
Our Step-by-step Approach
No Disruption, No Risk, No Wasted time.
Move from maintenance-heavy identity systems to a modern, automated platform that cuts costs, strengthens security, and keeps access fully under control

Step 1
Map reality, define scope
Step 2
Set target, confirm ownership
Step 3
Design coexistence, decide writeback
Step 4
Deliver first win, prove
Step 5
Scale patterns, retire legacy
Your decision on estimate and design
01
Clarity
We map what MIM actually does today, what the business depends on, and where the risk and friction are. You get a clear scope, owners, and priorities.
04
First delivery in production
We migrate one high impact scenario first and make it work end to end. Onboarding, offboarding, access governance, or privileged access. You get measurable improvement early.
02
Target model
We define how HR becomes the source of truth, how Entra becomes the control plane, and what the operating model must look like to keep control over access.
05
Scale and reduce legacy
We repeat the pattern across the remaining scenarios. Each wave reduces manual handling, reduces uncertainty, and increases governance.
03
Coexistence plan
We decide what stays in MIM for a period, what moves first, and how we avoid split ownership. This is where writeback to AD is decided, based on real dependencies.
Microsoft Entra ID
One Identity for Everything

With managed identity, we use Microsoft Entra ID as the central hub for identity and access management. It connects every user to every system—Microsoft 365, Azure, SaaS tools, and internal apps—with one secure login.
-
No duplicate accounts.
-
No lost credentials
-
No friction.
Just one identity that works everywhere.
The Team: Meet some of the experts
These folks live and breathe identity & access. From Microsoft MVPs to longtime architects, our team ensures you get solutions that are secure, scalable, and built for your reality.

Marius Solbakken Mellum
Co-Founder, Microsoft MVP and CTO
Co-founder and Principal Cloud Engineer @ Fortytwo, Microsoft Security MVP, Host of the CloudFirst Podcast and CISSP Certified.

Christopher Thomsen
Principal IAM Engineer
With 25+ years in the industry with expertise in security, networking, infrastructure, databases, virtualization, backup, and client/server and IAM.

Tim Peter Edstrøm
Principal IAM Engineer
A seasoned CIAM and IAM expert, he brings a wealth of experience, specializing in PKI, DevOps, and IAC. Since 2017, his dedicated focus on CIAM and B2C IAM solutions underscores 17+ years of industry expertise.

Ole Idar Bruvik
Principal IAM Engineer
With 20+ years in IT, spanning public and private sectors, he excels in IAM, and diverse IT domains—developer, network, security, containers, and IAC. Additionally, he has managed and led numerous technical projects.
Contact Us - Let`s Talk.
Don't wait. Start to solve.
Let`s build something extraordinary together!
Get Started Today
Contact Information
Bergen Office
Edvard Griegs Vei 1
5059 Bergen
Oslo Office
Vollsveien 21
1366 Lysaker
Brumunddal Office
Tårnvegen 55
2380 Brumunddal
Phone and email
Fortytwo Technologies AS
+47 45 600 600
hello(a)fortytwo.io
Orgnr: 991 450 068
Why Choose Fortytwo?
-
Microsoft Advanced Partner with deep expertise
-
40+ Cloud security experts
-
24/7 Monitoring and support
-
We solve problems others can't








