KuppingerCole IGA Leadership Compass reportRead the report
As organizations gather, store, and harness growing quantities of data, external and internal risks soar. Managing identities and permissions is key to preserving security, governance, and usability—that’s where OpenText™ Identity Manager (NetIQ) comes in.
Enhance your identity and access management (IAM) strategy with a comprehensive solution that simplifies identity lifecycle management, access requests, and risk assessment.
Our users love our [OpenText] Identity Manager-driven app, which gives them direct access to the tools they need to do their jobs.
Read the customer story
Event-based architecture delivers real-time responses to user lifecycle events, ensuring immediate enforcement of centralized policies and reinforcing identity authority across systems.
Leverage robust lifecycle management capabilities to more easily administrate user identities throughout their entire lifecycle.
Ease user permission management with predefined approval workflows. Users can easily request access to resources and managers can quickly review and approve or deny these requests.
Ensure that users receive appropriate access based on their job functions by grouping permissions into roles. Reduce the complexity of permissions administration and minimize the risk of privilege creep.
Create and enforce complex policies that govern user access based on various criteria, such as roles, departments, and security levels. This mitigates risks associated with unauthorized access and ensures compliance with regulatory requirements.
Establish a unified view of user identities, access rights, and compliance status. Allow administrators to efficiently monitor and manage user accounts, access requests, and policy compliance from a single interface.
Choose a solution you can continue to rely on as your identity management requirements grow and change—without compromising performance—thanks to scalable architecture.
Automate and simplify identity lifecycle management with an array of robust features.
Optimizes current IT resources and embraces SaaS, saving costs and ensuring compliance across physical, virtual, and cloud environments.
Streamlines IT tasks by enforcing mandatory user password policies, covering change frequency and complexity.
Matches your organization's workflow by combining business rules with roles-based provisioning to handle approvals and exceptions effectively.
Integrates with OpenText™ Identity Governance easily to create a unique, event-based solution for effective identity management and compliance enforcement.
OpenText Professional Services combines end-to-end solution implementation with comprehensive technology services to help improve systems.
Your journey to success
Consulting Services
NextGen Services
Customer Success Services
OpenText helps customers find the right solution, the right support, and the right outcome.
Find a Partner
Application Marketplace
Strategic Partners
OpenText Learning Services offers comprehensive enablement and learning programs to accelerate knowledge and skills.
Learning Services
Flexible Credits
Explore our OpenText communities. Connect with individuals and companies to get insight and support. Get involved in the discussion.
OpenText Identity Manager Community
Optimize the value of your OpenText solution with dedicated experts who provide mission-critical support for your complex IT environment.
By centralizing identity management, OpenText Identity Manager enhances security through streamlined user administration, provisioning, and de-provisioning. It ensures that user identity information is current and secure.
OpenText Identity Manager supports integration with various systems, including OpenText eDirectory, Microsoft Active Directory, LDAP v3 Directories, OpenText GroupWise, and Lotus Notes. Additional modules are available for purchase.
The system utilizes an Identity Vault to store identity data, which is synchronized across connected systems via drivers. These drivers facilitate bidirectional data flow, ensuring that changes in one system are reflected across all integrated platforms, including directories and applications.
ITDR provides protection against identity-based attacks, but IAM still offers advanced protection.
Read the blogWhat do secure systems, smooth audits, and good sleep have in common? Resilient identity governance.
Read the blog