Logo Inalogy
EN

    Inalogy Logo

    Your IAM Expert.

    +421 2 3810 1152
    info@inalogy.com

    INALOGY a.s.
    Černyševského 48
    851 01 Bratislava
    Slovakia

    • Home
    • About
    • Solutions
      • Identity Management Solutions
      • Access Management Solutions
      • Identity and Access Management Solutions
      • Identity Governance Solutions
      • Privileged Access Management Solutions
      • Network Security Solutions
    • What’s new
    • Case studies
    • Careers
    • Contact
    • Home
    • About
    • Solutions
      • Identity Management Solutions
      • Access Management Solutions
      • Identity and Access Management Solutions
      • Identity Governance Solutions
      • Privileged Access Management Solutions
      • Network Security Solutions
    • What’s new
    • Case studies
    • Careers
    • Contact

    +421 2 3810 1152 info@inalogy.com

    Legal information and personal data protection

    © INALOGY a.s. LinkedIn

    IAM Solution Inalogy
    • Home
    • Solutions
    • What’s new
    • Case studies
    • About
    • Contact
    EN
    InalogyWhat's newMicrosoft Identity Manager Replacement: The Case for Open-Source IGA in European Enterprises

    Microsoft Identity Manager Replacement: The Case for Open-Source IGA in European Enterprises

    10 mins read
    23 mar 26
    Microsoft Identity Manager has been a workhorse of enterprise identity management for over a decade. It’s deeply embedded in thousands of organizations — connected to Active Directory, SAP, HR systems, and dozens of custom applications, running synchronization rules and workflows that nobody fully remembers writing. And it’s reaching the end of its road.

    Microsoft extended MIM 2016 support to January 9, 2029 for Entra ID Premium customers. But the writing has been on the wall for much longer: Microsoft stopped actively developing MIM in 2021, shifting its focus entirely to Entra ID. The product hasn’t received meaningful feature investment in years. It reflects its age — complex to install, difficult to maintain, and increasingly misaligned with modern identity governance standards.

    If your organization is running MIM today, the question isn’t whether you’ll need to migrate. It’s whether you’ll do it on your terms or under pressure.

    01

    The Microsoft Migration Path — And Why It Doesn’t Work for Everyone

    Microsoft’s recommended successor is Entra ID Governance — a cloud-native platform that moves your identity governance entirely into the Microsoft cloud. For organizations deeply invested in the Microsoft ecosystem with straightforward identity requirements, this path has obvious appeal: tight integration, reduced infrastructure overhead, automatic updates.

    But Entra ID Governance is not a like-for-like replacement for MIM. The differences matter:

    Architecture. MIM runs on-premises, giving you full control over identity data, synchronization logic, and connectivity to target systems. Entra ID is cloud-first. For hybrid environments — which is most enterprises — this means managing identity synchronization across on-prem and cloud boundaries, with all the complexity that entails: forest/domain synchronization issues, custom attributes that don’t cleanly map to cloud directories, and firewalls that impede cloud-to-ground communication.

    Customization. If your organization has spent years building custom workflows, approval processes, and business rules in MIM, you’ll find that Entra ID doesn’t offer the same level of flexibility. It’s designed to work optimally within a Microsoft environment. If your business processes don’t align with that approach, you’ll need to either change your processes or build workarounds — both of which add time, cost, and risk.

    Sovereignty. This is where the conversation gets particularly relevant for European enterprises. Moving your identity governance platform — the system that controls who can access what across your entire digital estate — into a US-headquartered cloud raises questions that regulators and auditors are increasingly asking. Under NIS2, DORA, and national KRITIS regulations, organizations must demonstrate control over critical ICT systems and their data. Pointing at a Microsoft compliance attestation is not the same as pointing at infrastructure you physically control.

    Cost. Per-user pricing models look straightforward during initial evaluation. At enterprise scale, they rarely stay that way. Premium features, additional connectors for non-Microsoft systems, custom development requirements, and licensing fees compound over time. Organizations regularly report that total cost of ownership for cloud IGA significantly exceeds initial projections — especially when your identity landscape extends beyond the Microsoft ecosystem.

    02

    The Open-Source Alternative: midPoint

    For organizations where Entra ID isn’t the right fit — whether due to sovereignty requirements, hybrid complexity, customization needs, or cost — there’s a mature, production-proven alternative.

    midPoint is an open-source identity governance and administration (IGA) platform developed by Evolveum, a European company based in Slovakia. It’s recognized by Gartner in the IGA category, licensed under the European Union Public License (EUPL), and deployed across enterprises in financial services, telecom, healthcare, higher education, and public sector.

    MIM is primarily an identity provisioning engine. midPoint is a complete IGA platform. The difference matters:

    • Identity lifecycle management — automated onboarding, role changes, offboarding, triggered by HR events or manual workflows
    • Role-based access control (RBAC) — with support for organizational roles, application roles, business roles, and complex role hierarchies
    • Access certification — periodic reviews of who has access to what, with approval workflows and evidence trails
    • Policy enforcement — segregation of duties, minimum/maximum role constraints, risk-based assignment policies
    • Audit trails — complete history of every identity change, access request, and policy decision
    • Simulation — evaluate the impact of configuration changes on real data before applying them to production (a feature that generated significant interest at the recent Gartner IAM Summit in London)

    If your current MIM deployment is essentially provisioning users to AD and a handful of target systems, you’re replacing like-for-like. If you need actual governance — and under NIS2 and DORA, you increasingly do — midPoint gives you the full stack.

    03

    Deployment Flexibility

    midPoint runs wherever you need it:

    • On-premises in your data center, on infrastructure you control
    • In a private cloud within your sovereign cloud environment
    • As a managed service through Inalogy’s IAM Factory — a hosted midPoint environment where we handle operations, upgrades, and monitoring

    This isn’t a “cloud or nothing” decision. You choose the deployment model that fits your regulatory requirements, technical architecture, and operational preferences. And you can change it later without re-platforming.

    04

    Connector Ecosystem

    MIM’s connector framework (ECMA2 / Management Agents) has served its purpose, but it’s aging. midPoint uses the ConnId connector framework, which provides:

    • Native connectors for LDAP, Active Directory, databases (JDBC), CSV, REST APIs, and SCIM
    • A growing catalog of community-built connectors
    • AI-assisted connector generation through midPilot, Evolveum’s AI-powered assistant (funded by the EU Recovery and Resilience Plan), which can generate connector code from API documentation

    For organizations with extensive MIM connector estates, migration means mapping each Management Agent to a midPoint connector or resource definition. In our experience, this is rarely the bottleneck it appears to be. Most MIM connectors fall into a handful of patterns (LDAP, database, flat file, web service), and midPoint handles all of them natively.

    05

    Open Source — Why It Matters for IGA

    Being open source isn’t just about licensing costs (though the absence of per-user fees matters at enterprise scale). It’s about three things that are particularly relevant for identity governance:

    Transparency. Your security team can inspect every line of code in the platform that controls access to your entire digital estate. No black boxes. No “trust us, it’s secure.” Full auditability.

    Independence. You’re not locked into a vendor’s roadmap, pricing decisions, or strategic pivots. If Evolveum changed direction tomorrow, the code base would remain available under EUPL. Your identity infrastructure doesn’t disappear.

    Community. midPoint has an active development community, regular releases, and an upcoming 2nd Annual MidPoint Community Meetup in Prague (May 12-15, 2026) where users, partners, and the product team collaborate on the platform’s direction.

    06

    How We Migrate: A Practical Framework

    At Inalogy, we’ve migrated organizations from MIM (and other legacy platforms) to midPoint across Central and Western Europe. Here’s what a typical engagement looks like:

    Phase 1: Discovery & Assessment (2-4 weeks)

    Before writing a single line of configuration, we need to understand what you have:

    • Inventory all MIM Management Agents, synchronization rules, and connected systems
    • Map business processes that depend on identity provisioning and governance
    • Document custom workflows, extensions, and integrations
    • Assess data quality in your identity store — this is often where surprises live
    • Identify what’s actually used vs. what’s legacy configuration that nobody remembers building

    The output is a Migration Blueprint — a document your team and management can use to understand scope, timeline, risk, and resource requirements.

    Phase 2: Parallel Implementation (2-6 months)

    We build the midPoint environment while MIM continues to operate:

    • Stand up midPoint in your target environment (on-prem, cloud, or IAM Factory)
    • Configure connectors for each target system currently served by MIM
    • Implement role model, policies, and workflows — often improving on MIM’s original design
    • Connect midPoint to your identity sources (HR, AD, etc.) in read-only mode first
    • Run reconciliation to verify data consistency between MIM and midPoint

    This is where AI-assisted delivery makes a significant difference. Using AI coding tools throughout our implementation process, connector development that historically required three weeks of scoping, development, and testing now follows a different model: AI-assisted prototype in day one, engineer review and refinement in day two, client UAT in week one. Across our recent engagements, tasks that took a week now take a fraction of that time.

    Phase 3: Cutover & Decommission (2-4 weeks)

    Once midPoint is validated against your production data:

    • Switch identity sources from MIM to midPoint (phased, by target system)
    • Decommission MIM Management Agents one by one
    • Verify each cutover with automated reconciliation
    • Complete documentation and knowledge transfer

    Phase 4: Post-Migration Optimization

    Migration isn’t the finish line — it’s the starting point for modern IGA:

    • Implement access certification campaigns (likely new if you were on MIM)
    • Configure segregation of duties policies
    • Enable self-service access requests
    • Tune reporting and dashboards for compliance evidence
    • Train your team on midPoint administration
    07

    Timeline Reality Check

    Every migration is different, but here’s a realistic framework based on our experience:

    • Mid-market (1,000-5,000 users) — Simple (AD + 3-5 target systems): 3-4 months
    • Enterprise (5,000-20,000 users) — Moderate (AD + 10-15 systems + custom workflows): 5-8 months
    • Large enterprise (20,000+ users) — Complex (multiple AD forests, 20+ systems, extensive customization): 8-14 months

    These timelines assume adequate resource allocation and reasonable client-side availability. The single biggest variable isn’t technical complexity — it’s organizational readiness and stakeholder alignment.

    08

    Why Starting Now Matters

    The Evolveum partner ecosystem — including Ventum, ACEN, IT Concepts, DAASI International, and Inalogy — is seeing accelerating demand for MIM migration engagements. The partners with experienced midPoint consultants are booking up for 2026 and 2027.

    This is the same pattern we saw with SAP IDM migrations (SAP IDM mainstream maintenance ends December 31, 2027). Organizations that started planning 18-24 months ahead got their pick of partners and had time for proper discovery. Organizations that waited are now competing for scarce resources on compressed timelines.

    MIM’s January 2029 deadline feels comfortable today. It won’t feel comfortable in January 2028 when you’re trying to find an implementation partner, align stakeholders, and execute a migration in 12 months.

    09

    The Bottom Line

    Microsoft Identity Manager served its purpose. It brought identity management to enterprises that needed it, connected systems that needed connecting, and automated processes that needed automating. But its time has passed.

    The question isn’t whether to migrate — it’s what to migrate to. For European enterprises that need sovereignty, flexibility, full IGA capabilities, and cost predictability, midPoint is the strongest alternative on the market. It’s recognized by Gartner, backed by a growing partner ecosystem, and deployed in production across regulated industries.

    And with AI-assisted delivery, the migration is faster and more predictable than it’s ever been.

    If you’re running MIM and haven’t started scoping your replacement, let’s talk. Inalogy offers a no-obligation Migration Readiness Assessment — a focused engagement where we review your current MIM landscape and deliver a realistic migration roadmap.

    Inalogy is a European IAM specialist and Evolveum Silver Partner. We deliver midPoint and Keycloak implementations across financial services, telecom, higher education, and public sector, with offices in Bratislava. We’re pioneering AI-assisted IAM delivery — compressing implementation timelines without compromising quality.

    Sources: Microsoft MIM 2016 docs (EOL Jan 9, 2029) · Evolveum Migration Guide · Evolveum Partner Roundtable · On-Prem vs Cloud IGA · midPilot AI-Powered IGA

    Want to read more ?

    Palo Alto Networks Acquires CyberArk: What It Means for European IAM

    Palo Alto Networks closed its $25 billion acquisition of CyberArk in February 2026 — the…
    5 mins read
    17 mar 26
    Read more

    Why We Co-Founded IAM Factory — and What It Means for European Identity Management

    For over a decade, Inalogy has been helping organizations across Europe implement and integrate identity…
    4 mins read
    12 mar 26
    Read more

    MidPoint Earns Cybersecurity Made In Europe Badge: What This Means for Identity Data Sovereignty

    The “Cybersecurity Made In Europe” label represents a rigorous certification standard that validates complete European…
    5 mins read
    15 jul 25
    Read more
    IAM Solution Inalogy

    Your IAM Expert.

    Inalogy a.s.

    VAT ID: SK2121853778
    REG ID: 55043712

    Digital Park II, Einsteinova 23
    851 01 Bratislava
    Slovakia

    Our solutions

    • Identity Management Solutions
    • Access Management Solutions
    • Identity and Access Management Solutions
    • Identity Governance Solutions
    • Privileged Access Management Solutions
    • Network Security Solutions
    • Home
    • About
    • What’s new
    • Case studies
    • Careers
    • Contact
    • FAQ
    IAM Solution Inalogy

    Your IAM Expert.

    +421 2 3810 1152

    info@inalogy.com

    LinkedIn

      Request a demo

      Let's arrange a 30 minutes call and our consultants will show you how Inalogy IAM eases you from operations efforts and significantly increases security posture.

      This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.