TL;DR
AI is chewing through the repetitive, entry-level work that used to give newcomers their start in Identity & Access Management (IAM)—account audits, basic access reviews, routine onboarding/offboarding “click-ops,” and boilerplate policy writing. That means mentorship isn’t a nice-to-have; it’s the on-ramp. This post lays out (1) why the shift is happening, (2) what effective IAM mentorship looks like, (3) a practical 12-week plan any team can run, (4) how to blend AI as a co-mentor without outsourcing judgment, and (5) a vetted directory of communities and mentorship programs to join right now.
The context: AI raised the floor—and removed the first rung
For years, teams relied on help desk rotations and junior analyst roles to teach identity basics: JML (joiners, movers, leavers), group hygiene, SSO integrations, MFA enrollments, and audit prep. Generative models, stronger admin UX, and policy automation now handle a lot of that toil. The upside is real: fewer mistakes, faster tickets, and better baselines. The downside is structural: when the “first rung” disappears, new talent struggles to get on the ladder at all.
So we install a handrail. Structured mentorship, apprenticeships, and community contribution become the new entry path. The fastest way to turn a curious newcomer into a reliable IAM engineer is not more tickets—it’s proximity to someone who can explain tradeoffs, connect standards, and build judgment.
What great IAM mentorship teaches (beyond the docs)
Identity is an architecture, not a product.
Directories, attributes, trust, tokens, sessions, scopes, and claims fit together across workforce, customer, partner, and machine identities.Standards fluency.
OIDC/OAuth2, SAML, SCIM, WebAuthn/passkeys—and the subtle implementation choices that create (or prevent) risk.Risk-driven access.
Translating messy business processes into least-privilege with conditional access, device posture, and context signals (geolocation, network, time, user risk).Lifecycle and governance muscle.
JML automation with a golden source, SoD design, exception handling, recertifications that work, and paved-road app onboarding.Secure-by-default patterns.
IdP-first onboarding, break-glass accounts, key management basics, resilient MFA flows, and disaster recovery for identity.Human skills.
Writing policies people can read, telling credible risk stories, partnering with app owners, and leading change without authority.
Use a common language to map growth (NICE Framework)
Titles vary wildly—Analyst, Engineer, Architect, Governance Lead—but the NICE Framework gives a common set of tasks, knowledge, and skills you can point to for planning and hiring. If you’re new, pick one role you want next (e.g., “Identity Engineer” or “IAM Architect”), extract 6–8 competencies, and build your mentorship plan around them. If you lead a team, align your mentor/mentee goals to NICE so growth is explicit and portable.
A 12-week mentorship plan any team can run
Cadence: 60 min/week mentor session + 90 min/week hands-on lab + a small “ship” every Friday
Portfolio: a repo with lab configs/notes, at least one small community contribution, and a 15-minute brown-bag talk
Weeks 1–2 — Foundations & Threats
- Read: identity primitives, directory trust boundaries, session/token lifecycles
- Lab: stand up a sandbox IdP and a sample app; trace an OIDC authorization code flow with a proxy
- Ship: an architecture diagram of your tenant and the “happy-path” login
Weeks 3–4 — Authentication & MFA
- Read: WebAuthn/passkeys, phishing resistance, recovery pitfalls, step-up auth
- Lab: add passkeys to the sample app; test step-up with risk signals
- Ship: a one-pager “MFA choices & tradeoffs” tailored to your org
Weeks 5–6 — Authorization & Groups
- Read: scopes vs. roles, ABAC vs. RBAC, SoD patterns
- Lab: design claims for least privilege roles; implement SoD checks in a mock request flow
- Ship: policy-as-code for one app (mentor review required)
Weeks 7–8 — Lifecycle & SCIM
- Read: JML best practices, golden sources, exception handling, deprovisioning safety
- Lab: SCIM-provision a test app; build a mover workflow with SoD gates
- Ship: a rollback/runbook for lifecycle automation
Weeks 9–10 — Governance & Reviews
- Read: micro-campaign access reviews, break-glass design, emergency elevation
- Lab: run a micro-campaign review across 2 apps/10 users; capture metrics
- Ship: a dashboard mock with time-to-revoke, orphan access rate, and exception burn-down
Week 11 — Standards & Community
- Read: one OpenID or FIDO WG issue; summarize the debate and alternatives
- Lab: submit a doc fix or example to a community repo; join a WG call as an observer
- Ship: a short post, “What I learned implementing X (and where the spec was unclear)”
Week 12 — Story & Portfolio
- Deliver: a 15-minute brown-bag talk to your team
- Publish: your labs + notes; schedule your next 90-day sprint
The mentor/mentee contract (copy/paste)
- Weekly on time, prepared, and with artifacts (diagram, PR, runbook)
- One shared backlog of skills, labs, and deliverables
- Feedback is candid and kind; approvals require review comments
- One public contribution per month (docs, examples, issues)
- Midpoint recalibration at Week 6; wrap-up at Week 12
- Definition of done: you can explain why a design is safe, not just how to click it
How leaders can stand up mentorship next sprint
- Make mentorship part of the job. Put it in goals and calibrations; reward it with visibility.
- Run cohorts. Two mentees per mentor, 12 weeks, one demo day; rotate mentors quarterly.
- Pair labs with production. Every lab earns a real improvement: a doc fix, a test, a safer default.
- Use standards as scaffolding. Discuss one working-group issue each week; ask mentees to “explain the spec to an app owner.”
- Measure outcomes. Track time-to-first PR, number of doc/example contributions, reduction in exceptions, and time-to-revoke.
- Invite the business. Have app owners attend Week-10 governance demos to build empathy both ways.
How newcomers can get a mentor (even if your org is small)
- Join two communities (directory below) and introduce yourself with a concrete goal (“Implement passkeys for internal apps in 60 days”).
- Shadow generously. Sit in on an app onboarding or access review; take the notes; summarize back for confirmation.
- Contribute small. Fix a typo, add a code sample to a quickstart, or write a 2-paragraph “how we solved X” post. Tiny contributions compound.
- Build a portfolio. A public repo with redacted lab configs, diagrams, and three postmortems of tricky identity bugs.
- Ask like a pro. “Could we meet for 20 minutes next week? I’ll bring two questions and a diagram; I’m choosing between A and B for our SSO rollout.”
Using AI as your co-mentor—not your replacement
AI is phenomenal at acceleration—summarizing specs, proposing drafts, and generating test cases. It’s poor at judgment—trading off risk, reading culture, and anticipating failure modes.
Try this workflow:
- Read → Explain → Build. Have AI explain a spec section, then build the lab and test edge cases.
- Generate → Critique. Ask AI for three SoD models; you and your mentor critique and fix them.
- Document → Stress. Let AI draft a runbook; you inject sharp edges: recovery, break-glass, observability.
- Pair human review. AI output ships only after mentor review and a tabletop failure exercise.
Find-Your-People Directory (join these today)
Active communities, standards bodies, and mentorship programs that welcome newcomers. Start with two and show up consistently.
Vendor-neutral identity communities & standards
- IDPro — Professional association for identity practitioners. Offers the vendor-neutral Body of Knowledge and the CIDPRO certification; active review circles and learning resources.
- OpenID Foundation — Home of OpenID Connect and related specs. Join working groups, read drafts, watch interop sessions, and contribute clarifications.
- FIDO Alliance (Developers) — The hub for passkeys/WebAuthn. Developer forum, implementation guidance, and adoption playbooks.
- Cloud Security Alliance (CSA) – IAM Working Group — Publications and discussion on IAM in cloud and zero trust; opportunities to co-author guidance.
Awareness & cross-industry identity collaboration
- Identity Defined Security Alliance (IDSA) — Free resources, community working groups, and the annual Identity Management Day spotlighting best practices.
Formal mentorship & inclusion programs (great for early career)
- Women in Identity (WiD) — Nonprofit focused on diversity and inclusion in digital identity; events, talks, and community programs.
- Women in CyberSecurity (WiCyS) — Structured 9–12 month mentorship for professional members; regional chapters and conferences.
- Cyversity — 1:1 matching and 16-week mentorship cohorts with a mentee-first curriculum; pathways to internships and training partners.
- ISACA — Local chapters frequently run mentorship programs and deep governance content relevant to IAM.
- ISC2 — Chapters and forums connect mentors/mentees; Security Congress and local events are prime places to meet practitioners.
Product ecosystems & developer communities
- Auth0 by Okta Community — Active forums, AMAs, and integration examples for builders.
- Okta Community & User Groups — Peer support, developer discussions, and regional user groups for hands-on practitioners.
Tip: If travel budget is tight, prioritize virtual WG meetings and chapter events; contribute doc fixes and examples between sessions—those artifacts demonstrate consistency and create mentor pull.
Starter syllabus (one quarter)
- Read (weekly): An IDPro BoK article and one OpenID or FIDO issue discussion.
- Lab (weekly): Passkeys, SCIM, claims design, and a micro-campaign access review.
- Contribute (monthly): A doc fix, an example PR, or a short post explaining one IAM tradeoff.
Copy-and-use resources
Mentorship agenda (weekly)
- 10 min: Wins/blocks
- 15 min: Lab review (diagram + PR)
- 20 min: Standards discussion (1 issue thread)
- 10 min: Risk story (how could this fail?)
- 5 min: Commit one Friday ship
Brown-bag outline (Week 12)
- Problem & business goal
- Architecture & controls
- Demo (2–3 minutes)
- Failure modes & recovery
- What we’ll improve next
Closing: install the handrail
We can’t wish back the old entry-level tickets. But we can build a better ramp: mentorship cohorts, standards participation, and small public contributions. If you lead an identity program, launch a 12-week cohort. If you’re starting out, pick two communities and one lab this week. The identity world needs your curiosity—and your judgment.