fitgap

Entrust Identity Enterprise

Features
Ease of use
Ease of management
Quality of support
Affordability
Market presence
Take the quiz to check if Entrust Identity Enterprise and its alternatives fit your requirements.
Pricing from
Contact the product provider
Free Trial
Free version unavailable
User corporate size
Small
Medium
Large
User industry
  1. Energy and utilities
  2. Public sector and nonprofit organizations
  3. Banking and insurance

What is Entrust Identity Enterprise

Entrust Identity Enterprise is an identity and access management platform used to authenticate users and control access to enterprise applications and systems. It supports multi-factor authentication, certificate-based authentication, and risk-based policies for workforce and partner access use cases. The product is commonly deployed in regulated environments that require strong credential assurance and integration with public key infrastructure (PKI). It is typically implemented by IT/security teams and integrated with directories, VPNs, and web access gateways.

pros

Strong PKI and certificate support

The platform supports certificate-based authentication and can align with organizations that already use smart cards or enterprise PKI. This is useful for higher-assurance access scenarios where possession-based credentials and cryptographic identity are required. It also fits environments that need lifecycle management around credentials rather than only OTP-style MFA.

Multiple authentication methods

Entrust Identity Enterprise supports MFA options that can include hardware/software tokens, certificates, and other factors depending on deployment. This helps organizations standardize authentication across different user populations and access channels. It can reduce reliance on a single factor type and support step-up authentication for sensitive actions.

Policy and risk-based controls

The product supports policy-driven access decisions that can incorporate contextual or risk signals to adjust authentication requirements. This enables step-up flows (for example, requiring stronger factors when risk increases) and can improve control consistency across applications. It is relevant for enterprises that need centralized enforcement rather than app-by-app configuration.

cons

Implementation can be complex

Deployments that include PKI, certificates, or smart cards often require careful design, integration, and operational processes. Organizations may need specialized expertise to integrate with existing directories, access gateways, and credential issuance workflows. This can increase time-to-value compared with lighter-weight authentication-only deployments.

CIAM depth may vary

While the product can be used for external users in some scenarios, CIAM programs often require extensive customer-facing features such as progressive profiling, consent management, and highly customizable registration journeys. Organizations may need additional components or development work to meet consumer identity UX and scale requirements. This can be a consideration when the primary goal is customer identity rather than workforce access.

Ongoing credential operations overhead

Certificate- and token-based approaches can introduce operational overhead for issuance, renewal, revocation, and user support. Helpdesk processes and device lifecycle management can become significant, especially in large distributed workforces. Organizations should plan for governance and automation to avoid manual administration.

Seller details

Entrust Corporation
Shakopee, Minnesota, USA
1969
Private
https://www.entrust.com/
https://x.com/Entrust
https://www.linkedin.com/company/entrust/

Tools by Entrust Corporation

HyTrust Cloud Control
Entrust IoT Security
Entrust Certificate Manager
Entrust Cryptographic Security Platform
Entrust PKI as a Service
Entrust nShield as a Service
Entrust KeyControl
Entrust Identity as a Service
Entrust Identity Enterprise
Entrust Identity Essentials
Entrust Adaptive Issuance Instant Financial Issuance
Entrust Signhost
HyTrust Cloud Advisor
HyTrust Data Control
HyTrust Key Control
Entrust IDV, formerly Onfido
Entrust Digital Card Solution
Entrust Identity Verification as a Service

Best Entrust Identity Enterprise alternatives

Ory
Cisco Duo
Auth0
Okta
See all alternatives

Related stack guides

HR
Route onboarding tasks from new hire to IT provisioning
Step1
Register the new hire and trigger the onboarding workflow
Step2
Generate department-specific task lists from role templates
Step3
Provision application access based on role profile

Popular categories

All categories