NetIQ Advanced Authentication lineage
Two decades of regulated-MFA deployment. Established case law in financial services, government, defense, and healthcare.
OpenText • Identity and access management
OpenText Advanced Authentication carries the NetIQ Advanced Authentication lineage with FIDO2, passwordless, smart-card, biometric, and risk-based MFA across workforce, customer, and privileged users, integrated with the rest of the OpenText IAM line.
A Merito Advanced Authentication engagement scopes authentication methods per user population, designs the enrollment workflow against NetIQ Identity Manager-driven HR provisioning, and configures risk-based step-up policy so MFA fits without burning workforce experience.
What it is
OpenText Advanced Authentication carries the NetIQ Advanced Authentication lineage. It is the MFA and adaptive-authentication product inside the OpenText IAM line, supporting FIDO2 webauthn, passwordless, smart card, biometric, push notification, OTP, hardware token, and a long tail of authentication methods. Programs running heterogeneous user populations (workforce on FIDO2, contractors on OTP, customer-facing biometric, privileged users on smart card) get one MFA platform that handles all of them.
Risk-based authentication is the load-bearing capability for adaptive workflows. Static MFA (every login requires the same factor) is too friction-heavy for low-risk operations and too weak for high-risk ones. Risk-based authentication evaluates context (user, device, location, time, behavioral pattern) and selects the appropriate authentication factor. Low-risk requests pass with single-factor; high-risk requests step up to additional factors. Programs running adaptive authentication get the security posture without burning user experience.
FIDO2 and passwordless support is where the modernization fits in. Passwords are the most-attacked authentication factor; passwordless authentication (WebAuthn, FIDO2 hardware keys, platform authenticators) eliminates the most common attack vector. Advanced Authentication supports the modern passwordless landscape and the legacy long-tail (smart cards, OTP, hardware tokens) so programs can modernize gradually rather than rip-and-replace.
What kills Advanced Authentication adoption is poor enrollment hygiene. MFA is only as good as the enrollment process: users who never enrolled fall back to legacy authentication, users with stale enrollment data lose access, and contractor populations without enrollment workflows generate help-desk burden. Merito's engagement scopes enrollment workflow alongside the MFA deployment, integrates with NetIQ Identity Manager for HR-driven enrollment, and designs the operating model that keeps enrollment data current.
Ideal use cases
What it is best at
Two decades of regulated-MFA deployment. Established case law in financial services, government, defense, and healthcare.
FIDO2, passwordless, smart card, biometric, push, OTP, hardware token, and long-tail methods. Programs running heterogeneous populations get one platform.
Context-aware authentication that evaluates user, device, location, time, and behavioral pattern. Adaptive friction.
Step-up authentication integrated with Access Manager SSO flows.
HR-driven MFA enrollment integrated with NetIQ Identity Manager provisioning.
Core capabilities
What Advanced Authentication actually delivers across workforce and customer.
FIDO2 and passwordless
FIDO2 webauthn, passwordless authentication, platform authenticators, security keys.
Smart card and hardware token
PIV, CAC, smart card, and hardware token for regulated and federal workforce.
Biometric
Fingerprint, face, voice biometric for workforce and customer authentication.
Push, OTP, SMS
Push notification, time-based OTP, SMS for legacy and contractor populations.
Adaptive friction that fits the request.
Context evaluation
User, device, location, time, behavioral pattern context evaluated per request.
Step-up authentication
Risk-based step-up to additional factors on sensitive operations.
Behavioral risk scoring
Anomalous behavior triggers additional authentication challenges.
Integration with Core Behavioral Signals
UEBA risk scoring informs authentication decisions.
Advanced Authentication inside the OpenText IAM line.
Access Manager integration
Step-up authentication integrated with Access Manager SSO.
Identity Manager-driven enrollment
HR-driven MFA enrollment integrated with provisioning.
Privileged Access Manager pairing
MFA for privileged session checkout.
Compliance reporting
Audit-ready evidence for SOX, HIPAA, PCI DSS, and FedRAMP MFA mandates.
Where it fits in the stack
Deployment and implementation
Licensing and packaging
Advanced Authentication
Standard edition with FIDO2, smart card, biometric, OTP, and risk-based authentication.
Best for: Workforce MFA across regulated programs.
Advanced Authentication for customer identity
Customer-facing MFA with passwordless and biometric depth.
Best for: Customer-facing identity programs requiring adaptive authentication.
Merito services
Merito sells licenses and the delivery work around them. Pick the service that matches where you are in the lifecycle.
Authentication-method scoping, enrollment-workflow design, risk-based policy, OpenText IAM line integration.
Explore service02NetIQ Advanced Authentication version upgrades and FIDO2 modernization.
Explore service03MFA program scoping for OpenText Advanced Authentication alongside Okta MFA, Duo, and Microsoft Entra MFA.
Explore service04MFA integration into application authentication flows.
Explore service05Named engineer, priority SLAs, and release-time coverage for Advanced Authentication.
Explore service06Long-term run support including enrollment-workflow operation, risk-policy maintenance, and authentication-method evolution.
Explore service07Role-based training for identity architects, IAM operators, and help-desk teams.
Explore service08Merito-placed identity engineers and OpenText specialists embedded on long-running programs.
Explore serviceOpenText Advanced Authentication licensing
Advanced Authentication pricing arrives with method scoping, enrollment-workflow design, risk-based policy, and OpenText IAM line integration that turn MFA into adaptive security rather than friction with an unmanaged legacy-auth tail.
Merito point of view
Merito has audited MFA programs that rolled out FIDO2 enthusiastically and ended up with a workforce population split between enrolled users on modern authentication and an unmanaged tail of legacy authentication for contractors, service accounts, and users who never enrolled. The fix is enrollment workflow integrated with HR-driven provisioning. Programs that adopt MFA without enrollment hygiene end up with the gaps MFA is supposed to close.
Merito recommends OpenText Advanced Authentication specifically for programs already running NetIQ, modernizing legacy NetIQ Advanced Authentication, or running heterogeneous user populations that require authentication-method breadth. For greenfield cloud-native programs, Okta MFA and Microsoft Entra MFA are competitive. For programs running mature Duo deployments, the migration tradeoff goes the other way. Merito surfaces those alternatives honestly during scoping.
Risk-based authentication is the load-bearing modernization. Static MFA is too friction-heavy for low-risk operations and too weak for high-risk ones. Adaptive authentication that evaluates context and selects the appropriate factor gives the security posture without burning user experience. Programs running static MFA without adaptive policy generate either low security or high friction.
What buyers usually underestimate
Related from Merito
Related solutions
Related services
Related products
Frequently Asked Questions
Consultation request
Share your user populations, authentication-method posture, and OpenText IAM footprint. A Merito OpenText specialist follows up within one business day.
Method breadth
Heterogeneous authentication methods across workforce, customer, and privileged users.
Risk-based
Context-aware authentication. Low-risk passes single-factor; high-risk steps up.
Next step
A Merito Advanced Authentication engagement starts with enrollment-workflow design and risk-based policy. Programs that roll out MFA without enrollment hygiene leave an unmanaged tail of legacy authentication.