
How many systems are you juggling just to answer a simple question: Who accessed what, and when?
In education, identity management is rarely clean or quiet. People come and go. Students change roles mid-term. A teacher might need elevated access on Monday and have it revoked by Thursday. Tracking it all is usually where things get messy.
Now, with Access Manager 25.2, OpenText has quietly delivered something big: Audit, Compliance & Data Intelligence (ACDI). It’s now native, right inside Access Manager.
ACDI brings real-time identity visibility into the same system that governs access. No extra dashboards or exporting logs just to make sense of who did what. If you’ve ever had to prepare for an audit with three different tools, this is the kind of shift that matters.
However, integrations come and go. What makes this one different?
What Is ACDI?
ACDI is an observability layer for your IAM stack. It connects Access Manager and Identity Manager to give you a continuous, centralized feed of identity events, complete with dashboards and rollback capability.
That means:
- You see who accessed what, when, and how.
- You get dashboards tailored for real-time compliance tracking.
- You can undo risky changes before they spiral.
- You run FERPA-ready reports with just a few clicks.
ACDI runs on OpenSearch, allowing it to instantly search and correlate data across both access and identity layers. This means if a student gains unexpected privileges or an account is accessed at unusual hours, you’ll be able to spot it immediately.
The best part is you don’t need to be a forensic analyst to get answers. The system delivers insights quickly, exactly when you need them.
Why It’s a Game-Changer:
There’s no shortage of dashboards in education tech. However, most of them speak different languages. What makes ACDI different is what it connects and who it helps.
Here’s what it delivers:
- Compliance prep drops dramatically: Instead of pulling logs from multiple systems, you generate reports from one.
- Incident investigations go faster: A login anomaly or a deprovisioning delay is all right there.
- Lifecycle tracking gets real: You know exactly when someone was added, what access they had, and when it was pulled.
According to the MS-ISAC 2025 report, 82% of school districts reported at least one cyber incident last year, most of them linked to access issues. When access isn’t tightly managed, risk multiplies.
Still, risk isn’t the only pressure. There’s time, fatigue, and budget.
The bigger win, then, may be ending the constant firefighting. You spend less time hunting for proof and more time enhancing systems that support your users.
How to Leverage ACDI:
You don’t need a complete infrastructure overhaul to get started. If you’re running Access Manager 25.2, ACDI is already built in and ready to use.
Here’s how to put it to work:
- Turn it on: That’s the first step. Activate ACDI in your environment and let it start collecting logs.
- Tweak your dashboards: Build panels for things you already care about, such as password resets, admin privilege changes, and failed logins.
- Use rollback like a safety net: Mistakes happen. For instance, if someone deploys a change prematurely, you can roll it back calmly and safely.
- Set up monthly compliance reports: This is where you save time, deliver leadership exactly the information they need, automatically.
- Train more than just IT: Give your security and compliance teams direct access to what matters and empower them to act faster.
Looking Ahead:
If this sounds like real progress, that’s because it is, and yet, it’s only the beginning.
OpenText has made it clear that ACDI is the foundation for a broader shift toward identity observability. That includes AI, automation, and smarter workflows.
What might that look like?
- Risk scores that highlight where to focus before issues arise.
- Automatic rollbacks when unauthorized access occurs.
- Cross-platform dashboards that consolidate identity data from SaaS apps, learning platforms, and student portals.
Your IAM Partner in Education
Schools need to stay vigilant, as surprises are no longer affordable. According to the Center for Internet Security, 82% of school districts reported cyber threat impacts between July of 2023 and December of 2024.
It’s not about whether identity events will happen. They will. The question is: Will you know when they do?
At Concensus Technologies, we work alongside schools and higher education institutions to co-manage cybersecurity and identity systems, including provisioning, SIS synchronization, data loss prevention, and real-time access governance.
We partner with Identity Automation to provide more than just software. Our support helps institutions manage access, maintain compliance, and tackle evolving identity challenges. From onboarding new students to deactivating old accounts, we stay engaged throughout the entire process.
If you’re looking to tighten your IAM posture but aren’t sure where to begin, we can help. Let’s look at where ACDI and Access Manager fit into your current setup, and how they might ease the pressure around audits, provisioning, or day-to-day oversight. Contact Concensus Technologies today.
Let us give you peace of mind
Leave it to our experts to keep your organization secure around the clock. Partner with us for trusted technology support.