Running Oracle? Find out exactly what you're overpaying. Free cost analysis, no commitment.
500+ enterprise clients · Est. 2016 · 15-min response · No commitment
What Oracle Access Manager Third-Party Support Actually Means
Oracle Access Manager (OAM) is Oracle's flagship web access management platform, providing single sign-on (SSO), federated identity, adaptive authentication, and policy-based access control for enterprise web applications. OAM integrates at the WebGate level — Apache, IIS, WebLogic, WebSphere, and IBM HTTP Server WebGate agents sit in front of every protected application, forwarding authentication challenges to the OAM server infrastructure. Replacing OAM is therefore not a product swap — it is a re-integration project that touches every application in your protected estate.
Third-party support for Oracle Access Manager provides continued maintenance, security advisory, and incident support for OAM 11g R2 and 12c environments without Oracle. Your WebGate agents, OAM Admin Servers, Policy Managers, and all authentication and authorisation policies remain in production under a TPS provider's SLA. The versions you have deployed continue to run — you are not forced onto Oracle's SaaS IAM roadmap at Oracle's pace.
Oracle's commercial pressure here is predictable: OAM's support lifecycle is tightening, Oracle Identity Cloud Service (IDCS) and OCI IAM have been positioned as the long-term replacements, and Oracle consistently presents "migration" as a simpler exercise than it is. For an enterprise with 200–500 OAM-protected applications across multiple WebGate deployments, the migration reality is a multi-year programme costing £400K–£3.5M before your first application goes live on the replacement platform.
Oracle Access Manager Version Support Matrix
| OAM Version | Release | Oracle Support Status | Extended Support | TPS Available |
|---|---|---|---|---|
| OAM 11g R1 (11.1.1.x) | 2010–2012 | Sustaining Support | Expired | Yes |
| OAM 11g R2 PS1–PS2 (11.1.2.1/2) | 2012–2013 | Sustaining Support | Expired | Yes |
| OAM 11g R2 PS3 (11.1.2.3) | 2014 | Sustaining Support | Expired May 2020 | Yes |
| OAM 12c (12.2.1.3) | 2017 | Sustaining Support | Expired Dec 2022 | Yes |
| OAM 12c R2 PS4 (12.2.1.4) | 2019 | Extended Support | Until Dec 2025 | Yes |
The most critical data point: OAM 12.2.1.4 — the current and final on-premise OAM version — exits Extended Support in December 2025 and moves to Sustaining Support. Oracle has signalled that there will be no OAM 13c; the product line terminates with 12.2.1.4. For organisations not yet ready to complete a full IAM platform migration, Oracle TPS provides the only structured support path forward that does not involve emergency migration.
Why OAM Customers Choose Third-Party Support
Three forces drive OAM customers to third-party support: product end-of-life with no on-premise successor, migration cost reality, and the operational risk of forced IAM platform change.
Force 1 — Product Line Termination
Oracle Access Manager 12.2.1.4 is the last on-premise OAM release. Oracle's public roadmap commits to IDCS and OCI IAM for identity services. This is a legitimate product-lifecycle termination, not a temporary version gap. Organisations on OAM 12c face a binary choice: migrate to a cloud or modern on-premise IAM platform, or accept Sustaining Support (bug fix-only, no new patches). Third-party support is the bridge that buys you the time to migrate on an engineered schedule rather than under Oracle's commercial pressure.
Force 2 — IAM Migration Cost Reality
Oracle's sales materials routinely understate OAM migration complexity. The reality for large enterprise OAM environments:
- WebGate decommission: Every OAM-protected application requires its WebGate agent to be replaced with an OIDC/SAML integration. For 300 applications, this is 300 separate integration projects — each requiring security testing and UAT sign-off.
- Authentication scheme migration: OAM supports complex adaptive authentication flows — step-up authentication, IP-based risk scoring, device fingerprinting — all configured in OAM's proprietary policy framework. Re-implementing these in IDCS or Okta requires complete redesign of your authentication architecture.
- Oracle EBS/PeopleSoft/Siebel SSO: Oracle's own applications (EBS, PeopleSoft, Siebel) have deep WebGate-based SSO integrations. Migrating these applications' SSO to OIDC requires specific Oracle FMW patching and Oracle Application-specific SSO re-configuration — not simply pointing them at a new identity provider.
- Federation and B2B identity: OAM-managed SAML 2.0 and WS-Federation partnerships with external organisations require renegotiation of federation agreements and partner-side configuration changes — each involving third-party project dependencies outside your control.
For a large financial services firm with 400 OAM-protected applications, IDCS migration programme costs range from £1.8M–£3.5M over 24–36 months, including integration work, security testing, UAT, and parallel-run infrastructure. Azure AD/Entra ID migrations are comparably expensive — and introduce a Microsoft dependency that many regulated organisations are reluctant to take on for their primary IAM layer.
Force 3 — Operational Risk of Forced Timelines
IAM is not a system where you can afford failed migrations. A botched OAM-to-IDCS cutover that prevents 5,000 employees from accessing core systems at 7am on a Monday morning is a Tier 1 incident with board-level visibility. Regulated organisations — banks under PRA/FCA operational resilience requirements, NHS trusts under DSPT, government agencies under NCSC security standards — require formal migration testing, rollback plans, and regulatory change notification before any IAM platform change. None of this can be rushed. TPS gives you the time to do it properly.
What would Oracle Access Manager TPS save your organisation?
GoVendorFree provides free Oracle IAM support cost assessments. We model your exact OAM environment, WebGate deployment count, and Oracle support contract value to calculate your precise TPS saving.
Get Your Free OAM Cost AssessmentWhat Oracle Access Manager TPS Covers
GoVendorFree's Oracle Access Manager third-party support covers the complete on-premise OAM environment and its integration dependencies:
- OAM Admin Server and Managed Servers: OAM server cluster, high-availability configuration, JVM tuning, heap and GC diagnostics on WebLogic 10.3.6 / 12c
- WebGate Agents: Apache WebGate, IIS WebGate, WebLogic WebGate, and IBM HTTP Server WebGate — configuration, certificate management, connectivity to OAM server
- Authentication Policies: Authentication modules, authentication schemes (Form, X.509, Kerberos, LDAP), challenge responses, step-up authentication policies
- Authorisation Policies: Resource protection profiles, policy domains, conditions (IP, time, attribute-based), and response conditions for header injection
- OAM-OID/OVD Integration: Oracle Internet Directory and Oracle Virtual Directory backend LDAP connectivity for user store integration
- Oracle Identity Federation (OIF): SAML 2.0 and WS-Federation provider configurations co-located with OAM environments
- SSO Partner Integrations: Oracle EBS SSO (mod_osso / WebGate), PeopleSoft SSO (WebGate), Siebel SSO configurations
- OAM Database Repository: OAM policy store (LDAP or Oracle DB), audit store maintenance, and performance optimisation
- Keystore and Certificate Management: OAM-WebGate keypair rotation, SSL/TLS certificate renewal, and trust store management
Industry Cohort Analysis: Who Benefits Most from OAM TPS
Financial Services — PRA/FCA Operational Resilience Constraint
Banks and insurers regulated under PRA SS2/21 (operational resilience) and FCA PS21/3 must demonstrate impact tolerance testing for Important Business Services (IBS). The IAM platform — which gates access to core banking, payments, treasury, and risk systems — is invariably a component in multiple IBS dependency chains. A forced OAM-to-IDCS migration that falls within an IBS impact tolerance window requires formal notification to the PRA and documented evidence that the migration has been fully tested against operational resilience scenarios. For most tier-1 and tier-2 banks, this makes emergency or accelerated IAM migrations impractical. TPS buys the 24–36 months needed to execute a properly governed migration programme. Combined Oracle TPS across OAM, Oracle Database, and Oracle Fusion Middleware typically delivers £280K–£950K annual saving for UK financial services institutions.
Healthcare and NHS — DSPT and NHS Digital Security Standards
NHS trusts and health bodies are required to maintain Data Security and Protection Toolkit (DSPT) compliance and adhere to NHS Digital's security standards. Any change to the IAM platform must be assessed against the NHS's clinical risk management methodology (DCB0160) when the IAM system gates access to clinical systems. OAM environments protecting clinical workstation SSO, PACS imaging system access, clinical decision support tools, and EPR (Electronic Patient Record) portals fall into this category. IAM migrations in NHS environments frequently require clinical safety officer involvement and formal change approval processes that preclude compressed migration timelines. TPS provides a compliant bridge.
Public Sector — NCSC CAF and OFFICIAL-SENSITIVE Security Requirements
Central government departments and local authorities operating under the NCSC Cyber Assessment Framework (CAF) or handling OFFICIAL-SENSITIVE data are subject to rigorous change management requirements for security-critical infrastructure. The IAM platform — as the primary access control layer for government systems — requires formal security impact assessment, accreditor sign-off, and often GovAssure review for platform migrations. These processes take 12–18 months minimum. Government organisations on OAM 12c that cannot complete their migration programme before OAM's Sustaining Support transition have no realistic alternative to TPS.
OAM Third-Party Support Cost Model
The following cost profiles are based on GoVendorFree engagements with UK and European organisations across the financial services, healthcare, and public sector verticals. All figures represent annual support cost comparisons.
The critical comparison point: Oracle Extended Support for OAM 12.2.1.4 (available until December 2025) carries a 10% surcharge on top of standard 22% annual maintenance. Organisations currently paying Extended Support fees are paying approximately 24% of licence value annually for a product Oracle has announced it will not develop further. TPS eliminates this entirely.
Oracle's Migration Pressure Tactics for OAM Customers
Having worked with OAM customers through multiple Oracle renewal cycles, the pressure tactics are consistent and worth documenting. Oracle sales teams routinely deploy the following arguments — and here is the accurate counter-position to each:
- "IDCS is free with your Oracle Cloud subscription." IDCS/OCI IAM may be included in certain Oracle Cloud agreements, but the migration cost to re-integrate 200–500 applications onto OIDC/SAML is not free — it is the primary cost driver. The OCI IAM licence cost is not the obstacle; the professional services cost is.
- "OAM 12.2.1.4 will not receive security patches after December 2025." Accurate — Sustaining Support does not include new security patches. However, this does not mean your OAM environment is immediately insecure; it means you need a compensating control strategy (WAF, network segmentation, runtime monitoring) while you execute your migration programme. TPS providers include this security advisory as part of the service.
- "Third-party support voids your Oracle licence." False. Oracle's Technology Licence Agreement does not require you to maintain Oracle support as a condition of continued use. Your perpetual licences are yours. TPS operates entirely within your existing licence rights.
- "WebGate agents stop working without Oracle support." False. WebGate agents are software that runs on your infrastructure. They continue to function regardless of Oracle support status. Your existing OAM deployment continues to provide SSO and access management services without interruption under TPS.
Ready to assess OAM third-party support for your organisation?
GoVendorFree has supported Oracle Access Manager environments across financial services, healthcare, and public sector since 2016. Our assessment is free, takes 15 minutes, and delivers a precise saving calculation.
Start Your Free OAM AssessmentTransitioning to Oracle Access Manager TPS: The Process
GoVendorFree's OAM TPS transition is designed to be invisible to end users and application owners. The standard transition process:
- Environment audit (weeks 1–2): Complete documentation of your OAM topology — Admin Server, Managed Servers, WebGate estate, authentication scheme inventory, policy domain structure, OID/OVD backend configuration, and integration map across protected applications.
- Support scope agreement: Formal definition of supported components — OAM version, WebLogic version, operating system (RHEL/OEL/Solaris), database repository, and all integrated identity components (OUD, OVD, OIF).
- Support portal and SLA activation: GoVendorFree's 15-minute response SLA activates from day one. Dedicated senior engineers assigned to your account with full documentation of your environment.
- Oracle contract termination support: GoVendorFree handles the Oracle contract wind-down process, including notification procedures and licence inventory reconciliation, to ensure no contractual risk.
- Migration roadmap development (optional): For clients who want to plan their eventual OAM-to-successor migration, GoVendorFree can develop a costed migration roadmap aligned to your business timeline — not Oracle's.
Most OAM TPS transitions complete in under 30 days. The transition has zero impact on your live OAM environment — no downtime, no configuration changes, no application owner notification required.