State of Identity Governance & Access 2026
Most Identity Systems Aren’t Ready for AI. Here’s What the Best Teams Did Instead.
Opal analyzed a year’s worth of data to reveal how the world's best security teams eliminated slow approvals, automated workflows, and removed unused access to rebuild identity governance for the agentic AI era.
TRUSTED BY LEADING COMPANIES
TRUSTED BY LEADING COMPANIES
TRUSTED BY LEADING COMPANIES
Status-Quo Identity VS AI-Ready Identity
Category
Not Ready for AI
Ready for AI
Access Approval Speed
Days to weeks; dependent on ticket queues and manual reviews
Minutes or seconds; automated approvals handle the majority of requests
Access Lifecycle Management
Scattered across Slack DMs, email threads, and spreadsheets
Unified approval engine with configurable policy routing
Unused Access Handling
Quarterly spreadsheet marathons taking 3+ weeks
Continuous compliance with AI-powered recommendations
AI Agent Readiness
Siloed per-system reports with no cross-app correlation
Unified identity graph across AWS, GCP, GitHub, and more
Status-Quo Identity VS AI-Ready Identity
Category
Not Ready for AI
Ready for AI
Access Approval Speed
Days to weeks; dependent on ticket queues and manual reviews
Minutes or seconds; automated approvals handle the majority of requests
Access Lifecycle Management
Scattered across Slack DMs, email threads, and spreadsheets
Unified approval engine with configurable policy routing
Unused Access Handling
Quarterly spreadsheet marathons taking 3+ weeks
Continuous compliance with AI-powered recommendations
AI Agent Readiness
Siloed per-system reports with no cross-app correlation
Unified identity graph across AWS, GCP, GitHub, and more
Status-Quo Identity VS AI-Ready Identity
Category
Not Ready for AI
Ready for AI
Access Approval Speed
Days to weeks; dependent on ticket queues and manual reviews
Minutes or seconds; automated approvals handle the majority of requests
Access Lifecycle Management
Scattered across Slack DMs, email threads, and spreadsheets
Unified approval engine with configurable policy routing
Unused Access Handling
Quarterly spreadsheet marathons taking 3+ weeks
Continuous compliance with AI-powered recommendations
AI Agent Readiness
Siloed per-system reports with no cross-app correlation
Unified identity graph across AWS, GCP, GitHub, and more
Status-Quo Identity VS AI-Ready Identity
Category
Not Ready for AI
Ready for AI
Access Approval Speed
Days to weeks; dependent on ticket queues and manual reviews
Minutes or seconds; automated approvals handle the majority of requests
Access Lifecycle Management
Scattered across Slack DMs, email threads, and spreadsheets
Unified approval engine with configurable policy routing
Unused Access Handling
Quarterly spreadsheet marathons taking 3+ weeks
Continuous compliance with AI-powered recommendations
AI Agent Readiness
Siloed per-system reports with no cross-app correlation
Unified identity graph across AWS, GCP, GitHub, and more
Trusted by security teams that ship fast and sleep well.

86K
Time-bound access requests
JIT Access and UARs Enhance Productivity and Security at Databricks
See customer story
Trusted by security teams that ship fast and sleep well.

86K
Time-bound access requests
JIT Access and UARs Enhance Productivity and Security at Databricks
See customer story
Trusted by security teams that ship fast and sleep well.

86K
Time-bound access requests
JIT Access and UARs Enhance Productivity and Security at Databricks
See customer story
Trusted by security teams that ship fast and sleep well.

86K
Time-bound access requests
JIT Access and UARs Enhance Productivity and Security at Databricks
See customer story

5,353
Okta entitlements governed
How Mercari Built Zero-Touch Access to Production
See customer story

5,000
Employees secured
Blend Transforms Identity Security with Deterministic Logic
See customer story

150+
Apps under governance
Superhuman Reduced Access Risk While Improving End-User Experience
See customer story
One platform. SaaS, self hosted, or on-prem.
PALADIN
Access Evaluation Agent
Paladin investigates every access request with the rigor of a senior security engineer — verifying identity, cross-referencing tickets, analyzing peer norms, and evaluating resource sensitivity. It operates as a first-class reviewer in Opal's approval chain: approving high-confidence requests instantly, and escalating unclear ones with specific, actionable reasoning. Every decision is auditable.

OPALSCRIPT
Policy-as-Code Language
A Python-like language for encoding access policy as executable automations. Define approval workflows, JIT rules, SoD constraints, and break-glass logic in code that's version-controlled, testable, peer-reviewed, and composable. Write it by hand, or describe what you need and let AI generate it. Ships through Git, Terraform, and CI/CD — just like the rest of your infrastructure.

OPALQUERY
Natural-Language Access Query Engine
Ask "who has admin access to production databases?" and get structured, exportable results in seconds. OpalQuery translates natural language into composable filters against Opal's full identity and access graph — covering users, resources, groups, and entitlements. Save queries, share them across your team, and use them as living audit evidence.

ACCESS GRAPH
See Every Entitlement, Role, and Relationship
With deeper integrations, we can tie every entitlement, role, and identity together, not only under the hood, but also in a visualization. Opal gives you the highest resolution representation of access in your organization.

One platform. SaaS, self hosted, or on-prem.
PALADIN
Access Evaluation Agent
Paladin investigates every access request with the rigor of a senior security engineer — verifying identity, cross-referencing tickets, analyzing peer norms, and evaluating resource sensitivity. It operates as a first-class reviewer in Opal's approval chain: approving high-confidence requests instantly, and escalating unclear ones with specific, actionable reasoning. Every decision is auditable.

OPALSCRIPT
Policy-as-Code Language
A Python-like language for encoding access policy as executable automations. Define approval workflows, JIT rules, SoD constraints, and break-glass logic in code that's version-controlled, testable, peer-reviewed, and composable. Write it by hand, or describe what you need and let AI generate it. Ships through Git, Terraform, and CI/CD — just like the rest of your infrastructure.

OPALQUERY
Natural-Language Access Query Engine
Ask "who has admin access to production databases?" and get structured, exportable results in seconds. OpalQuery translates natural language into composable filters against Opal's full identity and access graph — covering users, resources, groups, and entitlements. Save queries, share them across your team, and use them as living audit evidence.

ACCESS GRAPH
See Every Entitlement, Role, and Relationship
With deeper integrations, we can tie every entitlement, role, and identity together, not only under the hood, but also in a visualization. Opal gives you the highest resolution representation of access in your organization.

One platform. SaaS, self hosted, or on-prem.
PALADIN
Access Evaluation Agent
Paladin investigates every access request with the rigor of a senior security engineer — verifying identity, cross-referencing tickets, analyzing peer norms, and evaluating resource sensitivity. It operates as a first-class reviewer in Opal's approval chain: approving high-confidence requests instantly, and escalating unclear ones with specific, actionable reasoning. Every decision is auditable.

OPALSCRIPT
Policy-as-Code Language
A Python-like language for encoding access policy as executable automations. Define approval workflows, JIT rules, SoD constraints, and break-glass logic in code that's version-controlled, testable, peer-reviewed, and composable. Write it by hand, or describe what you need and let AI generate it. Ships through Git, Terraform, and CI/CD — just like the rest of your infrastructure.

OPALQUERY
Natural-Language Access Query Engine
Ask "who has admin access to production databases?" and get structured, exportable results in seconds. OpalQuery translates natural language into composable filters against Opal's full identity and access graph — covering users, resources, groups, and entitlements. Save queries, share them across your team, and use them as living audit evidence.

ACCESS GRAPH
See Every Entitlement, Role, and Relationship
With deeper integrations, we can tie every entitlement, role, and identity together, not only under the hood, but also in a visualization. Opal gives you the highest resolution representation of access in your organization.

One platform. SaaS, self hosted, or on-prem.
PALADIN
Access Evaluation Agent
Paladin investigates every access request with the rigor of a senior security engineer — verifying identity, cross-referencing tickets, analyzing peer norms, and evaluating resource sensitivity. It operates as a first-class reviewer in Opal's approval chain: approving high-confidence requests instantly, and escalating unclear ones with specific, actionable reasoning. Every decision is auditable.

OPALSCRIPT
Policy-as-Code Language
A Python-like language for encoding access policy as executable automations. Define approval workflows, JIT rules, SoD constraints, and break-glass logic in code that's version-controlled, testable, peer-reviewed, and composable. Write it by hand, or describe what you need and let AI generate it. Ships through Git, Terraform, and CI/CD — just like the rest of your infrastructure.

OPALQUERY
Natural-Language Access Query Engine
Ask "who has admin access to production databases?" and get structured, exportable results in seconds. OpalQuery translates natural language into composable filters against Opal's full identity and access graph — covering users, resources, groups, and entitlements. Save queries, share them across your team, and use them as living audit evidence.

ACCESS GRAPH
See Every Entitlement, Role, and Relationship
With deeper integrations, we can tie every entitlement, role, and identity together, not only under the hood, but also in a visualization. Opal gives you the highest resolution representation of access in your organization.

Stop Reviewing.
Start Enforcing.

Stop Reviewing.
Start Enforcing.

Stop Reviewing.
Start Enforcing.

Stop Reviewing.
Start Enforcing.
