Skip to main content
All Case Studies
Travel & Distribution / GDS 24 weeks engagement

Global Travel Technology Provider

Legacy modernization of 340+ applications, consumer-facing partner platform identity, cloud-native authorization for Kubernetes microservices — and an active credential compromise requiring immediate threat response.

340+

Apps migrated to Okta OIE

100%

Threat actor identified

0

Repeat incidents post-remediation

The Challenge

This global travel technology provider operated the backbone infrastructure connecting airlines, travel agencies, and hospitality partners worldwide. Their identity infrastructure was anchored on aging CA SiteMinder protecting 340+ applications — a platform that had reached end-of-life and could no longer support modern authentication protocols. Simultaneously, they were launching an Open Distribution Services platform — a consumer-facing marketplace where travel agencies register, onboard, and transact as partners. The platform required modern identity with fine-grained authorization across containerized microservices running in Kubernetes. To compound the challenge, a credential compromise incident emerged mid-engagement: admin credentials for their ServiceNow instance were discovered scraped from a public GitHub repository and were being actively exploited by threat actors impersonating the brand to defraud airline passengers through fake travel agency storefronts.

Our Approach

1

Executed a full-scale migration from CA SiteMinder to Okta OIE across 340+ applications — modernizing authentication from legacy cookie-based sessions to SAML 2.0 and OIDC federation. Each application was assessed, categorized by integration complexity, and migrated in prioritized waves with zero-downtime cutover.

2

Architected the identity layer for the Open Distribution Services platform using Okta OIE as the central IDP, CyberArk for privileged access management of platform infrastructure, and SailPoint for partner lifecycle management — enabling travel agencies to self-register, complete verification, and receive precisely scoped access to distribution APIs.

3

Deployed Open Policy Agent (OPA) with Styra as authentication and authorization sidecars for containerized microservices in Kubernetes. The enterprise IDP was federated as the third-party identity provider for Styra, enabling fine-grained RBAC decisions at the service mesh layer — every API call authenticated and authorized against centrally managed policies without application-level code changes.

4

Responded to the active credential compromise by designing AI-powered decoy bots seeded with legitimate consumer identity profiles from the partner user directory. These bots engaged the threat actors as interested ticket purchasers, generating transactional activity that enabled real-time access log tracing. Live tailing of authentication and transaction logs during the sting operation captured the attackers' source IPs, session patterns, and infrastructure fingerprints — evidence that was compiled and reported to law enforcement, resulting in the identification and arrest of the fraud operation.

Engagement Timeline

Assessment & Migration Planning

Weeks 1-4

SiteMinder application inventory, integration complexity scoring, Okta OIE tenant architecture, migration wave prioritization across 340+ applications.

SiteMinder-to-Okta Migration

Weeks 5-12

Phased application migration in priority waves, SAML/OIDC connector development, MFA enrollment, legacy session decommission, zero-downtime cutover validation.

Platform Identity & OPA/Styra

Weeks 13-18

Open Distribution Services identity architecture, CyberArk PAM integration, SailPoint partner lifecycle, OPA/Styra sidecar deployment in Kubernetes, enterprise IDP federation for fine-grained RBAC.

Incident Response & Threat Containment

Weeks 14-17

Credential compromise triage, GitHub exposure remediation, AI decoy bot deployment, live access log tracing, evidence compilation, law enforcement coordination.

Hardening & Operational Handoff

Weeks 19-24

Secret scanning automation, credential rotation across all environments, security monitoring enhancement, operational runbook delivery, hypercare.

Total engagement: 24 weeks

The Results

All 340+ applications successfully migrated from SiteMinder to Okta OIE with zero authentication outages during the transition — decommissioning a decade-old legacy platform.

Open Distribution Services platform launched with modern identity — travel agency partners onboard through automated workflows with API-scoped access provisioned in minutes, not weeks.

OPA/Styra sidecars enforcing fine-grained RBAC across all Kubernetes microservices — every API request authenticated and authorized at the mesh layer with centralized policy management.

Credential compromise fully contained — threat actors identified through AI-assisted sting operation, evidence compiled for law enforcement, and the fraud ring was shut down with arrests in multiple countries.

"TechSquad migrated 340 applications off SiteMinder without a single outage, built the identity layer for our partner platform, and — when we were actively being compromised — designed the operation that caught the attackers. That is not a normal consulting engagement. That is a team you trust with your business."

CISO, Global Travel Technology Provider

Technologies Deployed

Okta OIE CyberArk SailPoint OPA/Styra Kubernetes ServiceNow

Related Case Studies

Healthcare

National Health IT Enterprise

End-to-end identity automation — building a fully automated zero-trust pipeline from cloud infrastructure provisioning through federated just-in-time access with automated session cleanup.

2,400+

Orphaned accounts eliminated

80%

Provisioning time reduction

0

Standing cloud privileges

Read full case study
Hospitality

Global Hospitality Leader

Complete identity modernization across 6,000+ properties — migrating legacy SiteMinder and CA IDM, enabling contactless mobile guest experiences, and implementing network security at global scale.

6,000+

Properties unified

40%

Helpdesk ticket reduction

<1s

Global auth latency

Read full case study
Higher Education

Ivy League Research University

Complete identity overhaul across 11 academic schools, 2 teaching hospitals, and 3 government research institutions — unifying incompatible authoritative sources into a centralized directory from the ground up.

16

Institutions unified

11

Academic schools consolidated

0

Data loss during migration

Read full case study
Healthcare

Fortune 500 Healthcare

Identity consolidation — unifying 12 disparate identity stores from M&A activity into a single governed view without data migration.

12→1

Identity stores unified

Days→Min

Provisioning time

0

Downtime during migration

Read full case study
Retail

Global Luxury Retail Brand

Enterprise-wide identity modernization for a global luxury retailer — migrating 500+ apps from PingFederate to Okta OIE, automating lifecycle management for workforce and retail store users, and achieving passwordless authentication on managed devices.

500+

Apps migrated to Okta OIE

100%

Managed device passwordless

0

Manual enrollment steps

Read full case study
Financial Services

Top-Tier Global Bank

Full identity modernization for a top-tier global bank — replicating the enterprise identity stack (Okta OIE, SailPoint ISC, Delinea, device compliance, passwordless) and then migrating 380+ customer-facing applications from Okta OIE to Okta CIC for consumer identity.

380+

Apps migrated OIE → CIC

500+

Workforce apps on Okta OIE

0

Customer auth disruptions

Read full case study
Healthcare

National Health Insurance Provider

Post-divestiture CIAM transformation — silently migrating 6.5 million consumer identities from Okta OIE to Auth0 for a public-facing healthcare enrollment platform, with zero user disruption and full CI/CD automation.

6.5M

Users silently migrated

0

User-reported issues

100%

CI/CD automated

Read full case study

Facing a Similar Challenge?

Every enterprise has unique identity challenges. Let's discuss yours and build a roadmap to measurable outcomes.

No pitch. No pressure. Just a senior consultant reviewing your landscape.

Book a 30-Min Strategy Call