~/iam $

Cleveland Oliver

IAM Engineer · Identity & Access Specialist

5 years designing and implementing secure identity solutions across Microsoft Entra ID, Okta, and Active Directory. I translate complex IAM challenges into clean, automated, auditable outcomes.

SC-300
Security+
5 Years Experience
9 Production Scenarios
3 IAM Platforms
2 Certifications

Identity is the new perimeter.

I'm an IAM Engineer based in Fayetteville, NC, focused on building identity infrastructure that scales securely. My background spans hybrid AD environments, cloud-native identity platforms, and the automation that ties them together.

Beyond my day-to-day work, I document real production scenarios in my homelab — not how-to guides, but case studies structured around actual business problems, constraints, and measurable outcomes. This site is where that work lives publicly.

I built ID Sentinel Solutions as a professional brand to house my labs, writing, and eventually consulting work as my career grows in the identity space.

Certifications
Microsoft SC-300
Identity and Access Administrator Associate
CompTIA Security+
Security Analyst Certification
Platforms
Microsoft Entra ID Okta Active Directory Auth0 AWS IAM PowerShell Graph API Terraform

IAM Production Scenarios

View Full Repo ↗

Real-world IAM problems simulated in a homelab — each structured as a production case study with business context, solution design, scripts, and documented outcomes. Not how-to guides.

01

MFA Bypass via Legacy Auth

Legacy protocols bypassing MFA controls org-wide. Blocked using Conditional Access sign-in risk policies.

Conditional AccessSign-in LogsBlock Legacy Auth
02

App Migration: Legacy IdP → Okta

M&A scenario requiring migration of enterprise apps off a legacy SSO platform to Okta with zero downtime.

SAMLOktaAttribute MappingCutover
03

Orphaned Access Audit

Audit revealed stale users retaining access post-offboarding. Remediated with Graph API + PowerShell automation.

Graph APIPowerShellAccess Governance
04

Zero Trust Rollout

Executive mandate to implement Zero Trust for a 1,000-person org. Deployed CA policies, PIM, and Terraform.

Zero TrustPIMTerraformCA Policies
05

SCIM Provisioning Pipeline

Manual provisioning caused access delays and errors. Automated the full lifecycle with SCIM and Okta Workflows.

SCIMLifecycle AutomationOkta Workflows
06

OAuth2 API Integration

Built automated identity risk reporting pipeline using Graph API with OAuth2 client credentials flow.

OAuth2Graph APIPythonPostman
07

Identity Risk Response Playbook

Standardized P1/P2 response procedures for Identity Protection alerts, mapped to NIST IR and SOC 2.

Identity ProtectionNIST IRSOC 2Runbooks
08

CIAM Platform with Auth0

Built secure, branded customer login with social federation, MFA, and JWT-protected API endpoints.

Auth0OIDCJWTGoogle Federation
09

AWS IAM Least Privilege

Overprivileged AWS roles increasing lateral movement risk. Remediated with Access Analyzer and SCPs.

AWS IAMLeast PrivilegeAccess AnalyzerSCPs

Foundational Lab Work

Structured learning environments covering IAM fundamentals and Microsoft 365 security — the foundation behind the production scenarios above.

Enterprise IAM Lab

Hands-on modules covering Microsoft Entra ID, Okta, on-prem Active Directory, and federation protocols including SAML, SCIM, OAuth 2.0, and OIDC.

View Modules
View on GitHub

Microsoft 365 Security & Compliance Lab

Hands-on labs covering Microsoft Purview, Defender for Cloud Apps, and Intune — focused on identity protection, data governance, and device management.

View Modules
View on GitHub

Technical Expertise

Identity Platforms
  • Microsoft Entra ID — Azure AD, Hybrid Identity, Conditional Access
  • Okta Identity Cloud — SAML/OIDC, MFA, Lifecycle Automation, Workflows
  • Active Directory — OU/GPO Management, Delegation, User & Group Mgmt
  • Auth0 (CIAM) — Customer Identity, Social Federation, JWT
Protocols & Integrations
  • Federation — SAML 2.0, OpenID Connect, OAuth 2.0, SCIM
  • APIs — Microsoft Graph API, Postman, REST
  • Automation — PowerShell, Okta Workflows, Terraform, Python
Security & Governance
  • Zero Trust — MFA, Conditional Access, Compliant Devices, RBAC
  • PAM — Privileged Identity Management (PIM), Least Privilege
  • Governance — Access Reviews, JML Lifecycle, Logging & Audit
  • Compliance — SOC 2, GDPR, HIPAA, NIST IR
Cloud Security
  • Microsoft Purview — DLP, Sensitivity Labels, Compliance Reporting
  • Defender for Cloud Apps — CASB, Shadow IT, App Governance
  • Intune — Device & App Management, Conditional Access Integration
  • AWS IAM — IAM Policies, Access Analyzer, SCPs

Let's Connect

Whether you're hiring for an IAM role, want to talk identity architecture, or just want to connect — I'm always open to a conversation.