u/heartmocog

[ON] lead gen when you're already stretched thin - what's actually working

Running a small consulting practice on the side of my main work and lead gen is, honestly, the thing I keep putting off because it feels like a full job in itself. Tried doing the whole multi-channel thing for a bit, content plus ads plus LinkedIn outreach all at once, and it just fell apart because I didn't have the time to follow through on any of it properly. Ended up scaling back to one channel and one landing page with a simple follow-up sequence in a CRM, and that's been more consistent than doing everything half-heartedly. For context I'm using something lightweight like HubSpot's free tier or Pipedrive, nothing fancy, just enough to track leads and automate a couple of touchpoints. The thing I keep hearing from other small operators is that referrals and warm, outreach still punch way above their weight compared to cold stuff, especially when you're time-limited. Makes sense when you think about it, conversion is better so you need less volume to get the same result. That said I don't think multi-channel is dead, it just seems to work better when it's, tightly scoped rather than trying to run everything at once with no real system behind it. One thing I've been paying more attention to lately is owned channels, email list, SEO, directories, stuff where rising ad costs and privacy changes don't suddenly tank your reach overnight. Feels more sustainable for a small practice. Curious what's actually working for people here in Canada, especially if you're running something with under 10 people. Are you doing any paid ads or mostly organic and word of mouth?

reddit.com
u/heartmocog — 23 hours ago

scaling identity governance in a SaaS product - where does it actually break

been spending a lot of time lately on identity governance across SaaS environments and the pattern I keep, seeing is that things hold together fine at small scale, then quietly fall apart as the org grows. the breaking point isn't a fixed number - it depends on how many SaaS tools you're running, how mature, your governance is, and whether anyone actually owns the process - but the symptoms tend to look the same regardless. the visibility problem is usually the first thing to crack. someone leaves, their access in the core app gets revoked, but there are several other tools they connected via OAuth that nobody centrally tracked. those accounts just sit there. and if you don't have continuous discovery running, those gaps don't surface until an audit or an incident. this is especially true where users can bypass centralized auth or SSO - shadow IT and self-provisioned integrations are still a real blind spot even with modern tooling. the other thing that's genuinely hard to scale is access certification. manual review cycles can work in small, tightly controlled environments, but once you're dealing with role creep across, multiple apps, reviewers start rubber-stamping everything because the volume is too high and the context is too thin. risk-based and automated attestation workflows exist for exactly this reason, but a lot of teams don't get there until something breaks. what makes this messier in 2026 is that it's not just human identities anymore. agentic and non-human identities - service accounts, API integrations, AI-driven processes - are multiplying fast, and most governance frameworks weren't designed with machine-speed access changes in mind. the JML lifecycle stuff is already complicated when you've got contractors, part-timers, and integration accounts mixed in with regular employees. add autonomous agents to that and the orphaned access problem gets significantly harder to contain. we've been looking at how tools like Netwrix IGA handle this - specifically the automated provisioning, continuous discovery, and certification workflows - because the manual approach genuinely doesn't hold up once the environment gets complex enough. curious whether others building or scaling a SaaS product have hit a point where identity governance became a real bottleneck, and what actually moved the needle. was it tooling, process change, or just finally getting buy-in to do it properly?

reddit.com
u/heartmocog — 2 days ago

Anyone actually automated their identity governance and compliance workflows end to end

Been working on a project lately involving JML automation, access certifications, and SoD controls, and, one thing keeps coming up: the gap between what's technically automated and what's actually governed. Provisioning runs fine, reviews get triggered on schedule, but the moment an auditor asks "who approved this and why," the answer gets shaky, not always, because the logs aren't there, but because the governance design never really captured approver rationale, entitlement context, or meaningful decision evidence in the first place. Curious whether anyone here has gotten this working in a way that holds up under audit, not just operationally. The rubber-stamp problem is real, especially when review volumes are high and certifiers are just clicking through, but I've also seen orgs where risk-based scoping helped focus human attention on the entitlements that actually matter. The challenge is that what "holds up" depends heavily on your regulator and how your controls are, designed, so auto-certification or exception-based review might be fine in one context and completely unacceptable in another. Also worth noting: non-human identities are making this harder. Service accounts, pipelines, agentic workflows, the NHI surface is growing fast and most certification processes weren't built with that in mind. Have you found a way to make delegated approvals meaningful rather than just a checkbox, and does your audit trail actually capture enough context to defend a decision after the fact?

reddit.com
u/heartmocog — 3 days ago

IGA deployment across 300+ apps

Our director sold leadership on 6 months to full visibility, automated provisioning, clean audit trail. Budget approved at $800K. We're 18 months in, spent over $2M, and have 47 apps fully onboarded out of 310.

The trigger was simple math nobody did upfront. Vendor estimated 2 weeks per app. Reality is 6 to 8 weeks once you factor in app owner coordination, custom connector work, for anything that isn't a major SaaS platform, and provisioning rules that break things in prod.

We evaluated SailPoint, Saviynt, and Netwrix IGA before landing where we did, and the connector story was a real differentiator in that process. But no tool fixes the underlying problem: legacy apps with no API mean manual CSV uploads someone has to, remember to run, and apps acquired through M&A that nobody documented are still waiting on an owner to surface.

The 47 apps we did onboard work great. Automated provisioning, clean deprovisioning on termination, compliance is happy. The other 263 still have orphan accounts, manual access management, and zero visibility.

Next audit is in 4 months. They want attestation on all 310. We can produce reports for 47. Finance wants to know why we're $1.2M over budget with no end date. I don't have a good answer for either.

reddit.com
u/heartmocog — 4 days ago

Aperio + OnGuard with TLS actually working for anyone on 8.3

Been going down a rabbit hole on this and the info is all over the place. We've got a deployment coming up with AH40 hubs and LNL-X2220 controllers on OnGuard 8.3, and the TLS situation is genuinely confusing. The thing I keep running into is that the "AH40 needs TLS on, X2220 needs it off" framing gets repeated a, lot in community threads, but I'm not convinced that's a universal rule rather than someone's specific workaround for a cert mismatch. From what I can tell, the actual requirement is that both ends need to be aligned, controller, hub, and Aperio mode, and a mixed TLS/non-TLS state is usually what causes the handshake failures people are complaining about. The certificate piece is where it gets murky because it's not always clear whether people, mean a self-signed cert generated on the controller, an imported CA cert, or something else entirely. There's a sequence floating around from an 8.1 deployment where someone went manufacturer mode first, added the, door and controller, handled the cert setup, enabled TLS on both sides, then switched to customer mode. The order apparently mattered. Whether that still holds on 8.3 I genuinely don't know, and I'd be cautious about, assuming it does given how much the TLS and OpenAccess handling has shifted in recent builds. The other issue is the communication drop fragility where you end up having to restart, or re-download the controller, which is not something you want finding out about in production. Has anyone actually got this running in a stable state on 8.3 with proper TLS enforced rather than just available? Specifically curious what firmware versions you landed on for both the controller and the hub, and whether the cert setup was clean or a whole ordeal. The compatibility matrix from Lenel should theoretically answer this but the docs I've found haven't been specific enough to be useful.

reddit.com
u/heartmocog — 6 days ago

Management wants it fast, cheap, and perfect. Pick two

Been reading through a few threads here lately and this keeps coming up in different forms. Boss wants jobs turned around quicker, budgets keep getting squeezed, and somehow the expectation is that the deliverable quality stays exactly the same. The old good, fast, cheap rule of thumb exists for a reason, and surveying is one of those fields, where the "perfect" corner is often non-negotiable, especially on boundary or legal work where accuracy standards and permitting aren't optional. What really gets me is that when something goes wrong downstream, it's not the manager who pushed the timeline wearing the liability. It's the licensed surveyor who sealed the work. That's not an abstract risk, that's a real career and legal exposure. From what I've seen discussed here, the most practical way to push back isn't to argue about quality in general terms. It's to document everything and make the tradeoffs visible. Scope creep, timeline changes, skipped QC steps. If it's in writing, you've got something to point to. The "just use the old file and make it work" stuff is exactly where errors compound and where ethics complaints start. Signing off on work you didn't properly supervise is consistently one of the more prosecuted, violations across licensing boards, which most managers probably don't fully register until it's too late. The harder conversation is whether firms that consistently operate this way are actually worth staying at. Some people have luck escalating with specifics, like here's the step we skipped and here's what that exposes us to. Others quietly start looking around. Curious how others here have actually navigated this, especially when the pressure is coming from someone who isn't licensed and genuinely doesn't understand what the seal means.

reddit.com
u/heartmocog — 7 days ago

How do you handle management pushing you to cut corners on QC

Been talking to a few surveyors lately and this keeps coming up. Management wants jobs turned around faster, budgets keep shrinking, and somehow the expectation is that the quality stays exactly the same. From what I can tell the pressure usually lands on skipping QC steps or signing off on work that hasn't had proper review. And the frustrating part is that when something goes wrong later, it's the licensed surveyor of record on the hook, not the manager who pushed the timeline. That liability sits with the person who sealed the work, and that varies by jurisdiction but the principle is pretty consistent. What makes this harder to ignore now is that the tools we're working with in 2026 actually make corner-cutting more visible, not less. Cloud-based workflows, AI-assisted processing, analytics platforms tracking QC metrics, it's all leaving a cleaner paper trail than ever. So the old "we just moved fast" defence is getting thinner, and regulators are increasingly expecting digital records to back up your process. I still think the documentation angle is the most solid defence regardless, getting scope, standards, and limitations in writing early so there's something to point to when the goalposts move. You can also lean on current industry standards around digital deliverables and data integrity as a, legitimate reason certain QC steps aren't optional, they're baked into what the output is supposed to be. But curious how people actually handle it in practice when it's your direct manager or the firm owner doing the pushing. Do you push back hard, document and escalate, or does it just end up being a find a better employer situation more often than not?

reddit.com
u/heartmocog — 7 days ago
▲ 2 r/entra

Legacy system integration with Entra ID - what's actually tripping you up

Been working through a hybrid setup lately where the on-prem AD isn't going anywhere soon. Kerberos dependencies, some older line-of-business apps that just assume domain membership, GPO-driven workflows. the usual. Application Proxy helps for publishing the web-based stuff, but it won't touch your classic Kerberos, or SMB dependencies, and anything that needs a domain controller in sight is still a problem. The thing I keep running into is that Entra DS gets floated as a fix, but it really isn't a drop-in for full AD DS. It'll give you managed LDAP, Kerberos, and NTLM support, which covers some ground, but the, moment you need forest trusts, schema extensions, or full domain admin control, you're out of luck. Forest and domain trusts aren't supported in Entra DS at all, so if that's part of your environment, you're keeping AD DS regardless. Worth flagging too that hybrid Entra join is an AD DS plus Entra ID, device state, not really an Entra DS story, so that framing can muddy the conversation. End result is you keep a minimal on-prem AD footprint for the legacy dependencies while moving users and devices to Entra and Intune. That's not really a failure of cloud-first strategy, it's just the realistic middle ground most orgs are sitting in right now. The other pressure I'm seeing is legacy auth deprecation. If any of those older apps are still leaning on Basic Auth or similar, that's becoming a harder conversation alongside the domain dependency problem. Curious how others are handling the apps that genuinely can't modernise yet. Wrapping them with a secure access layer, keeping AD DS alive indefinitely, looking at OAuth or API, patterns where the app can support it, or just accepting the hybrid reality for a few more years?

reddit.com
u/heartmocog — 8 days ago
▲ 31 r/iih

does your IIH get noticeably worse around your period

been seeing a lot of posts about symptoms fluctuating and started wondering how many people here notice a clear pattern tied to their cycle. from what I've read, there's a theory that hormonal shifts before menstruation might play a role in CSF volume changes and, intracranial pressure, which could explain why so many people feel like their IIH just tanks around that time of the month. that said, the actual cause of IIH still isn't fully understood, so the hormone connection is more of a hypothesis, at this point than something clinically proven, even if it does seem to match a lot of people's lived experience. there have been some case studies recently that explore the link, which is at least getting more attention than it used to. I'm curious whether anyone tracks this and whether your neurologist or GP actually takes it seriously when you bring it up. also wondering if anyone has found anything that helps during those few days, whether that's diet changes, adjusting meds, or anything else.

reddit.com
u/heartmocog — 9 days ago

Can we actually standardize judge training or is that a pipe dream

Been thinking about this a lot after watching some rounds at a local tournament last month where, the parent judges clearly had no idea what fiat meant and were voting on "real world" implementation concerns. NSDA has that short video requirement but let's be honest, a five to ten minute clip with no quiz or follow-up isn't really training anyone on anything meaningful. The tricky part is that policy debate judges aren't a monolith. You've got experienced tech judges who care deeply about flow and evidence quality, and then, you've got first-time parent judges who are just trying to figure out what a 2AC is. A one-size-fits-all module probably undershoots for one group and overwhelms the other. Speechwire one-pagers help a bit at the tournament level but there's no enforcement mechanism and coaches can't babysit every judge in the pool. Mutual preference systems sort of paper over the problem rather than fix it. A tiered certification approach could work better than what we have now. Something like a basic module for new judges covering fiat and flow fundamentals, then an optional advanced track for people who want to judge elimination rounds. Keep it voluntary but build in tabroom integration so tournaments can actually filter by certification level if they choose. That way you're not mandating anything that creates resentment or drives judges away, but you're giving tab rooms a real signal about who knows what they're doing. The enforcement question is the hard one though. Would leagues actually require it, and would that just deepen the judge shortages that are already a real problem at the local level? That tension between raising the floor and keeping the pool large enough to run tournaments feels like the core thing nobody has a clean answer to.

reddit.com
u/heartmocog — 10 days ago
▲ 1 r/Acura

Timing belt vs serpentine belt on older Integras - what actually matters

Had a mate ask me about this recently after picking up a 3rd gen Integra, so figured I'd throw it out here since I've been down this rabbit hole before. The short version: they're completely different things doing completely different jobs, and the consequences of getting it wrong are not equal. The serpentine belt drives your accessories, alternator, A/C, power steering pump. If it snaps you lose those things, you pull over, annoying but fixable on the side of the road. The timing belt is a different story. On the Integra's interference engine, if that thing goes, the pistons and valves meet each other and you're looking at a dead engine. That's the ballgame. So when people debate which is more "reliable" it's kind of the wrong question. The serpentine is easier to inspect and replace reactively, timing belt you just have to stay on top of proactively based on mileage. Typical interval on these B-series engines is somewhere in the 90-105k mile range but check your specific manual rather than going off memory or forum posts. From what I've seen most people do the timing belt, water pump, and tensioners all at once since you're already in there. Makes sense to not skimp on the water pump while it's accessible. On the belt brand debate, OEM or Gates seems to be the general consensus for the timing side specifically, and worth noting, that Gates kits have actually come down in price lately with supply chains settling out, so there's less excuse to cut corners there. Aftermarket is probably fine for the serpentine but I'd be more conservative with the timing given what's at stake. If you're buying a used Integra and don't have service records proving the timing belt was done, that's the first thing I'd budget for regardless of mileage. Non-negotiable on an interference engine.

reddit.com
u/heartmocog — 12 days ago

AI co-pilots in fintech apps vs traditional identity governance - actually replacing anything

Been sitting with this question for a while after a few conversations with compliance leads at a couple of financial services clients. There's a lot of hype around AI co-pilots handling compliance documentation, flagging policy breaches in real time, auto-executing decisions within pre-approved rules - that kind of thing. And honestly some of it is genuinely useful. Klarna's agentic workflows reportedly saved tens of millions in operational costs, and banks like Oschadbank are running co-pilots embedded directly into compliance processes. So the capability is real. But every time someone floats the idea of replacing traditional IGA or IAM tooling with it, I get skeptical. The access control layer, the entitlement management, the audit trails that regulators actually care about - a co-pilot isn't doing that work. It's a different layer entirely. What I keep seeing in practice is that AI agents are becoming their own identity problem. Agentic systems executing multi-step payment flows or aggregating account data across dozens of protocols need access controls, audit trails, and governance just like a human user does. So if anything, the identity governance footprint is getting bigger, not smaller. The gap that concerns me is this: a significant number of financial institutions have AI embedded, in core workflows by now, but far fewer have mature governance frameworks wrapped around those agents. That's where the real risk lives in regulated environments. The EU AI Act and NIST frameworks are starting to formalize expectations here, but, FINRA and the FCA aren't going to accept "the AI decided" as an audit response. Someone has to own the access decision trail. Curious whether anyone here is actually seeing fintech teams try to consolidate these layers into, one platform, or whether the pattern is still separate tools talking to each other badly.

reddit.com
u/heartmocog — 13 days ago
▲ 0 r/IGN

So the leaks about Halo 2 and 3 remakes being in active development got, me thinking less about the games themselves and more about how they'll actually sell them. Campaign Evolved is launching in 2026 as a standalone campaign-only release on Xbox, PC, and PS5 with Game Pass day one, and if the remakes follow the same formula, you've got three separate releases for what's essentially the same trilogy MCC already covers. I get that the visual overhaul and the reported extra Brute prequel missions are a genuine selling point, though the, mission details are still pretty vague from what's leaked so far, but the value question starts to get awkward pretty fast. Game Pass day one would probably be the move that makes the most sense for accessibility, especially, since MCC is already on there and people are used to playing Halo without paying per entry. With Game Pass now sitting at 40 million plus subscribers, Microsoft has even more reason to, lean into that model and use these remakes as retention tools rather than standalone revenue plays. But there's also a version of this where the remakes aren't included at launch and Game Pass subscribers, feel like they're paying twice in a way, once for the sub and then again on top of that. Curious what people here reckon, would you rather see these hit Game Pass on launch or would you actually prefer a one-time buy so the value feels cleaner?

reddit.com
u/heartmocog — 14 days ago

Is Ambassador status actually worth the $225 or is it a skip for most people

Been going back and forth on this for a while. The guaranteed upgrade and 4pm checkout sound solid on paper, and if you can stack that with, the complimentary weekend night at a property where rooms are $300+, the math works out pretty easily. But it really only makes sense if you're staying at InterContinentals or Six Senses properties specifically and doing it fairly regularly. Those are the flagships where the benefits actually land. If most of your IHG nights are spread across Kimptons, Holiday Inns, or other mid-tier brands in the portfolio, it's worth checking whether Ambassador perks even, apply at those properties before assuming you'll get value out of them, because the program is pretty clearly built around the luxury end of the IHG lineup. For anyone doing 40+ nights a year at premium IHG properties, the ROI case is pretty straightforward. For everyone else it can start feeling like a sunk cost by year end. Curious if people here are actually getting consistent value from it or if the upgrade guarantee is hit or miss in practice.

reddit.com
u/heartmocog — 14 days ago

Been thinking about this lately while working on some identity governance stuff. Most IGA implementations I've seen are pretty laser-focused on security outcomes like SoD enforcement, access certifications, JML lifecycle, that kind of thing. Accessibility basically never comes up in those conversations. But there are real gaps. Things like reviewers who use screen readers trying to navigate certification campaigns, or MFA flows that don't offer alternatives to biometrics for people who can't use them. Keyboard navigation in access request portals is another one that tends to be pretty broken in practice. Vendors have put real effort into modernizing IGA interfaces over the years, things like cleaner request workflows and mobile, support, but accessibility specifics like screen reader compatibility and full keyboard nav still seem to fall through the cracks. What makes this more pressing now is that accessibility compliance expectations are tightening across the board, and organizations are increasingly expected to bake this into workflow design rather than retrofit it later. Yet identity tooling seems to be lagging behind that shift. I'm curious whether anyone here has actually pushed for accessibility requirements in identity or access, management tooling, either from the disabled user side or from within a compliance or governance team. And whether WCAG compliance has ever made it into your vendor selection criteria when evaluating auth or IGA platforms. Would be interested to hear if anyone has had any traction on this or if it's still mostly being ignored.

reddit.com
u/heartmocog — 15 days ago
▲ 5 r/idpa

Been thinking about this after running a few stages where shoot-throughs created some real headaches, not just for scoring but for how the whole scenario played out. With the current rulebook putting more emphasis on shoot-through restrictions, things like muzzle safe area indicators and the way fault lines are being designed now, there's a lot more to think about when you're trying to build something that actually feels like a defensive situation rather than just a geometry puzzle. The lateral placement guidance makes sense on paper but it can really box you in, especially when you're working with nested or overlapping fault lines and trying to keep movement meaningful. Some of the stages coming out of state-level matches lately have done a decent job of, using cover and vision barriers to force the decision-making without just punishing shooters for an unlucky angle. Curious how other stage designers are handling the tradeoff under the current rules. Do you lean toward spreading targets out to sidestep the issue entirely, or do you, let some shoot-through risk exist and rely on deliberate non-threat placement to actually test decision-making? And has the stricter cover enforcement during walkthroughs changed how you think about staging it from the designer side, knowing competitors can't just walk it individually anymore?

reddit.com
u/heartmocog — 21 days ago
▲ 0 r/AZURE

Our old vault setup worked fine until the org hit about 400 privileged accounts across hybrid AD and Azure. Credential rotation was manual, standing admin accounts never actually went away between rotations, and auditors kept flagging accounts that technically had access to nothing but still existed.

The trigger was a pen test finding: a service account with Domain Admin rights that nobody owned and hadn't been used in 11 months. Still active. That was the meeting where leadership stopped treating PAM as an IT problem.

We evaluated CyberArk and BeyondTrust among others, both confirmed players with solid credential rotation and, discovery capabilities, though comparing feature depth across vendors really depends on your environment and use case. CyberArk deployment timelines and staffing requirements vary a lot and I've seen wildly different estimates depending on who you ask, so I won't throw numbers out there. We landed on a solution that supported ephemeral/JIT accounts, which is a feature you'll find across several PAM tools, and it fit our AD-heavy environment well. Migration timeline and team size will depend heavily on your specific setup.

Five months later, standing Domain Admin accounts are gone and audit prep is noticeably faster. Honest downside: the approval workflow took some tuning before it stopped annoying the infra team. The old vault was simpler to explain to non-security stakeholders, and I miss that sometimes.

reddit.com
u/heartmocog — 21 days ago

CVE-2026-41329 in OpenClaw is a sandbox bypass vulnerability allowing privilege escalation via heartbeat context inheritance and senderIsOwner, parameter manipulation, CVSS 9.9 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) is reported by one source, but NVD assessment is not yet provided. It's a good stress test for how mature your PAM posture actually is. Confirmed, OpenClaw versions before 2026.3.31 (affected up to 2026.3.28) are vulnerable, fixed in 2026.3.31 and later, but the, deeper question is whether your controls would have caught lateral movement if an attacker hit this before you patched.

I'm an IAM architect working across a few hybrid Microsoft environments right now. Constraints are mid-market budgets, lean ops teams, and orgs that still have a lot of standing local admin accounts that haven't been cleaned up.

We've looked at CyberArk and Delinea, but both felt heavy for the team size and timeline. I've also been evaluating Netwrix PAM, though I haven't been able to confirm specific features, around ephemeral JIT accounts or how well it handles this kind of endpoint escalation scenario.

What I care most about is continuous discovery of privileged accounts, session termination controls, and, how fast the tool surfaces new lateral movement paths after a vuln like this drops. Worth noting I haven't been able to verify whether Netwrix PAM specifically delivers on these features compared to CyberArk or Delinea, so still working through that evaluation.

For teams already running JIT, did a critical priv esc vuln like this change how you scope discovery or approval windows?

reddit.com
u/heartmocog — 22 days ago

The CISA BlueHammer directive is getting a lot of attention for the patch itself, but the part nobody's talking about is what the exploit path actually reveals. The flaw lets an attacker escalate privileges through Defender, which means any account with persistent local, admin rights on that endpoint was already a lateral movement stepping stone before the zero-day even landed.

Running hybrid AD plus Intune across about 400 endpoints right now. We applied the patch within the mandate window, but the real discomfort is realizing how many, standing admin accounts existed on those machines that would have made BlueHammer-style escalation trivially useful post-exploitation. Tools like Netwrix PAM handle this by eliminating standing privileges entirely through ephemeral JIT accounts, which at least shrinks the window an attacker gets even if a Defender-level flaw gets exploited.

My actual question: for those managing endpoint privilege in hybrid environments, how are you handling the gap between, patch deployment and the underlying standing-privilege exposure that makes these escalation CVEs so damaging in the first place?

reddit.com
u/heartmocog — 24 days ago

Just wrapped up another M&A identity integration and honestly the deprovisioning side never gets easier. Everyone focuses on getting acquired users into the new IdP fast, which makes sense, but the cleanup afterward is where things fall apart. Orphaned accounts, stale entitlements carrying over, SoD conflicts that nobody noticed because the two orgs had totally different role structures. It piles up quick. What's making this worse lately is the pace of deals. M&A activity has picked back up significantly and a lot of the mid-market transactions we're seeing now involve companies with pretty immature IAM infrastructure. Less governance maturity means more entanglement when you actually try to integrate. We ended up pushing for a single system of truth early in the process, which helped with visibility into who had access to what across both environments. But getting buy-in from the acquired company's IT team was its own challenge. They'd built their provisioning workflows a certain way and weren't thrilled about federation changes mid-operation. That resistance is real and it doesn't matter how clean your IGA tooling is if the other side won't cooperate on the data model. The SoD piece is where I've seen things get quietly dangerous. Two orgs with completely different role structures merging access without a proper conflict detection pass is a compliance incident waiting to happen. Running access certification campaigns early, before full integration, has been the most useful forcing function we've had to surface those gaps before they get baked in. Curious what approach others have landed on for the rip-and-replace vs hybrid IdP debate, especially when, the acquired company is heavily Microsoft-native and you're trying to bring them into a different ecosystem.

reddit.com
u/heartmocog — 29 days ago