AI for Identity. Identity for AI.
AI for Identity. Identity for AI.
AI for Identity.
Identity for AI.
Opal is the identity governance control plane for AI agents, humans, and service accounts at hyperscale enterprises.
Opal is the identity governance control plane for AI agents, humans, and service accounts at hyperscale enterprises.
Opal is the identity governance control plane for AI agents, humans, and service accounts at hyperscale enterprises.
Opal is the identity governance control plane for AI agents, humans, and service accounts at hyperscale enterprises.
AI for Identity.
Identity for AI.
Opal is the identity governance control plane for AI agents, humans, and service accounts at hyperscale enterprises.
Search
Search
Search
Search
Search
⌘+K
⌘+K
⌘+K
⌘+K
⌘+K
Catalog
Catalog
Catalog
Catalog
Catalog
Requests
Requests
Requests
Requests
Requests
Access Reviews
Access Reviews
Access Reviews
Access Reviews
Access Reviews
Admin
Admin
Admin
Admin
Admin
Risk Center
Risk Center
Risk Center
Risk Center
Risk Center
Inventory
Inventory
Inventory
Inventory
Inventory
Events
Events
Events
Events
Events
Dashboard
Dashboard
Dashboard
Dashboard
Dashboard
Explore
Explore
Explore
Explore
Explore
Configuration
Configuration
Configuration
Configuration
Configuration
DS
DS
DS
DS
DS
Daniel Stuart
Daniel Stuart
Daniel Stuart
Daniel Stuart
Daniel Stuart
Poplar Communications
Poplar Communications
Poplar Communications
Poplar Communications
Poplar Communications
Risk Center
Risk Center
Risk Center
Risk Center
Risk Center
Permanent Access
Permanent Access
Permanent Access
Permanent Access
Permanent Access
82k
82k
82k
82k
82k
Grants
Grants
Grants
Grants
Grants
+0.98%
+0.98%
+0.98%
+0.98%
+0.98%
Unused Access
Unused Access
Unused Access
Unused Access
Unused Access
968
968
968
968
968
Grants
Grants
Grants
Grants
Grants
+70.42%
+70.42%
+70.42%
+70.42%
+70.42%
Outside Access
Outside Access
Outside Access
Outside Access
Outside Access
26k
26k
26k
26k
26k
Grants
Grants
Grants
Grants
Grants
+2.75%
+2.75%
+2.75%
+2.75%
+2.75%
Irregular Access
Irregular Access
Irregular Access
Irregular Access
Irregular Access
568
568
568
568
568
Grants
Grants
Grants
Grants
Grants
+68.05%
+68.05%
+68.05%
+68.05%
+68.05%
Suggestions
Suggestions
Suggestions
Suggestions
Suggestions
View access from overprovisioned rules
View access from overprovisioned rules
View access from overprovisioned rules
View access from overprovisioned rules
View access from overprovisioned rules
poplar-project-002
poplar-project-002
poplar-project-002
poplar-project-002
poplar-project-002
1 out of 2 users have permanent access and have not used this resource in the last 30 days.
1 out of 2 users have permanent access and have not used this resource in the last 30 days.
1 out of 2 users have permanent access and have not used this resource in the last 30 days.
1 out of 2 users have permanent access and have not used this resource in the last 30 days.
1 out of 2 users have permanent access and have not used this resource in the last 30 days.
View potentially anomalous access grants
View potentially anomalous access grants
View potentially anomalous access grants
View potentially anomalous access grants
View potentially anomalous access grants
Administrat
Administrat
Administrat
Administrat
Administrat
2 out of 3 users have permanent access and have not used this resource in the last 30 days.
2 out of 3 users have permanent access and have not used this resource in the last 30 days.
2 out of 3 users have permanent access and have not used this resource in the last 30 days.
2 out of 3 users have permanent access and have not used this resource in the last 30 days.
2 out of 3 users have permanent access and have not used this resource in the last 30 days.
Access Risk Summary
Access Risk Summary
Access Risk Summary
Access Risk Summary
Access Risk Summary
Today
Today
Today
Today
Today
This Week
This Week
This Week
This Week
This Week
This Month
This Month
This Month
This Month
This Month
Total
Total
Total
Total
Total
By Identity Type
By Identity Type
By Identity Type
By Identity Type
By Identity Type
184 Access Grants
184 Access Grants
184 Access Grants
184 Access Grants
184 Access Grants
Identity
Identity
Identity
Identity
Identity
Asset
Asset
Asset
Asset
Asset
Expiration
Expiration
Expiration
Expiration
Expiration
First Granted
First Granted
First Granted
First Granted
First Granted
Last Used
Last Used
Last Used
Last Used
Last Used
Vulnerabilities
Vulnerabilities
Vulnerabilities
Vulnerabilities
Vulnerabilities
ZN
ZN
ZN
ZN
ZN
Zuri Nichols
Zuri Nichols
Zuri Nichols
Zuri Nichols
Zuri Nichols
zuri@poplarcomm.net
zuri@poplarcomm.net
zuri@poplarcomm.net
zuri@poplarcomm.net
zuri@poplarcomm.net
Teams Administrator
Teams Administrator
Teams Administrator
Teams Administrator
Teams Administrator
Azure • Entra ID Role
Azure • Entra ID Role
Azure • Entra ID Role
Azure • Entra ID Role
Azure • Entra ID Role
Permanent
Permanent
Permanent
Permanent
Permanent
15 days ago
15 days ago
15 days ago
15 days ago
15 days ago
Not available
Not available
Not available
Not available
Not available
Expire in 7 days
Expire in 7 days
Expire in 7 days
Expire in 7 days
Expire in 7 days
DP
DP
DP
DP
DP
Denise Pratt
Denise Pratt
Denise Pratt
Denise Pratt
Denise Pratt
denise@poplarcomm.net
denise@poplarcomm.net
denise@poplarcomm.net
denise@poplarcomm.net
denise@poplarcomm.net
Billing Administrator
Billing Administrator
Billing Administrator
Billing Administrator
Billing Administrator
Azure • Entra ID Role
Azure • Entra ID Role
Azure • Entra ID Role
Azure • Entra ID Role
Azure • Entra ID Role
Permanent
Permanent
Permanent
Permanent
Permanent
15 days ago
15 days ago
15 days ago
15 days ago
15 days ago
Not available
Not available
Not available
Not available
Not available
Expire in 7 days
Expire in 7 days
Expire in 7 days
Expire in 7 days
Expire in 7 days
RP
RP
RP
RP
RP
Rita Patel
Rita Patel
Rita Patel
Rita Patel
Rita Patel
rita@poplarcomm.net
rita@poplarcomm.net
rita@poplarcomm.net
rita@poplarcomm.net
rita@poplarcomm.net
Finance Team Admin
Finance Team Admin
Finance Team Admin
Finance Team Admin
Finance Team Admin
Azure • Entra ID Role
Azure • Entra ID Role
Azure • Entra ID Role
Azure • Entra ID Role
Azure • Entra ID Role
Permanent
Permanent
Permanent
Permanent
Permanent
15 days ago
15 days ago
15 days ago
15 days ago
15 days ago
Not available
Not available
Not available
Not available
Not available
Expire in 7 days
Expire in 7 days
Expire in 7 days
Expire in 7 days
Expire in 7 days
ZN
ZN
ZN
ZN
ZN
Zuri Nichols
Zuri Nichols
Zuri Nichols
Zuri Nichols
Zuri Nichols
zuri@poplarcomm.net
zuri@poplarcomm.net
zuri@poplarcomm.net
zuri@poplarcomm.net
zuri@poplarcomm.net
Teams Administrator
Teams Administrator
Teams Administrator
Teams Administrator
Teams Administrator
Azure • Entra ID Role
Azure • Entra ID Role
Azure • Entra ID Role
Azure • Entra ID Role
Azure • Entra ID Role
Permanent
Permanent
Permanent
Permanent
Permanent
15 days ago
15 days ago
15 days ago
15 days ago
15 days ago
Not available
Not available
Not available
Not available
Not available
Expire in 7 days
Expire in 7 days
Expire in 7 days
Expire in 7 days
Expire in 7 days
Ask Opal
Summary
Recommendation: Revoke permanent access for Teams Administrator for Zuri Nichols and implement just-in-time access instead.
Justification
Zuri Nichols currently has permanent access to Teams Administrator, which is classified as a medium sensitivity asset. Two significant risk factors have been identified:
Permanent access: Maintaining permanent access to administrative systems violates the principle of least privilege and creates unnecessary standing access risk.
Externally granted access: The access was granted outside of standard access management workflows, indicating potential governance gaps and lack of proper approval processes.
Teams Administrator privileges can be particularly risky as they allow for managing team memberships, communication settings, and potentially sensitive collaboration spaces. Following security best practices, administrative access should be:
Do Nothing
Expire in 7 days
Expire Now
Ask Opal
Summary
Recommendation: Revoke permanent access for Teams Administrator for Zuri Nichols and implement just-in-time access instead.
Justification
Zuri Nichols currently has permanent access to Teams Administrator, which is classified as a medium sensitivity asset. Two significant risk factors have been identified:
Permanent access: Maintaining permanent access to administrative systems violates the principle of least privilege and creates unnecessary standing access risk.
Externally granted access: The access was granted outside of standard access management workflows, indicating potential governance gaps and lack of proper approval processes.
Teams Administrator privileges can be particularly risky as they allow for managing team memberships, communication settings, and potentially sensitive collaboration spaces. Following security best practices, administrative access should be:
Do Nothing
Expire in 7 days
Expire Now
Search
⌘+K
Catalog
Requests
Access Reviews
Admin
Risk Center
Inventory
Events
Dashboard
Explore
Configuration
DS
Daniel Stuart
Poplar Communications
Risk Center
Permanent Access
82k
Grants
+0.98%
Unused Access
968
Grants
+70.42%
Outside Access
26k
Grants
+2.75%
Irregular Access
568
Grants
+68.05%
Suggestions
View access from overprovisioned rules
poplar-project-002
1 out of 2 users have permanent access and have not used this resource in the last 30 days.
View potentially anomalous access grants
Administrat
2 out of 3 users have permanent access and have not used this resource in the last 30 days.
Access Risk Summary
Today
This Week
This Month
Total
By Identity Type
184 Access Grants
Identity
Asset
Expiration
First Granted
Last Used
Vulnerabilities
ZN
Zuri Nichols
zuri@poplarcomm.net
Teams Administrator
Azure • Entra ID Role
Permanent
15 days ago
Not available
Expire in 7 days
DP
Denise Pratt
denise@poplarcomm.net
Billing Administrator
Azure • Entra ID Role
Permanent
15 days ago
Not available
Expire in 7 days
RP
Rita Patel
rita@poplarcomm.net
Finance Team Admin
Azure • Entra ID Role
Permanent
15 days ago
Not available
Expire in 7 days
ZN
Zuri Nichols
zuri@poplarcomm.net
Teams Administrator
Azure • Entra ID Role
Permanent
15 days ago
Not available
Expire in 7 days
Ask Opal
Summary
Recommendation: Revoke permanent access for Teams Administrator for Zuri Nichols and implement just-in-time access instead.
Justification
Zuri Nichols currently has permanent access to Teams Administrator, which is classified as a medium sensitivity asset. Two significant risk factors have been identified:
Permanent access: Maintaining permanent access to administrative systems violates the principle of least privilege and creates unnecessary standing access risk.
Externally granted access: The access was granted outside of standard access management workflows, indicating potential governance gaps and lack of proper approval processes.
Teams Administrator privileges can be particularly risky as they allow for managing team memberships, communication settings, and potentially sensitive collaboration spaces. Following security best practices, administrative access should be:
Do Nothing
Expire in 7 days
Expire Now
Search
⌘+K
Catalog
Requests
Access Reviews
Admin
Risk Center
Inventory
Events
Dashboard
Explore
Configuration
DS
Daniel Stuart
Poplar Communications
Risk Center
Permanent Access
82k
Grants
+0.98%
Unused Access
968
Grants
+70.42%
Outside Access
26k
Grants
+2.75%
Irregular Access
568
Grants
+68.05%
Suggestions
View access from overprovisioned rules
poplar-project-002
1 out of 2 users have permanent access and have not used this resource in the last 30 days.
View potentially anomalous access grants
Administrat
2 out of 3 users have permanent access and have not used this resource in the last 30 days.
Access Risk Summary
Today
This Week
This Month
Total
By Identity Type
184 Access Grants
Identity
Asset
Expiration
First Granted
Last Used
Vulnerabilities
ZN
Zuri Nichols
zuri@poplarcomm.net
Teams Administrator
Azure • Entra ID Role
Permanent
15 days ago
Not available
Expire in 7 days
DP
Denise Pratt
denise@poplarcomm.net
Billing Administrator
Azure • Entra ID Role
Permanent
15 days ago
Not available
Expire in 7 days
RP
Rita Patel
rita@poplarcomm.net
Finance Team Admin
Azure • Entra ID Role
Permanent
15 days ago
Not available
Expire in 7 days
ZN
Zuri Nichols
zuri@poplarcomm.net
Teams Administrator
Azure • Entra ID Role
Permanent
15 days ago
Not available
Expire in 7 days
Ask Opal
Summary
Recommendation: Revoke permanent access for Teams Administrator for Zuri Nichols and implement just-in-time access instead.
Justification
Zuri Nichols currently has permanent access to Teams Administrator, which is classified as a medium sensitivity asset. Two significant risk factors have been identified:
Permanent access: Maintaining permanent access to administrative systems violates the principle of least privilege and creates unnecessary standing access risk.
Externally granted access: The access was granted outside of standard access management workflows, indicating potential governance gaps and lack of proper approval processes.
Teams Administrator privileges can be particularly risky as they allow for managing team memberships, communication settings, and potentially sensitive collaboration spaces. Following security best practices, administrative access should be:
Do Nothing
Expire in 7 days
Expire Now
Trusted by leading companies
Trusted by leading companies
Trusted by leading companies
Trusted by leading companies
Trusted by leading companies
Trusted by leading companies
Trusted by leading companies
What we do
Secure AI adoption starts with identity governance. Opal is the control layer that keeps access accurate, compliant, and contained.
Secure AI adoption starts with identity governance. Opal is the control layer that keeps access accurate, compliant, and contained.
Secure AI adoption starts with identity governance. Opal is the control layer that keeps access accurate, compliant, and contained.
Identity Lifecycle Automation
Keep access current by orchestrating provisioning, updates, and removals in Opal or via Terraform.
Identity Lifecycle Automation
Keep access current by orchestrating provisioning, updates, and removals in Opal or via Terraform.
Identity Lifecycle Automation
Keep access current by orchestrating provisioning, updates, and removals in Opal or via Terraform.
Identity Lifecycle Automation
Keep access current by orchestrating provisioning, updates, and removals in Opal or via Terraform.
Identity Lifecycle Automation
Keep access current by orchestrating provisioning, updates, and removals in Opal or via Terraform.
Identity Lifecycle Automation
Keep access current by orchestrating provisioning, updates, and removals in Opal or via Terraform.
Identity Lifecycle Automation
Keep access current by orchestrating provisioning, updates, and removals in Opal or via Terraform.
JIT & Self-Service Access
Reduce sprawl and let users request and receive approved, time-bound access from Opal or Slack.
JIT & Self-Service Access
Reduce sprawl and let users request and receive approved, time-bound access from Opal or Slack.
JIT & Self-Service Access
Reduce sprawl and let users request and receive approved, time-bound access from Opal or Slack.
JIT & Self-Service Access
Reduce sprawl and let users request and receive approved, time-bound access from Opal or Slack.
JIT & Self-Service Access
Reduce sprawl and let users request and receive approved, time-bound access from Opal or Slack.
JIT & Self-Service Access
Reduce sprawl and let users request and receive approved, time-bound access from Opal or Slack.
JIT & Self-Service Access
Reduce sprawl and let users request and receive approved, time-bound access from Opal or Slack.
Access Reviews & Compliance
Simplify certifications and audits by automating UARs, evidence collection, and policy checks.
Access Reviews & Compliance
Simplify certifications and audits by automating UARs, evidence collection, and policy checks.
Access Reviews & Compliance
Simplify certifications and audits by automating UARs, evidence collection, and policy checks.
Access Reviews & Compliance
Simplify certifications and audits by automating UARs, evidence collection, and policy checks.
Access Reviews & Compliance
Simplify certifications and audits by automating UARs, evidence collection, and policy checks.
Access Reviews & Compliance
Simplify certifications and audits by automating UARs, evidence collection, and policy checks.
Access Reviews & Compliance
Simplify certifications and audits by automating UARs, evidence collection, and policy checks.
Identity Risk Management
Continuously detect and remediate risky access with full visibility and least-privilege enforcement.
Identity Risk Management
Continuously detect and remediate risky access with full visibility and least-privilege enforcement.
Identity Risk Management
Continuously detect and remediate risky access with full visibility and least-privilege enforcement.
Identity Risk Management
Continuously detect and remediate risky access with full visibility and least-privilege enforcement.
Identity Risk Management
Continuously detect and remediate risky access with full visibility and least-privilege enforcement.
Identity Risk Management
Continuously detect and remediate risky access with full visibility and least-privilege enforcement.
Identity Risk Management
Continuously detect and remediate risky access with full visibility and least-privilege enforcement.
Permanent Access
82k
Grants
+0.98%
Unused Access
968
Grants
+70.42%
Outside Access
26k
Grants
+2.75%
Irregular Access
568
Grants
+68.05%
Suggestions
View access from overprovisioned rules
poplar-project-002
1 out of 2 users have permanent access and have not used this resource in the last 30 days.
View potentially anomalous access grants
Administrat
2 out of 3 users have permanent access and have not used this resource in the last 30 days.
Access Risk Summary
Today
This Week
This Month
Total
By Identity Type
184 Access Grants
Identity
Asset
Expiration
First Granted
Last Used
Vulnerabilities
SM
Shrinjay Mukherjee
shrinjay@adriandev.net
09-28-google-idp
Google Cloud • Service Account
Permanent
19 minutes ago
Never used
Expire in 7 days
default service account
Google Cloud • Service Account
09-28-google-idp
Google Cloud • Service Account
Permanent
5 hours ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
aiplatform.serviceagent
Google Cloud • Service Account
Permanent
4 days ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
timbucket9.serviceagent
Google Cloud • Service Account
Permanent
4 days ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
adrian36288
Google Cloud • Service Account
Permanent
17 days ago
Never used
Expire in 7 days
default service account
Google Cloud • Service Account
adrian-backupdr
Google Cloud • Service Account
Permanent
17 days ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
timbucket9.storage
Google Cloud • Service Account
Permanent
a month ago
Never used
Expire in 7 days
SM
Shrinjay Mukherjee
shrinjay@adriandev.net
adrian.dev-owner
Google Cloud • Organization
Permanent
a month ago
Never used
Expire in 7 days
Adrian Security Group
Azure • Microsoft Entra ID Security Group
Cognitive Services Contributor
Azure • Storage Container
Permanent
a month ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
adrian-folder
Google Cloud • Folder
Permanent
a month ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
resourcemanager
Google Cloud • Folder
Permanent
a month ago
Never used
Expire in 7 days
Risk Center
Admin
FN
Ask Opal
1 Access Grant Selected
Expire in 7 days (Recommended)
Permanent Access
82k
Grants
+0.98%
Unused Access
968
Grants
+70.42%
Outside Access
26k
Grants
+2.75%
Irregular Access
568
Grants
+68.05%
Suggestions
View access from overprovisioned rules
poplar-project-002
1 out of 2 users have permanent access and have not used this resource in the last 30 days.
View potentially anomalous access grants
Administrat
2 out of 3 users have permanent access and have not used this resource in the last 30 days.
Access Risk Summary
Today
This Week
This Month
Total
By Identity Type
184 Access Grants
Identity
Asset
Expiration
First Granted
Last Used
Vulnerabilities
SM
Shrinjay Mukherjee
shrinjay@adriandev.net
09-28-google-idp
Google Cloud • Service Account
Permanent
19 minutes ago
Never used
Expire in 7 days
default service account
Google Cloud • Service Account
09-28-google-idp
Google Cloud • Service Account
Permanent
5 hours ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
aiplatform.serviceagent
Google Cloud • Service Account
Permanent
4 days ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
timbucket9.serviceagent
Google Cloud • Service Account
Permanent
4 days ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
adrian36288
Google Cloud • Service Account
Permanent
17 days ago
Never used
Expire in 7 days
default service account
Google Cloud • Service Account
adrian-backupdr
Google Cloud • Service Account
Permanent
17 days ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
timbucket9.storage
Google Cloud • Service Account
Permanent
a month ago
Never used
Expire in 7 days
SM
Shrinjay Mukherjee
shrinjay@adriandev.net
adrian.dev-owner
Google Cloud • Organization
Permanent
a month ago
Never used
Expire in 7 days
Adrian Security Group
Azure • Microsoft Entra ID Security Group
Cognitive Services Contributor
Azure • Storage Container
Permanent
a month ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
adrian-folder
Google Cloud • Folder
Permanent
a month ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
resourcemanager
Google Cloud • Folder
Permanent
a month ago
Never used
Expire in 7 days
Risk Center
Admin
FN
Ask Opal
1 Access Grant Selected
Expire in 7 days (Recommended)
Permanent Access
82k
Grants
+0.98%
Unused Access
968
Grants
+70.42%
Outside Access
26k
Grants
+2.75%
Irregular Access
568
Grants
+68.05%
Suggestions
View access from overprovisioned rules
poplar-project-002
1 out of 2 users have permanent access and have not used this resource in the last 30 days.
View potentially anomalous access grants
Administrat
2 out of 3 users have permanent access and have not used this resource in the last 30 days.
Access Risk Summary
Today
This Week
This Month
Total
By Identity Type
184 Access Grants
Identity
Asset
Expiration
First Granted
Last Used
Vulnerabilities
SM
Shrinjay Mukherjee
shrinjay@adriandev.net
09-28-google-idp
Google Cloud • Service Account
Permanent
19 minutes ago
Never used
Expire in 7 days
default service account
Google Cloud • Service Account
09-28-google-idp
Google Cloud • Service Account
Permanent
5 hours ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
aiplatform.serviceagent
Google Cloud • Service Account
Permanent
4 days ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
timbucket9.serviceagent
Google Cloud • Service Account
Permanent
4 days ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
adrian36288
Google Cloud • Service Account
Permanent
17 days ago
Never used
Expire in 7 days
default service account
Google Cloud • Service Account
adrian-backupdr
Google Cloud • Service Account
Permanent
17 days ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
timbucket9.storage
Google Cloud • Service Account
Permanent
a month ago
Never used
Expire in 7 days
SM
Shrinjay Mukherjee
shrinjay@adriandev.net
adrian.dev-owner
Google Cloud • Organization
Permanent
a month ago
Never used
Expire in 7 days
Adrian Security Group
Azure • Microsoft Entra ID Security Group
Cognitive Services Contributor
Azure • Storage Container
Permanent
a month ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
adrian-folder
Google Cloud • Folder
Permanent
a month ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
resourcemanager
Google Cloud • Folder
Permanent
a month ago
Never used
Expire in 7 days
Risk Center
Admin
FN
Ask Opal
1 Access Grant Selected
Expire in 7 days (Recommended)
Permanent Access
82k
Grants
+0.98%
Unused Access
968
Grants
+70.42%
Outside Access
26k
Grants
+2.75%
Irregular Access
568
Grants
+68.05%
Suggestions
View access from overprovisioned rules
poplar-project-002
1 out of 2 users have permanent access and have not used this resource in the last 30 days.
View potentially anomalous access grants
Administrat
2 out of 3 users have permanent access and have not used this resource in the last 30 days.
Access Risk Summary
Today
This Week
This Month
Total
By Identity Type
184 Access Grants
Identity
Asset
Expiration
First Granted
Last Used
Vulnerabilities
SM
Shrinjay Mukherjee
shrinjay@adriandev.net
09-28-google-idp
Google Cloud • Service Account
Permanent
19 minutes ago
Never used
Expire in 7 days
default service account
Google Cloud • Service Account
09-28-google-idp
Google Cloud • Service Account
Permanent
5 hours ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
aiplatform.serviceagent
Google Cloud • Service Account
Permanent
4 days ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
timbucket9.serviceagent
Google Cloud • Service Account
Permanent
4 days ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
adrian36288
Google Cloud • Service Account
Permanent
17 days ago
Never used
Expire in 7 days
default service account
Google Cloud • Service Account
adrian-backupdr
Google Cloud • Service Account
Permanent
17 days ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
timbucket9.storage
Google Cloud • Service Account
Permanent
a month ago
Never used
Expire in 7 days
SM
Shrinjay Mukherjee
shrinjay@adriandev.net
adrian.dev-owner
Google Cloud • Organization
Permanent
a month ago
Never used
Expire in 7 days
Adrian Security Group
Azure • Microsoft Entra ID Security Group
Cognitive Services Contributor
Azure • Storage Container
Permanent
a month ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
adrian-folder
Google Cloud • Folder
Permanent
a month ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
resourcemanager
Google Cloud • Folder
Permanent
a month ago
Never used
Expire in 7 days
Risk Center
Admin
FN
Ask Opal
1 Access Grant Selected
Expire in 7 days (Recommended)
Permanent Access
82k
Grants
+0.98%
Unused Access
968
Grants
+70.42%
Outside Access
26k
Grants
+2.75%
Irregular Access
568
Grants
+68.05%
Suggestions
View access from overprovisioned rules
poplar-project-002
1 out of 2 users have permanent access and have not used this resource in the last 30 days.
View potentially anomalous access grants
Administrat
2 out of 3 users have permanent access and have not used this resource in the last 30 days.
Access Risk Summary
Today
This Week
This Month
Total
By Identity Type
184 Access Grants
Identity
Asset
Expiration
First Granted
Last Used
Vulnerabilities
SM
Shrinjay Mukherjee
shrinjay@adriandev.net
09-28-google-idp
Google Cloud • Service Account
Permanent
19 minutes ago
Never used
Expire in 7 days
default service account
Google Cloud • Service Account
09-28-google-idp
Google Cloud • Service Account
Permanent
5 hours ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
aiplatform.serviceagent
Google Cloud • Service Account
Permanent
4 days ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
timbucket9.serviceagent
Google Cloud • Service Account
Permanent
4 days ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
adrian36288
Google Cloud • Service Account
Permanent
17 days ago
Never used
Expire in 7 days
default service account
Google Cloud • Service Account
adrian-backupdr
Google Cloud • Service Account
Permanent
17 days ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
timbucket9.storage
Google Cloud • Service Account
Permanent
a month ago
Never used
Expire in 7 days
SM
Shrinjay Mukherjee
shrinjay@adriandev.net
adrian.dev-owner
Google Cloud • Organization
Permanent
a month ago
Never used
Expire in 7 days
Adrian Security Group
Azure • Microsoft Entra ID Security Group
Cognitive Services Contributor
Azure • Storage Container
Permanent
a month ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
adrian-folder
Google Cloud • Folder
Permanent
a month ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
resourcemanager
Google Cloud • Folder
Permanent
a month ago
Never used
Expire in 7 days
Risk Center
Admin
FN
Ask Opal
1 Access Grant Selected
Expire in 7 days (Recommended)
Permanent Access
82k
Grants
+0.98%
Unused Access
968
Grants
+70.42%
Outside Access
26k
Grants
+2.75%
Irregular Access
568
Grants
+68.05%
Suggestions
View access from overprovisioned rules
poplar-project-002
1 out of 2 users have permanent access and have not used this resource in the last 30 days.
View potentially anomalous access grants
Administrat
2 out of 3 users have permanent access and have not used this resource in the last 30 days.
Access Risk Summary
Today
This Week
This Month
Total
By Identity Type
184 Access Grants
Identity
Asset
Expiration
First Granted
Last Used
Vulnerabilities
SM
Shrinjay Mukherjee
shrinjay@adriandev.net
09-28-google-idp
Google Cloud • Service Account
Permanent
19 minutes ago
Never used
Expire in 7 days
default service account
Google Cloud • Service Account
09-28-google-idp
Google Cloud • Service Account
Permanent
5 hours ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
aiplatform.serviceagent
Google Cloud • Service Account
Permanent
4 days ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
timbucket9.serviceagent
Google Cloud • Service Account
Permanent
4 days ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
adrian36288
Google Cloud • Service Account
Permanent
17 days ago
Never used
Expire in 7 days
default service account
Google Cloud • Service Account
adrian-backupdr
Google Cloud • Service Account
Permanent
17 days ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
timbucket9.storage
Google Cloud • Service Account
Permanent
a month ago
Never used
Expire in 7 days
SM
Shrinjay Mukherjee
shrinjay@adriandev.net
adrian.dev-owner
Google Cloud • Organization
Permanent
a month ago
Never used
Expire in 7 days
Adrian Security Group
Azure • Microsoft Entra ID Security Group
Cognitive Services Contributor
Azure • Storage Container
Permanent
a month ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
adrian-folder
Google Cloud • Folder
Permanent
a month ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
resourcemanager
Google Cloud • Folder
Permanent
a month ago
Never used
Expire in 7 days
Risk Center
Admin
FN
Ask Opal
1 Access Grant Selected
Expire in 7 days (Recommended)
Permanent Access
82k
Grants
+0.98%
Unused Access
968
Grants
+70.42%
Outside Access
26k
Grants
+2.75%
Irregular Access
568
Grants
+68.05%
Suggestions
View access from overprovisioned rules
poplar-project-002
1 out of 2 users have permanent access and have not used this resource in the last 30 days.
View potentially anomalous access grants
Administrat
2 out of 3 users have permanent access and have not used this resource in the last 30 days.
Access Risk Summary
Today
This Week
This Month
Total
By Identity Type
184 Access Grants
Identity
Asset
Expiration
First Granted
Last Used
Vulnerabilities
SM
Shrinjay Mukherjee
shrinjay@adriandev.net
09-28-google-idp
Google Cloud • Service Account
Permanent
19 minutes ago
Never used
Expire in 7 days
default service account
Google Cloud • Service Account
09-28-google-idp
Google Cloud • Service Account
Permanent
5 hours ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
aiplatform.serviceagent
Google Cloud • Service Account
Permanent
4 days ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
timbucket9.serviceagent
Google Cloud • Service Account
Permanent
4 days ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
adrian36288
Google Cloud • Service Account
Permanent
17 days ago
Never used
Expire in 7 days
default service account
Google Cloud • Service Account
adrian-backupdr
Google Cloud • Service Account
Permanent
17 days ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
timbucket9.storage
Google Cloud • Service Account
Permanent
a month ago
Never used
Expire in 7 days
SM
Shrinjay Mukherjee
shrinjay@adriandev.net
adrian.dev-owner
Google Cloud • Organization
Permanent
a month ago
Never used
Expire in 7 days
Adrian Security Group
Azure • Microsoft Entra ID Security Group
Cognitive Services Contributor
Azure • Storage Container
Permanent
a month ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
adrian-folder
Google Cloud • Folder
Permanent
a month ago
Never used
Expire in 7 days
09-28-google-idp
Google Cloud • Service Account
resourcemanager
Google Cloud • Folder
Permanent
a month ago
Never used
Expire in 7 days
Risk Center
Admin
FN
Ask Opal
1 Access Grant Selected
Expire in 7 days (Recommended)
Built for every identity
Opal governs every identity type under one model — because security breaks and business slows when they’re managed apart.
Opal governs every identity type under one model — because security breaks and business slows when they’re managed apart.
AI Agents
Extend governance to coding and autonomous AI agents, which can request and manage access via MCP — with audit and guardrails.
AI Agents
Extend governance to coding and autonomous AI agents, which can request and manage access via MCP — with audit and guardrails.
AI Agents
Extend governance to coding and autonomous AI agents, which can request and manage access via MCP — with audit and guardrails.
AI Agents
Extend governance to coding and autonomous AI agents, which can request and manage access via MCP — with audit and guardrails.
AI Agents
Extend governance to coding and autonomous AI agents, which can request and manage access via MCP — with audit and guardrails.
AI Agents
Extend governance to coding and autonomous AI agents, which can request and manage access via MCP — with audit and guardrails.
AI Agents
Extend governance to coding and autonomous AI agents, which can request and manage access via MCP — with audit and guardrails.
Humans
Unify workforce access, reviews, and authorization decisions through a continuous framework of least privilege and accountability.
Humans
Unify workforce access, reviews, and authorization decisions through a continuous framework of least privilege and accountability.
Humans
Unify workforce access, reviews, and authorization decisions through a continuous framework of least privilege and accountability.
Humans
Unify workforce access, reviews, and authorization decisions through a continuous framework of least privilege and accountability.
Humans
Unify workforce access, reviews, and authorization decisions through a continuous framework of least privilege and accountability.
Humans
Unify workforce access, reviews, and authorization decisions through a continuous framework of least privilege and accountability.
Humans
Unify workforce access, reviews, and authorization decisions through a continuous framework of least privilege and accountability.
Service Accounts
Bring system-level identities into scope with lifecycle governance, policy consistency, and intelligent least-privilege enforcement.
Service Accounts
Bring system-level identities into scope with lifecycle governance, policy consistency, and intelligent least-privilege enforcement.
Service Accounts
Bring system-level identities into scope with lifecycle governance, policy consistency, and intelligent least-privilege enforcement.
Service Accounts
Bring system-level identities into scope with lifecycle governance, policy consistency, and intelligent least-privilege enforcement.
Service Accounts
Bring system-level identities into scope with lifecycle governance, policy consistency, and intelligent least-privilege enforcement.
Service Accounts
Bring system-level identities into scope with lifecycle governance, policy consistency, and intelligent least-privilege enforcement.
Service Accounts
Bring system-level identities into scope with lifecycle governance, policy consistency, and intelligent least-privilege enforcement.
How it works
The Opal Platform is a modern IGA control plane that unifies governance and security for every human and machine identity.
Discover
Orchestrate
Scale
Adapt
Autopilot
Requests
Risk Center
Human review
Opal intelligence
Updates
Learn
Assist
How it works
The Opal Platform is a modern IGA control plane that unifies governance and security for every human and machine identity.
Discover
Orchestrate
Scale
Adapt
Autopilot
Requests
Risk Center
Human review
Opal intelligence
Updates
Learn
Assist
How it works
The Opal Platform is a modern IGA control plane that unifies governance and security for every human and machine identity.
Discover
Orchestrate
Scale
Adapt
Autopilot
Human review
Requests
Risk Center
Opal intelligence
Updates
Learn
Assist
How it works
The Opal Platform is a modern IGA control plane that unifies governance and security for every human and machine identity.
Discover
Orchestrate
Scale
Adapt
Autopilot
Human review
Requests
Risk Center
Opal intelligence
Updates
Learn
Assist
How it works
The Opal Platform is a modern IGA control plane that unifies governance and security for every human and machine identity.
Discover
Orchestrate
Scale
Adapt
Autopilot
Human review
Requests
Risk Center
Opal intelligence
Updates
Learn
Assist
How it works
The Opal Platform is a modern IGA control plane that unifies governance and security for every human and machine identity.
Discover
Orchestrate
Scale
Adapt
Autopilot
Requests
Risk Center
Human review
Opal intelligence
Updates
Learn
Assist
How it works
The Opal Platform is a modern IGA control plane that unifies governance and security for every human and machine identity.
Discover
Orchestrate
Scale
Adapt
Autopilot
Requests
Risk Center
Human review
Opal intelligence
Updates
Learn
Assist
FROM OUR Customers:
"With Opal, we were able to transition quickly to a self-service access model that supports both JIT and Just-Enough-Access (JEA).
This shift not only streamlined our provisioning workflows but also empowered teams with the right level of access, exactly when needed. Once our access data was centralized in Opal, generating user access reviews became effortless.
Opal has allowed us to scale securely and efficiently — transforming what used to be a time-consuming, error-prone process into an automated, auditable, and compliant system.”

Sharon Aby
Senior Manager of IAM, Databricks
"Opal helps Elastic protect more of our attack surface than we could before with a small but mighty team. Whether we're speeding up workflows with Slack, orchestrating authorization directly from Terraform, or using the API, Opal has helped us do more with less.
In the near future, we're excited to implement Just-in-Time (JIT) access for all of our employees who use GitHub, as well as begin to secure LLMs, service accounts, and other NHIs with Opal."

Mandy Andress
CISO, Elastic
“At Obsidian, we use Opal to run quarterly access reviews, maintain just-in-time access, and handle access requests to some of our sensitive applications, like AWS.
Once we started using Opal’s Risk Layer in AWS, it changed the way we connect to it, which is fantastic. We’re excited to find the time to set up a deeper Terraform integration, along with the API and CLI that Opal built. Overall, Opal has been a great time saver—really helped us out.”

Chris Kennington
Security Engineer, Obsidian
"Opal's Access Review module allows us to provide internal and external auditors with the evidence required for multiple compliances, and provides our Privileged Access Reviewers with the necessary information to make meaningful access decisions.
Opal's ability to self-host their solution also allows us to host in our own FedRAMP High environment, thus allowing us to utilize all of their capabilities to harden our FedRAMP resources."

Jack Zaldivar, Jr.
Staff Systems Engineer, Databricks
"At Grammarly, Opal enabled us to migrate all access management for over 150 corporate applications and hundreds of production services across two public clouds to a unified employee experience in just a few weeks."

Suha Can
CISO, Grammarly
“Access reviews and access management were a tedious time sink for us at Obsidian before we adopted Opal. But unlike a lot of other security products, Opal is one of those rare products that gives us back time to focus on what matters, which is amazing.”

Alfredo Hickman
CISO, Obsidian
"With Opal, we were able to transition quickly to a self-service access model that supports both JIT and Just-Enough-Access (JEA).
This shift not only streamlined our provisioning workflows but also empowered teams with the right level of access, exactly when needed. Once our access data was centralized in Opal, generating user access reviews became effortless.
Opal has allowed us to scale securely and efficiently — transforming what used to be a time-consuming, error-prone process into an automated, auditable, and compliant system.”

Sharon Aby
Senior Manager of IAM, Databricks
"Opal helps Elastic protect more of our attack surface than we could before with a small but mighty team. Whether we're speeding up workflows with Slack, orchestrating authorization directly from Terraform, or using the API, Opal has helped us do more with less.
In the near future, we're excited to implement Just-in-Time (JIT) access for all of our employees who use GitHub, as well as begin to secure LLMs, service accounts, and other NHIs with Opal."

Mandy Andress
CISO, Elastic
“At Obsidian, we use Opal to run quarterly access reviews, maintain just-in-time access, and handle access requests to some of our sensitive applications, like AWS.
Once we started using Opal’s Risk Layer in AWS, it changed the way we connect to it, which is fantastic. We’re excited to find the time to set up a deeper Terraform integration, along with the API and CLI that Opal built. Overall, Opal has been a great time saver—really helped us out.”

Chris Kennington
Security Engineer, Obsidian
"Opal's Access Review module allows us to provide internal and external auditors with the evidence required for multiple compliances, and provides our Privileged Access Reviewers with the necessary information to make meaningful access decisions.
Opal's ability to self-host their solution also allows us to host in our own FedRAMP High environment, thus allowing us to utilize all of their capabilities to harden our FedRAMP resources."

Jack Zaldivar, Jr.
Staff Systems Engineer, Databricks
"At Grammarly, Opal enabled us to migrate all access management for over 150 corporate applications and hundreds of production services across two public clouds to a unified employee experience in just a few weeks."

Suha Can
CISO, Grammarly
“Access reviews and access management were a tedious time sink for us at Obsidian before we adopted Opal. But unlike a lot of other security products, Opal is one of those rare products that gives us back time to focus on what matters, which is amazing.”

Alfredo Hickman
CISO, Obsidian
"With Opal, we were able to transition quickly to a self-service access model that supports both JIT and Just-Enough-Access (JEA).
This shift not only streamlined our provisioning workflows but also empowered teams with the right level of access, exactly when needed. Once our access data was centralized in Opal, generating user access reviews became effortless.
Opal has allowed us to scale securely and efficiently — transforming what used to be a time-consuming, error-prone process into an automated, auditable, and compliant system.”

Sharon Aby
Senior Manager of IAM, Databricks
"Opal helps Elastic protect more of our attack surface than we could before with a small but mighty team. Whether we're speeding up workflows with Slack, orchestrating authorization directly from Terraform, or using the API, Opal has helped us do more with less.
In the near future, we're excited to implement Just-in-Time (JIT) access for all of our employees who use GitHub, as well as begin to secure LLMs, service accounts, and other NHIs with Opal."

Mandy Andress
CISO, Elastic
“At Obsidian, we use Opal to run quarterly access reviews, maintain just-in-time access, and handle access requests to some of our sensitive applications, like AWS.
Once we started using Opal’s Risk Layer in AWS, it changed the way we connect to it, which is fantastic. We’re excited to find the time to set up a deeper Terraform integration, along with the API and CLI that Opal built. Overall, Opal has been a great time saver—really helped us out.”

Chris Kennington
Security Engineer, Obsidian
"Opal's Access Review module allows us to provide internal and external auditors with the evidence required for multiple compliances, and provides our Privileged Access Reviewers with the necessary information to make meaningful access decisions.
Opal's ability to self-host their solution also allows us to host in our own FedRAMP High environment, thus allowing us to utilize all of their capabilities to harden our FedRAMP resources."

Jack Zaldivar, Jr.
Staff Systems Engineer, Databricks
"At Grammarly, Opal enabled us to migrate all access management for over 150 corporate applications and hundreds of production services across two public clouds to a unified employee experience in just a few weeks."

Suha Can
CISO, Grammarly
“Access reviews and access management were a tedious time sink for us at Obsidian before we adopted Opal. But unlike a lot of other security products, Opal is one of those rare products that gives us back time to focus on what matters, which is amazing.”

Alfredo Hickman
CISO, Obsidian
"With Opal, we were able to transition quickly to a self-service access model that supports both JIT and Just-Enough-Access (JEA).
This shift not only streamlined our provisioning workflows but also empowered teams with the right level of access, exactly when needed. Once our access data was centralized in Opal, generating user access reviews became effortless.
Opal has allowed us to scale securely and efficiently — transforming what used to be a time-consuming, error-prone process into an automated, auditable, and compliant system.”

Sharon Aby
Senior Manager of IAM, Databricks
"Opal helps Elastic protect more of our attack surface than we could before with a small but mighty team. Whether we're speeding up workflows with Slack, orchestrating authorization directly from Terraform, or using the API, Opal has helped us do more with less.
In the near future, we're excited to implement Just-in-Time (JIT) access for all of our employees who use GitHub, as well as begin to secure LLMs, service accounts, and other NHIs with Opal."

Mandy Andress
CISO, Elastic
“At Obsidian, we use Opal to run quarterly access reviews, maintain just-in-time access, and handle access requests to some of our sensitive applications, like AWS.
Once we started using Opal’s Risk Layer in AWS, it changed the way we connect to it, which is fantastic. We’re excited to find the time to set up a deeper Terraform integration, along with the API and CLI that Opal built. Overall, Opal has been a great time saver—really helped us out.”

Chris Kennington
Security Engineer, Obsidian
"Opal's Access Review module allows us to provide internal and external auditors with the evidence required for multiple compliances, and provides our Privileged Access Reviewers with the necessary information to make meaningful access decisions.
Opal's ability to self-host their solution also allows us to host in our own FedRAMP High environment, thus allowing us to utilize all of their capabilities to harden our FedRAMP resources."

Jack Zaldivar, Jr.
Staff Systems Engineer, Databricks
"At Grammarly, Opal enabled us to migrate all access management for over 150 corporate applications and hundreds of production services across two public clouds to a unified employee experience in just a few weeks."

Suha Can
CISO, Grammarly
“Access reviews and access management were a tedious time sink for us at Obsidian before we adopted Opal. But unlike a lot of other security products, Opal is one of those rare products that gives us back time to focus on what matters, which is amazing.”

Alfredo Hickman
CISO, Obsidian
FROM OUR Customers:
"With Opal, we were able to transition quickly to a self-service access model that supports both JIT and Just-Enough-Access (JEA).
This shift not only streamlined our provisioning workflows but also empowered teams with the right level of access, exactly when needed. Once our access data was centralized in Opal, generating user access reviews became effortless.
Opal has allowed us to scale securely and efficiently — transforming what used to be a time-consuming, error-prone process into an automated, auditable, and compliant system.”

Sharon Aby
Senior Manager of IAM, Databricks
"Opal helps Elastic protect more of our attack surface than we could before with a small but mighty team. Whether we're speeding up workflows with Slack, orchestrating authorization directly from Terraform, or using the API, Opal has helped us do more with less.
In the near future, we're excited to implement Just-in-Time (JIT) access for all of our employees who use GitHub, as well as begin to secure LLMs, service accounts, and other NHIs with Opal."

Mandy Andress
CISO, Elastic
“At Obsidian, we use Opal to run quarterly access reviews, maintain just-in-time access, and handle access requests to some of our sensitive applications, like AWS.
Once we started using Opal’s Risk Layer in AWS, it changed the way we connect to it, which is fantastic. We’re excited to find the time to set up a deeper Terraform integration, along with the API and CLI that Opal built. Overall, Opal has been a great time saver—really helped us out.”

Chris Kennington
Security Engineer, Obsidian
"Opal's Access Review module allows us to provide internal and external auditors with the evidence required for multiple compliances, and provides our Privileged Access Reviewers with the necessary information to make meaningful access decisions.
Opal's ability to self-host their solution also allows us to host in our own FedRAMP High environment, thus allowing us to utilize all of their capabilities to harden our FedRAMP resources."

Jack Zaldivar, Jr.
Staff Systems Engineer, Databricks
"At Grammarly, Opal enabled us to migrate all access management for over 150 corporate applications and hundreds of production services across two public clouds to a unified employee experience in just a few weeks."

Suha Can
CISO, Grammarly
“Access reviews and access management were a tedious time sink for us at Obsidian before we adopted Opal. But unlike a lot of other security products, Opal is one of those rare products that gives us back time to focus on what matters, which is amazing.”

Alfredo Hickman
CISO, Obsidian
"With Opal, we were able to transition quickly to a self-service access model that supports both JIT and Just-Enough-Access (JEA).
This shift not only streamlined our provisioning workflows but also empowered teams with the right level of access, exactly when needed. Once our access data was centralized in Opal, generating user access reviews became effortless.
Opal has allowed us to scale securely and efficiently — transforming what used to be a time-consuming, error-prone process into an automated, auditable, and compliant system.”

Sharon Aby
Senior Manager of IAM, Databricks
"Opal helps Elastic protect more of our attack surface than we could before with a small but mighty team. Whether we're speeding up workflows with Slack, orchestrating authorization directly from Terraform, or using the API, Opal has helped us do more with less.
In the near future, we're excited to implement Just-in-Time (JIT) access for all of our employees who use GitHub, as well as begin to secure LLMs, service accounts, and other NHIs with Opal."

Mandy Andress
CISO, Elastic
“At Obsidian, we use Opal to run quarterly access reviews, maintain just-in-time access, and handle access requests to some of our sensitive applications, like AWS.
Once we started using Opal’s Risk Layer in AWS, it changed the way we connect to it, which is fantastic. We’re excited to find the time to set up a deeper Terraform integration, along with the API and CLI that Opal built. Overall, Opal has been a great time saver—really helped us out.”

Chris Kennington
Security Engineer, Obsidian
"Opal's Access Review module allows us to provide internal and external auditors with the evidence required for multiple compliances, and provides our Privileged Access Reviewers with the necessary information to make meaningful access decisions.
Opal's ability to self-host their solution also allows us to host in our own FedRAMP High environment, thus allowing us to utilize all of their capabilities to harden our FedRAMP resources."

Jack Zaldivar, Jr.
Staff Systems Engineer, Databricks
"At Grammarly, Opal enabled us to migrate all access management for over 150 corporate applications and hundreds of production services across two public clouds to a unified employee experience in just a few weeks."

Suha Can
CISO, Grammarly
“Access reviews and access management were a tedious time sink for us at Obsidian before we adopted Opal. But unlike a lot of other security products, Opal is one of those rare products that gives us back time to focus on what matters, which is amazing.”

Alfredo Hickman
CISO, Obsidian
"With Opal, we were able to transition quickly to a self-service access model that supports both JIT and Just-Enough-Access (JEA).
This shift not only streamlined our provisioning workflows but also empowered teams with the right level of access, exactly when needed. Once our access data was centralized in Opal, generating user access reviews became effortless.
Opal has allowed us to scale securely and efficiently — transforming what used to be a time-consuming, error-prone process into an automated, auditable, and compliant system.”

Sharon Aby
Senior Manager of IAM, Databricks
"Opal helps Elastic protect more of our attack surface than we could before with a small but mighty team. Whether we're speeding up workflows with Slack, orchestrating authorization directly from Terraform, or using the API, Opal has helped us do more with less.
In the near future, we're excited to implement Just-in-Time (JIT) access for all of our employees who use GitHub, as well as begin to secure LLMs, service accounts, and other NHIs with Opal."

Mandy Andress
CISO, Elastic
“At Obsidian, we use Opal to run quarterly access reviews, maintain just-in-time access, and handle access requests to some of our sensitive applications, like AWS.
Once we started using Opal’s Risk Layer in AWS, it changed the way we connect to it, which is fantastic. We’re excited to find the time to set up a deeper Terraform integration, along with the API and CLI that Opal built. Overall, Opal has been a great time saver—really helped us out.”

Chris Kennington
Security Engineer, Obsidian
"Opal's Access Review module allows us to provide internal and external auditors with the evidence required for multiple compliances, and provides our Privileged Access Reviewers with the necessary information to make meaningful access decisions.
Opal's ability to self-host their solution also allows us to host in our own FedRAMP High environment, thus allowing us to utilize all of their capabilities to harden our FedRAMP resources."

Jack Zaldivar, Jr.
Staff Systems Engineer, Databricks
"At Grammarly, Opal enabled us to migrate all access management for over 150 corporate applications and hundreds of production services across two public clouds to a unified employee experience in just a few weeks."

Suha Can
CISO, Grammarly
“Access reviews and access management were a tedious time sink for us at Obsidian before we adopted Opal. But unlike a lot of other security products, Opal is one of those rare products that gives us back time to focus on what matters, which is amazing.”

Alfredo Hickman
CISO, Obsidian
"With Opal, we were able to transition quickly to a self-service access model that supports both JIT and Just-Enough-Access (JEA).
This shift not only streamlined our provisioning workflows but also empowered teams with the right level of access, exactly when needed. Once our access data was centralized in Opal, generating user access reviews became effortless.
Opal has allowed us to scale securely and efficiently — transforming what used to be a time-consuming, error-prone process into an automated, auditable, and compliant system.”

Sharon Aby
Senior Manager of IAM, Databricks
"Opal helps Elastic protect more of our attack surface than we could before with a small but mighty team. Whether we're speeding up workflows with Slack, orchestrating authorization directly from Terraform, or using the API, Opal has helped us do more with less.
In the near future, we're excited to implement Just-in-Time (JIT) access for all of our employees who use GitHub, as well as begin to secure LLMs, service accounts, and other NHIs with Opal."

Mandy Andress
CISO, Elastic
“At Obsidian, we use Opal to run quarterly access reviews, maintain just-in-time access, and handle access requests to some of our sensitive applications, like AWS.
Once we started using Opal’s Risk Layer in AWS, it changed the way we connect to it, which is fantastic. We’re excited to find the time to set up a deeper Terraform integration, along with the API and CLI that Opal built. Overall, Opal has been a great time saver—really helped us out.”

Chris Kennington
Security Engineer, Obsidian
"Opal's Access Review module allows us to provide internal and external auditors with the evidence required for multiple compliances, and provides our Privileged Access Reviewers with the necessary information to make meaningful access decisions.
Opal's ability to self-host their solution also allows us to host in our own FedRAMP High environment, thus allowing us to utilize all of their capabilities to harden our FedRAMP resources."

Jack Zaldivar, Jr.
Staff Systems Engineer, Databricks
"At Grammarly, Opal enabled us to migrate all access management for over 150 corporate applications and hundreds of production services across two public clouds to a unified employee experience in just a few weeks."

Suha Can
CISO, Grammarly
“Access reviews and access management were a tedious time sink for us at Obsidian before we adopted Opal. But unlike a lot of other security products, Opal is one of those rare products that gives us back time to focus on what matters, which is amazing.”

Alfredo Hickman
CISO, Obsidian
FROM OUR Customers:
"With Opal, we were able to transition quickly to a self-service access model that supports both JIT and Just-Enough-Access (JEA).
This shift not only streamlined our provisioning workflows but also empowered teams with the right level of access, exactly when needed. Once our access data was centralized in Opal, generating user access reviews became effortless.
Opal has allowed us to scale securely and efficiently — transforming what used to be a time-consuming, error-prone process into an automated, auditable, and compliant system.”

Sharon Aby
Senior Manager of IAM, Databricks
"Opal helps Elastic protect more of our attack surface than we could before with a small but mighty team. Whether we're speeding up workflows with Slack, orchestrating authorization directly from Terraform, or using the API, Opal has helped us do more with less.
In the near future, we're excited to implement Just-in-Time (JIT) access for all of our employees who use GitHub, as well as begin to secure LLMs, service accounts, and other NHIs with Opal."

Mandy Andress
CISO, Elastic
“At Obsidian, we use Opal to run quarterly access reviews, maintain just-in-time access, and handle access requests to some of our sensitive applications, like AWS.
Once we started using Opal’s Risk Layer in AWS, it changed the way we connect to it, which is fantastic. We’re excited to find the time to set up a deeper Terraform integration, along with the API and CLI that Opal built. Overall, Opal has been a great time saver—really helped us out.”

Chris Kennington
Security Engineer, Obsidian
"Opal's Access Review module allows us to provide internal and external auditors with the evidence required for multiple compliances, and provides our Privileged Access Reviewers with the necessary information to make meaningful access decisions.
Opal's ability to self-host their solution also allows us to host in our own FedRAMP High environment, thus allowing us to utilize all of their capabilities to harden our FedRAMP resources."

Jack Zaldivar, Jr.
Staff Systems Engineer, Databricks
"At Grammarly, Opal enabled us to migrate all access management for over 150 corporate applications and hundreds of production services across two public clouds to a unified employee experience in just a few weeks."

Suha Can
CISO, Grammarly
“Access reviews and access management were a tedious time sink for us at Obsidian before we adopted Opal. But unlike a lot of other security products, Opal is one of those rare products that gives us back time to focus on what matters, which is amazing.”

Alfredo Hickman
CISO, Obsidian
FROM OUR Customers:
"With Opal, we were able to transition quickly to a self-service access model that supports both JIT and Just-Enough-Access (JEA).
This shift not only streamlined our provisioning workflows but also empowered teams with the right level of access, exactly when needed. Once our access data was centralized in Opal, generating user access reviews became effortless.
Opal has allowed us to scale securely and efficiently — transforming what used to be a time-consuming, error-prone process into an automated, auditable, and compliant system.”

Sharon Aby
Senior Manager of IAM, Databricks
"Opal helps Elastic protect more of our attack surface than we could before with a small but mighty team. Whether we're speeding up workflows with Slack, orchestrating authorization directly from Terraform, or using the API, Opal has helped us do more with less.
In the near future, we're excited to implement Just-in-Time (JIT) access for all of our employees who use GitHub, as well as begin to secure LLMs, service accounts, and other NHIs with Opal."

Mandy Andress
CISO, Elastic
“At Obsidian, we use Opal to run quarterly access reviews, maintain just-in-time access, and handle access requests to some of our sensitive applications, like AWS.
Once we started using Opal’s Risk Layer in AWS, it changed the way we connect to it, which is fantastic. We’re excited to find the time to set up a deeper Terraform integration, along with the API and CLI that Opal built. Overall, Opal has been a great time saver—really helped us out.”

Chris Kennington
Security Engineer, Obsidian
"Opal's Access Review module allows us to provide internal and external auditors with the evidence required for multiple compliances, and provides our Privileged Access Reviewers with the necessary information to make meaningful access decisions.
Opal's ability to self-host their solution also allows us to host in our own FedRAMP High environment, thus allowing us to utilize all of their capabilities to harden our FedRAMP resources."

Jack Zaldivar, Jr.
Staff Systems Engineer, Databricks
"At Grammarly, Opal enabled us to migrate all access management for over 150 corporate applications and hundreds of production services across two public clouds to a unified employee experience in just a few weeks."

Suha Can
CISO, Grammarly
“Access reviews and access management were a tedious time sink for us at Obsidian before we adopted Opal. But unlike a lot of other security products, Opal is one of those rare products that gives us back time to focus on what matters, which is amazing.”

Alfredo Hickman
CISO, Obsidian
"With Opal, we were able to transition quickly to a self-service access model that supports both JIT and Just-Enough-Access (JEA).
This shift not only streamlined our provisioning workflows but also empowered teams with the right level of access, exactly when needed. Once our access data was centralized in Opal, generating user access reviews became effortless.
Opal has allowed us to scale securely and efficiently — transforming what used to be a time-consuming, error-prone process into an automated, auditable, and compliant system.”

Sharon Aby
Senior Manager of IAM, Databricks
"Opal helps Elastic protect more of our attack surface than we could before with a small but mighty team. Whether we're speeding up workflows with Slack, orchestrating authorization directly from Terraform, or using the API, Opal has helped us do more with less.
In the near future, we're excited to implement Just-in-Time (JIT) access for all of our employees who use GitHub, as well as begin to secure LLMs, service accounts, and other NHIs with Opal."

Mandy Andress
CISO, Elastic
“At Obsidian, we use Opal to run quarterly access reviews, maintain just-in-time access, and handle access requests to some of our sensitive applications, like AWS.
Once we started using Opal’s Risk Layer in AWS, it changed the way we connect to it, which is fantastic. We’re excited to find the time to set up a deeper Terraform integration, along with the API and CLI that Opal built. Overall, Opal has been a great time saver—really helped us out.”

Chris Kennington
Security Engineer, Obsidian
"Opal's Access Review module allows us to provide internal and external auditors with the evidence required for multiple compliances, and provides our Privileged Access Reviewers with the necessary information to make meaningful access decisions.
Opal's ability to self-host their solution also allows us to host in our own FedRAMP High environment, thus allowing us to utilize all of their capabilities to harden our FedRAMP resources."

Jack Zaldivar, Jr.
Staff Systems Engineer, Databricks
"At Grammarly, Opal enabled us to migrate all access management for over 150 corporate applications and hundreds of production services across two public clouds to a unified employee experience in just a few weeks."

Suha Can
CISO, Grammarly
“Access reviews and access management were a tedious time sink for us at Obsidian before we adopted Opal. But unlike a lot of other security products, Opal is one of those rare products that gives us back time to focus on what matters, which is amazing.”

Alfredo Hickman
CISO, Obsidian
"With Opal, we were able to transition quickly to a self-service access model that supports both JIT and Just-Enough-Access (JEA).
This shift not only streamlined our provisioning workflows but also empowered teams with the right level of access, exactly when needed. Once our access data was centralized in Opal, generating user access reviews became effortless.
Opal has allowed us to scale securely and efficiently — transforming what used to be a time-consuming, error-prone process into an automated, auditable, and compliant system.”

Sharon Aby
Senior Manager of IAM, Databricks
"Opal helps Elastic protect more of our attack surface than we could before with a small but mighty team. Whether we're speeding up workflows with Slack, orchestrating authorization directly from Terraform, or using the API, Opal has helped us do more with less.
In the near future, we're excited to implement Just-in-Time (JIT) access for all of our employees who use GitHub, as well as begin to secure LLMs, service accounts, and other NHIs with Opal."

Mandy Andress
CISO, Elastic
“At Obsidian, we use Opal to run quarterly access reviews, maintain just-in-time access, and handle access requests to some of our sensitive applications, like AWS.
Once we started using Opal’s Risk Layer in AWS, it changed the way we connect to it, which is fantastic. We’re excited to find the time to set up a deeper Terraform integration, along with the API and CLI that Opal built. Overall, Opal has been a great time saver—really helped us out.”

Chris Kennington
Security Engineer, Obsidian
"Opal's Access Review module allows us to provide internal and external auditors with the evidence required for multiple compliances, and provides our Privileged Access Reviewers with the necessary information to make meaningful access decisions.
Opal's ability to self-host their solution also allows us to host in our own FedRAMP High environment, thus allowing us to utilize all of their capabilities to harden our FedRAMP resources."

Jack Zaldivar, Jr.
Staff Systems Engineer, Databricks
"At Grammarly, Opal enabled us to migrate all access management for over 150 corporate applications and hundreds of production services across two public clouds to a unified employee experience in just a few weeks."

Suha Can
CISO, Grammarly
“Access reviews and access management were a tedious time sink for us at Obsidian before we adopted Opal. But unlike a lot of other security products, Opal is one of those rare products that gives us back time to focus on what matters, which is amazing.”

Alfredo Hickman
CISO, Obsidian
"With Opal, we were able to transition quickly to a self-service access model that supports both JIT and Just-Enough-Access (JEA).
This shift not only streamlined our provisioning workflows but also empowered teams with the right level of access, exactly when needed. Once our access data was centralized in Opal, generating user access reviews became effortless.
Opal has allowed us to scale securely and efficiently — transforming what used to be a time-consuming, error-prone process into an automated, auditable, and compliant system.”

Sharon Aby
Senior Manager of IAM, Databricks
"Opal helps Elastic protect more of our attack surface than we could before with a small but mighty team. Whether we're speeding up workflows with Slack, orchestrating authorization directly from Terraform, or using the API, Opal has helped us do more with less.
In the near future, we're excited to implement Just-in-Time (JIT) access for all of our employees who use GitHub, as well as begin to secure LLMs, service accounts, and other NHIs with Opal."

Mandy Andress
CISO, Elastic
“At Obsidian, we use Opal to run quarterly access reviews, maintain just-in-time access, and handle access requests to some of our sensitive applications, like AWS.
Once we started using Opal’s Risk Layer in AWS, it changed the way we connect to it, which is fantastic. We’re excited to find the time to set up a deeper Terraform integration, along with the API and CLI that Opal built. Overall, Opal has been a great time saver—really helped us out.”

Chris Kennington
Security Engineer, Obsidian
"Opal's Access Review module allows us to provide internal and external auditors with the evidence required for multiple compliances, and provides our Privileged Access Reviewers with the necessary information to make meaningful access decisions.
Opal's ability to self-host their solution also allows us to host in our own FedRAMP High environment, thus allowing us to utilize all of their capabilities to harden our FedRAMP resources."

Jack Zaldivar, Jr.
Staff Systems Engineer, Databricks
"At Grammarly, Opal enabled us to migrate all access management for over 150 corporate applications and hundreds of production services across two public clouds to a unified employee experience in just a few weeks."

Suha Can
CISO, Grammarly
“Access reviews and access management were a tedious time sink for us at Obsidian before we adopted Opal. But unlike a lot of other security products, Opal is one of those rare products that gives us back time to focus on what matters, which is amazing.”

Alfredo Hickman
CISO, Obsidian
FROM OUR Customers:
"With Opal, we were able to transition quickly to a self-service access model that supports both JIT and Just-Enough-Access (JEA).
This shift not only streamlined our provisioning workflows but also empowered teams with the right level of access, exactly when needed. Once our access data was centralized in Opal, generating user access reviews became effortless.
Opal has allowed us to scale securely and efficiently — transforming what used to be a time-consuming, error-prone process into an automated, auditable, and compliant system.”

Sharon Aby
Senior Manager of IAM, Databricks
"Opal helps Elastic protect more of our attack surface than we could before with a small but mighty team. Whether we're speeding up workflows with Slack, orchestrating authorization directly from Terraform, or using the API, Opal has helped us do more with less.
In the near future, we're excited to implement Just-in-Time (JIT) access for all of our employees who use GitHub, as well as begin to secure LLMs, service accounts, and other NHIs with Opal."

Mandy Andress
CISO, Elastic
“At Obsidian, we use Opal to run quarterly access reviews, maintain just-in-time access, and handle access requests to some of our sensitive applications, like AWS.
Once we started using Opal’s Risk Layer in AWS, it changed the way we connect to it, which is fantastic. We’re excited to find the time to set up a deeper Terraform integration, along with the API and CLI that Opal built. Overall, Opal has been a great time saver—really helped us out.”

Chris Kennington
Security Engineer, Obsidian
"Opal's Access Review module allows us to provide internal and external auditors with the evidence required for multiple compliances, and provides our Privileged Access Reviewers with the necessary information to make meaningful access decisions.
Opal's ability to self-host their solution also allows us to host in our own FedRAMP High environment, thus allowing us to utilize all of their capabilities to harden our FedRAMP resources."

Jack Zaldivar, Jr.
Staff Systems Engineer, Databricks
"At Grammarly, Opal enabled us to migrate all access management for over 150 corporate applications and hundreds of production services across two public clouds to a unified employee experience in just a few weeks."

Suha Can
CISO, Grammarly
“Access reviews and access management were a tedious time sink for us at Obsidian before we adopted Opal. But unlike a lot of other security products, Opal is one of those rare products that gives us back time to focus on what matters, which is amazing.”

Alfredo Hickman
CISO, Obsidian
FROM OUR Customers:
"With Opal, we were able to transition quickly to a self-service access model that supports both JIT and Just-Enough-Access (JEA).
This shift not only streamlined our provisioning workflows but also empowered teams with the right level of access, exactly when needed. Once our access data was centralized in Opal, generating user access reviews became effortless.
Opal has allowed us to scale securely and efficiently — transforming what used to be a time-consuming, error-prone process into an automated, auditable, and compliant system.”

Sharon Aby
Senior Manager of IAM, Databricks
"Opal helps Elastic protect more of our attack surface than we could before with a small but mighty team. Whether we're speeding up workflows with Slack, orchestrating authorization directly from Terraform, or using the API, Opal has helped us do more with less.
In the near future, we're excited to implement Just-in-Time (JIT) access for all of our employees who use GitHub, as well as begin to secure LLMs, service accounts, and other NHIs with Opal."

Mandy Andress
CISO, Elastic
“At Obsidian, we use Opal to run quarterly access reviews, maintain just-in-time access, and handle access requests to some of our sensitive applications, like AWS.
Once we started using Opal’s Risk Layer in AWS, it changed the way we connect to it, which is fantastic. We’re excited to find the time to set up a deeper Terraform integration, along with the API and CLI that Opal built. Overall, Opal has been a great time saver—really helped us out.”

Chris Kennington
Security Engineer, Obsidian
"Opal's Access Review module allows us to provide internal and external auditors with the evidence required for multiple compliances, and provides our Privileged Access Reviewers with the necessary information to make meaningful access decisions.
Opal's ability to self-host their solution also allows us to host in our own FedRAMP High environment, thus allowing us to utilize all of their capabilities to harden our FedRAMP resources."

Jack Zaldivar, Jr.
Staff Systems Engineer, Databricks
"At Grammarly, Opal enabled us to migrate all access management for over 150 corporate applications and hundreds of production services across two public clouds to a unified employee experience in just a few weeks."

Suha Can
CISO, Grammarly
“Access reviews and access management were a tedious time sink for us at Obsidian before we adopted Opal. But unlike a lot of other security products, Opal is one of those rare products that gives us back time to focus on what matters, which is amazing.”

Alfredo Hickman
CISO, Obsidian
"With Opal, we were able to transition quickly to a self-service access model that supports both JIT and Just-Enough-Access (JEA).
This shift not only streamlined our provisioning workflows but also empowered teams with the right level of access, exactly when needed. Once our access data was centralized in Opal, generating user access reviews became effortless.
Opal has allowed us to scale securely and efficiently — transforming what used to be a time-consuming, error-prone process into an automated, auditable, and compliant system.”

Sharon Aby
Senior Manager of IAM, Databricks
"Opal helps Elastic protect more of our attack surface than we could before with a small but mighty team. Whether we're speeding up workflows with Slack, orchestrating authorization directly from Terraform, or using the API, Opal has helped us do more with less.
In the near future, we're excited to implement Just-in-Time (JIT) access for all of our employees who use GitHub, as well as begin to secure LLMs, service accounts, and other NHIs with Opal."

Mandy Andress
CISO, Elastic
“At Obsidian, we use Opal to run quarterly access reviews, maintain just-in-time access, and handle access requests to some of our sensitive applications, like AWS.
Once we started using Opal’s Risk Layer in AWS, it changed the way we connect to it, which is fantastic. We’re excited to find the time to set up a deeper Terraform integration, along with the API and CLI that Opal built. Overall, Opal has been a great time saver—really helped us out.”

Chris Kennington
Security Engineer, Obsidian
"Opal's Access Review module allows us to provide internal and external auditors with the evidence required for multiple compliances, and provides our Privileged Access Reviewers with the necessary information to make meaningful access decisions.
Opal's ability to self-host their solution also allows us to host in our own FedRAMP High environment, thus allowing us to utilize all of their capabilities to harden our FedRAMP resources."

Jack Zaldivar, Jr.
Staff Systems Engineer, Databricks
"At Grammarly, Opal enabled us to migrate all access management for over 150 corporate applications and hundreds of production services across two public clouds to a unified employee experience in just a few weeks."

Suha Can
CISO, Grammarly
“Access reviews and access management were a tedious time sink for us at Obsidian before we adopted Opal. But unlike a lot of other security products, Opal is one of those rare products that gives us back time to focus on what matters, which is amazing.”

Alfredo Hickman
CISO, Obsidian
"With Opal, we were able to transition quickly to a self-service access model that supports both JIT and Just-Enough-Access (JEA).
This shift not only streamlined our provisioning workflows but also empowered teams with the right level of access, exactly when needed. Once our access data was centralized in Opal, generating user access reviews became effortless.
Opal has allowed us to scale securely and efficiently — transforming what used to be a time-consuming, error-prone process into an automated, auditable, and compliant system.”

Sharon Aby
Senior Manager of IAM, Databricks
"Opal helps Elastic protect more of our attack surface than we could before with a small but mighty team. Whether we're speeding up workflows with Slack, orchestrating authorization directly from Terraform, or using the API, Opal has helped us do more with less.
In the near future, we're excited to implement Just-in-Time (JIT) access for all of our employees who use GitHub, as well as begin to secure LLMs, service accounts, and other NHIs with Opal."

Mandy Andress
CISO, Elastic
“At Obsidian, we use Opal to run quarterly access reviews, maintain just-in-time access, and handle access requests to some of our sensitive applications, like AWS.
Once we started using Opal’s Risk Layer in AWS, it changed the way we connect to it, which is fantastic. We’re excited to find the time to set up a deeper Terraform integration, along with the API and CLI that Opal built. Overall, Opal has been a great time saver—really helped us out.”

Chris Kennington
Security Engineer, Obsidian
"Opal's Access Review module allows us to provide internal and external auditors with the evidence required for multiple compliances, and provides our Privileged Access Reviewers with the necessary information to make meaningful access decisions.
Opal's ability to self-host their solution also allows us to host in our own FedRAMP High environment, thus allowing us to utilize all of their capabilities to harden our FedRAMP resources."

Jack Zaldivar, Jr.
Staff Systems Engineer, Databricks
"At Grammarly, Opal enabled us to migrate all access management for over 150 corporate applications and hundreds of production services across two public clouds to a unified employee experience in just a few weeks."

Suha Can
CISO, Grammarly
“Access reviews and access management were a tedious time sink for us at Obsidian before we adopted Opal. But unlike a lot of other security products, Opal is one of those rare products that gives us back time to focus on what matters, which is amazing.”

Alfredo Hickman
CISO, Obsidian
"With Opal, we were able to transition quickly to a self-service access model that supports both JIT and Just-Enough-Access (JEA).
This shift not only streamlined our provisioning workflows but also empowered teams with the right level of access, exactly when needed. Once our access data was centralized in Opal, generating user access reviews became effortless.
Opal has allowed us to scale securely and efficiently — transforming what used to be a time-consuming, error-prone process into an automated, auditable, and compliant system.”

Sharon Aby
Senior Manager of IAM, Databricks
"Opal helps Elastic protect more of our attack surface than we could before with a small but mighty team. Whether we're speeding up workflows with Slack, orchestrating authorization directly from Terraform, or using the API, Opal has helped us do more with less.
In the near future, we're excited to implement Just-in-Time (JIT) access for all of our employees who use GitHub, as well as begin to secure LLMs, service accounts, and other NHIs with Opal."

Mandy Andress
CISO, Elastic
“At Obsidian, we use Opal to run quarterly access reviews, maintain just-in-time access, and handle access requests to some of our sensitive applications, like AWS.
Once we started using Opal’s Risk Layer in AWS, it changed the way we connect to it, which is fantastic. We’re excited to find the time to set up a deeper Terraform integration, along with the API and CLI that Opal built. Overall, Opal has been a great time saver—really helped us out.”

Chris Kennington
Security Engineer, Obsidian
"Opal's Access Review module allows us to provide internal and external auditors with the evidence required for multiple compliances, and provides our Privileged Access Reviewers with the necessary information to make meaningful access decisions.
Opal's ability to self-host their solution also allows us to host in our own FedRAMP High environment, thus allowing us to utilize all of their capabilities to harden our FedRAMP resources."

Jack Zaldivar, Jr.
Staff Systems Engineer, Databricks
"At Grammarly, Opal enabled us to migrate all access management for over 150 corporate applications and hundreds of production services across two public clouds to a unified employee experience in just a few weeks."

Suha Can
CISO, Grammarly
“Access reviews and access management were a tedious time sink for us at Obsidian before we adopted Opal. But unlike a lot of other security products, Opal is one of those rare products that gives us back time to focus on what matters, which is amazing.”

Alfredo Hickman
CISO, Obsidian
FROM OUR Customers:
"With Opal, we were able to transition quickly to a self-service access model that supports both JIT and Just-Enough-Access (JEA).
This shift not only streamlined our provisioning workflows but also empowered teams with the right level of access, exactly when needed. Once our access data was centralized in Opal, generating user access reviews became effortless.
Opal has allowed us to scale securely and efficiently — transforming what used to be a time-consuming, error-prone process into an automated, auditable, and compliant system.”

Sharon Aby
Senior Manager of IAM, Databricks
"Opal helps Elastic protect more of our attack surface than we could before with a small but mighty team. Whether we're speeding up workflows with Slack, orchestrating authorization directly from Terraform, or using the API, Opal has helped us do more with less.
In the near future, we're excited to implement Just-in-Time (JIT) access for all of our employees who use GitHub, as well as begin to secure LLMs, service accounts, and other NHIs with Opal."

Mandy Andress
CISO, Elastic
“At Obsidian, we use Opal to run quarterly access reviews, maintain just-in-time access, and handle access requests to some of our sensitive applications, like AWS.
Once we started using Opal’s Risk Layer in AWS, it changed the way we connect to it, which is fantastic. We’re excited to find the time to set up a deeper Terraform integration, along with the API and CLI that Opal built. Overall, Opal has been a great time saver—really helped us out.”

Chris Kennington
Security Engineer, Obsidian
"Opal's Access Review module allows us to provide internal and external auditors with the evidence required for multiple compliances, and provides our Privileged Access Reviewers with the necessary information to make meaningful access decisions.
Opal's ability to self-host their solution also allows us to host in our own FedRAMP High environment, thus allowing us to utilize all of their capabilities to harden our FedRAMP resources."

Jack Zaldivar, Jr.
Staff Systems Engineer, Databricks
"At Grammarly, Opal enabled us to migrate all access management for over 150 corporate applications and hundreds of production services across two public clouds to a unified employee experience in just a few weeks."

Suha Can
CISO, Grammarly
“Access reviews and access management were a tedious time sink for us at Obsidian before we adopted Opal. But unlike a lot of other security products, Opal is one of those rare products that gives us back time to focus on what matters, which is amazing.”

Alfredo Hickman
CISO, Obsidian
"With Opal, we were able to transition quickly to a self-service access model that supports both JIT and Just-Enough-Access (JEA).
This shift not only streamlined our provisioning workflows but also empowered teams with the right level of access, exactly when needed. Once our access data was centralized in Opal, generating user access reviews became effortless.
Opal has allowed us to scale securely and efficiently — transforming what used to be a time-consuming, error-prone process into an automated, auditable, and compliant system.”

Sharon Aby
Senior Manager of IAM, Databricks
"Opal helps Elastic protect more of our attack surface than we could before with a small but mighty team. Whether we're speeding up workflows with Slack, orchestrating authorization directly from Terraform, or using the API, Opal has helped us do more with less.
In the near future, we're excited to implement Just-in-Time (JIT) access for all of our employees who use GitHub, as well as begin to secure LLMs, service accounts, and other NHIs with Opal."

Mandy Andress
CISO, Elastic
“At Obsidian, we use Opal to run quarterly access reviews, maintain just-in-time access, and handle access requests to some of our sensitive applications, like AWS.
Once we started using Opal’s Risk Layer in AWS, it changed the way we connect to it, which is fantastic. We’re excited to find the time to set up a deeper Terraform integration, along with the API and CLI that Opal built. Overall, Opal has been a great time saver—really helped us out.”

Chris Kennington
Security Engineer, Obsidian
"Opal's Access Review module allows us to provide internal and external auditors with the evidence required for multiple compliances, and provides our Privileged Access Reviewers with the necessary information to make meaningful access decisions.
Opal's ability to self-host their solution also allows us to host in our own FedRAMP High environment, thus allowing us to utilize all of their capabilities to harden our FedRAMP resources."

Jack Zaldivar, Jr.
Staff Systems Engineer, Databricks
"At Grammarly, Opal enabled us to migrate all access management for over 150 corporate applications and hundreds of production services across two public clouds to a unified employee experience in just a few weeks."

Suha Can
CISO, Grammarly
“Access reviews and access management were a tedious time sink for us at Obsidian before we adopted Opal. But unlike a lot of other security products, Opal is one of those rare products that gives us back time to focus on what matters, which is amazing.”

Alfredo Hickman
CISO, Obsidian
"With Opal, we were able to transition quickly to a self-service access model that supports both JIT and Just-Enough-Access (JEA).
This shift not only streamlined our provisioning workflows but also empowered teams with the right level of access, exactly when needed. Once our access data was centralized in Opal, generating user access reviews became effortless.
Opal has allowed us to scale securely and efficiently — transforming what used to be a time-consuming, error-prone process into an automated, auditable, and compliant system.”

Sharon Aby
Senior Manager of IAM, Databricks
"Opal helps Elastic protect more of our attack surface than we could before with a small but mighty team. Whether we're speeding up workflows with Slack, orchestrating authorization directly from Terraform, or using the API, Opal has helped us do more with less.
In the near future, we're excited to implement Just-in-Time (JIT) access for all of our employees who use GitHub, as well as begin to secure LLMs, service accounts, and other NHIs with Opal."

Mandy Andress
CISO, Elastic
“At Obsidian, we use Opal to run quarterly access reviews, maintain just-in-time access, and handle access requests to some of our sensitive applications, like AWS.
Once we started using Opal’s Risk Layer in AWS, it changed the way we connect to it, which is fantastic. We’re excited to find the time to set up a deeper Terraform integration, along with the API and CLI that Opal built. Overall, Opal has been a great time saver—really helped us out.”

Chris Kennington
Security Engineer, Obsidian
"Opal's Access Review module allows us to provide internal and external auditors with the evidence required for multiple compliances, and provides our Privileged Access Reviewers with the necessary information to make meaningful access decisions.
Opal's ability to self-host their solution also allows us to host in our own FedRAMP High environment, thus allowing us to utilize all of their capabilities to harden our FedRAMP resources."

Jack Zaldivar, Jr.
Staff Systems Engineer, Databricks
"At Grammarly, Opal enabled us to migrate all access management for over 150 corporate applications and hundreds of production services across two public clouds to a unified employee experience in just a few weeks."

Suha Can
CISO, Grammarly
“Access reviews and access management were a tedious time sink for us at Obsidian before we adopted Opal. But unlike a lot of other security products, Opal is one of those rare products that gives us back time to focus on what matters, which is amazing.”

Alfredo Hickman
CISO, Obsidian
"With Opal, we were able to transition quickly to a self-service access model that supports both JIT and Just-Enough-Access (JEA).
This shift not only streamlined our provisioning workflows but also empowered teams with the right level of access, exactly when needed. Once our access data was centralized in Opal, generating user access reviews became effortless.
Opal has allowed us to scale securely and efficiently — transforming what used to be a time-consuming, error-prone process into an automated, auditable, and compliant system.”

Sharon Aby
Senior Manager of IAM, Databricks
"Opal helps Elastic protect more of our attack surface than we could before with a small but mighty team. Whether we're speeding up workflows with Slack, orchestrating authorization directly from Terraform, or using the API, Opal has helped us do more with less.
In the near future, we're excited to implement Just-in-Time (JIT) access for all of our employees who use GitHub, as well as begin to secure LLMs, service accounts, and other NHIs with Opal."

Mandy Andress
CISO, Elastic
“At Obsidian, we use Opal to run quarterly access reviews, maintain just-in-time access, and handle access requests to some of our sensitive applications, like AWS.
Once we started using Opal’s Risk Layer in AWS, it changed the way we connect to it, which is fantastic. We’re excited to find the time to set up a deeper Terraform integration, along with the API and CLI that Opal built. Overall, Opal has been a great time saver—really helped us out.”

Chris Kennington
Security Engineer, Obsidian
"Opal's Access Review module allows us to provide internal and external auditors with the evidence required for multiple compliances, and provides our Privileged Access Reviewers with the necessary information to make meaningful access decisions.
Opal's ability to self-host their solution also allows us to host in our own FedRAMP High environment, thus allowing us to utilize all of their capabilities to harden our FedRAMP resources."

Jack Zaldivar, Jr.
Staff Systems Engineer, Databricks
"At Grammarly, Opal enabled us to migrate all access management for over 150 corporate applications and hundreds of production services across two public clouds to a unified employee experience in just a few weeks."

Suha Can
CISO, Grammarly
“Access reviews and access management were a tedious time sink for us at Obsidian before we adopted Opal. But unlike a lot of other security products, Opal is one of those rare products that gives us back time to focus on what matters, which is amazing.”

Alfredo Hickman
CISO, Obsidian