Running Oracle? Find out exactly what you're overpaying. Free cost analysis, no commitment.

500+ enterprise clients · Est. 2016 · 15-min response · No commitment

Get Free Oracle Analysis →

What Oracle Access Manager Third-Party Support Actually Means

Oracle Access Manager (OAM) is Oracle's flagship web access management platform, providing single sign-on (SSO), federated identity, adaptive authentication, and policy-based access control for enterprise web applications. OAM integrates at the WebGate level — Apache, IIS, WebLogic, WebSphere, and IBM HTTP Server WebGate agents sit in front of every protected application, forwarding authentication challenges to the OAM server infrastructure. Replacing OAM is therefore not a product swap — it is a re-integration project that touches every application in your protected estate.

Third-party support for Oracle Access Manager provides continued maintenance, security advisory, and incident support for OAM 11g R2 and 12c environments without Oracle. Your WebGate agents, OAM Admin Servers, Policy Managers, and all authentication and authorisation policies remain in production under a TPS provider's SLA. The versions you have deployed continue to run — you are not forced onto Oracle's SaaS IAM roadmap at Oracle's pace.

Oracle's commercial pressure here is predictable: OAM's support lifecycle is tightening, Oracle Identity Cloud Service (IDCS) and OCI IAM have been positioned as the long-term replacements, and Oracle consistently presents "migration" as a simpler exercise than it is. For an enterprise with 200–500 OAM-protected applications across multiple WebGate deployments, the migration reality is a multi-year programme costing £400K–£3.5M before your first application goes live on the replacement platform.

Oracle Access Manager Version Support Matrix

OAM Version Release Oracle Support Status Extended Support TPS Available
OAM 11g R1 (11.1.1.x)2010–2012Sustaining SupportExpiredYes
OAM 11g R2 PS1–PS2 (11.1.2.1/2)2012–2013Sustaining SupportExpiredYes
OAM 11g R2 PS3 (11.1.2.3)2014Sustaining SupportExpired May 2020Yes
OAM 12c (12.2.1.3)2017Sustaining SupportExpired Dec 2022Yes
OAM 12c R2 PS4 (12.2.1.4)2019Extended SupportUntil Dec 2025Yes

The most critical data point: OAM 12.2.1.4 — the current and final on-premise OAM version — exits Extended Support in December 2025 and moves to Sustaining Support. Oracle has signalled that there will be no OAM 13c; the product line terminates with 12.2.1.4. For organisations not yet ready to complete a full IAM platform migration, Oracle TPS provides the only structured support path forward that does not involve emergency migration.

Why OAM Customers Choose Third-Party Support

Three forces drive OAM customers to third-party support: product end-of-life with no on-premise successor, migration cost reality, and the operational risk of forced IAM platform change.

Force 1 — Product Line Termination

Oracle Access Manager 12.2.1.4 is the last on-premise OAM release. Oracle's public roadmap commits to IDCS and OCI IAM for identity services. This is a legitimate product-lifecycle termination, not a temporary version gap. Organisations on OAM 12c face a binary choice: migrate to a cloud or modern on-premise IAM platform, or accept Sustaining Support (bug fix-only, no new patches). Third-party support is the bridge that buys you the time to migrate on an engineered schedule rather than under Oracle's commercial pressure.

Force 2 — IAM Migration Cost Reality

Oracle's sales materials routinely understate OAM migration complexity. The reality for large enterprise OAM environments:

For a large financial services firm with 400 OAM-protected applications, IDCS migration programme costs range from £1.8M–£3.5M over 24–36 months, including integration work, security testing, UAT, and parallel-run infrastructure. Azure AD/Entra ID migrations are comparably expensive — and introduce a Microsoft dependency that many regulated organisations are reluctant to take on for their primary IAM layer.

Force 3 — Operational Risk of Forced Timelines

IAM is not a system where you can afford failed migrations. A botched OAM-to-IDCS cutover that prevents 5,000 employees from accessing core systems at 7am on a Monday morning is a Tier 1 incident with board-level visibility. Regulated organisations — banks under PRA/FCA operational resilience requirements, NHS trusts under DSPT, government agencies under NCSC security standards — require formal migration testing, rollback plans, and regulatory change notification before any IAM platform change. None of this can be rushed. TPS gives you the time to do it properly.

What would Oracle Access Manager TPS save your organisation?

GoVendorFree provides free Oracle IAM support cost assessments. We model your exact OAM environment, WebGate deployment count, and Oracle support contract value to calculate your precise TPS saving.

Get Your Free OAM Cost Assessment

What Oracle Access Manager TPS Covers

GoVendorFree's Oracle Access Manager third-party support covers the complete on-premise OAM environment and its integration dependencies:

Industry Cohort Analysis: Who Benefits Most from OAM TPS

Financial Services — PRA/FCA Operational Resilience Constraint

Banks and insurers regulated under PRA SS2/21 (operational resilience) and FCA PS21/3 must demonstrate impact tolerance testing for Important Business Services (IBS). The IAM platform — which gates access to core banking, payments, treasury, and risk systems — is invariably a component in multiple IBS dependency chains. A forced OAM-to-IDCS migration that falls within an IBS impact tolerance window requires formal notification to the PRA and documented evidence that the migration has been fully tested against operational resilience scenarios. For most tier-1 and tier-2 banks, this makes emergency or accelerated IAM migrations impractical. TPS buys the 24–36 months needed to execute a properly governed migration programme. Combined Oracle TPS across OAM, Oracle Database, and Oracle Fusion Middleware typically delivers £280K–£950K annual saving for UK financial services institutions.

Healthcare and NHS — DSPT and NHS Digital Security Standards

NHS trusts and health bodies are required to maintain Data Security and Protection Toolkit (DSPT) compliance and adhere to NHS Digital's security standards. Any change to the IAM platform must be assessed against the NHS's clinical risk management methodology (DCB0160) when the IAM system gates access to clinical systems. OAM environments protecting clinical workstation SSO, PACS imaging system access, clinical decision support tools, and EPR (Electronic Patient Record) portals fall into this category. IAM migrations in NHS environments frequently require clinical safety officer involvement and formal change approval processes that preclude compressed migration timelines. TPS provides a compliant bridge.

Public Sector — NCSC CAF and OFFICIAL-SENSITIVE Security Requirements

Central government departments and local authorities operating under the NCSC Cyber Assessment Framework (CAF) or handling OFFICIAL-SENSITIVE data are subject to rigorous change management requirements for security-critical infrastructure. The IAM platform — as the primary access control layer for government systems — requires formal security impact assessment, accreditor sign-off, and often GovAssure review for platform migrations. These processes take 12–18 months minimum. Government organisations on OAM 12c that cannot complete their migration programme before OAM's Sustaining Support transition have no realistic alternative to TPS.

OAM Third-Party Support Cost Model

The following cost profiles are based on GoVendorFree engagements with UK and European organisations across the financial services, healthcare, and public sector verticals. All figures represent annual support cost comparisons.

Mid-Market (100–200 apps)
£68K–£145K
Annual saving vs Oracle support. OAM 12c + OUD/OID integrated environment. 64–65% reduction.
Large Enterprise (200–400 apps)
£145K–£320K
Annual saving. OAM + OVD + OIF + WebLogic FMW stack. Extended WG estate. 64–65% reduction.
Financial Services (FS stack)
£280K–£620K
Annual saving on combined OAM + Oracle DB + Fusion Middleware. Core banking SSO environment. 64–65% reduction.
Government / NHS (400+ apps)
£180K–£480K
Annual saving. Complex multi-domain OAM deployment. DSPT/CAF-compliant environment. 64–65% reduction.

The critical comparison point: Oracle Extended Support for OAM 12.2.1.4 (available until December 2025) carries a 10% surcharge on top of standard 22% annual maintenance. Organisations currently paying Extended Support fees are paying approximately 24% of licence value annually for a product Oracle has announced it will not develop further. TPS eliminates this entirely.

Oracle's Migration Pressure Tactics for OAM Customers

Having worked with OAM customers through multiple Oracle renewal cycles, the pressure tactics are consistent and worth documenting. Oracle sales teams routinely deploy the following arguments — and here is the accurate counter-position to each:

Ready to assess OAM third-party support for your organisation?

GoVendorFree has supported Oracle Access Manager environments across financial services, healthcare, and public sector since 2016. Our assessment is free, takes 15 minutes, and delivers a precise saving calculation.

Start Your Free OAM Assessment

Transitioning to Oracle Access Manager TPS: The Process

GoVendorFree's OAM TPS transition is designed to be invisible to end users and application owners. The standard transition process:

  1. Environment audit (weeks 1–2): Complete documentation of your OAM topology — Admin Server, Managed Servers, WebGate estate, authentication scheme inventory, policy domain structure, OID/OVD backend configuration, and integration map across protected applications.
  2. Support scope agreement: Formal definition of supported components — OAM version, WebLogic version, operating system (RHEL/OEL/Solaris), database repository, and all integrated identity components (OUD, OVD, OIF).
  3. Support portal and SLA activation: GoVendorFree's 15-minute response SLA activates from day one. Dedicated senior engineers assigned to your account with full documentation of your environment.
  4. Oracle contract termination support: GoVendorFree handles the Oracle contract wind-down process, including notification procedures and licence inventory reconciliation, to ensure no contractual risk.
  5. Migration roadmap development (optional): For clients who want to plan their eventual OAM-to-successor migration, GoVendorFree can develop a costed migration roadmap aligned to your business timeline — not Oracle's.

Most OAM TPS transitions complete in under 30 days. The transition has zero impact on your live OAM environment — no downtime, no configuration changes, no application owner notification required.