getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Identity Management Software with Public administrations - Page 7

Last updated: May 2026

Verified reviewer profile picture
Get free expert advice+1 (888) 216-6745
Call now for a one-to-one consultation in under 15 mins.
1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


176 software options

M365 Manager Plus logo

Management, reporting, auditing, and monitoring of Microsoft

learn more
M365 Manager Plus is a reporting, auditing, monitoring, management, and security solution for Microsoft 365. Designed for businesses of all sizes, it helps users manage Exchange Online, Azure AD, Microsoft Teams, OneDrive for Business, and other services from a centralized dashboard.

Read more about M365 Manager Plus

Users also considered
TechIDManager logo

A unique account for every tech on every domain

learn more
TechIDManager is a Privileged Access Management (PAM) tool designed for MSPs to streamline technician account creation, deactivation, permission control, password rotation, and more.

Read more about TechIDManager

Users also considered
Socure logo

The Leader in Digital ID Verification & Trust.

learn more
Socure ID+ is a identity verification platform for the largest enterprises and is trusted by 4 of the 5 largest banks, 7 of the 10 largest credit card issuers, top Buy Now, Pay Later (BNPL) providers, top crypto exchanges, and the largest online gaming operators.

Read more about Socure

Users also considered
Appsian Security Platform logo

Data security, authentication & access management software

learn more
Appsian Security Platform helps organizations manage user authentication, data access, network security, and other security processes for SAP and PeopleSoft applications. The software enables enterprises to detect, prevent, and respond to network threats, risks, and vulnerabilities.

Read more about Appsian Security Platform

Users also considered
SeciossLink logo

Integrated ID management for secure access.

learn more
SeciossLink is an IDaaS that enables integrated ID management, single sign-on (SSO), multi-factor authentication (MFA), access restrictions, and other security measures. It consolidates account information for employees, students, and more to balance convenience and security with SSO and MFA.

Read more about SeciossLink

Users also considered
Prove ID logo

All-Suite ID Verification & Management Platform

learn more
Prove ID is an all suite KYC platform for businesses to build trust online in a legally compliant way. It allows any two or more parties to verify ID, willingness and eligibility for accessing services.

Read more about Prove ID

Users also considered
ToothPic Key Protection SDK logo

Cloud-based authentication and identity management solution

learn more
ToothPic Key Protection SDK is a cloud-based authentication tool that helps businesses verify signatures, encrypt documents, and exchange cryptocurrency data on a unified platform.

Read more about ToothPic Key Protection SDK

Users also considered
Cyberelements logo

Cloud-based cybersecurity and access management solution

learn more
Cyberelements is a cloud-based cybersecurity software that lets businesses monitor external data centers, helps connect workforces to their applications and streamline identity management processes.

Read more about Cyberelements

Users also considered
OLOID logo

Cloud-based identity management software

learn more
OLOID, a cloud-based SaaS platform to manage workplace identity and access with a mobile-first approach, presents OLOID M-Tag. OLOID M-Tag is the world’s first self-installable retrofit mobile access solution to upgrade your existing access control systems.

Read more about OLOID

Users also considered
Segura logo

Identity security for privileged access control

learn more
Segura is an identity security platform securing privileged credentials via storage, access segregation, and traceability features.

Read more about Segura

Users also considered
Enso logo

Cloud-based & on-premise tool for identity management.

learn more
Enso is an identity management and workflow software that helps businesses manage onboarding, cross-boarding, and offboarding processes on a centralized interface.

Read more about Enso

Users also considered
Keystash logo

Level up your cloud IT security

learn more
Keystash is an integrated IAM and SSH Key management solution to manage users, groups, SSH Keys and SSH server security across your Linux environments.

Read more about Keystash

Users also considered
KYC Hub logo

Cloud-based and on-premise solution for KYC compliance.

learn more
KYC Hub is a cloud-based and on-premise solution, which helps businesses in finance, gaming, real estate, and other sectors streamline the identity verification process for their customer. The platform offers various features such as AML compliance, document management, ongoing monitoring, liveness detection, reporting, video analysis, and more. KYC Hub also facilitates two-way integration with various applications via APIs.

Read more about KYC Hub

Users also considered
Stytch logo

Identity platform providing APIs and SDKs

learn more
Stytch is an identity platform providing APIs and SDKs to integrate authentication and security into applications. The platform offers enterprise-grade authentication features including passkeys, breach-resistant passwords, and SAML SSO, alongside bot and fraud protection with intelligent rate limiting. Stytch supports both human users and AI agents with turnkey multi-tenancy capabilities and an embeddable admin portal for self-service configuration.

Read more about Stytch

Users also considered
CryptoSpike logo

Bug tracking tool to detect ransomware in storage systems.

learn more
CryptoSpike is a data transparency and cybersecurity solution that helps businesses detect malicious software and manage remediation from a centralized interface. The platform monitors real-time transactions in the storage for abnormalities relating to file extensions or user behavior.

Read more about CryptoSpike

Users also considered
YeshID Onboard logo

Cloud-based identity management tool for growing companies.

learn more
YeshID Onboard is an identity management tool designed for organizations using Google Workspace. It enables users to streamline onboarding and offboarding processes with templates, task lists, and application provisioning.

Read more about YeshID Onboard

Users also considered
IGA Toolkit logo

Identity governance and administration solution

learn more
IGA Toolkit is a web-based identity management software designed to help businesses streamline security administration and user identity processes across the organization. The solution facilitates automated testing of several security controls, such as access pattern analysis and user termination.

Read more about IGA Toolkit

Users also considered
walt.id Identity Infrastructure logo

Leading open source solutions for Self-Sovereign Identity.

learn more
Open Source Self-Sovereign Identity (SSI) solutions (B2B/G) for any use case - including authentication, identification, credentialing and digital signatures.

Read more about walt.id Identity Infrastructure

Users also considered
Descope logo

Drag & drop authentication and user management platform

learn more
Descope is a cloud-based authentication software that helps application developers easily add authentication, authorization, and identity management to their apps using no-code workflows.

Read more about Descope

Users also considered
Melapress Login Security logo

Manage WordPress security with login and password policies

learn more
Melapress Login Security is a comprehensive WordPress plugin that enables website administrators to easily implement robust login and password security policies. This plugin empowers users to comply with these policies by providing real-time feedback and increasing overall website security. Key features include enforcing strong passwords, limiting failed login attempts, changing the WordPress login URL, and device recognition alerts.

Read more about Melapress Login Security

Users also considered
VeriFinger SDK logo

VeriFinger SDK is a solution for fingerprint identification

learn more
The VeriFinger algorithm is based on deep neural networks and follows the commonly accepted fingerprint identification scheme. It uses a set of specific fingerprint points (minutiae) along with a number of proprietary algorithmic solutions that enhance system performance and reliability.

Read more about VeriFinger SDK

Users also considered
PasskeyBridge logo

Identity threat detection and response platform

learn more
PasskeyBridge is an identity threat response platform that ingests carrier signals, credentials, and biometric data to detect and neutralize security threats in real time. It executes automated playbooks to respond to incidents like SIM swaps, credential breaches, and unauthorized access. PasskeyBridge features FIDO2 passkey authentication, verifiable credentials with post-quantum cryptography, and insider threat analytics without storing personally identifiable information.

Read more about PasskeyBridge

Users also considered
Haventec Authenticate logo

Multi-factor protection without multi-factor friction.

learn more
Haventec Authenticate is an authentication engine for developers and product teams. It gives you the ability to add passwordless MFA to your application or enhance the security of your existing username/password authentication with a Silent MFA option that is easy to deploy and manage.

Read more about Haventec Authenticate

Users also considered
ManageEngine Free Active Directory Tools logo

Simplified Management & Reporting solution for AD

learn more
Active Directory FREE Tools that helps administrators efficiently handle Active Directory data.

Read more about ManageEngine Free Active Directory Tools

Users also considered
PropelAuth logo

Authentication software

learn more
PropelAuth is a B2B authorization software that helps businesses sell to companies of any size immediately with just a few lines of code.

Read more about PropelAuth

Users also considered