What Oracle Access Manager Does and Why Licensing Is Complex
Oracle Access Manager is Oracle's on-premises identity and access management (IAM) platform. It provides web single sign-on (SSO), multi-factor authentication, coarse-grained authorisation, and session management for enterprise applications. OAM is typically deployed as the access management layer in front of Oracle WebLogic Server, Oracle E-Business Suite, Oracle Fusion Applications, and other enterprise systems — both Oracle and non-Oracle.
The licensing complexity arises from three characteristics of how OAM is used in practice. First, OAM is deployed to protect multiple application environments simultaneously, and each environment may have its own user population and access pattern. Second, OAM deployments frequently serve external users — customers, partners, contractors — whose count may be orders of magnitude larger than the internal employee count. Third, OAM interacts with other Oracle middleware components (Oracle HTTP Server, Oracle WebLogic Server, Oracle Internet Directory) in ways that create licence dependencies across multiple product families.
Understanding how Oracle counts licensable users and how the metric choice affects total cost is the starting point for any OAM licence review.
The Two Core Licensing Metrics
Processor Licensing
Processor licensing is the dominant metric for Oracle Access Manager in enterprise deployments, particularly where OAM protects applications accessed by large numbers of external users or where the exact user count is difficult to determine. Under processor licensing, the organisation licences based on the number of physical CPU cores on the servers running OAM, applying Oracle's core factor (0.5 for most Intel processors).
Processor licensing is metric-blind to user count — whether OAM serves 1,000 or 10 million users, the licence count does not change as long as the server infrastructure remains the same. This makes processor licensing predictable for organisations with large or growing external user populations. The downside is that processor licences are expensive on an absolute basis: Oracle Access Manager processor list pricing runs in the tens of thousands of dollars per processor, with annual support of 22% per year, increasing at 8% annually.
One critical complexity with processor licensing for OAM is that the licence requirement applies to every server in the OAM deployment stack — not just the OAM administration server or policy manager, but every managed server and HTTP server through which OAM-protected resources are accessed. Organisations that deploy OAM in high-availability configurations with multiple nodes frequently find that the total processor count is significantly higher than the number of nodes that run OAM software directly.
Named User Plus (NUP) Licensing
Named User Plus licensing is viable for OAM deployments serving a defined, controllable internal user population — employees, contractors, and partners whose identities are individually known and manageable. Under NUP licensing, the organisation licences each individual who accesses OAM-protected resources, regardless of frequency of access.
Oracle's minimum NUP count for Oracle Middleware products is 25 named users per processor (using the same processor definition as above). This minimum applies even if the actual user count is lower. For an OAM deployment on a server with eight Intel cores (four licensed processors after the 0.5 core factor), the minimum NUP count is 100, regardless of actual usage.
For most enterprise OAM deployments, NUP licensing becomes uneconomical as soon as external users — customers, portal users, citizens for government organisations — are included in the licence count. A retail organisation with two million registered online customers using an OAM-protected portal cannot manage a named user list of two million individuals in any practical sense. External-facing deployments almost always require processor licensing.
The External User Problem
Oracle's Named User Plus definition includes every individual authorised to access OAM-protected resources — including external users such as customers, partners, and portal visitors who authenticate through OAM. An organisation that initially deploys OAM under NUP licensing for internal employees and then extends OAM to protect a customer portal has potentially created a licence position where millions of external users need to be licenced on a per-user basis.
This scenario is one of the most common sources of OAM licence exposure identified in Oracle audits. The sequence is: deploy OAM for internal employees under NUP licensing, extend OAM to protect a customer-facing web application, fail to reassess the metric, and continue paying NUP licence fees that now represent a significant under-licence position relative to the actual user population being served.
Any OAM deployment that protects resources accessible by external users — regardless of how few external users are accessing it initially — should be assessed for metric appropriateness before the deployment goes live, not after the user base has grown to a point where the retroactive under-licence exposure is material.
Non-Human Accounts and Service Identities
A related complexity in OAM licensing is the treatment of non-human accounts — service accounts, application accounts, batch processing accounts, and system-to-system identities that authenticate through OAM without a human user behind them. Oracle's NUP definition includes all authorised users, which Oracle has in audit contexts interpreted to include non-human accounts that access OAM-protected resources.
Many enterprise OAM deployments have hundreds of service accounts configured in the user directory that OAM protects. Each of these accounts is potentially a named user under Oracle's definition. An organisation with 5,000 employees but 800 service accounts operating under NUP licensing may find that the NUP count is 5,800, not 5,000, once Oracle's audit team reviews the authentication logs.
Processor licensing eliminates the non-human account problem entirely — processor licences count server cores, not users. For organisations with large numbers of service accounts or complex application-to-application authentication patterns through OAM, processor licensing is the cleaner and typically more defensible metric choice.
OAM in Multi-Tier Deployments: Licence Dependencies
Oracle Access Manager is rarely deployed in isolation. Standard OAM architectures include Oracle HTTP Server as the web server layer, Oracle WebLogic Server as the application server layer, and Oracle Internet Directory (OID) or Oracle Unified Directory (OUD) as the LDAP directory service. Each of these components carries its own licence requirement, and the licence counts must be consistent across the stack.
Oracle HTTP Server
Oracle HTTP Server (OHS) is the web server that hosts the OAM WebGate — the policy enforcement point that intercepts requests before they reach protected applications. OHS is a separately licenced Oracle product when used in combination with OAM. Its licence metric must match the OAM metric choice (processor or NUP), and its processor count must cover all physical cores on every server running OHS as part of the OAM deployment.
Oracle Internet Directory and Oracle Unified Directory
OAM requires a directory service for user authentication. If that directory service is Oracle Internet Directory (OID) or Oracle Unified Directory (OUD), those products require separate licence entitlement. Oracle OID and OUD are licensed using the same Processor and NUP metrics as OAM, and the metric and count must be consistent with the OAM licence position. Organisations that deploy Oracle Directory Services as part of an OAM implementation and licence only OAM are in an immediate compliance gap for the directory service layer.
Oracle WebLogic Server
OAM is deployed on Oracle WebLogic Server. WebLogic is a separately licensed product unless the organisation has a WebLogic licence entitlement that covers the OAM deployment nodes. Organisations that deploy OAM on WebLogic without an explicit WebLogic licence — assuming OAM includes WebLogic entitlement — are typically creating an unlicensed WebLogic deployment that Oracle will identify during an audit of the OAM environment.
Unsure whether your OAM deployment is correctly licensed?
We conduct independent Oracle Identity and Access Management licence reviews for enterprise clients. Buyer-side only.OAM and Oracle Fusion Middleware Licensing
Oracle Access Manager is part of Oracle's Fusion Middleware product family. Customers with Oracle Fusion Middleware licences — including Oracle WebLogic Suite, Oracle SOA Suite, or Oracle Identity Governance — may have OAM entitlement included within their existing Fusion Middleware licence agreements, depending on the specific products and versions covered.
This is a source of potential cost savings that is frequently missed. Organisations that purchase OAM standalone may have existing Fusion Middleware licence entitlement that already covers OAM deployments. A review of existing Oracle licence agreements against the deployed OAM configuration can identify whether standalone OAM licences are necessary or whether existing Fusion Middleware entitlement covers the deployment.
Conversely, organisations that assume their Fusion Middleware licences cover OAM without verification may find that their specific Fusion Middleware licence version or metric does not include OAM entitlement for the scale or deployment type they are running. Assumptions about licence entitlement coverage must always be validated against the specific contract terms, not against Oracle's standard product bundling documentation.
Support Fee Structure and Annual Increases
Oracle Access Manager annual support is charged at 22% of the original net licence value per year. Support fees increase at up to 8% per year under Oracle's standard terms. For organisations with significant OAM licence investment, the 8% annual compounding on support is a substantial cost driver over a multi-year deployment lifecycle.
The cost control principles that apply to Oracle Database and Application support equally apply to OAM. Negotiating a support fee cap at renewal, consolidating OAM support negotiations with other Oracle Middleware renewals, and using credible third-party support alternatives as negotiation leverage are all viable tactics for managing OAM support cost escalation.
Oracle's Identity and Access Management product family has also been subject to Oracle's ongoing migration pressure toward Oracle Cloud — specifically Oracle Identity Cloud Service (IDCS) and Oracle Identity and Access Management on OCI. Customers considering or being pushed toward cloud migration should assess the total cost of ownership comparison carefully. OAM on-premises, while complex to manage, represents a known cost base. Oracle cloud IAM services introduce consumption-based pricing and integration dependencies that must be modelled against the existing OAM deployment cost before any migration decision is made.
Common OAM Compliance Risks
NUP metric with external users: As described above, deploying OAM under NUP metric and then extending to external-facing applications creates an under-licence position that grows with the external user base. Reassess metric when external access is added.
Unlicensed Oracle HTTP Server or WebLogic: OAM deployments typically sit on OHS and WebLogic. Neither is included in the OAM licence. Verify that OHS and WebLogic licences exist and cover the full deployment scope.
Unlicensed Oracle Internet Directory: OAM requires a directory service. If OID or OUD is the directory, separate licence entitlement is required. Validate the directory licence position as part of any OAM audit.
Inconsistent metric across the stack: OAM, OHS, and OID must use the same licence metric. Mixing processor and NUP metrics across different components of the same deployment is a compliance error that Oracle will identify during an audit.
Assuming Fusion Middleware covers OAM without verification: Existing Fusion Middleware licences may or may not cover OAM depending on the specific licence terms. Validate actual entitlement before deploying OAM under assumed coverage.
Oracle Identity Management Resources
Full Oracle identity and access management licensing guides, compliance checklists, and cost optimisation frameworks.