Need advice about which tool to choose?Ask the StackShare community!

AWS IAM

1.1K
761
+ 1
26
Azure Active Directory

292
236
+ 1
4
Add tool

AWS IAM vs Azure Active Directory: What are the differences?

Developers describe AWS IAM as "Securely control access to AWS services and resources for your users". AWS Identity and Access Management. On the other hand, Azure Active Directory is detailed as "Identity and access management for the cloud". It is a comprehensive identity and access management solution that gives you a robust set of capabilities to manage users and groups. You can get the reliability and scalability you need with identity services that work with your on-premises, cloud, or hybrid environment.

AWS IAM can be classified as a tool in the "Cloud Access Management" category, while Azure Active Directory is grouped under "Password Management".

9GAG, PedidosYa, and Splunk are some of the popular companies that use AWS IAM, whereas Azure Active Directory is used by Wealthsimple, Focus21 Inc., and 8gears AG. AWS IAM has a broader approval, being mentioned in 133 company stacks & 50 developers stacks; compared to Azure Active Directory, which is listed in 4 company stacks and 4 developer stacks.

Get Advice from developers at your company using StackShare Enterprise. Sign up for StackShare Enterprise.
Learn More
Pros of AWS IAM
Pros of Azure Active Directory
  • 23
    Centralized powerful permissions based access
  • 3
    Straightforward SSO integration
  • 4
    Backed by Microsoft Azure

Sign up to add or upvote prosMake informed product decisions

Cons of AWS IAM
Cons of Azure Active Directory
  • 1
    Cloud auth limited to resources, no apps or services
  • 1
    No equivalent for on-premise networks, must adapt to AD
  • 3
    Closed source

Sign up to add or upvote consMake informed product decisions

What is AWS IAM?

It enables you to manage access to AWS services and resources securely. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.

What is Azure Active Directory?

It is a comprehensive identity and access management solution that gives you a robust set of capabilities to manage users and groups. You can get the reliability and scalability you need with identity services that work with your on-premises, cloud, or hybrid environment.

Need advice about which tool to choose?Ask the StackShare community!

Jobs that mention AWS IAM and Azure Active Directory as a desired skillset
What companies use AWS IAM?
What companies use Azure Active Directory?
See which teams inside your own company are using AWS IAM or Azure Active Directory.
Sign up for StackShare EnterpriseLearn More

Sign up to get full access to all the companiesMake informed product decisions

What tools integrate with AWS IAM?
What tools integrate with Azure Active Directory?

Sign up to get full access to all the tool integrationsMake informed product decisions

Blog Posts

May 21 2020 at 12:02AM

Rancher Labs

KubernetesAmazon EC2Grafana+12
4
1332
What are some alternatives to AWS IAM and Azure Active Directory?
Okta
Connect all your apps in days, not months, with instant access to thousands of pre-built integrations - even add apps to the network yourself. Integrations are easy to set up, constantly monitored, proactively repaired and handle authentication and provisioning.
Auth0
A set of unified APIs and tools that instantly enables Single Sign On and user management to all your applications.
OAuth2
It is an authorization framework that enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.
Teleport
Teleport makes it easy for users to securely access infrastructure and meet the toughest compliance requirements.
HashiCorp Boundary
Simple and secure remote access — to any system anywhere based on trusted identity. It enables practitioners and operators to securely access dynamic hosts and services with fine-grained authorization without requiring direct network access.
See all alternatives