Your monitoring dashboard is glowing red again. Logs are fine, metrics are fine, but access requests keep piling up because no one’s sure who’s allowed to touch what inside New Relic. That confusion costs teams hours, especially when production data and compliance collide. Enter New Relic OAM, the layer that fixes identity-driven chaos before it spreads.
OAM stands for “Observability Access Manager.” It exists to make user permissions in New Relic predictable, audit-ready, and secure without forcing engineers to babysit credentials. It ties identity providers like Okta or AWS IAM to New Relic’s internal role mapping. The result is simple: fewer manual steps, more traceable activity, and consistent access controls across every dashboard or alert channel.
How New Relic OAM Works
Think of it as an intelligent traffic cop for observability data. When someone requests access to logs or traces, OAM checks who they are (via SSO or OIDC), what team they belong to, and what scope of authorization they’ve been granted. Policies handle the logic, not humans. It automates role assignment, rotating tokens, and group permissions based on identity claims. This turns “Should Alice have access?” from a Slack thread into an automated truth enforced by policy.
Behind the scenes, New Relic OAM integrates with your org’s identity provider using standardized protocols. All requests route through identity-aware gateways that apply rules dynamically. You define them once, and OAM ensures every session respects those boundaries. No duplicated API keys, no stale credentials, and certainly no forgotten accounts wasting in memory.
Best Practices for Using New Relic OAM
Start with clean role mapping. Tie your least-privilege strategy to OAM groups rather than manual overlays. Rotate signing secrets regularly — OAM supports it natively. Track permission drift with audit events and push them into your compliance tool. Always verify that each identity claim is both valid and current.