Identity Governance Modernization for a European Telecom Operator
Replacing a legacy IAM stack with Evolveum midPoint — 15,000 identities, 6 enterprise integrations, and a Kubernetes-native deployment. Delivered in 5 months by a 2-person team.
The Challenge
A major European telecom operator was running an aging identity management stack that no longer met the demands of a modern, multi-entity enterprise.
The operator needed to evaluate whether Evolveum midPoint could replace their legacy IAM system, handle the full identity lifecycle across all identity types, and integrate with both existing and modern systems — without disrupting ongoing operations.
What We Delivered
Over 5 months, a 2-person WKI team delivered: an authorization concept replacing Excel-based access management, lifecycle automation for 6 identity types, 6 enterprise system integrations including 2 custom-built connectors, a Kubernetes deployment with full CI/CD pipelines, and structured knowledge transfer to the operator’s internal team.
Authorization Concept — Replacing Spreadsheets with Policy
We designed and implemented an authorization concept that replaced the operator’s Excel-based access management entirely.
We built a structured role architecture within midPoint:
- Application roles linked to the organization’s real application inventory, each carrying business criticality and risk classification
- Permission roles defining granular access rights derived from business rules rather than ad-hoc assignments
- Business roles grouping permissions into meaningful bundles aligned with job functions
- Meta-roles enforcing prerequisites and exclusions to prevent toxic access combinations (separation of duties)
Access requests moved from email chains and spreadsheet lookups to a self-service role catalog. Employees could request application access directly, with automated routing through manager approval, security officer review, and role-owner sign-off.
The authorization data itself was ingested into midPoint automatically via daily synchronization — turning what had been a static document into a living, enforceable governance framework.
Identity Lifecycle Automation
We architected and implemented lifecycle management for six distinct identity types:
- Internal employees (multiple organizational entities)
- Contractors (multiple organizational entities)
- External dealers and sales boutique staff
- Machine and system accounts
Each identity type follows its own provisioning rules, organizational relationships, and deprovisioning policies. When an identity is disabled — whether an employee leaves, a contractor’s engagement ends, or a dealer relationship changes — all permission assignments are automatically removed across every connected system. No manual cleanup, no forgotten accounts.
Enterprise System Integration
We connected midPoint to six enterprise systems, building the connectors and integration logic for each:
Inbound (sources of truth):
- Enterprise HR system — daily synchronization of all employee and organizational data
- Authorization concept data feed — daily automated ingest of the role-permission-application mapping
Outbound (provisioned systems):
- Enterprise directory — account provisioning, group management, and access control. New applications could be connected to the identity infrastructure within minutes
- Development platform — automated user provisioning and project access management
- Internal asset management platform — custom connector built from scratch
- Ticketing system — automated ticket creation for access change tracking and audit trail
Kubernetes-Native Deployment with Full CI/CD
The entire midPoint environment was deployed on Kubernetes with production-grade infrastructure and a complete GitOps workflow:
- Version-controlled configuration — all midPoint configuration stored in Git, enabling change tracking, peer review, and rollback
- Automated CI/CD pipelines — build, test, and deploy automation promoting through dev, test, and production environments
- Multi-environment management — identical deployment via Helm charts, eliminating manual configuration drift
- Secrets management — credentials and certificates managed through a dedicated vault, not stored in code
The operator’s team could manage configuration changes through familiar development workflows — commit, review, merge, deploy — rather than manual admin console changes. Infrastructure-as-code from day one.
Knowledge Transfer
Throughout the engagement, we conducted structured knowledge transfer sessions ensuring the operator’s internal team could maintain and extend the deployment independently. At the conclusion, the operator’s team had full independence to operate and extend the platform on their own.
Key Outcomes
What began as a feasibility evaluation evolved into a complete working identity governance environment — with 6 system integrations, automated lifecycle management, a production Kubernetes deployment, and full operational handover.
“The collaboration on the feasibility project for implementing a new IDM system was very professional and efficient. We appreciate the expert knowledge, high quality of delivery, and proactive approach throughout the entire project.”
— Project Manager, European Telecom Operator
Facing a Similar Challenge?
Whether you’re replacing a legacy IAM stack, implementing midPoint for the first time, or modernizing identity governance for a complex environment — we’ve done it before. Let’s discuss your situation.

