Home | Connectors | Threekit | Threekit - OpenText Identity and Access Management Integration and Automation
Data flow: OpenText Identity and Access Management ? Threekit
Enable designers, merchandisers, product managers, and support teams to access Threekit through a single enterprise login managed by OpenText Identity and Access Management. This removes separate credentials, reduces password-related help desk tickets, and gives IT centralized control over authentication policies.
Business value: Faster access for business users, lower administrative overhead, and stronger security enforcement across the visual commerce workflow.
Data flow: OpenText Identity and Access Management ? Threekit
Synchronize user roles from OpenText Identity and Access Management into Threekit so each team member only sees the tools and product assets relevant to their job. For example, marketing teams can manage visual experiences, while engineering or operations teams can access configuration rules and technical product data.
Business value: Reduces the risk of unauthorized changes, supports segregation of duties, and simplifies governance for complex product catalogs.
Data flow: OpenText Identity and Access Management ? Threekit
When external agencies, photographers, or 3D content specialists are onboarded in OpenText Identity and Access Management, their access to Threekit can be automatically created with the correct permissions. When contracts end, access is revoked immediately across both systems.
Business value: Improves security for third-party collaboration, shortens onboarding time, and prevents orphaned accounts in Threekit.
Data flow: OpenText Identity and Access Management ? Threekit
For enterprises that allow regional sales teams or channel partners to manage approved product configurations, OpenText Identity and Access Management can authenticate users and enforce access policies before they enter Threekit administration tools. Access can be limited by region, brand, or product line.
Business value: Enables distributed business teams to manage localized product experiences while maintaining centralized security controls.
Data flow: OpenText Identity and Access Management ? Threekit
Large enterprises often run multiple brands or divisions with separate product catalogs and visual assets. OpenText Identity and Access Management can pass identity attributes such as business unit, geography, or brand affiliation into Threekit to determine which product libraries and configuration experiences a user can access.
Business value: Supports clean separation of business units, reduces catalog management complexity, and improves compliance with brand governance rules.
Data flow: Threekit ? OpenText Identity and Access Management
Threekit activity logs, such as who edited a product configuration, published a visual experience, or updated asset mappings, can be correlated with identity records in OpenText Identity and Access Management. This creates a clear audit trail for security reviews and operational investigations.
Business value: Strengthens traceability, supports internal audits, and helps teams quickly identify the source of unauthorized or incorrect changes.
Data flow: Bi-directional
Use OpenText Identity and Access Management as the central access layer for employees working across cloud and hybrid environments, while Threekit remains the specialized visual commerce platform. Identity policies, session controls, and authentication standards are enforced consistently regardless of where users are located or which device they use.
Business value: Provides a consistent security model for distributed teams, simplifies compliance, and improves user experience for global operations.
Data flow: OpenText Identity and Access Management ? Threekit
During product launches, temporary cross-functional teams often need access to Threekit to review 3D assets, approve visual variants, and validate customer-facing configurations. OpenText Identity and Access Management can grant time-bound access based on project membership and automatically remove it after launch.
Business value: Speeds up launch execution, reduces manual access administration, and ensures access is limited to active business needs.