Skip to content

Ingrambtp3/IAM--PROJECTS

Repository files navigation

πŸ›‘οΈ Identity & Access Management (IAM) Labs – By The BYTEKAGE

Welcome to my IAM project series β€” a hands-on portfolio designed to showcase real-world Identity and Access Management implementations using Microsoft Entra ID, Auth0, PowerShell, and Microsoft Graph API.

These labs reflect my practical experience and professional growth as I transition deeper into the IAM space, building the technical skills required to design, secure, and automate modern identity systems.

🧠 I'm not just learning β€” I'm executing.
πŸ“ˆ I'm not just documenting β€” I'm building.
🌍 I'm not just growing β€” I'm showing the path for others breaking into tech.


🎯 Why These Labs Matter

  • Every project simulates a real-world scenario an IAM engineer or security analyst would face
  • Each lab reinforces identity governance, automation, role-based access control, SSO, and more
  • I use these labs to deepen my own mastery and to help others see what it looks like to do the work that earns the role

Whether you're a hiring manager, aspiring IAM pro, or someone curious about what identity looks like in action β€” this repo shows the receipts.


πŸ“‚ Weekly Progress (WEEK 1)


πŸ”₯ Topics Covered

βœ… Azure Entra ID (Conditional Access, MFA, RBAC)
βœ… ENTRA ID IAM Roles, Policies, CloudTrail Logs
βœ… IAM Best Practices & Security Principles


πŸ“‚ Weekly Progress (WEEK 2)

-Week 2 Scenario Based Remediation

πŸ”₯ Topics Covered

βœ…Identify and remove excessive privileges from the test account.

βœ… Access Reviews to monitor privileged role assignments.

βœ… Privileged Identity Management (PIM) for secure and controlled administrative access.


Weekly Progress (WEEK 3)

βœ… Topics Covered

  • Set up and tested Access Reviews to ensure users still need access

  • Assigned reviewers and applied decisions to remove unnecessary access

  • Practiced governance and cleanup using built-in tools in Entra ID


πŸ›‘οΈWEEK 4 – Automating Access Review Insights with PowerShell πŸ›‘οΈ

In this lab, I automated the process of pulling Access Review decision data using PowerShell and the Microsoft Graph API.
I authenticated with a custom app registration, queried Access Review instances and decisions, and exported the results to a CSV for auditing.

πŸ› οΈ Skills Practiced:

  • Microsoft Graph API
  • PowerShell scripting
  • Identity Governance automation
  • Least privilege enforcement

πŸ“ Project Folder: Week 4 – PowerShell Access Review Automation


πŸ” Week 5 – PIM Role Activation Automation

  • Automated Just-In-Time (JIT) role activation using Microsoft Graph and PowerShell
  • Script accepts user email, role name, and access duration
  • Activates eligible PIM roles and logs each activation to a CSV file
  • Simulates real-world enterprise access governance and least privilege controls

πŸ“ Project Folder: Week 5 - PIM Role Activation Automation


πŸ”Ž Week 6 – PIM Role Audit & Auto-Cleanup Script

Goal: Detect and clean up Entra ID PIM role assignments that remain active beyond their allowed time window using PowerShell and Microsoft Graph API.

What I did:

  • Connected to Microsoft Graph to retrieve all active role assignments
  • Used PowerShell to check which roles were still active after 1 hour
  • Exported flagged assignments to a CSV for auditing
  • Built in optional auto-removal logic for roles that break policy
  • Created a mock data test script to simulate violations for testing

πŸ“ Project Folder: Week 6-PIM Role Audit & Auto-Cleanup


βœ… Week 7 – Inactive Guest User Cleanup

  • Scripted the detection and reporting of inactive guest accounts in Microsoft Entra ID
  • Used Microsoft Graph PowerShell SDK to pull all guest users and check last sign-in timestamps
  • Exported inactive accounts (30+ days or never signed in) to a CSV report
  • Simulated lifecycle cleanup and identity hygiene used in enterprise IAM practices

πŸ”— Project Folder: Week 7 – Inactive Guest User Cleanup


πŸ” Week 8 – SAML SSO Lab: Auth0 (IdP) β†’ Microsoft Entra ID (SP)

In this lab, I configured a SAML-based Single Sign-On (SSO) flow using Auth0 as the Identity Provider (IdP) and Microsoft Entra ID as the Service Provider (SP). I manually set up the SAML integration by exporting metadata from Auth0, uploading the X.509 signing certificate into Entra, and defining the ACS and Entity ID settings. After assigning a test user in Entra, I confirmed the flow end-to-end using an IdP-initiated login that redirected to a custom GitHub Pages landing page.


βœ… Key Topics Covered

  • SAML 2.0 protocol fundamentals: NameID, ACS URL, Entity ID
  • Identity federation between Auth0 and Entra ID
  • X.509 certificate trust setup in Entra
  • Redirect handling and custom post-login landing pages
  • Real-world SSO lab structure and documentation

🧰 Tools & Technologies

  • Auth0 (SAML IdP)
  • Microsoft Entra ID (SAML SP)
  • X.509 Certificates
  • GitHub Pages

πŸ” Outcome

This project shows how to federate identity between a third-party IdP and Microsoft Entra using SAML 2.0. It simulates real enterprise SSO setups and reinforces identity federation, assertion handling, and trust relationships across platforms. πŸ”— Project Folder: Week 8- SAML SSO Lab: Auth0 (IdP) β†’ Microsoft Entra ID (SP)


πŸ” Week 9 – Hybrid Identity Lab: bytekagelab.local β†’ Microsoft Entra ID

In this lab, I created a hybrid identity environment by deploying a Windows Server 2019 VM in Azure and configuring it as a domain controller (bytekagelab.local). I installed Azure AD Connect and synced on-prem AD users to Microsoft Entra ID. This simulates how organizations bridge legacy identity infrastructure with cloud-based directories.


βœ… Key Topics Covered

  • Active Directory Domain Services (AD DS) configuration
  • Azure AD Connect setup and sync
  • PowerShell-based manual sync triggering
  • Troubleshooting module import and sync cmdlets
  • Hybrid identity architecture in real-world environments

🧰 Tools & Technologies

  • Windows Server 2019 (Azure VM)
  • Active Directory Domain Services (AD DS)
  • Azure AD Connect
  • Microsoft Entra ID (Azure AD)
  • PowerShell

πŸ” Outcome

This project demonstrates how hybrid identity works by integrating on-prem AD with Microsoft Entra. I gained hands-on experience with directory synchronization, identity provisioning, and PowerShell troubleshooting β€” replicating enterprise IAM workflows.

πŸ”— Project Folder: [Week 9 – Hybrid Identity Lab][(https://github.com/Ingrambtp3/IAM--PROJECTS/tree/main/week09-hybrid-identity-ad-sync)]


πŸ” Week 10 – Hybrid Identity Access Governance: Group-Based App Provisioning

In this lab, I extended my hybrid identity environment by implementing role-based access control (RBAC) and automated cloud app provisioning. I created security groups in on-prem Active Directory, synced them to Microsoft Entra ID using Azure AD Connect, and assigned these groups to the ServiceNow app. I then added test users to the on-prem groups and verified that access was automatically granted in the cloud.


βœ… Key Topics Covered

  • On-prem AD security group creation and structure
  • Azure AD Connect group synchronization
  • Enterprise application assignment to groups in Microsoft Entra
  • Automatic cloud access provisioning through group membership
  • Real-world RBAC and onboarding simulation

🧰 Tools & Technologies

  • Windows Server 2019 (Azure VM)
  • Active Directory Users and Computers (ADUC)
  • Azure AD Connect
  • Microsoft Entra ID (Azure AD)
  • ServiceNow (Enterprise App)

πŸ” Outcome

This project showcases how organizations can automate access provisioning using group-based role assignments. By linking on-prem group membership to cloud app access through Entra ID, I simulated a real-world identity governance flow that improves onboarding efficiency and enforces least privilege.

πŸ”— Project Folder: Week 10 – Hybrid Identity Access Governance


🧩 WEEK 11 – Keycloak IAM Lifecycle (Joiner–Mover–Leaver)

Built a full IAM lifecycle simulation inside Keycloak + Docker, covering the Joiner β†’ Mover β†’ Leaver process used in enterprise identity governance.
Implemented RBAC, MFA, SSO (OIDC), and audit logging to demonstrate how identity, security, and compliance work together.

πŸ”‘ Skills Practiced:
Keycloak | Docker | JML Lifecycle | RBAC | MFA | SSO (OIDC) | Audit Governance

πŸ’‘ Focus:
Lifecycle automation, Zero Trust enforcement, and troubleshooting real-world IAM issues like misconfigured redirect URIs and disabled accounts.

πŸ“ Project Folder: Week 11 – Keycloak IAM Lifecycle (JML)


πŸ” Week 12 – Okta ⇄ Salesforce Lifecycle Automation (SSO + Provisioning)

In this lab, I integrated Okta with Salesforce to automate the full Joiner–Mover–Leaver (JML) identity lifecycle.
This project brings together SAML SSO for secure authentication and SCIM provisioning (OAuth) for seamless user management β€” exactly how real enterprises connect SaaS platforms to their identity providers.

βœ… Key Topics Covered

  • Configured SAML SSO between Okta (IdP) and Salesforce (SP)
  • Enabled SCIM provisioning via OAuth for automated user creation, updates, and deactivation
  • Implemented Joiner, Mover, and Leaver scenarios to simulate real identity lifecycle events
  • Verified updates through Okta System Logs and Salesforce user records

🧰 Tools & Technologies Okta | Salesforce | SAML | SCIM | OAuth | Lifecycle Management

πŸ’‘ Focus Demonstrated how identity automation eliminates manual onboarding/offboarding, reduces data exposure risk, and ensures compliance.
By the end of this lab, Okta was the single source of truth β€” creating, updating, and disabling Salesforce users in real time based on profile changes.

πŸ“ Project Folder: Week 12 – Okta ⇄ Salesforce Lifecycle Automation

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors