Skip to main content
All Case Studies
Healthcare / Health IT 18 weeks engagement

National Health IT Enterprise

End-to-end identity automation — building a fully automated zero-trust pipeline from cloud infrastructure provisioning through federated just-in-time access with automated session cleanup.

2,400+

Orphaned accounts eliminated

80%

Provisioning time reduction

0

Standing cloud privileges

The Challenge

After a series of acquisitions, this national health IT enterprise inherited a sprawling identity landscape with no unified governance. Over 2,400 orphaned accounts persisted across Active Directory and downstream applications — each one an unmonitored attack surface. Manual provisioning consumed 5-7 business days per request. But the deeper challenge was architectural: the organization was migrating hundreds of applications to AWS and needed a fully automated pipeline that could onboard both on-premises and SaaS applications, provision role-based access, and federate identities into AWS — all without standing privileges. With SOX and HIPAA audits approaching, they needed zero-trust access from day one.

Our Approach

1

Designed a fully automated end-to-end pipeline triggered by Terraform submissions during AWS application onboarding. Each infrastructure request automatically initiated the identity provisioning chain — no manual handoffs, no tickets, no delays.

2

Integrated SailPoint IIQ as the central IGA engine. On application onboarding, SailPoint automatically created the organizational unit structure in Active Directory — OU=<CMDB-AppID> with nested OUs for Dev, Admin, and End-User roles, and corresponding CN groups beneath each — tied directly to the ServiceNow CMDB application record.

3

Extended Ping Directory Services from on-premises into the private cloud, deploying proxy servers co-located with cloud workloads for low-latency authentication. PingFederate served as the enterprise IDP, embedding each user's RBAC attributes and group memberships into SAML assertions and OAuth tokens at authentication time.

4

Configured AWS SSO to consume the incoming SAML/OAuth responses from PingFederate, validate the claims, and dynamically map them to the corresponding AWS IAM Role ARNs. Access was provisioned as just-in-time federated identities via Amazon Cognito — users received precisely scoped AWS sessions with zero standing privileges. On logout, a Lambda function automatically cleaned up the JIT Cognito user, ensuring no residual access persisted beyond the session.

Engagement Timeline

Discovery & Landscape Assessment

Weeks 1-3

Identity landscape mapping across 47 connected applications, orphaned account identification, CMDB-to-AD gap analysis, and zero-trust architecture requirements gathering.

Pipeline Architecture & Design

Weeks 4-6

Terraform-to-SailPoint integration design, AD OU/group schema modeling per CMDB AppID, Ping Directory cloud extension topology, PingFederate claim mapping strategy.

IGA & Directory Build

Weeks 7-10

SailPoint IIQ lifecycle automation, automated AD OU/group provisioning, Ping Directory proxy deployment in private cloud, PingFederate SAML/OAuth configuration.

AWS Federation & JIT Access

Weeks 11-15

AWS SSO integration, IAM Role ARN mapping to federated claims, Cognito JIT user provisioning, Lambda session cleanup automation, end-to-end pipeline testing.

Go-Live & Compliance Validation

Weeks 16-18

Production cutover, SOX/HIPAA evidence automation, zero-trust posture validation, operational runbook handoff, 30-day hypercare.

Total engagement: 18 weeks

The Results

All 2,400+ orphaned accounts identified and remediated within the first 6 weeks — eliminating the largest single source of audit findings.

Application onboarding reduced from 5-7 business days to fully automated, zero-touch provisioning triggered by a single Terraform submission.

Zero standing cloud privileges achieved — every AWS session was JIT-provisioned via Cognito federation and automatically cleaned up on logout via Lambda.

Achieved full SOX and HIPAA audit readiness with automated evidence collection, replacing manual spreadsheet-based compliance processes entirely.

"TechSquad built something we didn't think was possible — a single Terraform submission triggers the entire identity lifecycle, from AD group creation through federated AWS access, with automatic cleanup on logout. Zero standing privileges, zero manual steps, fully auditable. This is what zero trust actually looks like in practice."

VP of Information Security, National Health IT Enterprise

Technologies Deployed

Terraform SailPoint IIQ Ping Directory PingFederate AWS SSO Amazon Cognito AWS Lambda ServiceNow CMDB

Related Case Studies

Travel & Distribution

Global Travel Technology Provider

Legacy modernization of 340+ applications, consumer-facing partner platform identity, cloud-native authorization for Kubernetes microservices — and an active credential compromise requiring immediate threat response.

340+

Apps migrated to Okta OIE

100%

Threat actor identified

0

Repeat incidents post-remediation

Read full case study
Hospitality

Global Hospitality Leader

Complete identity modernization across 6,000+ properties — migrating legacy SiteMinder and CA IDM, enabling contactless mobile guest experiences, and implementing network security at global scale.

6,000+

Properties unified

40%

Helpdesk ticket reduction

<1s

Global auth latency

Read full case study
Higher Education

Ivy League Research University

Complete identity overhaul across 11 academic schools, 2 teaching hospitals, and 3 government research institutions — unifying incompatible authoritative sources into a centralized directory from the ground up.

16

Institutions unified

11

Academic schools consolidated

0

Data loss during migration

Read full case study
Healthcare

Fortune 500 Healthcare

Identity consolidation — unifying 12 disparate identity stores from M&A activity into a single governed view without data migration.

12→1

Identity stores unified

Days→Min

Provisioning time

0

Downtime during migration

Read full case study
Retail

Global Luxury Retail Brand

Enterprise-wide identity modernization for a global luxury retailer — migrating 500+ apps from PingFederate to Okta OIE, automating lifecycle management for workforce and retail store users, and achieving passwordless authentication on managed devices.

500+

Apps migrated to Okta OIE

100%

Managed device passwordless

0

Manual enrollment steps

Read full case study
Financial Services

Top-Tier Global Bank

Full identity modernization for a top-tier global bank — replicating the enterprise identity stack (Okta OIE, SailPoint ISC, Delinea, device compliance, passwordless) and then migrating 380+ customer-facing applications from Okta OIE to Okta CIC for consumer identity.

380+

Apps migrated OIE → CIC

500+

Workforce apps on Okta OIE

0

Customer auth disruptions

Read full case study
Healthcare

National Health Insurance Provider

Post-divestiture CIAM transformation — silently migrating 6.5 million consumer identities from Okta OIE to Auth0 for a public-facing healthcare enrollment platform, with zero user disruption and full CI/CD automation.

6.5M

Users silently migrated

0

User-reported issues

100%

CI/CD automated

Read full case study

Facing a Similar Challenge?

Every enterprise has unique identity challenges. Let's discuss yours and build a roadmap to measurable outcomes.

No pitch. No pressure. Just a senior consultant reviewing your landscape.

Book a 30-Min Strategy Call