NetIQ Identity Governance lineage
Two decades of regulated-IAM deployment. Established case law in financial services, government, and Fortune 500 SOX programs.
OpenText • Identity and access management
OpenText Identity Governance carries the NetIQ Identity Governance lineage with access reviews, segregation-of-duties enforcement, and audit-ready entitlement reporting for SOX-aligned and regulated identity programs.
Through Merito, Identity Governance gets configured for the customer's quarterly or annual access-review cadence, SOD rules authored against SAP, Oracle EBS, and PeopleSoft entitlements, and the whole governance loop paired with NetIQ Identity Manager so rejected entitlements actually get removed.
What it is
OpenText Identity Governance carries the NetIQ Identity Governance lineage (formerly NetIQ Aegis). It is the access-review and SOD-enforcement product inside the OpenText IAM line, designed for SOX-aligned and regulated identity programs that require recurring entitlement attestation, audit-ready reporting, and segregation-of-duties analysis. The product reads from identity stores (NetIQ Identity Manager, AD, LDAP, HR systems), runs scheduled access-review cycles, and surfaces SOD violations across the entitlement landscape.
Access reviews are the load-bearing capability for SOX programs. Public companies subject to SOX section 404 controls run quarterly or annual access reviews on financially material applications, and auditors expect documented evidence that managers attested to direct reports' access. Identity Governance handles the review cadence, the manager workflow, the rejection-and-remediation loop, and the audit-evidence packaging. Programs running ad-hoc spreadsheet-based reviews struggle to scale and routinely fail audit on documentation gaps.
SOD enforcement is the second capability that pays back on regulated programs. Toxic combinations of access (employee can both create vendors and approve payments, employee can both modify code and deploy to production) need to be identified and either blocked or compensated by review. NetIQ has been doing SOD across SAP, Oracle EBS, and PeopleSoft for two decades; the rule library covers the patterns regulated finance and HR programs face. Programs running SOD enforcement get the catch; programs without it find out about toxic combinations during audit or after fraud incidents.
What kills Identity Governance adoption is data-quality drift. Access reviews are only as good as the entitlement data feeding them. Programs with stale provisioning (terminated employees retaining access), shared service accounts, and unmanaged contractor entitlements generate access reviews that look chaotic regardless of actual risk. The right pattern is to fix identity hygiene first (NetIQ Identity Manager) and then layer Identity Governance on top. Merito's engagement scopes both sides honestly.
Ideal use cases
What it is best at
Two decades of regulated-IAM deployment. Established case law in financial services, government, and Fortune 500 SOX programs.
SAP, Oracle EBS, PeopleSoft, and other ERP systems where toxic combinations live. NetIQ has been doing SOD on these stacks for two decades.
Quarterly and annual cycles with manager attestation, reject-and-remediate workflow, and audit-evidence packaging.
Provisioning data flows directly into governance. Programs running both get coordinated identity lifecycle and governance.
SOX, HIPAA, PCI DSS, and sector-specific entitlement evidence in the formats auditors expect.
Core capabilities
Where Identity Governance does the work for SOX-aligned programs.
Manager attestation cycles
Scheduled quarterly or annual cycles with manager-led entitlement review. Audit-evidence packaging built in.
Reject-and-remediate workflow
Manager rejection flows into Identity Manager for entitlement removal. Closed-loop remediation.
Risk-aware review
Risk scoring per entitlement so high-risk access gets reviewed more frequently.
Multi-tier review
Application owner review plus manager review for entitlements that require both perspectives.
Toxic-combination enforcement on regulated apps.
SOD rule library
Pre-built SOD rules for SAP, Oracle EBS, PeopleSoft, and other ERP systems.
Custom SOD authoring
Custom SOD rules for proprietary applications and internal toxic combinations.
Detective and preventive enforcement
Detective (find existing toxic combinations) and preventive (block new toxic provisioning) enforcement.
Compensating controls workflow
Where toxic combinations are necessary, document compensating controls with audit-evidence trail.
Identity Governance output flowing into audit and the rest of the IAM line.
Audit-ready reporting
SOX, HIPAA, PCI DSS, and regulated entitlement reports in audit-expected formats.
Identity Manager integration
Provisioning data flows into governance; reject-and-remediate flows back into Identity Manager.
Access Manager integration
Access Manager-managed entitlements covered in access-review cycles.
Privileged Access Manager integration
Privileged-account entitlements covered with elevated review cadence.
Where it fits in the stack
Deployment and implementation
Licensing and packaging
Identity Governance
Standard edition for access-review cadence and SOD enforcement.
Best for: SOX-aligned programs and regulated identity governance.
Identity Governance with Identity Manager
Bundled with NetIQ Identity Manager for coordinated provisioning and governance.
Best for: Programs running coordinated identity lifecycle and governance.
Merito services
Merito sells licenses and the delivery work around them. Pick the service that matches where you are in the lifecycle.
Entitlement-data integration, access-review policy design, SOD authoring, NetIQ Identity Manager pairing, audit-evidence packaging.
Explore service02NetIQ Identity Governance version upgrades and access-review-cycle modernization.
Explore service03IAM and governance program scoping for OpenText Identity Governance alongside SailPoint, Saviynt, and Microsoft Entra ID Governance.
Explore service04Access-review automation, SOD enforcement integration, and audit-evidence packaging.
Explore service05Named engineer, priority SLAs, and release-time coverage for Identity Governance.
Explore service06Long-term run support including access-review-cycle operation, SOD policy maintenance, and audit-evidence packaging.
Explore service07Role-based training for compliance leads, identity governance architects, and audit teams.
Explore service08Merito-placed identity governance engineers and OpenText specialists embedded on long-running programs.
Explore serviceOpenText Identity Governance licensing
Identity Governance pricing arrives with entitlement-data integration, access-review policy design, SOD authoring, and audit-evidence packaging that turn quarterly attestation into defensible SOX evidence rather than spreadsheet click-through.
Merito point of view
Merito has audited SOX programs running quarterly access reviews on spreadsheets that managers click through without reading, and other programs running rigorous Identity Governance cycles with reject-and-remediate workflow and audit-evidence packaging. The difference shows up at audit time. Identity Governance is the right tool for SOX-aligned and regulated programs that take attestation seriously; programs that treat access reviews as a checkbox should not adopt it because the discipline is the value, not the product.
Merito recommends OpenText Identity Governance specifically for programs already running NetIQ, modernizing legacy NetIQ Identity Governance, or subject to SOX section 404 controls with mature compliance discipline. For greenfield cloud-native programs, SailPoint and Saviynt are competitive depending on the program shape. For programs running Microsoft-ecosystem-only IAM, Microsoft Entra ID Governance fits naturally. Merito surfaces those alternatives honestly during scoping.
The pairing with NetIQ Identity Manager is the load-bearing move on coordinated identity governance. Provisioning data flows into governance; reject-and-remediate flows back into provisioning. Programs running governance without provisioning integration find that rejected entitlements never actually get removed.
What buyers usually underestimate
Related from Merito
Related solutions
Related services
Related products
Frequently Asked Questions
Consultation request
Share your access-review cadence, SOX program posture, and OpenText IAM footprint. A Merito OpenText specialist follows up within one business day.
NetIQ governance depth
Established case law in financial services, government, and Fortune 500 SOX programs.
Coordinated with provisioning
Native pairing with NetIQ Identity Manager. Rejected entitlements actually get removed.
Next step
A Merito Identity Governance engagement starts with access-review policy design and SOD authoring. Programs that treat access reviews as a checkbox routinely fail audit.