Replace Legacy SSO with a Modern IdP

Migrating from on-prem ADFS or homegrown SSO to a cloud-native IdP without breaking 50+ existing app integrations.

Financial ServicesInsuranceHealthcareGovernmentOktaAzure ADAuth0

The scenario

Your organisation has 5–15 years of accumulated authentication infrastructure: an on-prem ADFS deployment, perhaps a homegrown SSO portal, plus the inevitable handful of apps with their own user databases that nobody wants to touch.

You've decided to consolidate on a cloud-native IdP. The question is how, not whether.

The phased approach

Phase 0: Inventory & risk-rank

Phase 1: Greenfield foundation

Phase 2: Tier-1 migration

Phase 3: Conditional access

Phase 4: Long-tail

Phase 5: Decommission

Common pitfalls

Underestimating the long tail. The 80/20 rule is real: 20% of apps will consume 80% of project time. Budget accordingly.

Skipping the pilot. Going straight to a big-bang migration of multiple apps because "it'll be faster" is the most expensive shortcut in IAM.

Ignoring service accounts. Human users are the obvious migration target. Service accounts and machine identities are equally important and often forgotten until something breaks.

Insufficient communications. End users tolerate change if they understand it. Surprise auth changes generate support tickets that overwhelm helpdesk and erode goodwill.

How long will it take?

For a 1,000–5,000 employee organisation with 50–150 apps and reasonably modern infrastructure: 6–9 months end-to-end.

Add 3–6 months if you're integrating with on-prem AD, have a heavy-regulation environment, or need to handle privileged access in the same project.

When this use case doesn't apply

If your existing IdP is working, fully integrated, and meeting your audit needs — don't migrate. The risk of a mid-flight migration outweighs the marginal gains in most cases. The time to migrate is when an audit finding, a vendor end-of-life, or a strategic platform shift forces the conversation.

← All use cases