Home | Connectors | OpenText Identity and Access Management | OpenText Identity and Access Management - OpenText Webroot Unity Integration and Automation

OpenText Identity and Access Management - OpenText Webroot Unity Integration and Automation

Integrate OpenText Identity and Access Management Security / Identity Access Management and OpenText Webroot Unity Security / Identity Access Management apps with any of the apps from the library with just a few clicks. Create automated workflows by integrating your apps.

Common Integration Use Cases Between OpenText Identity and Access Management and OpenText Webroot Unity

1. Role-Based Access to Endpoint Security Administration

Data flow: OpenText Identity and Access Management ? OpenText Webroot Unity

Use OpenText Identity and Access Management to enforce single sign-on and role-based access for Webroot Unity administrators, analysts, and help desk users. This ensures only approved personnel can manage endpoint policies, view threat dashboards, or initiate remediation actions. It reduces manual account provisioning and helps security teams maintain least-privilege access across the security console.

Business value: Faster onboarding and offboarding of security staff, lower risk of unauthorized changes, and simpler audit preparation.

2. Centralized User Authentication for Security Operations Teams

Data flow: OpenText Identity and Access Management ? OpenText Webroot Unity

Integrate enterprise identity provider authentication through OpenText Identity and Access Management so security operations teams can access Webroot Unity using corporate credentials. This eliminates separate passwords for the endpoint security platform and supports consistent authentication policies such as MFA, password rules, and conditional access.

Business value: Improved user experience, reduced password reset requests, and stronger access control for security operations.

3. Automated Deprovisioning of Security Console Access When Employees Leave

Data flow: OpenText Identity and Access Management ? OpenText Webroot Unity

When an employee changes role or leaves the organization, OpenText Identity and Access Management can trigger removal or adjustment of their Webroot Unity access. This is especially important for SOC analysts, IT administrators, and managed service teams who may have elevated privileges in the endpoint protection console.

Business value: Reduces orphaned accounts, shortens access revocation time, and lowers insider risk.

4. Segregated Access for IT, Security, and Service Desk Teams

Data flow: Bi-directional governance, with OpenText Identity and Access Management controlling access into OpenText Webroot Unity

Use identity governance rules to assign different Webroot Unity permissions based on job function. For example, the service desk can view endpoint status and open tickets, while security analysts can investigate threats and quarantine devices, and platform administrators can manage global policies. OpenText Identity and Access Management provides the access model, while Webroot Unity enforces operational controls.

Business value: Clear separation of duties, reduced operational errors, and better compliance with internal control requirements.

5. Secure Access for Third-Party Managed Security Providers

Data flow: OpenText Identity and Access Management ? OpenText Webroot Unity

If a managed security service provider supports endpoint protection operations, OpenText Identity and Access Management can provide controlled access to Webroot Unity using federated identities or delegated accounts. Access can be limited to specific tenants, device groups, or response actions, and revoked immediately when the engagement ends.

Business value: Faster partner onboarding, tighter control over external access, and improved accountability for outsourced security operations.

6. Policy-Driven Access for High-Risk Administrative Actions

Data flow: OpenText Identity and Access Management ? OpenText Webroot Unity

Require stronger authentication or step-up verification through OpenText Identity and Access Management before users can perform sensitive Webroot Unity actions such as disabling protection, changing global policies, or releasing quarantined files. This adds an extra control layer for privileged operations without slowing down routine tasks.

Business value: Better protection against misuse of admin privileges and stronger control over critical security changes.

7. Unified Audit and Compliance Reporting for Identity and Endpoint Security

Data flow: OpenText Webroot Unity ? OpenText Identity and Access Management

Send Webroot Unity administrative activity and security events into OpenText Identity and Access Management reporting or governance workflows to correlate who accessed the console with what actions were taken. This supports investigations, compliance reviews, and access recertification by linking identity events with endpoint security operations.

Business value: Stronger audit trails, faster incident investigations, and easier compliance evidence collection.

8. Incident Response Access Escalation for Security Analysts

Data flow: OpenText Identity and Access Management ? OpenText Webroot Unity

During a security incident, OpenText Identity and Access Management can temporarily elevate access for designated analysts so they can isolate endpoints, review detections, or adjust containment policies in Webroot Unity. Time-bound access and approval workflows help ensure elevated privileges are granted only when needed and automatically removed afterward.

Business value: Faster incident containment, controlled emergency access, and reduced operational risk during high-pressure events.

How to integrate and automate OpenText Identity and Access Management with OpenText Webroot Unity using OneTeg?