The centralized authorization platform for IT and infrastructure teams
Opal is a security platform that enables organizations to scale process. After building internal authorization systems, the Opal team understands that access management should be decentralized, self-service, and easy to use
Reduce help desk tickets by automating approvals and provisioning
Decentralize management: Delegate access requests to teams and managers who have the most context. More context = faster and better decisions
Embrace Slack automation: Use Slack to request access, notify reviewers, automate provisioning and revocations
Workflows that developers will love: Generate auto-expiring credentials using Opal’s CLI and request for AWS IAM roles natively in Opal
Reduce access footprint with granular and short-lived just-in-time access requests
Prevent permission sprawl with coarse grain roles and groups
Eliminate longstanding access to critical systems and applications
Grant access on-demand to reduce over-provisioned access
Opal is building the framework for identity management and authorization—providing an incredible user experience for our employees while ensuring we have the infrastructure for auditability and evidence.
Automate spreadsheet-based workflows needed for SOX, SOC-2, ISO, and HITRUST user access reviews
No more confusing spreadsheets. Kick off user access reviews with the click of a button
Generate access review reports with all of the information your auditors would need
Monitor for any changes to access or violations in segregation of duties. Let Opal’s comprehensive logging and exportable reports help you maintain ongoing compliance
Our cloud-first approach automatically discovers your databases, servers, internal tools, and applications
No proxies or agents required for faster time to value
Opal can be deployed via SaaS or self-hosted in minutes
Keeping our customer data safe is our highest priority. Our commitment to enterprise-grade security is one of the many reasons why leading companies choose Opal
You can self-host Opal behind your own VPN and in your own VPC. Deploy to a new or existing Kubernetes cluster with a seamless management user interface
Opal's Type 2 SOC-2 report attests to our enterprise-grade system and organization controls regarding security, privacy, availability, and confidentiality
Opal is heavily invested in maintaining the highest security standards and undergoes regular penetration testing. We leverage AES 256-bit encryption using hardware security modules for data at-rest and in-transit
We use Opal internally to ensure all privileged access requests are short-lived, fully audited, and routed to relevant owners
Opal reduces a lot of the complexity around orchestrating and scaling access requests. They also have built-in workflows that provide an end-to-end audit trail for JIT-based access, which I’m sure appeals to many compliance teams.
In general, I’m very happy with how versatile the platform is—it allows access to be as flexible or strict as necessary
Opal is building the framework for identity management and authorization— providing an incredible user experience for our employees while ensuring we have the infrastructure for auditability and evidence.
I was worried the team would be skeptical of using an access management tool. No one wants to get slowed down. But Opal has actually helped us work faster—our infrastructure feels like a Ferrari.
As Merge continues to scale, it's important our security scales with it. By partnering with Opal, we don't have to worry about access controls anymore. We can focus on our mission to reshape the way businesses integrate.
Implementing Opal was really straightforward. It tracks access logs in one place automatically, so we have peace of mind we're storing everything we need for upcoming audits.
With Opal, we can focus on building our core product without worrying about access controls. Their integration into Google Cloud Platform has made it really easy and secure to work with external partners.