
Top picks: Orca Cloud Infrastructure Entitlement Management, Broadcom Identity and Access Management, Aserto — plus 45 more compared.
IAMOry Oathkeeper is a commercial Identity Governance and Administration tool developed by Ory Corp. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to Ory Oathkeeper, including their key features and shared capabilities.
Cloud Infrastructure Entitlement Mgmt for multi-cloud identity & access control
Enterprise IAM platform with zero trust identity fabric capabilities
Shares 3 capabilities with Ory Oathkeeper: Authorization, Authentication, Zero Trust Architecture
Fine-grained authorization service for apps and APIs with ~1ms latency.
Shares 3 capabilities with Ory Oathkeeper: Cloud Native, Open Source, Authorization
Centralized authorization platform for fine-grained permissions at scale.
Shares 3 capabilities with Ory Oathkeeper: Cloud Native, Open Source, Authorization
Enterprise IAM platform for identity management and access control
IAM platform with visual identity orchestration and low/no-code workflows
Cloud-based IAM platform for identity mgmt, SSO, MFA, and lifecycle mgmt
B2B IAM platform with self-service onboarding and granular access control
Cloud Infrastructure Entitlement Mgmt for multi-cloud identity & access control
Enterprise IAM platform with zero trust identity fabric capabilities
Fine-grained authorization service for apps and APIs with ~1ms latency.
Centralized authorization platform for fine-grained permissions at scale.
Enterprise IAM platform for identity management and access control
IAM platform with visual identity orchestration and low/no-code workflows
Cloud-based IAM platform for identity mgmt, SSO, MFA, and lifecycle mgmt
B2B IAM platform with self-service onboarding and granular access control
Federated identity platform for authenticating machine workloads w/o secrets
Identity and access management solution from BeyondTrust
Platform for managing and securing Non-Human Identities (NHIs)
Identity orchestration platform for managing distributed IAM across hybrid envs
Managed identity and access management services for organizations
Managed IAM service for user access control across enterprise resources.
Platform for standardizing authorization policies across software systems.
SaaS IAM platform covering IGA, SSO, MFA, and CIAM for all identity types.
External authorization engine for enterprise apps with RBAC/ABAC policy support.
Open source authorization server based on Google Zanzibar for access control
ConsoleMe is a web service that simplifies AWS IAM permissions and credential management across multiple accounts through self-service workflows and centralized administration.
Identity governance platform for access mgmt, compliance & lifecycle automation
Cloud-based IAM governance for access control and compliance management
Identity data platform that unifies, observes, and acts on identity data
Centralized access mgmt platform for self-service requests & governance
Automates identity provisioning and deprovisioning across enterprise systems.
ABAC-based dynamic authorization for fine-grained access control
Cloud-based directory service for centralized user, group, and device mgmt.
IAM platform with self-service capabilities, MFA, SSO, and mobile access
Customer IAM platform for managing external identities with SSO and MFA
Customer identity and access management platform for businesses
LDAP proxy firewall for securing Active Directory and LDAP directories
Customer and B2B identity management platform with CIAM and IAM capabilities
Centralized identity data platform unifying human & non-human identities
Managed CIAM service for securing customer digital access and experiences
Automated identity and access mgmt solution for Microsoft environments
Real-time policy-based access control platform for enterprise authorization
SCIM implementation for automated user provisioning and deprovisioning
IAM platform providing continuous identity observability across applications
Unified identity infrastructure for AI agents with federated identity & access
Smart employee ID card combining physical & logical access control.
French IAM platform covering SSO, MFA, provisioning, and identity lifecycle.
Real-time context engine unifying identity, data, and policy for access control.
Converged IAM/IGA/PAM/CIEM platform for hybrid and multi-cloud identity security.
Managed IAM infrastructure hosting with 24x7 ops, geo-diversity & BYOL.
Manages & secures non-human identities in cloud envs via least-privilege JIT perms.
An automated script that configures Active Directory domains using customizable XML configuration files.
kube2iam provides IAM credentials to Kubernetes containers by intercepting EC2 metadata API calls and retrieving temporary AWS credentials based on pod annotations.
Repokid automatically removes unused service permissions from AWS IAM role inline policies using Access Advisor data to implement least privilege access.
IGA platform automating access certifications, compliance, and identity governance.
Common questions security professionals ask when evaluating alternatives and competitors to Ory Oathkeeper.
The most popular alternatives to Ory Oathkeeper include Orca Cloud Infrastructure Entitlement Management, Broadcom Identity and Access Management, Aserto, AuthZed, and Unotech Cymmetri. These Identity Governance and Administration tools offer similar capabilities and are frequently compared by security professionals evaluating their options.