- API Access Management
- Passwordless Login
- Social Sign On
- Single Sign-On (SSO)
- User Activity Monitoring
Secure, self-service access for cloud applications.
(367 ratings)
Starts from $6/User/Month, also offers free forever plan
Overview
Features
Pricing
Alternatives
Media
Integrations
Customers
FAQs
Support
9.0/10
Spot Score
Azure Active Directory (Azure AD) is an identity and access management solution that helps to: keep user identities and access secure, reduce help desk calls by providing self-service capabilities for users, and enhance productivity by giving employees easy access to ... Read More
API Access Management is a crucial feature that allows organizations to securely manage and control access to their APIs (Application Programming Interfaces). An API is a set of protocols and tools that enable two different software systems to communicate with each other. By utilizing this feature, organizations can effectively manage the usage of their API endpoints and ensure that only authorized users and applications have access to the APIs. API Access Management works by authenticating and authorizing the requests that are made to the API. This means that before any data
Passwordless login is a modern technological feature that allows users to access their accounts without the need for a password. This feature eliminates the need for the traditional process of remembering and entering lengthy and complex passwords. Instead, passwordless login utilizes alternative factors of authentication such as biometric sensors, one-time codes, or email verification to allow users to log in to their accounts securely. One of the main advantages of passwordless login is enhanced security. As passwords can be easily compromised or stolen, this feature reduces
Social Sign On is a software feature that allows users to log in or sign up for an account using their existing social media credentials. This means that users do not have to create a separate username and password for the software, but can instead use their login information from popular social media platforms such as Facebook, Google, or Twitter. By enabling Social Sign On, software users can easily access their accounts without the hassle of remembering yet another password. This also eliminates the need for users to go through a lengthy
Single sign-on (SSO) allows users to log in to various applications with a single set of credentials, making it safe and straightforward. It's an authentication method in which users are provided only one set of login credentials to make the procedure easier. This eliminates the need for users to log in and out of different applications independently.
User Activity Monitoring (UAM) is a software feature that allows organizations to monitor and track the activities of their users within their network. This feature enables companies to analyze user behavior, identify potential security threats, and ensure compliance with company policies. With UAM, companies can track user login and logout times, application usage, internet browsing history, file access, and data transfers. This information is collected and stored in a central database, providing a detailed log of user activity. The monitoring is done in
Role Management is a key feature that allows users to control and manage individual roles and their permissions within a software or application. It offers a centralized platform for administrators to assign specific roles to users, limiting their access to only the necessary features and functions, thereby ensuring better security and control over the software. This feature is especially valuable in organizations where different teams or individuals have access to different sets of data and functionalities. With the role management feature, administrators can easily assign different roles, such as user, administrator
Multi-factor authentication (MFA) is a security mechanism that verifies a user's identity for a login or other transaction by requiring multiple ways of verification from separate categories of credentials. Multi-factor authentication combines two or more distinct credentials: what the user knows, such as a password; what the user owns, such as a security token; and who the user is, as determined by biometric verification methods. The purpose of multi-factor authentication is to construct a layered defense that makes it more difficult for an unauthorized person to access a target, such as a physical location, computing device, network, or database. Even if one element is compromised or damaged, the attacker still needs to get through at least one or more barriers before breaking into the target.
Password management is a software feature that allows individuals or organizations to securely manage and store their login credentials for various online accounts and applications. It serves as a centralized platform for users to store their usernames, passwords, and other sensitive information in one location, eliminating the need to remember and store multiple login details for different accounts. The primary purpose of password management is to enhance the security of online accounts and prevent unauthorized access. This is achieved through the use of advanced encryption technologies to safeguard the stored information. Users
Access Request Management is a software feature that allows organizations to control and manage user access to various systems and applications within their network. It serves as a central point for managing access requests from users and other stakeholders, ensuring that access is granted only to authorized individuals. With Access Request Management, organizations can streamline their access granting process, improving overall efficiency and security. This feature enables users to submit access requests through a centralized portal, eliminating the need for manual processes and reducing the risk of unauthorized access. Administrators
Managers plan, coordinate, regulate, and lead operations that assure compliance with laws and standards through compliance management. It is the process of continuously monitoring and evaluating systems to verify that they meet industry and security standards and corporate and regulatory policies and mandates. This entails assessing infrastructure to detect noncompliant systems due to regulatory, policy, or standard changes, misconfiguration, or other factors. Noncompliance can lead to penalties, security breaches, certification revocation, and other company consequences. Staying on top of compliance changes and updates keeps your business processes running smoothly and saves you money.
Starts from $6, also offers free forever plan
Yearly plans
Show all features
Free
Directory Objects1: 500,000 Object Limit
Single Sign-On (SSO): up to 10 apps
User provisioning
Federated Authentication (ADFS or 3rd party IDP)
User and group management (add/update/delete)
Device registration
Cloud Authentication (Pass-Through Auth, Password Hash sync, Seamless SSO)
Azure AD Connect sync (extend on-premises directories to Azure AD)
OFFICE 365 APPS
Includes Free plan features, plus
Directory Objects: No Object Limit
Company branding (customization of logon & logout pages, access panel)
Self-service password reset for cloud users
Service Level Agreement (SLA)
Device write-back (device objects two-way synchronization between on-premises directories and Azure)
PREMIUM P1
$6
/User/Month
Includes Office 365 Apps features, plus
Single Sign-On (SSO): unlimited
Password Protection (custom banned password)
Password Protection for Windows Server Active Directory (global & custom banned password)
Self-service password reset/change/unlock with on-premises write-back
Group access management
Microsoft Cloud App Discovery5
Azure AD Join: MDM auto-enrollment & local admin policy customization
PREMIUM P2
$9
/User/Month
Includes Premium P1 features, plus
Vulnerabilities and risky accounts detection
Risk events investigation
Risk based Conditional Access policies
Privileged Identity Management (PIM)
Access Reviews
Entitlement Management
Screenshot of the Azure AD Pricing Page (Click on the image to visit Azure AD 's Pricing page)
Disclaimer: Pricing information for Azure AD is provided by the software vendor or sourced from publicly accessible materials. Final cost negotiations and purchasing must be handled directly with the seller. For the latest information on pricing, visit website. Pricing information was last updated on .
Contact
+1 855-270-0615
Customer Service
Business Hours
Online
Location
Redmond, Washington
Azure Active Directory (Azure AD) is an identity and access management solution that helps to: keep user identities and access secure, reduce help desk calls by providing self-service capabilities for users, and enhance productivity by giving employees easy access to the cloud applications they need. Azure AD provides a complete user lifecycle management. It includes identity management, as well as application access management for a wide range of SaaS and on-premises applications.
Disclaimer: This research has been collated from a variety of authoritative sources. We welcome your feedback at [email protected].
Researched by Rajat Gupta