Managed Open Source: The Middle Ground Between Maintenance Effort and Data Control
When medium-sized companies plan their IT strategy for the coming years, they often find themselves …

In modern business IT, two departments often stand in stark opposition: IT security demands increasingly complex passwords, additional authentication factors, and strict access restrictions to protect the infrastructure from unauthorized access. Meanwhile, business departments demand speed, flexibility, and easy access to all the tools they need for their daily work.
As companies grow and introduce more digital tools, this tug-of-war without an overarching concept leads to risky sprawl. Employees become overwhelmed by the flood of access credentials, passwords are noted unsecured, and when leaving the company, accounts may remain active for weeks in the worst case. The solution to this dilemma lies in a centralized identity layer—an Identity & Access Management (IAM)—that acts as both an invisible security guard and a convenience guarantor.
When a medium-sized company operates its business tools as a loose collection of isolated SaaS solutions, three significant security and efficiency gaps arise in practice:
Each new tool brings its own user database. This means: When a new employee is hired, IT administration must manually create accounts in the chat, ticket system, cloud storage, and signature tool. More dangerous, however, is the reverse: When an employee leaves the company, access to one of the less-used systems is often forgotten in the hustle and bustle of everyday life. An orphaned but active account is an open door for data theft.
No one can remember twenty different, highly complex passwords. The result is human avoidance behavior: Employees use the same, slightly modified password for multiple systems or write it on sticky notes and in unencrypted text files. If an attacker breaks into a single, less protected system, they often automatically gain access to the business-critical core areas of the company.
If employees have to log in to different systems multiple times a day, it disrupts the workflow. At the same time, overly restrictive and complicated rights assignments lead departments to independently use unauthorized, private cloud tools (“Shadow IT”) to quickly achieve results—completely bypassing internal IT.
A modern platform design resolves this conflict by decoupling the user’s identity from the actual software. Through standardized protocols like OIDC (OpenID Connect) or SAML (Security Assertion Markup Language), a central identity service (such as Authentik or Keycloak) is placed as the primary control instance.
This setup creates a clear separation between identification and application:
+---------------------------------+
| Central IAM (e.g., Authentik) |
+---------------------------------+
|
+---------------------------+---------------------------+
| | |
v v v
[Service Desk] [Collaboration] [Real-Time Chat]
(e.g., Zammad) (e.g., Nextcloud) (e.g., Mattermost)The employee logs in once in the morning at the company’s central identity portal. From that moment on, all connected business tools (whether chat, ticketing, or document storage) trust this central login. The user seamlessly switches between applications without ever having to enter a password again.
When an employee leaves the company or changes departments, a single click in the central IAM system is enough. By deactivating the main account, the user instantly and system-wide loses access to all company data, documents, and chat histories. There are no forgotten accounts and no digital residual risks.
Since authentication is centralized, advanced security features can be enforced with minimal effort for the entire company. For example, Multi-Factor Authentication (MFA) via app or hardware token can be activated for all connected tools with one click. IT security increases massively while maintaining user convenience in everyday life.
Centralized identity management is not an optional convenience feature but the architectural backbone of any sovereign IT landscape. It proves that the highest security standards and maximum user-friendliness do not have to be mutually exclusive in medium-sized businesses. Those who maintain control over digital identities within their company protect their intellectual property, minimize administrative costs, and create the technological basis for secure and efficient growth in the digital space.
Yes, absolutely. Modern IAM solutions like Authentik can easily act as a Federation Gateway between existing directory services (such as a local Microsoft Active Directory or LDAP systems) and new, sovereign open-source tools. Existing user data does not need to be migrated; the IAM system uses the existing data base and extends it with modern web authentication protocols.
As the IAM system is the central gateway to all applications, its availability is of utmost priority. In a modern cloud-native architecture (e.g., on Managed Kubernetes), the identity system is always designed to be highly available and redundant. This means that multiple instances of the system run in parallel. If one instance fails due to an error, another takes over in milliseconds without employees noticing any interruption in their daily work.
Yes. A professional IAM system allows defining so-called “guest roles” or dedicated tenant structures. For example, you can grant an external auditor or a major customer strictly time-limited access to a specific Nextcloud folder or a support ticket without giving them insight into other internal systems or communication channels.
When medium-sized companies plan their IT strategy for the coming years, they often find themselves …
“We have a nightly backup.” In many SaaS companies, this phrase is the standard …
In a multi-tenant environment (many customers on one platform), video is a selfish workload. If …