Home | Connectors | OpenText Core Content - Metadata | OpenText Core Content - Metadata - OpenText Identity and Access Management Integration and Automation
OpenText Core Content - Metadata and OpenText Identity and Access Management complement each other by combining governed content classification with controlled user access. Together, they help enterprises enforce metadata standards, secure content operations, and streamline administration across cloud and hybrid OpenText environments.
Data flow: OpenText Identity and Access Management to OpenText Core Content - Metadata
When a user signs in, their identity, department, or role can be used to assign the correct metadata template in OpenText Core Content. For example, legal users can be presented with legal retention and matter fields, while marketing users receive campaign and asset classification fields. This reduces manual setup, improves metadata consistency, and ensures users only see the fields relevant to their job function.
Data flow: Bi-directional
Identity and Access Management can enforce who is allowed to create, edit, or approve metadata for sensitive content categories such as HR records, contracts, or regulated documents. OpenText Core Content - Metadata can then apply validation rules based on those permissions. This helps prevent unauthorized changes to critical classification data and supports audit-ready governance.
Data flow: OpenText Identity and Access Management to OpenText Core Content - Metadata
As new employees are provisioned in Identity and Access Management, their access rights can automatically determine which content libraries, metadata sets, and classification rules they receive in Core Content. This shortens onboarding time for content-heavy teams such as records management, procurement, and compliance, while reducing help desk requests for manual configuration.
Data flow: OpenText Identity and Access Management to OpenText Core Content - Metadata
Enterprises often need business users to maintain controlled vocabularies, but only within their area of responsibility. Identity and Access Management can assign stewardship permissions to specific roles, such as regional content admins or product line owners, while Core Content enforces the approved metadata values and validation rules. This supports decentralized administration without losing governance control.
Data flow: Bi-directional
Metadata values such as document type, confidentiality level, or region can be used alongside identity attributes to determine access rights. For example, a document tagged as confidential and assigned to a specific business unit can be restricted to users with matching roles and clearance levels. This improves security precision and reduces the risk of overexposure in shared repositories.
Data flow: OpenText Core Content - Metadata to OpenText Identity and Access Management
Metadata records can be combined with identity logs to show who created, updated, approved, or accessed content and under what role. Compliance teams can use this to produce audit reports for regulated processes, retention reviews, and policy enforcement. The result is stronger traceability across both content classification and user activity.
Data flow: OpenText Identity and Access Management to OpenText Core Content - Metadata
In large organizations, multiple teams may manage different metadata domains, such as legal, HR, finance, and product content. Identity and Access Management can restrict each team to its approved metadata sets and administration functions. This prevents accidental changes to enterprise-wide taxonomies and helps maintain consistency across repositories.
Data flow: OpenText Identity and Access Management to OpenText Core Content - Metadata
When a user changes roles or leaves the organization, Identity and Access Management can immediately revoke access to metadata administration and content classification functions in Core Content. This reduces security exposure and ensures former users cannot alter controlled vocabularies, validation rules, or governance settings after their access should have ended.
Together, these integration patterns help enterprises align identity controls with metadata governance, improving security, reducing administrative effort, and making content operations more reliable and auditable.