![](https://cdn.prod.website-files.com/60d5e13b76ef69df62efa9bd/60f85c0613a191aaea065dfb_Asset_1_Merge%20Link%20Menu%20-%20Stylized.jpg)
![](https://cdn.prod.website-files.com/60d5e13b76ef69df62efa9bd/60f88c40415c34018f902b8b_Asset_2_Merge%20Link%20Auth%20-%20Stylized.jpg)
![](https://cdn.prod.website-files.com/60d5e13b76ef69df62efa9bd/60fade2e2dfa6b408305da42_Template%20for%20Opal%20(1).jpg)
The Problem
Merge, having access to lots of sensitive data, wanted to ensure top-shelf security for their customers. To follow good security practices, they regularly expired tokens every three months, and access to production was only given to experienced back-end developers. For on-call rotations, Merge provided privileged access and manually revoked them.
Merge realized they could redefine what was possible, exceeding good security practice to become best-in-class. Using Opal, an automated access management platform, Merge created a new standard of security in their category.