Initial Situation
A manufacturing company with 150 employees manages user accounts for multiple SaaS applications manually. Each application has its own password reset process. IT Support receives 5-10 password reset requests daily. Security policy mandates two-factor authentication, but not all applications support it. When an employee leaves, it takes an average of 2 days for all accounts to be deactivated – too late. The company already uses Azure AD for its local infrastructure but did not want to use it for simple system.
Your Solution with simple system
- SSO integration is initiated in close collaboration with the simple system setup team
- Azure AD is configured as Identity Provider – Step 1: SAML metadata exchange
- Step 2: Azure AD is configured to sign SAML assertions and set SSO redirect URLs
- Identity email is mapped from Azure AD attribute
- Step 3: Completion – Dedicated SSO login links are provided for all users
- Users activate MFA in Azure AD – MFA automatically applies to simple system as well
- Automatic user provisioning: On first SSO login, account is auto-created
Result: All employees use the same set of Azure AD credentials for simple system. Password resets drop to near zero. MFA is centrally activated. On departure, access is revoked in <5 min.
Your Benefit
- Time savings: 8 password resets/day × 30 min. = 4 hrs/day = 1,000 hrs/year + 1 FTE IT admin
- EBIT impact: +€35,000/year (password resets) + €50,000/year (IT admin) + security risk reduction ~€40,000 = +€125,000/year