Apporetum Logo

Case Study

Australian state government agency

State GovernmentAccess ReviewIdentity ManagementData Insights

Large-scale workforce access reviews across Microsoft Entra ID and Active Directory in a single pane of glass, with identity observability finding critical data issues first.

An Australian state government agency uses Apporetum to run unified workforce access reviews across Microsoft Entra ID and on-premises Active Directory. Identity Observability runs up front to surface critical data governance issues before reviewers ever see them.

Access ReviewsMulti-Directory Access ReviewsIdentity ObservabilityData Governance

Headline metric

Entra ID + AD

workforce access reviews unified across cloud and on-premises directories

Scale and shape

  • WorkforceWhole-of-agency workforce reviews
  • Entra ID + ADUnified across Microsoft Entra ID and on-premises Active Directory
  • StateAustralian state government agency
  • SovereignDeployed inside the agency's own Australian Azure tenant
Problem

The challenge

What was driving the engagement

  • Workforce identity was split across Microsoft Entra ID and on-premises Active Directory, with access certifications running independently in each estate.

  • Reviewers (line managers and application owners) were asked to review the same person in two places, with no consolidated view of what they actually held.

  • Auditors were getting partial evidence, because no single review covered the full cloud and on-premises surface.

  • Underlying identity data quality was unknown, so even a perfectly executed review risked certifying bad data.

Solution

What Apporetum did

Australian-built, cloud-native on Microsoft Entra, deployed inside the customer's own Australian Azure tenant

  • Apporetum was deployed inside the agency's own Australian Azure tenant. Australian-built, cloud-native on Microsoft Entra, and live in weeks.

  • Workforce identities were correlated across Microsoft Entra ID and Active Directory into a unified, deterministic record per person.

  • Identity Observability was run first to surface critical data governance issues like orphan accounts, mis-correlated records and unmanaged service accounts. The agency fixed the data before certifying it.

  • Large-scale workforce access reviews were then delivered against the unified record. One review per person, across both directories, in a single pane of glass.

Outcomes

The result

What the customer can now show, prove and defend

Single pane of glass

workforce access reviews across Microsoft Entra ID and Active Directory

Critical findings

in identity data governance surfaced and remediated before reviews ran

One review per person

consolidated cloud and on-premises evidence, not two parallel exercises

Sovereign

deployed inside the agency's own Australian Azure tenant

Why Apporetum

Australian-built, sovereign, fast to value

Apporetum is built specifically for Australian organisations who need Identity Governance and Administration (IGA) on Microsoft Entra without shipping identity data offshore, without per-user licensing, and without waiting quarters for value.

  • Deployed in the customer's own Australian Azure tenant

    Identity data stays inside the customer's sovereign boundary.

  • Value from deployment, in weeks not quarters

    Insight mode from day one, deterministic governance shortly after.

  • Fixed monthly cost, no per-user licensing

    Cost stays predictable as the identity estate grows.

  • Cloud-native on Microsoft Entra, not parallel to it

    Apporetum extends Entra ID and Entra External ID rather than replacing them.

Recognise the shape of this problem?

Book a quick demo and we will walk you through how Apporetum has solved similar problems for organisations in your industry, inside their own Australian Azure tenant.

Book a quick demo

We use cookies

We use cookies to ensure you get the best experience on our website. By clicking Accept, you agree to our use of cookies.
Learn more.