switched to get simpler cloud-based SSO, stronger MFA capabilities, and easier SaaS integration management.

How was the initial setup?

My experience with pricing, setup cost, and licensing is that the pricing is competitive compared to other enterprise IAM platforms, and the setup was relatively straightforward for standard SSO deployments, although more advanced integration and policies required additional planning and configuration effort.

What was our ROI?

I have seen a return on investment as the adaptive login features with Vigilance AI have been useful for identifying unusual login patterns and automatically applying stronger authentication when the risk level increases. We have seen good results mainly through reduced password-related support tickets, faster onboarding, and less time spent managing user access across multiple SaaS applications. The centralized SSO and MFA management also reduced a lot of repetitive admin work for my IT team.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing is that the pricing is competitive compared to other enterprise IAM platforms, and the setup was relatively straightforward for standard SSO deployments, although more advanced integration and policies required additional planning and configuration effort.

Which other solutions did I evaluate?

We evaluated Okta, Microsoft Entra ID, and Ping Identity before choosing OneLogin.

What other advice do I have?

The advice I would give to others looking into using OneLogin is to plan your application integrations and MFA policies carefully from the beginning because OneLogin works best when access management and authentication workflows are standardized early on.

Overall, OneLogin has been a reliable and user-friendly IAM platform that helps simplify SSO and strengthen MFA adoption without creating too much complexity for users or administration. I would rate this product an eight out of ten.


    Shrikant Patil

Centralized access has simplified secure logins and has strengthened adaptive authentication

  • May 10, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for OneLogin is for single sign-on, MFA enforcement, and centralized user access management for most SaaS applications.

I use OneLogin to give employees one secure login for applications like Microsoft 365, VPN access, and internal SaaS tools, while enforcing MFA policies based on user roles and access location.

OneLogin made a significant difference for my organization during remote work expansion because it centralized employee authentication and MFA policies across cloud apps without adding too much complexity for users.

What is most valuable?

The best features OneLogin offers include the single sign-on experience, adaptive MFA, centralized access management, and the large number of pre-built integrations with SaaS applications. SmartFactor, the adaptive authentication feature, is especially useful because it adjusts security requirements based on login risk and user behavior.

SmartFactor has worked well because it adds extra verification only when a login behavior appears risky, so users are not constantly dealing with MFA prompts during normal day-to-day access.

OneLogin has positively impacted my organization by improving user access management, simplifying the login experience for employees, and strengthening MFA enforcement across cloud applications without adding too much administrative overhead.

What needs improvement?

The integration library is definitely one of the strongest parts of OneLogin platform, but more granular reporting and customization options would make administration even better.

OneLogin can be improved by enhancing the reporting and the dashboard customization for more flexibility, and troubleshooting federation or integration issues can sometimes take more effort than expected.

The UI is generally easy to use, but some advanced sections feel a bit outdated, and more detailed troubleshooting documentation would help during complex integration.

Better granular policy control and more advanced analytics for authentication activity would be useful, especially for larger enterprise environments.

For how long have I used the solution?

I have been using OneLogin for over one year.

What do I think about the stability of the solution?

OneLogin is stable.

What do I think about the scalability of the solution?

OneLogin scales effectively for enterprise environments, especially for organizations managing large numbers of users and cloud applications, and the centralized SaaS integration model makes expansion fairly straightforward.

How are customer service and support?

Customer support for OneLogin is very good and solid.

Which solution did I use previously and why did I switch?

Before OneLogin, I primarily used native application logins and some Microsoft AD Federation Services, but I switched to OneLogin to obtain simpler cloud-based SSO, stronger MFA capabilities, and easier SaaS integration management.

How was the initial setup?

My experience with pricing, setup cost, and licensing shows that the pricing is competitive compared to other enterprise IAM platforms, and the setup was relatively straightforward for standard SSO deployments, although more advanced integrations and policies required additional planning and configuration effort.

What was our ROI?

I have seen a good return on investment, mainly through reduced password-related support tickets, faster onboarding, and less time spent managing user access across multiple SaaS applications. The centralized SSO and MFA management also reduced a lot of repetitive admin work for the IT team.

Which other solutions did I evaluate?

I evaluated other options including Okta, Microsoft Entra ID, and Ping Identity before choosing OneLogin.

What other advice do I have?

My advice for others looking into using OneLogin is to plan your application integrations and MFA policies carefully from the beginning because OneLogin works best when access management and authentication workflows are standardized early on.

OneLogin has been a reliable and user-friendly IAM platform that can simplify access with SSO and strengthen MFA adoption without creating too much complexity for users or administrators. I would rate my overall experience with OneLogin as an eight out of ten.


    Ayushi Rathod

Centralized access management has simplified secure logins and reduced password reset efforts

  • May 09, 2026
  • Review provided by PeerSpot

What is our primary use case?

My main use case for OneLogin is centralized identity and access management, primarily for enabling single sign-on and MFA across cloud applications like Microsoft 365, Salesforce, and internal business tools.

For single sign-on or MFA in my daily workflow, we use OneLogin to give employees one secure login for applications such as Microsoft 365 and Salesforce. MFA automatically triggers when users sign in from unmanaged devices or new locations, which has made access management much simpler for the IT team.

What is most valuable?

The best features OneLogin offers include easy management of SSO, adaptive MFA, Smart Factor Authentication, automated user provisioning, de-provisioning, and strong integration support for cloud and on-premises applications, which really helps simplify identity management and improve security.

Smart Factor Authentication in OneLogin has helped us reduce unnecessary MFA prompts by applying extra verification only for risky logins. Automated provisioning saved a lot of time by automatically creating and removing user access based on HR or Active Directory changes.

OneLogin has positively impacted our organization by improving security and user experience by simplifying access to business applications through single sign-on while also reducing password reset tickets and manual account management for the IT team.

After implementing OneLogin, we saw password reset tickets drop noticeably because employees could access most applications through a single login and automated provisioning reduced manual onboarding and offboarding work that previously took the IT team hours each week.

Overall, OneLogin has been a reliable identity management platform for simplifying SSO and MFA across multiple applications. It is especially useful for organizations looking to reduce password-related support issues while improving access security.

What needs improvement?

OneLogin could improve its admin interface and troubleshooting experience because some configuration and error logs can be difficult to track during complex integrations or provisioning issues. Better documentation and faster support for advanced cases would also help IT teams manage deployments more efficiently.

One area I would appreciate improvement in is reporting and audit visibility because pulling detailed user activity or troubleshooting authentication failures can sometimes feel less intuitive than it should be, especially in larger environments.

Better customization and clearer workflow for complex conditional access policies in large enterprise environments are needed. I advise starting with a small pilot rollout first and ensuring that your identity sources such as Active Directory or HR systems are properly organized before enabling automated provisioning.

For how long have I used the solution?

I have been working in my current field for one year.


    Shubham Dwivedi

Centralized access has improved secure sign-in and simplifies automated user lifecycle management

  • May 08, 2026
  • Review from a verified AWS customer

What is our primary use case?

OneLogin is mainly used for single sign-on, SSO as identity and access management, multi-factor authentication, MFA, and secure user authentication across cloud applications and internal systems.

OneLogin is used to provide employees with a secure sign-in to access multiple business applications through one centralized login. For example, a user can securely access tools like Microsoft 365, VPN services, and internal applications with MFA enabled, which improves security and reduces password-related support requests.

Another major benefit of the main use case with OneLogin is centralized identity management and automated access control, as it makes onboarding and offboarding much easier because user access can be managed from a single platform, improving efficiency and helping maintain security and compliance across the organization.

What is most valuable?

The best features OneLogin offers are single sign-on (SSO), multi-factor authentication (MFA), adaptive authentication, centralized identity management, and automated user provisioning. The large number of pre-integrated applications and the ease of managing user access policies from a single platform are also valuable.

The ease of managing user access policies and pre-integrated applications helps the team day-to-day by making onboarding and access management much faster. For example, when a new employee joins, access to required applications can be assigned quickly through predefined policies instead of configuring each application manually, which saves time, reduces errors, and improves security consistency across the environment.

OneLogin has positively impacted the organization by improving security, simplifying access management, and reducing password-related support issues. Single sign-on and MFA help provide a better user experience while strengthening authentication security across multiple applications, and it also improves onboarding and offboarding efficiency through centralized identity management and automated provisioning, which reduces manual administrative work and helps maintain better access control and compliance.

What needs improvement?

OneLogin could be improved with more flexible reporting and analytic options, especially for detailed access monitoring and compliance tracking. The admin interface for advanced configuration could also be simplified further to make management easier for new administrators. Faster support response times for complex technical issues and more customization options for the authentication workflow would also improve the overall experience.

Another improvement would be enhancing integration flexibility with some third-party and legacy applications. More detailed documentation and easier customization for advanced policies and workflows would also help administrators manage complex environments more efficiently. Overall, OneLogin has been reliable and easy to use for identity and access management.

Making some advanced policy and authentication settings easier to configure for new administrators would be beneficial, as troubleshooting integration and login issues with certain legacy applications can take extra time. A more streamlined diagnostic and troubleshooting tool would be helpful.

For how long have I used the solution?

OneLogin has been in use for around one year plus.

What do I think about the stability of the solution?

OneLogin is stable.

What do I think about the scalability of the solution?

OneLogin shows strong scalability, efficiently supporting growing numbers of user applications and authentication requests without major performance issues, making it suitable for both mid-sized and enterprise environments.

How are customer service and support?

The experience with customer support has been positive overall. The support team is knowledgeable, responsive, and helpful during deployment, and the quality of support is good and easy to work with the OneLogin team.

Which solution did I use previously and why did I switch?

Before OneLogin, the main reliance was on native automation tools and manual identity management processes. The switch to OneLogin was made because it provides centralized identity management, stronger MFA capabilities, sign-on integration, and better automation for user provisioning and access control.

How was the initial setup?

Setup was straightforward because it is a cloud-based solution, and the licensing model was flexible, with advanced features increasing costs. However, the security and automation benefits provide good value.

What about the implementation team?

The company has a partnership relationship with OneLogin.

What was our ROI?

A positive return on investment has been seen with OneLogin. Password-related support tickets were reduced significantly after implementing single sign-on and MFA, which saved time for both users and the IT team.

What's my experience with pricing, setup cost, and licensing?

The experience with pricing and licensing was positive overall.

Which other solutions did I evaluate?

Before choosing OneLogin, other solutions such as Okta were evaluated.

What other advice do I have?

Clearly understanding identity management, SSO, and MFA requirements before implementing OneLogin is important, as it delivers the most value when integrated properly with applications, directories, and security policies.

OneLogin provides a very smooth and user-friendly sign-in experience, allowing users to access multiple applications with one set of credentials, which reduces password fatigue and improves productivity. The automation process is generally fast and consistent across applications, and features such as adaptive authentication and MFA help maintain security without creating too much friction for end-users.

Smart Factor Authentication has been effective in balancing security and usability because lower-risk users can log in smoothly without unnecessary MFA prompts while higher-risk logins receive stronger authentication checks. This approach improves user experience and reduces authentication fatigue while still maintaining strong security control and better protection against unauthorized access attempts.

The integration of phishing-resistant device trust strengthens authentication processes by ensuring that only trusted and verified devices can access critical applications and systems. It adds an extra layer of security beyond passwords and standard MFA, which helps reduce the risk of phishing attacks and unauthorized access, while also improving the user experience because trusted devices can authenticate more smoothly without extensive verification steps, helping balance security with usability.

The user identity synchronization functionality in OneLogin has been reliable and useful. It helps keep user accounts, group membership, and access permissions synchronized across active directories, cloud applications, and other content systems automatically. This reduces manual administrative work, improves consistency in identity management, and ensures users have the correct access across different platforms in a timely manner.

HR-driven identity management plays an important role in streamlining employee identity handling by automating onboarding, role changes, and offboarding processes. When employee information is updated in the HR system, user accounts, access permissions, and group membership can be created or modified automatically based on predefined policies.

Enforcing MFA at the desktop level has significantly strengthened the security posture by ensuring users are authenticated even when devices are offline or disconnected from the network. It helps protect endpoints from unauthorized access, especially for remote or mobile users, and reduces the risks of compromised credentials being misused.

Adaptive login flows with Vigilance AI have been helpful for identifying risky login behavior such as unusual locations, unfamiliar devices, or abnormal access patterns. Based on the calculated risk level, the systems can automatically require additional authentication steps or restrict access when needed, which improves the ability to respond to potential threats in real time while still keeping the login experience smooth for normal low-risk user activity.

This review gives OneLogin an overall rating of eight out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Manik Singh

Centralized access management has simplified secure logins and strengthened adaptive MFA

  • May 07, 2026
  • Review provided by PeerSpot

What is our primary use case?

OneLogin is primarily used for single sign-on, MFA enforcement, and centralized user access management across SaaS applications. We use OneLogin to give employees one secure login for applications like Microsoft 365, VPN access, and internal SaaS tools, while enforcing MFA policies based on user roles and access location.

OneLogin has improved user access management, simplified the login experience for employees, and strengthened MFA enforcement across cloud applications without adding too much administrative overhead. OneLogin serves as a cloud-based IAM platform integrated with both on-premises and cloud applications in a hybrid environment.

SmartFactor is used for adaptive authentication policies, and it does a good job balancing security and usability because low-risk logins stay simple while high-risk attempts automatically trigger stronger MFA requirements. This reduces unnecessary MFA fatigue for users while still improving overall account security.

Identity synchronization works well overall and helps keep user accounts, groups, and access permissions consistent across connected directories and cloud applications with minimal manual effort. The end-user experience has been very smooth overall since users can access most applications from a single portal with fewer password prompts and consistent authentication workflows.

Adaptive login features with Vigilance AI have been useful for identifying unusual login patterns and automatically applying stronger authentication when the risk level increases. HR-driven identity management makes onboarding and offboarding smoother by automatically provisioning and de-provisioning access based on employee status. This minimizes manual work and reduces the risk of orphaned accounts.

Enforcing MFA at the desktop level has strengthened endpoint security significantly because users still need strong authentication even when devices are offline, which helps reduce the risk of unauthorized local access.

What is most valuable?

OneLogin made a big difference during remote expansion because it centralized authentication and MFA policies across cloud apps without adding too much complexity for users. The best features are a seamless SSO experience, adaptive MFA, centralized access management, and a large number of pre-built integrations for SaaS applications.

SmartFactor adaptive authentication feature is especially useful because it adjusts security requirements based on login risk and user behavior. SmartFactor has worked well because it adds extra verifications only when login behavior looks risky, so users are not constantly dealing with MFA prompts during normal day-to-day access.

OneLogin's integration library is definitely one of the strongest parts of the platform. OneLogin's customer identity and access management features help provide a smoother and more secure login experience for external users while giving better control over authentication policies, access management, and scalability.

What needs improvement?

OneLogin's reporting and dashboard customization could be more flexible, and troubleshooting federation or integration issues can sometimes take more effort than expected. The UI is generally easy to use, but some admin sections feel a bit outdated, and more detailed troubleshooting documentation would help during complex integrations.

Better granular policy controls and more advanced analytics for authentication activity would be useful, especially for larger enterprise environments. More granular reporting and customization options would make administration even better.

For how long have I used the solution?

OneLogin has been used for approximately two years.

What do I think about the stability of the solution?

OneLogin is smooth and very stable.

What do I think about the scalability of the solution?

OneLogin scales well for enterprise environments, especially for organizations managing a large number of users and cloud applications, and the centralized SaaS integration model makes expansion fairly straightforward.

How are customer service and support?

Customer support is good.

Which solution did I use previously and why did I switch?

Before OneLogin, native application logins and some Microsoft AD Federation Services were mainly used, but the switch was made to get simpler cloud-based SSO, stronger MFA capabilities, and easier SaaS integration management.

How was the initial setup?

OneLogin's pricing is competitive compared to other enterprise IAM platforms, and the setup was relatively straightforward for standard SSO deployments, although more advanced integrations and policies required additional planning and configuration effort.

What was our ROI?

Good ROI has been seen mainly through reduced password-related support tickets, faster onboarding, and less time spent managing user access across multiple SaaS applications. OneLogin's centralized SSO and MFA management also reduced a lot of repetitive admin work for the IT team.

Which other solutions did I evaluate?

Okta, Microsoft Entra ID, and Ping Identity were evaluated before choosing OneLogin.

What other advice do I have?

Onboarding and application access provisioning are much faster now, and password-related support tickets have been reduced because users can access most applications through a single login portal. Planning application, integration, and MFA policies carefully from the beginning is advised for others looking into using OneLogin because OneLogin works best when access management and authentication workflows are standardized.

OneLogin has been a reliable and user-friendly IAM platform that helped simplify SSO and strengthen MFA adoption without creating too much complexity for users or administrators. This review is rated an eight out of ten.