OpenText brings decades of expertise to help you unlock data, connect people and processes, and fuel AI with trust
Unify data seamlessly across your enterprise to eliminate silos, improve collaboration, and reduce risks
Get AI-ready and transform your data into structured, accessible, optimized information
Meet regulatory and compliance requirements and protect your information throughout its lifecycle
OpenText helps people manage content, automate work, use AI, and collaborate to boost productivity
See how thousands of companies around the world are succeeding with innovative solutions from OpenText
Our people are our greatest asset; they are the life of the OpenText brand and values
Learn how we aspire to advance societal goals and accelerate positive change
Find a highly skilled OpenText partner with the right solution to enable digital transformation
Explore scalable and flexible deployment options for global organizations of any size
Local control. Global scale. Trusted AI
Unlock the value of the cloud while maintaining control and compliance
Maintain full control of your data on your own infrastructure
Protect, scale, and use business information in your cloud of choice
See information in new ways
AI that understands your business, your data, and your goals
Say hello to faster decisions. Your secure personal AI assistant is ready to get to work
Gain better insights with generative AI for supply chains
Power work with AI content management and an intelligent AI content assistant
Improve your security posture with AI cybersecurity and agile threat detection
Enable faster app delivery, development, and automated software testing
Elevate customer communications and experiences for customer success
Turn every fax into instant action with AI
Empower users, service agents, and IT staff to find the answers they need
See information in new ways
AI that understands your business, your data, and your goals
Say hello to faster decisions. Your secure personal AI assistant is ready to get to work
Gain better insights with generative AI for supply chains
Power work with AI content management and an intelligent AI content assistant
Improve your security posture with AI cybersecurity and agile threat detection
Enable faster app delivery, development, and automated software testing
Elevate customer communications and experiences for customer success
Turn every fax into instant action with AI
Empower users, service agents, and IT staff to find the answers they need
Predict, act, and win with real-time analytics on a smarter data platform
Connect once, reach anything with a secure B2B integration platform
Reimagine knowledge with AI-ready content management solutions
Supercharge intelligent workspaces with AI to modernize work
Integrated cybersecurity solutions for enterprise protection
Purpose built data protection and security solutions
Reinvent threat hunting to improve security posture with the power of agile AI
Ship better software—faster—with AI-driven DevOps automation, testing, and quality
Reimagine conversations with unforgettable customer experiences
Transform customer communications with private generative AI
Turn faxes into workflow-ready data with AI
Make smarter decisions with AI-powered legal software and services
Accelerate eDiscovery with AI-driven speed and precision
Optimize strategy with early case assessment and investigation tools
Get smarter eDiscovery with advanced TAR and automated document review
Automate legal holds to eliminate risky and time-consuming processes
Unlock knowledge and legal insights across content silos
Get the clarity needed to cut the cost and complexity of IT operations
Redefine Tier 1 business support functions with self-service capabilities from private generative AI
Build custom applications using proven OpenText Information Management technology
Build it your way with OpenText Cloud APIs that create the real-time information flows that enable custom applications and workflows
Protect what matters, recover when it counts
Secure information management meets trusted AI
A unified data framework to elevate data and AI trust
A place where you can build, deploy, and iterate on agents in your data's language
A set of tools to help ingest data and automate metadata tagging to fuel AI
A suite of services and APIs that make governance proactive and persistent
Professional services experts who help you on your AI journey
Get greater visibility and sharper insights from AI-driven information management. Ready to see how?
Transform daily work with enterprise content management powered by AI
Cut the cost and complexity of IT service management, AIOps, and observability
AI-powered B2B integration for supply chain success
Drive value, growth, and loyalty with connected customer experiences
Agile development and software delivery? It only seems impossible
Cybersecurity for the Enterprise
Unlock insights with AI data analytics
See information in new ways
AI that understands your business, your data, and your goals
Say hello to faster decisions. Your secure personal AI assistant is ready to get to work
Gain better insights with generative AI for supply chains
Power work with AI content management and an intelligent AI content assistant
Improve your security posture with AI cybersecurity and agile threat detection
Enable faster app delivery, development, and automated software testing
Elevate customer communications and experiences for customer success
Turn every fax into instant action with AI
Empower users, service agents, and IT staff to find the answers they need
Improve efficiency, security, and customer satisfaction with OpenText
Transform energy and resources operations with cloud, cybersecurity, and AI
Boost customer experience, compliance, and efficiency with AI
Reimagine your mission with government-secure information management
Improve care delivery and patient engagement with AI-powered solutions
Modernize legal teams with automated, AI-powered legal tech solutions
Modernize manufacturing operations and logistics to reduce costs and ensure compliance
Enhance consumer engagement with omnichannel retail solutions and AI
Run processes faster and with less risk
Achieve digital transformation with guidance from certified experts
Modernize your information management with certified experts
Meet business goals with expert guidance, managed services, and more
Turn support into your strategic advantage
Free up your internal teams with expert IT service management
Discover training options to help users of all skill levels effectively adopt and use OpenText products
Modernize your information management with certified experts
Meet business goals with expert guidance, managed services, and more
Turn support into your strategic advantage
Free up your internal teams with expert IT service management
Discover training options to help users of all skill levels effectively adopt and use OpenText products
Find a highly skilled OpenText partner with the right solution to enable digital transformation
OpenText partners with leading cloud infrastructure providers to offer the flexibility to run OpenText solutions anywhere
OpenText partners with top enterprise app providers to unlock unstructured content for better business insights
Discover flexible and innovative offerings designed to add value to OpenText solutions
Discover the resources available to support and grow Partner capabilities
Get expert product and service support to accelerate issue resolution and keep business flows running efficiently
Explore detailed services and consulting presentations, briefs, documentation and other resources


Non-human identities (NHIs) are programmatic entities that perform operations and have access to a variety of information, some of which may be sensitive or otherwise need to be secured.
A non-human identity is more than just internet of things (IoT). It’s an identity used by any software or hardware—essentially, an identity that is not a person.
As it relates to identity and access management, here is a topline comparison of NHIs to user accounts.
| Characteristics | User accounts | NHIs |
|---|---|---|
| Origination | HR onboarding, self-service portals, trusted partner identity stores, etc. | Often dynamically assigned at creation time by development processes and tools. |
| Types | Employees, contractors, partners, customers, other types of individuals etc. | Service accounts, API keys and tokens, machine identities, cloud and workload identities, and increasingly automation and AI agents. |
| Volume | Proportional to workforce, or consumer base. | Vastly higher—outnumbering human identities by 50, 100 to one, or even more. These identities are also far more dynamic, meaning that they could pop up quickly and possibly have relatively short lifecycles. |
| Primary security threats | Especially vulnerable to phishing and credential theft. | Vulnerable to credential exposure, misuse, and exploitation. Their dynamic nature makes NHIs prone to inheriting excessive privileges. |
| Lifecycle management | Streamlined via HR and IAM systems. | NHIs are often far more dynamic, meaning that they could have relatively short lifecycles. Often inconsistent with limited visibility. |
| Access controls | Protected with controls such as passkeys and multi-factor authentication (MFA). | Lack of inherent controls, often rely on static credentials like API keys or certificates. |
Since they are tied to applications, services, and other types of digital resources, they behave and likely have different IAM requirements:
The proliferation of non-human identities is a necessary byproduct of modern innovation. While essential for building scalable and efficient systems, this new digital workforce demands a complete rethinking of security and governance to protect against the unique risks it presents. It’s quite likely that as you even look at your own organization that you’re seeing all types of digital automation crop up. For most types of organizations, this new “digital workforce” is growing far faster than the human one. For every human employee, there can be dozens, or even over a hundred, non-human identities performing critical functions. This sheer scale presents a profound challenge to traditional identity and access management (IAM) models, which were built for a human-centric world.
It's no secret that the latest frontier in this proliferation is the rise of AI and autonomous agents. As AI systems become more capable of making their own decisions and taking actions, they need their own identities to interact with applications and data. These "AI agents" represent a new category of NHI that operates continuously and whose behavior may be more dynamic and less predictable than a traditional service account.
The proliferation of NHIs in organizations is more than a trend; it's a fundamental shift driven by the modern demand for speed and scale. This exponential growth is a direct result of automation, cloud computing, and the rise of new technologies that are creating a massive volume of new identities that need to be secured and managed.
Taking a step back, at a higher level the top drivers to NHI proliferation are to reduce costs, increase efficiency, and enable rapid innovation wherever possible. Here is one way of organizing them:
Unfortunately, for many cybersecurity organizations identity and access management (IAM) of NHIs is an afterthought, commonly implemented through ad hoc adoption and processes. Here are some reasons why IAM of NHIs can be difficult and needs to be treated as carefully as carbon-based identities.
Discovery and inventory
One piece of NHI reality is that they proliferate at a speed and scale that makes manual tracking impossible. This poses a challenge for organizations that have been supplementing their current IAM infrastructure with identity true-up processes. You can't secure what you can't see, and that's the fundamental challenge with NHIs. Most often, this means that you need to get a complete, real-time inventory of every single non-human identity in your environment for effective management. More than just a list, the discovery process needs to be automated to find an API key, service account, and token, whether it's in the cloud, on-premises, or in a DevOps pipeline. Beyond just finding them, you must contextualize each identity, understanding its purpose, who owns it, and what resources it can access. This provides a crucial baseline, transforming a chaotic landscape into a structured, manageable system.
Lifecycle management
Unlike human identities with clear hiring and termination dates, NHIs have a dynamic lifecycle that demands automation. Effective management requires a "start-to-finish" approach. This means securely provisioning NHIs with the right permissions from the very beginning, often directly within development workflows. This requirement often poses a major challenge to organizations who focus their management on identities residing in Microsoft Active Directory, letting the other identity stores in their organization experience identity integrity drift. As such, there are two key issues. NHIs often have their own identity stores, meaning that organizations that have focused their enterprise identity management automation on Active Directory will have to incorporate some type of additional automation. It also means that any solution that they adopt doesn’t offer continuous identity management; it introduces access vulnerabilities.
It also means establishing a strict rotation schedule, automatically updating credentials to minimize the risk of a compromised secret being used for an extended period. Just as important is the automated decommissioning of identities when they are no longer needed. This prevents orphaned or forgotten credentials from becoming persistent backdoors for attackers.
Access control and governance
Access control for NHIs is about enforcing rules at machine speed. We know how important zero trust security principles and effective least privilege practices are, to grant an identity only the permissions it needs to perform a specific task, and nothing more. While this principle is a powerful defense against all types of breaches, it’s especially valuable to NHIs because of their programmatic nature. Another critical component of governance is the ability to centralize policy enforcement, ensuring consistent access rules are in place and enforced across all your systems, whether they are in different clouds or on-premises.
To combat the common problem of hard-coded secrets, it also means that you have a dedicated secrets management platform that can be used by your developers to securely store and inject credentials at runtime. That will need to be in place before you can adopt a policy for developers to keep credential secrets out of source code.
Just-in-Time (JIT) access, an advanced access governance concept, can provide temporary, high-privilege permissions that are automatically revoked once the job is done, dramatically reducing the window of opportunity for attackers. Considering the dynamic nature that NHIs commonly have, organizations will likely find added value incorporating JIT access for NHIs that they may not have deemed necessary for traditional users.
Continuous monitoring and threat detection
NHIs work 24/7, and so should your security. Continuous monitoring is essential to detect anomalies and respond to threats in real time. This involves establishing a baseline of normal behavior for each identity and using behavioral analytics to spot deviations. For example, if an identity that normally accesses a specific database suddenly tries to connect to an HR application, it should trigger an immediate alert. Maintaining detailed audit trails of all NHI activity is also critical for compliance and forensic analysis. This level of oversight turns your vast network of machine identities from a security risk into a well-managed and transparent component of your digital operations.
NHIs introduce new challenges to compliance and audit readiness because they operate outside the traditional frameworks built for human users. Regulatory standards like GDPR, HIPAA, and SOX require organizations to demonstrate control over who has access to sensitive data, when, and why. NHIs—such as service accounts, API tokens, and automation agents—often lack clear ownership, lifecycle visibility, and consistent governance, making it difficult to meet these requirements.
One major issue is discoverability. NHIs can be created dynamically by development pipelines or cloud services, and without automated inventory tools, many go unnoticed. This lack of visibility undermines audit efforts, as organizations cannot secure or report on identities they don’t know exist. Additionally, NHIs often use static credentials or hard-coded secrets, which are difficult to rotate and monitor, increasing the risk of non-compliance.
Audit trails must also evolve. NHIs perform critical tasks, sometimes with elevated privileges, and their actions must be logged with the same rigor as human users. This includes tracking access patterns, credential usage, and changes to permissions. Without this, organizations risk failing audits or overlooking breaches.
To stay compliant, organizations must extend identity governance to NHIs—automating discovery, enforcing least privilege, rotating credentials, and maintaining detailed logs. Treating NHIs as first-class citizens in IAM programs is essential to meeting modern compliance and audit commitments.
Effective onboarding and offboarding of non-human identities (NHIs) are essential to maintaining security and operational integrity in modern environments. Unlike human users, NHIs—such as service accounts, API tokens, and automation agents—are often created and destroyed programmatically, making manual processes insufficient and risky. Best practices begin with automated provisioning. NHIs should be created through secure development workflows, tagged with metadata that identifies their purpose, owner, and associated workload. This ensures accountability and enables policy enforcement from the moment of creation.
Access should be granted using least privilege principles, with short-lived credentials and scoped permissions tailored to the task. Static credentials and hard-coded secrets must be avoided in favor of dynamic secrets injected at runtime via secure vaults. This reduces exposure and supports compliance requirements.
Offboarding is equally critical. NHIs must be decommissioned as soon as their associated workloads are retired. This process should be automated and triggered by infrastructure-as-code or CI/CD pipeline events. Orphaned identities—those left behind after a workload is removed—pose serious security risks and are often exploited in breaches.
Credential rotation and expiration policies should be enforced throughout the lifecycle. Regular audits of NHI inventories help identify unused or overprivileged identities. By embedding these practices into your identity governance strategy, you can ensure NHIs are securely managed from creation to retirement, reducing risk and supporting compliance in dynamic, cloud-native environments.
JIT access governance plays a vital role in helping organizations meet their security compliance obligations, especially as non-human identities (NHIs) become more prevalent. Traditional access models often grant persistent permissions, which can lead to overprivileged accounts and increased risk. JIT access flips this model by granting temporary, task-specific permissions only when needed, and automatically revoking them afterward—dramatically reducing the attack surface.
For compliance, this means tighter control over who—or what—has access to sensitive systems and data. JIT access ensures that NHIs, such as service accounts and automation agents, operate within clearly defined boundaries. It supports least privilege by default, aligning with regulatory requirements that mandate minimal access and strong access controls.
JIT also enhances auditability. Every access request is time-bound and purpose-driven, making it easier to track, justify, and report during audits. This level of granularity helps demonstrate compliance with standards like GDPR, HIPAA, and SOX, which require detailed records of identity behavior and access events.
In dynamic environments like cloud and DevOps, JIT access integrates seamlessly with automated workflows, enabling secure, compliant operations without slowing down innovation. By embedding JIT into your identity governance strategy, you not only strengthen security but also build a defensible compliance posture in an increasingly complex digital landscape.
Enable passwordless and multifactor authentication
Lower identity and access management infrastructure TCO
Identify and secure unstructured data from unauthorized access