| Status | |
| Owner | HEALY-ext, Michael |
| Stakeholders |
Problem Statement
The organization currently utilizes SailPoint & IAS for identity management; however, it has been determined that SailPoint does not align with our long-term strategic vision for managing external (B2B) identities. The business urgently requires a centralized, purpose-built platform to manage a rapidly growing footprint of over 30,000 external identities. Currently, Syensqo lack a scalable solution capable of efficiently handling the lifecycle, governance, and seamless authentication of this volume of external partners, vendors, and clients.
Why a Decision is Required
A formal architectural decision is required to select and adopt a new B2B identity management platform. To future-proof Syensqo's infrastructure, the chosen solution must natively align with our current Microsoft-focused technology stack (specifically Azure). Furthermore, it must possess the out-of-the-box capability to scale seamlessly across our core enterprise SaaS ecosystem, including deep integration with SAP and Salesforce.
Business and Technical Problems Addressed
This decision will directly address the following critical gaps:
Scale and Performance: Replaces an unscalable external identity process with a cloud-native solution designed to handle 30,000+ concurrent B2B identities without performance degradation or administrative bottlenecks.
Lack of Centralization: Resolves the issue of fragmented identity stores by providing a single, unified control plane to govern all external identities and access rights.
Internal vs. External Segregation: Establishes a clear, secure architectural boundary between internal (employee) identities and external (B2B) identities, fundamentally reducing risk and simplifying compliance.
Frictionless Integration: Ensures out-of-the-box, standards-based integration (e.g., SAML/OIDC) with Azure, SAP, and Salesforce, eliminating customized point-to-point connections.
Recommendation: Implementation to Microsoft Entra (specifically utilizing Entra External ID and Entra ID Governance).
Strategic Rationale For an organization committed to a Microsoft-first technology strategy, maintaining a disparate third-party identity platform like SailPoint for B2B users creates unnecessary architectural complexity, licensing overlap, and integration overhead. Adopting Microsoft Entra as Syensqo's unified identity control plane is the most logical and future-proof path to manage the scale of 30,000+ external identities.
This recommendation is driven by three core architectural pillars:
1. Ecosystem Consolidation & Native Microsoft Alignment - By leveraging Microsoft Entra, the business centralizes its identity and access management directly within the Azure fabric Syensqo already own's and operates. This inherently reduces technical debt and eliminates the need to build and maintain custom connectors. Crucially, it allows the organization to govern external partner access using the exact same enterprise security framework (e.g., Conditional Access, continuous threat monitoring, Zero Trust policies) that currently protects Syensqo's internal Microsoft 365 and Azure environments.
2. Scalable B2B Segregation - Managing an ecosystem of over 30,000 external partners, vendors, and clients requires a purpose-built architecture. Entra External ID establishes a secure, logical boundary between internal employees and external entities, ensuring Syensqo's core employee directory remains unpolluted. Furthermore, it shifts the massive operational burden away from internal IT through a "Bring Your Own Identity" (BYOI) model—allowing external users to securely authenticate using their own organization's credentials—while Entra ID Governance natively automates the onboarding, access review, and offboarding lifecycle.
3. Frictionless Enterprise SaaS Integration (SAP & Salesforce) - While embedded in the Microsoft ecosystem, Entra acts as a highly capable, vendor-agnostic identity broker. It features deep, out-of-the-box integrations built specifically for top-tier enterprise platforms like SAP (via SAP Cloud Identity Services) and Salesforce. Entra utilizes open standards (SAML, OIDC, SCIM) to ensure that when an external identity is approved or terminated in Azure, their access is automatically provisioned or revoked downstream in SAP and Salesforce, guaranteeing a single source of truth across the business.
Syensqo operates within a complex, multi-tenanted enterprise environment with a substantial Microsoft-first cloud strategy anchored in Azure. The organization currently manages over 30,000 external identities—including partners, vendors, contractors, clients, and ecosystem participants—across multiple geographies and business units.
Historically, Syensqo relied on SailPoint Identity Governance as its primary identity and access management (IAM) platform, supplemented by Microsoft Entra ID (formerly Azure AD) for employee identity governance. However, SailPoint was architected primarily for managing internal employee lifecycles and has proven inadequate for the scale, speed, and unique requirements of managing B2B external identities.
The organization's core enterprise applications—SAP ERP, Salesforce, Microsoft 365, and Azure—require seamless, standards-based identity provisioning and access controls. The current point-to-point integration architecture is brittle, difficult to maintain, and fails to provide a unified governance posture across internal and external user bases.
Recent business growth, increased M&A activity, and expanded partner ecosystems have accelerated the external identity footprint beyond SailPoint's operational scalability. This has created an urgent business need to adopt a purpose-built, cloud-native B2B identity solution that can operate at scale while maintaining enterprise-grade security and compliance.
Implementation Costs
The primary implementation costs associated with this decision fall into three categories. First, professional services and internal effort required to design, configure, and deploy the Entra External ID and Entra ID Governance environment — including tenant configuration, Conditional Access policy design, access package and catalog structure, lifecycle workflow development, and the build-out of SCIM-based provisioning flows to SAP and Salesforce. Second, the data cleansing and migration effort to extract external identities from SailPoint, remediate data quality issues, and onboard those identities into Entra with correctly mapped attributes, entitlements, and governance policies. Third, upskilling and training costs for the IAM team and broader IT operations staff who must develop competency in Entra ID Governance administration alongside their existing SailPoint expertise.
Licensing and Subscription Costs
The ongoing licensing model introduces a shift in cost structure. Internal employee governance remains on existing SailPoint licensing, which is unaffected. For external identities, Syensqo must maintain the prerequisite Microsoft Entra ID P1 or P2 subscription at the tenant level, the Entra ID Governance product subscription, and — critically — the Microsoft Entra ID Governance for Guests add-on, which operates on a consumption-based Monthly Active User (MAU) billing model rather than a fixed per-seat cost. This means the external identity governance cost will fluctuate month to month based on the number of guest users actively triggering billable governance events. While this model can be cost-efficient during periods of low activity, it introduces a degree of financial variability that must be monitored and forecasted, particularly as the external identity population grows beyond the current 30,000 baseline. An Azure subscription must also be linked to the tenant to enable guest billing.
Operational Costs
On an ongoing basis, Syensqo will bear the operational cost of managing a dual-platform identity governance model — SailPoint for internal and Entra for external. This includes the administrative overhead of maintaining two sets of operational procedures, two sets of integrations into downstream systems like SAP and Salesforce, and consolidated reporting across both platforms for audit and compliance purposes. However, this is partially offset by the reduction in operational burden that Entra's self-service and automation capabilities introduce — particularly the BYOI model, automated lifecycle workflows, and delegated access package management, all of which reduce the manual effort currently required to manage external identities.
Cost Offsets and Efficiencies
The decision is expected to deliver cost efficiencies over time by eliminating the need for custom-built connectors and manual processes that currently support external identity management within SailPoint. The native alignment with Syensqo's existing Microsoft investment reduces integration overhead and avoids the licensing overlap of maintaining a third-party platform for a function that can be delivered within the incumbent ecosystem. The extent of these savings will depend on the volume and complexity of external identity operations that are successfully automated through Entra's governance capabilities.
The following business rules are derived from this decision and must be enforced through platform configuration, policy, and operational procedure.
Identity Platform Segregation
All external (B2B) identities — including partners, vendors, clients, and any non-employee entity — must be created, managed, and governed exclusively within Microsoft Entra External ID. No new external identity may be provisioned within SailPoint. SailPoint remains the sole governance platform for internal (employee) identities. An identity cannot be governed by both platforms simultaneously.
Guest User Type Classification
Every external identity onboarded into the Entra tenant must be assigned a userType of Guest. Under no circumstances may an external user be provisioned as a Member within the core employee directory. This classification is non-negotiable and underpins both the architectural segregation model and the guest billing mechanism.
Access Must Be Package-Based
Access to downstream systems — including SAP, Salesforce, Microsoft 365 resources, and any other integrated application — must not be granted to external users on an ad hoc or manual basis. All external user access must be assigned through a defined Entra ID Governance access package with an associated policy that specifies approval requirements, duration, and review cadence. Direct role or group assignment outside of the access package model is not permitted for external identities.
Bring Your Own Identity as Default Authentication
External users must authenticate using their own organization's identity provider wherever possible under the BYOI model. Federated authentication via SAML 2.0 or OIDC is the preferred and default method. Email one-time passcode or local account authentication may only be used as a fallback for partners who do not operate a compatible identity provider, and this exception must be documented and reviewed periodically.
Sponsorship and Approval Required for Onboarding
No external identity may be onboarded without a designated internal sponsor. Every access package policy for external users must include at least one approval stage with a named sponsor or delegated approver from the relevant business unit. Self-approval by the requesting external user is not permitted.
Time-Bound Access with Mandatory Review
All access granted to external identities must be time-bound. Open-ended or permanent access assignments are not permitted for B2B users. Every access package assignment must carry a defined expiry period, and recurring access reviews must be configured to ensure that continued access is re-certified by the appropriate business owner or sponsor at a defined cadence. Failure to complete a review within the defined window must result in automatic revocation of access.
Automated Lifecycle Enforcement
External identity lifecycle events — onboarding, access modification, and offboarding — must be managed through Entra ID Governance lifecycle workflows and entitlement management policies, not through manual administrative action. When an external user's engagement with Syensqo ends or their access package assignment expires without renewal, their access to all downstream systems must be automatically revoked and their guest account must be disabled or removed in accordance with the defined offboarding workflow.
Provisioning and Deprovisioning Must Be Automated
The provisioning and deprovisioning of external user accounts in downstream systems — specifically SAP (via SAP Cloud Identity Services) and Salesforce (via the SCIM connector) — must be automated through Entra. Manual creation or removal of external user accounts directly within SAP or Salesforce is not permitted. The Entra directory must remain the single source of truth for external identity status, and downstream systems must reflect changes propagated from Entra.
No Governance Without Billing Enablement
The Microsoft Entra ID Governance for Guests add-on must remain enabled and linked to an active Azure subscription at all times. Governance features for external users — including access reviews, entitlement management policies scoped to guests, and lifecycle workflows — are non-functional without this billing linkage. Allowing the add-on to lapse or become disconnected is treated as a critical operational failure.
Consolidated Audit and Compliance Reporting
Identity governance evidence for audit and regulatory purposes must be producible from both SailPoint (for internal identities) and Entra (for external identities). A consolidated reporting mechanism or process must be established and maintained to ensure that auditors receive a complete and coherent view of Syensqo's identity governance posture without requiring independent interrogation of each platform.
Data Quality Standards for External Identities
External identity records in Entra must meet defined minimum data quality standards before being granted access to any downstream system. At a minimum, each record must include a verified external email address, a mapped organizational affiliation, a designated internal sponsor, and correctly populated attributes required for downstream provisioning. Records that do not meet these standards must be quarantined and remediated before access is provisioned.
Under this option, the organisation would leverage its existing SailPoint IdentityNow (or IdentityIQ) deployment to serve as the identity governance and administration platform for all external identities, encompassing both B2B supplier accounts currently held in SAP IAS and B2B customer accounts managed within Salesforce.
SailPoint is a mature and capable identity governance platform. It provides comprehensive provisioning, access request workflows, certification campaigns, separation-of-duties enforcement, and lifecycle management capabilities. On paper, it meets the functional requirements for managing external identities.
However, functional capability alone does not make SailPoint the right choice for this use case. Several material factors weigh against this option, and when considered together, they present a compelling case for looking elsewhere.
SailPoint can technically fulfil the core requirements of external identity management:
In isolation, these capabilities would make SailPoint a credible candidate. The challenge lies not in what SailPoint can do, but in whether it is the right platform for the organisation to invest in for this purpose.
SailPoint is not positioned as the strategic IAM solution for this organisation. The business has already established its direction of travel toward the Microsoft Entra platform as the primary identity provider and governance layer. This strategic decision reflects the organisation’s deep investment in the Microsoft ecosystem across infrastructure, productivity, security, and cloud services.
Selecting SailPoint for external identity management would run directly counter to this strategic direction. It would mean committing further budget, skills, and operational capacity to a platform that the organisation is not investing in for the long term. Every pound spent on SailPoint licensing, custom development, and specialist resources is a pound not invested in the platform that will form the backbone of the organisation’s identity architecture going forward.
From an architectural governance perspective, introducing SailPoint as the external identity layer alongside Microsoft Entra for internal identities creates a dual-platform IAM landscape. This increases architectural complexity, requires two sets of operational expertise, and fragments the identity management story across the enterprise.
A significant practical concern is connector availability. While SailPoint offers a broad library of out-of-the-box connectors, the specific integration requirements for managing external identities within SAP IAS and Salesforce external-facing configurations may not be fully met by standard connectors.
In all likelihood, custom connectors will need to be developed to support the following:
Custom connector development introduces several risks:
The organisation is a Microsoft-heavy environment. The technology estate is built on Azure, Microsoft 365, and the broader Microsoft security and identity stack. Microsoft Entra ID already serves as the identity provider for the internal workforce. Choosing SailPoint for external identities introduces a competing identity platform that does not benefit from the native integration, shared security context, and unified management plane that the Microsoft ecosystem provides.
By contrast, Microsoft Entra External ID is purpose-built for external identity scenarios and is natively integrated with the same platform that manages internal identities, Conditional Access policies, security monitoring, and compliance tooling. Selecting SailPoint would forgo these integration advantages.
The total cost of ownership for the SailPoint option extends well beyond licensing:
When these costs are aggregated and compared against the investment required for Microsoft Entra External ID — which benefits from existing Microsoft licensing agreements, native ecosystem integration, and a consumption-based pricing model — the SailPoint option is difficult to justify on financial grounds.
Summary Assessment: Option A
Dimension | Assessment |
Functional Fit | Meets all core external identity management requirements including provisioning, lifecycle management, access governance, and certification campaigns. |
Strategic Alignment | Low. SailPoint is not positioned as the strategic IAM platform for the organisation. Investment in SailPoint runs counter to the established direction of travel toward Microsoft Entra as the primary identity platform. |
Connector Availability | Custom development required. Out-of-the-box connectors may not fully cover SAP IAS and Salesforce external identity scenarios. Custom connectors would need to be built, tested, and maintained, adding cost and ongoing technical debt. |
Ecosystem Alignment | Poor fit. The organisation is heavily invested in the Microsoft technology stack. Introducing SailPoint as the external identity layer creates a parallel IAM ecosystem alongside Microsoft Entra, increasing architectural complexity and operational overhead. |
Cost Justification | Difficult to justify. Licensing, custom connector development, specialist SailPoint skills, and ongoing maintenance represent a significant investment in a platform that the organisation has already determined is not part of its long-term IAM strategy. |
Recommendation | Not recommended. While SailPoint is a capable platform, selecting it for external identity management would be a strategic misalignment and an investment in a technology that the organisation is moving away from. |
Conclusion: SailPoint is a capable identity governance platform and meets the functional requirements for external identity management. However, it is not the strategic IAM direction for this organisation, it will require custom connector development that adds cost and risk, and it introduces an unnecessary parallel identity ecosystem in what is otherwise a Microsoft-centric environment. The investment would be better directed toward the platform that the organisation has already committed to for the long term.
Under this option, the organization would maintain the current operating model for external identity management. Supplier identities would continue to be created, maintained, and deactivated manually within SAP Identity Authentication Service (SAP IAS). B2B customer identities would continue to be managed independently and manually within Salesforce. No centralized identity platform would be introduced, and no cross-system automation or governance tooling would be implemented.
This option represents the status quo. While it requires no upfront capital investment and no organizational change management effort, it carries significant and compounding risks that must be clearly understood before it can be considered a viable long-term strategy.
The current state of external identity management is characterized by the following siloed processes:
SAP IAS – Supplier Identities
An estimated 15,000 to 20,000 external supplier identities are managed within SAP IAS.
Each supplier account is created manually by internal administrators. This includes setting up the user record, assigning the appropriate authentication method, and configuring access to the relevant SAP applications.
When a supplier relationship ends, deactivation of the account relies entirely on manual notification and action. There is no automated trigger or workflow to ensure timely removal.
In the current configuration, suppliers lack self-service capabilities to manage their profiles or credentials, despite SAP IAS offering native self-registration and profile management features. Consequently, password resets, attribute updates, and access modifications are heavily reliant on manual administrative support.
Salesforce – B2B Customer Identities
Thousands of B2B customer identities are maintained within Salesforce, typically within Experience Cloud (Communities).
Account provisioning is handled manually, often initiated through email requests or spreadsheet-based onboarding processes.
Even though Salesforce Experience Cloud supports delegated administration and self-registration, the current process relies on internal administrators to execute profile updates, permission changes, and deactivations.
There is no centralized view of a customer’s identity status across Salesforce and any other enterprise systems they may access.
Continuing with the current manual, decentralized approach exposes the organization to a range of operational, security, compliance, and financial risks that will only intensify as the external user population scales.
1. Human Error and Data Quality Degradation
Manual identity management is inherently error-prone. When administrators create and modify thousands of accounts by hand across two separate systems, mistakes are inevitable. These errors manifest as:
Accounts created with excessive permissions, granting external users access to data or functions outside their required scope.
Typographical errors in user attributes (names, email addresses, identifiers) that degrade data quality and make it impossible to correlate identities across systems.
Duplicate accounts created when an existing identity is not found during a manual search.
Inconsistent naming conventions and attribute values between SAP IAS and Salesforce, obstructing cross-system reporting and auditing.
2. Orphaned and Dormant Accounts
This is one of the most critical security vulnerabilities of manual identity management. When a supplier contract expires, a customer relationship ends, or an individual changes roles, there is no automated mechanism to detect this context change and deactivate the corresponding access.
In practice, this means the organization is actively carrying a significant number of orphaned accounts—active credentials belonging to individuals who no longer have a legitimate business relationship with the company. Each orphaned account is a potential entry point for unauthorized access, whether through credential theft, social engineering, or misuse by a former partner. With 15,000 to 20,000 supplier accounts alone, even a 5% orphan rate represents a material security exposure.
3. Audit and Compliance Failure
Regulatory frameworks, industry standards, and internal audit functions increasingly require organizations to demonstrate effective, provable controls over system access. Manual identity management fails to meet these standards:
Fragmented Audit Trails: There is no centralized, tamper-evident log detailing who created an account, who approved it, and what access was granted. Evidence must be manually assembled from disjointed emails, IT tickets, and spreadsheets.
No Access Certification: There is no systematic mechanism for relationship owners to periodically review and attest that external users still require their current access levels. Access accumulates indefinitely.
High Probability of Audit Findings: Internal and external auditors will inevitably flag the lack of automated lifecycle governance over third-party identities as a critical observation.
4. Scalability Has Reached Its Limit
With tens of thousands of external identities spread across SAP IAS and Salesforce, the current manual approach has exhausted the practical limits of administrative capacity. As the business grows, the volume of external identities will increase, but manual processes will not yield efficiency gains. This results in either a growing backlog of provisioning tasks (delaying supplier and customer onboarding) or a necessary, linear increase in IT headcount simply to maintain the status quo.
5. No Unified Security Baseline
Because security policies are defined and enforced independently within each silo, the organization lacks a cohesive security posture:
SAP IAS and Salesforce operate under separate password policies, session management settings, and multi-factor authentication (MFA) enforcement rules.
There is no centralized Conditional Access or risk-based authentication capability evaluating external user logins across the digital estate.
In the event of a security incident, there is no "single pane of glass" to investigate cross-platform sign-in activity or lateral movement.
6. Poor User Experience for External Stakeholders
External partners interacting with multiple systems must juggle separate credentials. The lack of Single Sign-On (SSO) and unified self-service creates:
Password fatigue, leading to weak or reused credentials.
A high volume of routine password reset tickets directed to internal IT support.
Unnecessary friction during onboarding, delaying time-to-value for new partners and projecting a disjointed organizational image.
7. Hidden Operational Costs
The true cost of manual identity management is frequently underestimated because it is absorbed into decentralized, day-to-day operational activities. However, the quantifiable drain on resources is substantial:
IT administrator hours lost to routine account creation, modification, and deactivation.
Helpdesk resources consumed by external user password resets and login troubleshooting.
The massive opportunity cost of highly skilled SAP and Salesforce administrators performing manual data entry rather than executing higher-value platform optimizations.
| Risk Category | Impact of Continuing Manual Management |
| Human Error | Manual provisioning across disjointed systems causes permission errors, duplicate accounts, and degraded data quality. |
| Orphaned Accounts | A lack of automated deprovisioning leaves active credentials in the hands of former partners, creating a massive, unmonitored attack surface. |
| Audit & Compliance | The inability to provide centralized, automated evidence of access approvals and periodic certifications leads directly to audit failures. |
| Scalability | Administrative overhead scales linearly with business growth, creating bottlenecks in partner onboarding and requiring constant headcount increases. |
| Inconsistent Security | Disparate password and MFA policies across SAP and Salesforce mean the external attack surface is only as strong as the weakest platform configuration. |
| Operational Cost | High hidden costs driven by routine helpdesk tickets, manual provisioning, and complex, manual audit evidence gathering. |
Describe the option in sufficient detail for a reader familiar with the subject matter to understand it properly
Describe the option in sufficient detail for a reader familiar with the subject matter to understand it properly
Outline why you selected a position. The best format could be a pro/con table (sample below), but is up to you as the author. You must consider complexity, feasibility, cost/effort to implement, but also ongoing operational impact and cost. You must consider the program principles and explain any deviations in detail. This is probably as important as the decision itself.
Option A | Option B | Option C | Option D | |
|---|---|---|---|---|
| Criterion 1 |
|
|
|
|
| Criterion 2 |
|
|
| |
| Criterion 3 |
Insert links and references to other documents which are relevant when trying to understand this decision and its implications. Other decisions are often impacted, so it's good to list them here with links. Attachments are also possible but dangerous as they are static documents and not updated by their authors.
