NetIQ PAM lineage
Two decades of regulated-IAM deployment. Established case law in financial services, government, and Fortune 500 PAM programs.
OpenText • Identity and access management
OpenText Privileged Access Manager carries the NetIQ Privileged Account Manager lineage with credential vaulting, session recording, just-in-time elevation, and audit-ready evidence for regulated programs running heterogeneous server, database, and infrastructure access.
A Merito PAM engagement inventories the customer's actual privileged-account landscape, sequences vault deployment by use case (interactive admin first, service accounts second, application accounts third), and wires session recording, JIT elevation, and OpenText IAM line integration so PAM rolls out without breaking critical workflows.
What it is
OpenText Privileged Access Manager carries the NetIQ Privileged Account Manager lineage. PAM-shaped products solve a specific governance problem: privileged accounts (root, sa, Administrator, service accounts, application accounts) carry the highest impact when compromised, and traditional access-management approaches do not handle their lifecycle well. NetIQ has been doing PAM in regulated environments for two decades, and the engine covers vaulting, session recording, just-in-time elevation, and audit-evidence packaging.
Vaulting is the load-bearing capability. Privileged credentials get stored in the vault, rotated on a configurable cadence, and checked out by authorized users for specific sessions. Programs that rely on shared password lists or static service-account passwords find that credential rotation is impossible, audit evidence does not exist, and lateral-movement attacks succeed. Vaulting closes that gap: credentials rotate automatically, every checkout is logged, and the SOC has a clear forensic trail.
Session recording is the second capability that pays back during incidents. Privileged sessions (RDP into a domain controller, SSH into a database server, console access to a router) get recorded as video and metadata. When an incident happens, the IR team has a recording of exactly what the privileged user did. Without session recording, IR reconstructs from logs that may or may not be complete; with it, the evidence is direct.
What derails PAM adoption is operational scope creep. Programs that try to put every privileged account into the vault on day one find that their critical workflows break (DBAs cannot reset passwords automatically, automation pipelines lose their service-account access, scheduled jobs fail). The right pattern is to scope by use case (interactive admin sessions first, service accounts second, application accounts third) and sequence the rollout. Merito's engagement scopes by use case and treats the operating-model design as central work in the implementation.
Ideal use cases
What it is best at
Two decades of regulated-IAM deployment. Established case law in financial services, government, and Fortune 500 PAM programs.
Windows, Linux, Unix, mainframe, network devices, databases, cloud infrastructure. Programs running mixed environments get one PAM.
Recorded privileged sessions paired with metadata logs for IR-grade forensic evidence.
Identity Manager provisioning, Identity Governance access reviews, and Access Manager SSO integrate with PAM-managed entitlements.
Time-bounded privileged access with auditable approval workflows. Programs avoid standing privileged access where it is not needed.
Core capabilities
Where PAM does the work on privileged credentials.
Credential vault
Centralized vault for privileged credentials with configurable rotation cadence and access policy.
Automated rotation
Programmatic credential rotation across Windows, Linux, Unix, databases, network devices, and cloud infrastructure.
Service-account management
Service-account and application-account credential management with automated rotation and consumer-aware updates.
Cloud privileged credentials
AWS IAM, Azure privileged identity, GCP service accounts, and other cloud privileged credential management.
Privileged sessions with recording and policy.
Session recording
Recorded RDP, SSH, console, and database sessions with searchable metadata.
Just-in-time elevation
Time-bounded privileged access with auditable approval workflows.
Live session monitoring
Real-time monitoring of active privileged sessions with intervention capability.
Command policy
Configurable command-allow and command-deny policies on privileged sessions.
PAM inside the OpenText IAM line and the SOC.
OpenText IAM line integration
Identity Manager, Identity Governance, and Access Manager integration for coordinated privileged identity.
SIEM integration
Privileged-session events feed Core Threat Detection and Response and Enterprise Security Manager.
UEBA enrichment
Privileged-account behavioral analytics through Core Behavioral Signals.
Compliance reporting
Audit-ready evidence for SOX, HIPAA, PCI DSS, and regulated privileged-access mandates.
Where it fits in the stack
Deployment and implementation
Licensing and packaging
Privileged Access Manager
Standard edition with vaulting, session recording, and JIT elevation.
Best for: Regulated programs running NetIQ-shaped privileged-access governance.
Privileged Access Manager with NetIQ Identity Manager
Bundled with Identity Manager for coordinated privileged identity lifecycle.
Best for: Programs running coordinated identity lifecycle and PAM.
Merito services
Merito sells licenses and the delivery work around them. Pick the service that matches where you are in the lifecycle.
Privileged-account inventory, vault deployment, session recording configuration, JIT elevation policy, OpenText IAM line integration, operating-model design.
Explore service02NetIQ Privileged Account Manager version upgrades and modernization.
Explore service03PAM program scoping for OpenText Privileged Access Manager alongside CyberArk, BeyondTrust, and Delinea.
Explore service04Service-account credential delivery for automation pipelines and DevOps integration.
Explore service05Named engineer, priority SLAs, and release-time coverage for Privileged Access Manager.
Explore service06Long-term partner-managed run for programs that want OpenText engineering without internal headcount.
Explore service07Role-based training for identity security architects, infrastructure operations leads, and compliance teams.
Explore service08Merito-placed identity engineers and OpenText specialists embedded on long-running programs.
Explore serviceOpenText Privileged Access Manager licensing
PAM pricing arrives with privileged-account inventory, vault deployment, session-recording configuration, JIT elevation policy, and OpenText IAM line integration sequenced so the rollout doesn't break the workflows it's meant to protect.
Merito point of view
Merito has scoped PAM programs where CyberArk is the right answer (programs picking the market-share leader, programs with cloud-native PAM as the priority) and others where OpenText Privileged Access Manager is the right answer (programs already running NetIQ, programs subject to OpenText catalog consolidation, programs that want PAM integrated with the rest of the NetIQ IAM line). Both decisions are valid; the right one depends on the program shape.
Merito recommends OpenText Privileged Access Manager specifically when the program runs NetIQ Identity Manager, Identity Governance, and Access Manager, or when OpenText IAM consolidation is the buying criterion. For programs picking specialist PAM depth, CyberArk is the market leader and BeyondTrust is competitive on session-recording depth. Merito surfaces those alternatives honestly during scoping.
Sequencing the rollout by use case is the load-bearing operational decision. Programs that try to put every privileged account into the vault on day one break critical workflows. The right pattern is interactive admin sessions first, service accounts second, application accounts third. Merito treats this sequencing as central work in the implementation.
What buyers usually underestimate
Related from Merito
Related solutions
Related services
Related products
Frequently Asked Questions
Consultation request
Share your privileged-account landscape, infrastructure mix, and OpenText IAM footprint. A Merito OpenText specialist follows up within one business day.
NetIQ PAM lineage
Established case law in financial services, government, and Fortune 500 PAM programs.
OpenText IAM integration
Identity Manager provisioning, Identity Governance access reviews, Access Manager SSO. PAM is not standalone.
Next step
A Merito Privileged Access Manager engagement scopes by use case and sequences the rollout. Programs that try to vault everything at once break critical workflows.