IAM Foundation, Fast: A 30-Day Plan to Eliminate Your Top 10 Identity Risks

TL;DR You don’t need a twelve-month program to stop the most common identity breaches. In 30 days, you can close the biggest gaps: Purge orphaned accounts Process leavers the same day Rotate & vault NHI (non-human identity) passwords/keys Enforce MFA everywhere; phishing-resistant for admins Disable legacy/basic auth + app passwords Kill standing admin; adopt least privilege + JIT elevation Put critical apps behind SSO; disable local logins Run a high-risk access review sprint Establish a Conditional Access baseline (device/risk/location) Turn on identity logging & alerts; harden break-glass Below is a day-by-day plan with owners, acceptance criteria, checkpoints, and metrics....

September 17, 2025 · 11 min · Jay Klinkowsky

IAM 101: Single Sign-On (SSO) – The Magic of One Login

TL;DR Single Sign-On (SSO) allows users to access multiple applications with just one login. It’s a cornerstone of modern IAM strategy—enhancing user experience, reducing password fatigue, and boosting productivity. But SSO done wrong can centralize risk. In this post, we cover: How SSO works (and where it fits) Benefits for security, UX, and operations SAML, OIDC, and modern federation protocols Common pitfalls and how to avoid them 🔍 Background Back in the early 2010s, most companies I worked with had users juggling 5–10 logins daily....

June 4, 2025 · 4 min · Jay Klinkowsky