Micro Focus Identity & Access Management

Identity-Powered Access solutions that integrate Identity and Access Management (IAM / IDAM) policies across local, mobile and cloud environments. Integrated identity information used to create, modify, and retire identities and control their access. We provide Identity Management, Access Management, single sign-on (SSO), access governance, identity tracking and Active Directory administration.


  • Single entry secure access to Enterprise and Cloud Applications
  • Multi factor Authentication for all devices across the organisation
  • Cloud Access management logging and reporting
  • Granular management of Active Directory and Office365 privileges
  • Identity Governance managing and enforcing entitlements across the organisation
  • User identity tracking and management of entitlements
  • Privileged Account Management and tracking of change
  • Secure Login and Single sign on to streamline user authentication
  • Self Service Password Reset and management across the
  • Change guardian file change management and control


  • Fast and secure user access to the correct resources
  • Govern access across the organisation for regulatory compliance
  • Control and manage privileged user activities
  • Proactively identify threats and reduce risk
  • Strengthen authentication without reducing productivity
  • Visibility over who access/changes what and when
  • Secure credentials for cloud service providers (AWS, Azure)
  • Define/Manage optimal roles needed to support business requirments
  • HR Integration for governance and compliance - Joiners Movers Leavers
  • Easy access through affiliated and social identities


£25000 to £1000000 per licence per year

  • Free trial available

Service documents


G-Cloud 11

Service ID

5 3 7 0 7 2 0 0 1 5 8 4 9 4 4



Micro Focus G-Cloud - Team



Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Identity and Access Management is often closely coupled with Integrated HR, Risk, Governance and Compliance programs and may be delivered as a complete solution or in individual elements depending on end user requirements. Our IDAM Solutions are flexible and adaptable to work with other vendor technologies too
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints There are no specific constraints that should be noted but as with all hybrid capabilities the specifics of a configuration should be discussed in detail and planned to provide optimum service capability for your business requirements. Micro Focus provide planning, implementation and configuration services to end users as well as through many specialised and certified partners.
System requirements System requirements will be determined by the selected services

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 24x7 support is available and details can be found at NetIQ.com/support
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Choose the level of support you need:
1 - Assigned Support Engineers - Available over the phone during business hours.
2 - Primary Support Engineer will visit you on-site periodically during the year and, with the purchase of Priority Maintenance, are available 24x7 by phone for emergency situations.
3 - Dedicated Support Engineer (DSE) is located in your office and focused on your business systems' needs. 4 - Service Account Management with a Premium Support Engineer works with you to ensure you get the most from your solutions gaining an in-depth knowledge of your technical support needs.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Comprehensive onsite tailored/bespoke training and Online training are both available and compliment our documentation which provides complete detail on configuration models, usage instructions and user scenarios.

Through our consulting services and those of our certified partners we offer solution, planning, configuration, implementation and fast start services.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Data extraction may be provided by our service as a standard offering or bespoke tailored solution depending on requirement.

Facilities are provided to allow export of data from the application. The exact requirements for data extraction at the end of the service contract will be negotiated between the customer and the chosen hosting partner.
End-of-contract process All Data management, governance and compliance with regulations applicable will be the responsibility of the client during the term of the agreement. Data extraction will be the responsibility of the client and at the clients expense prior to termination of the contract.
This will be negotiated between the customer and hosting partner as part of the service scoping exercise.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • Windows
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Administration services unavailable on mobile devices
Service interface No
What users can and can't do using the API Users have access to published API's enabling them to complete most tasks via the API's for managing and reporting on the IDAM platform.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Most anything is possible and should be discussed with the Planning team to ensure that Customisations are necessary and that there are no alternatives which are more cost effective and suitable for the requirement.


Independence of resources The solution is scalable. A scoping exercise between the customer and chosen hosting partner will identify the different workloads over time and required resources required to support those workload


Service usage metrics Yes
Metrics types Further information will be provided as part of the planning process to be discussed with the Micro Focus technical team
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency Never
Protecting data at rest Other
Other data at rest protection approach Data Protection at rest will be discussed and provided by the customer's chosen hosting partner
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach To be agreed - Data dump from database - command line application provided API call to database to export data to a pre-defined format (json, csv)
Data export formats Other
Other data export formats Standard formats will be determined and used
Data import formats Other
Other data import formats Standard formats will be determined and used

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Other
Other protection between networks Data Protection between networks will be discussed and provided by the customer's chosen hosting partner
Data protection within supplier network Other
Other protection within supplier network Data Protection within networks will be discussed and provided by the customer's chosen hosting partner

Availability and resilience

Availability and resilience
Guaranteed availability This guarantee will be negotiated between the customer and chosen hosting service delivery partner.
Approach to resilience Service resilience will be negotiated between the customer and chosen hosting service delivery partner.
Outage reporting Outage reporting will be provided by the chosen hosting partner.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels Roles can be defined to determine the provide and/or restrict access as appropriate
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI
ISO/IEC 27001 accreditation date 22/08/2017
What the ISO/IEC 27001 doesn’t cover This certification is for Software support services
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Security Governance will be a topic to be covered by the chosen hosting supplier
Information security policies and processes Security policies and processes will be a topic for discussion with the chosen hosting partner.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Vulnerability management will be provided by the chosen hosting partner.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Vulnerability management will be provided by the chosen hosting partner.
Protective monitoring type Supplier-defined controls
Protective monitoring approach These facilities will be provided by the chosen hosting partner.
Incident management type Supplier-defined controls
Incident management approach The incident management process will be provided by the chosen hosting partner.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No


Price £25000 to £1000000 per licence per year
Discount for educational organisations No
Free trial available Yes
Description of free trial Included Software license for Evaluation (Non production) use. Excluded Post sales technical support service. Period Standard is a maximum of 3 months although extensions to the 3 month period may be granted by the local account team.

Service documents

Return to top ↑