OpenText brings decades of expertise to help you unlock data, connect people and processes, and fuel AI with trust
Unify data seamlessly across your enterprise to eliminate silos, improve collaboration, and reduce risks
Get AI-ready and transform your data into structured, accessible, optimized information
Meet regulatory and compliance requirements and protect your information throughout its lifecycle
OpenText helps people manage content, automate work, use AI, and collaborate to boost productivity
See how thousands of companies around the world are succeeding with innovative solutions from OpenText™
Our people are our greatest asset; they are the life of the OpenText brand and values
Learn how we aspire to advance societal goals and accelerate positive change
Find a highly skilled OpenText partner with the right solution to enable digital transformation
Explore scalable and flexible deployment options for global organizations of any size
Local control. Global scale. Trusted AI
Your cloud, your control
Free up resources, optimize performance and rapidly address issues
Run anywhere and scale globally in the public cloud of your choice
See information in new ways
AI that understands your business, your data, and your goals
Say hello to faster decisions. Your secure personal AI assistant is ready to get to work
Gain better insights with generative AI for supply chains
Power work with AI content management and an intelligent AI content assistant
Improve your security posture with AI cybersecurity and agile threat detection
Enable faster app delivery, development, and automated software testing
Elevate customer communications and experiences for customer success
Empower users, service agents, and IT staff to find the answers they need
See information in new ways
AI that understands your business, your data, and your goals
Say hello to faster decisions. Your secure personal AI assistant is ready to get to work
Gain better insights with generative AI for supply chains
Power work with AI content management and an intelligent AI content assistant
Improve your security posture with AI cybersecurity and agile threat detection
Enable faster app delivery, development, and automated software testing
Elevate customer communications and experiences for customer success
Empower users, service agents, and IT staff to find the answers they need
Predict, act, and win with real-time analytics on a smarter data platform
Give users access to the answers they need, faster and easier, with multi-repository AI-based search that lets you contextualize everything from clicks to conversations
Connect once, reach anything with a secure B2B integration platform
Reimagine knowledge with AI-ready content management solutions
Supercharge intelligent workspaces with AI to modernize work
Integrated cybersecurity solutions for enterprise protection
Purpose built data protection and security solutions
Reinvent threat hunting to improve security posture with the power of agile AI
Ship better software—faster—with AI-driven DevOps automation, testing, and quality
Reimagine conversations with unforgettable customer experiences
Get the clarity needed to cut the cost and complexity of IT operations
Redefine Tier 1 business support functions with self-service capabilities from private generative AI
Build custom applications using proven OpenText Information Management technology
Build it your way with OpenText Cloud APIs that create the real-time information flows that enable custom applications and workflows
Protect what matters, recover when it counts
Get greater visibility and sharper insights from AI-driven information management. Ready to see how?
Break free from silos, streamline processes, and improve customer experiences with secure information management for AI
Improve efficiency, security, and customer satisfaction with OpenText
Run processes faster and with less risk
Achieve digital transformation with guidance from certified experts
Modernize your information management with certified experts
Unlock the full potential of your information management solution
Turn support into your strategic advantage
Extend IT teams with certified OpenText application experts
Discover training options to help users of all skill levels effectively adopt and use OpenText products
Modernize your information management with certified experts
Unlock the full potential of your information management solution
Turn support into your strategic advantage
Extend IT teams with certified OpenText application experts
Discover training options to help users of all skill levels effectively adopt and use OpenText products
Information is the heartbeat of every organization. We build information management software so you can build the future
OpenText partners with leading cloud infrastructure providers to offer the flexibility to run OpenText solutions anywhere
OpenText partners with top enterprise app providers to unlock unstructured content for better business insights
Discover flexible and innovative offerings designed to add value to OpenText solutions
Discover the resources available to support and grow Partner capabilities
Get expert product and service support to accelerate issue resolution and keep business flows running efficiently
Explore detailed services and consulting presentations, briefs, documentation and other resources

Passwordless authentication is the process of verifying someone’s identity without the use of the typical claim (username) and password. Tools that inject traditional credentials into a login prompt are not passwordless.
The most common passwordless authentication methods are biometrics, such as fingerprint and facial recognition, and out-of-band apps, which are common on smartphones. These smartphone apps often require a biometric ID verification combining multiple factors into a single authentication process.
OpenText™ Identity and Access Management (NetIQ) offers a comprehensive set of identity and access services, allowing workers to securely access resources from anywhere, on any device, at any location, and at the right time. OpenText Cybersecurity also empowers organizations to interact with their consumers effectively and securely.
While the promise of passwordless authentication replacing traditional credentials has been alive for over three decades, the technology available today has made it a reality. In 2022, the passwordless market was $15.6B, but it is expected to grow to over $53B by 2030. A large part of today’s passwordless adoption is made possible through smartphones. The “The State of Passwordless” Dark Reading report commissioned by OpenText reports that 64% of respondents feel it’s important to move to a fully passwordless authentication model.
During this past decade, compliance with government mandates has been the motivating force for organizations to adopt passwordless technologies:
Identity verification for the workforce
Historically, the use of passwordless technology in workforce security has been relegated to specialized applications and users. Only in the past decade have the four most significant barriers to its adoption come down:
Beyond the device evolution, authentication use cases and requirements around them have also changed beyond government mandates.
Remote work
Now more than ever, field workers access private information using mobile platforms. Far beyond road warriors, the adoption of telecommuting has seen significant growth during the past three years. While working from anywhere had been steadily growing before the pandemic, new remote work policies have since gained widespread adoption across all industries.
Cloud
Structured and unstructured private data is increasingly stored and accessed from the cloud rather than the data center. As the use of data centers hosting corporate services and routing remote traffic has dramatically diminished, firewall security techniques are becoming increasingly irrelevant.
Personal device use
Further eroding security control, is the growing adoption of bring-your-own-device (BYOD). Remote access to cloud-hosted resources from BYOD shifts the rudimental reliance away from managed devices to identity-based security. This reliance translates to a heightened exposure to phishing and other identity attacks that circumvent identity verification.
This move away from managed networks, in-house digital resources (services and unstructured data), and company devices means that security teams can no longer depend on them as part of their strategy. Instead, basing security on identity necessitates a verified strategy that is highly resistant to imposters. And while adoption of multifactor authentication will continue to grow, single-factor passwordless raises the security bar over username and password while simplifying the authentication process. Employees enjoy the speed and convenience of facial recognition, verified fingerprint, or other passive experience. Meanwhile, the organization gains increased protection against phishing—the most prominent vulnerability and source of breaches.
Consumers moving to passwordless
The core passwordless enabler is the smartphone. Packing a hefty amount of computing power in a small package, they’ve become an indispensable to so many of us, making them a passwordless game-changer. We use them for everything—from texting to social media, to online shopping and banking. We take photos at a moment’s notice, look for directions, or search for answers.
This dependency on handheld computing devices has led to an authentication paradigm shift like none before:
Consumers are becoming more aware of the threats that traditional authentication poses to them. Organizations recognize this shift and see opportunities to enhance their digital services.
Verizon's data breach team identified spear phishing as the dominant credential-poaching method used by criminals. Spear phishing is initiated when the attacker sends an email that appears to be from a trusted source, such as a bank, a colleague, or some other source that sends victims to a mock website. This website requires authentication, duping victims into revealing their credentials, entering credit card numbers, or providing some other set of private information.
A variation of this attack offers a link that, when clicked, installs malware on the victims’ computers.
Passwordless technology is well suited to protecting against these types of attacks. For platforms configured to eliminate passwords, none can be captured via entry or keystroke capture. For platforms that offer passwords as an option in addition to passwordless, it can be reinforced with a passwordless multifactor authentication, such as something they have—like a smartphone—or something they are—biometric.
This reliance on smartphones brings their vulnerabilities to the forefront of the security discussion. Left unattended, mobile devices can fall into the hands of hackers and other bad actors, who can intercept PINs, OTPs, and out-of-band push approvals, and reconfigure biometrics to match themselves. SIM card theft poses an SMS/OTP risk too. Even if users are careful, their security can be breached when attackers manipulate service providers into canceling and transferring crucial information from legitimate SIM cards.
While no organization can thwart all threats, it is true that simply moving to a passwordless paradigm protects against the most common ones. Even for single-factor authentication, moving away from typed-in credentials boosts security. Still more can done, for example, by elevating security levels via risk-based authentication (RBA). RBA has a long-proven track record of determining when additional steps are needed to verify a user's identity. Organizations can invoke a second-factor authentication under pre-defined conditions, such as:
Such criteria help organizaitons determine how many levels of identity verification are necessary. For example, requiring a fingerprint to access information. Still, there is a more sensitive subset requiring multifactor authentication when risk is elevated.
Implementing passwordless login involves more than retiring password use—it requires carefully designing user flows, choosing strong authenticators, and planning fallback paths. Here is a roadmap (find more details in OpenText’s Passwordless Buyer’s Guide):
1. Define assurance tiers and use-case mapping. Start by classifying your resources by risk level (e.g. basic account info vs. financial operations). Use standards like NIST’s Authentication Assurance Levels (AAL) to decide how strong your authentication must be for each scenario. Then map each user journey (login, transaction, admin action) to an appropriate assurance tier.
2. Choose the right authentication methods. Select one or more passwordless methods that align with your risk, usability, and cost goals. Ideally, pick interoperable standards (e.g. FIDO2) so you remain vendor-agnostic and cross-platform. Options include:
3. Design a secure enrollment flow. The binding between a user and their authenticator is critical. Verify identity (for example, via existing credentials, identity proofing, or in-person checks), then cryptographically register the authenticator. Support multiple authenticators per account (so users have backups) and allow them to disable or change methods.
4. Implement authentication flows. For each interaction (login, transaction, session renewal):
5. Provide fallback/recovery paths. No system is perfect. Users may lose their phone or key. Provide secure, high-assurance recovery options (e.g. support identity verification, alternate authenticators, or challenge-response fallback) to restore access without weakening security.
6. Monitor, iterate, and phase rollouts. Start with limited pilot groups or non-critical paths. Monitor user feedback, drop-off rates, support tickets, and security events. Use that data to refine your flows, calibrate risk thresholds, and expand coverage. Make sure logging and forensic traces are in place to detect anomalies.
Passwordless authentication means users can log in without memorizing or typing passwords. Instead, authentication relies on cryptographic credentials tied to a device (or biometric/PIN) to prove identity.
MFA typically layers additional checks on top of a password. Passwordless authentication avoids passwords altogether, relying solely on stronger factors (device, biometrics, or possession) and optionally mixing in additional factors.
Common passwordless approaches include:
In many cases, yes, passwordless is more secure than passwords—especially when implemented correctly. Because there’s no password to steal, it’s resistant to credential reuse, brute force, and many phishing attacks.
You should build fallback or recovery options—e.g., alternate authenticators, identity verification steps, or pre-registered recovery methods—so users can regain access without weakening security.
There can be upfront costs to passwordless (infrastructure, user onboarding, device provisioning), but those are often offset by reductions in password resets, helpdesk load, and security risk.
Generally, yes. Many users find biometric or push-based methods easier and faster than passwords. However, user education and smooth flows are essential to reduce friction.
Enable passwordless and multifactor authentication
Deliver single sign-on and access control across all your platforms
Secure and control privileged access to protect critical assets
Secure your digital assets by confidently managing identities and access