Advice & assistance to the project owner

A support from start to finish!



Synetis supports its customers from the scoping / consulting - upstream - phases to the project management in the integration phase and the follow-up of the deployment.

Projects related to Digital Identity always have a strong organizational and functional connotation , but the technical constraints are never to be neglected.


In such a context, it is important to have a trustworthy support with a real feedback on projects and solutions in order to be able to adopt a pragmatic and realistic approach.

Maturity audit

Digital identity is a broad topic for organizations - whether it's IGA, AM, DAG, PAM, CIAM, etc. What are the issues behind each of these topics? Is my organization mature on all of these issues? Am I truly compliant with current regulations? ;

At Synetis, we have developed a flash audit offer that allows you to analyze the level of maturity of your organization on all these subjects with respect to the state of the art of IAM, taking into account the regulations to which you are subject, the needs of external auditors, as well as the business needs;

This offer will allow you in a few days to identify the weak points to remedy at first, but also the strong points on which to capitalize during your future projects.

Consulting / Framing

The analysis of the existing situation is an essential and unavoidable step of the scoping mission. The objective is to highlight :

The definition of the target is based on the elements collected during the previous stage. Following the findings of the analysis phase, Synetis proposes several potential targets, adapted to the customer's context, which form a basis for reflection in workshops with the project team. The aim of these workshops is to define the target ecosystem by combining the expertise of Synetis contributors with the ambition of companies and organizations.

Each context being different, the scoping mission must be adapted and the best compromise must be found for each company and issue. Once the target is validated, the trajectory to reach the target must be determined. The possible trajectories are expressed by taking into account the projects in adherence, the planning objectives set, the budgetary constraints identified, etc.

This stage must allow for the formalization of the project's major projects to be launched, as well as the solution's deployment strategy (application deployment, deployment by population, deployment by functionality, etc.). For each step, the following are specified

The Project Plan finally provides elements of load, planning, cost, but also the organization to be set up, the actors to be mobilized, the success factors, etc. The scoping mission ends with a final report, presented to all stakeholders. The goal is to share the approach followed and to confirm the target and the trajectory identified in order to validate the launch of the project.

For the success of a scoping mission, here are some points of attention:

To go further...

Synetis also assists its customers in the choice of IAM solutions. Several approaches are possible and the choice methodology depends on the company:

AMOA - Assistance to the project owner

During the integration phase of a project, Synetis provides assistance to the project owner to the business lines:

Assistance for the design phases: functional and technical specifications, technical architecture file;

Definition of the acceptance strategy: test strategy, test plan, data sets, etc. ;

Technical and functional acceptance of the solution;

Deployment Preparation;

Work on data quality.

Access Management at Synetis

More than 45 consultants dedicated to Access Management with an average experience of more than 5 years in the field of cyber security;

More than 8 active partnerships with major market players (Microsoft, Ilex International, InWebo, Okta, Ping Identity, CyberArk, Wallix / Trustelem, Yubico) and a real expertise with other software vendors such as ForgeRock, Microsoft, OneLogin, etc. ;

Over 20 publisher certifications acquired;

More than 65 projects in progress as of 01/08/2022 - including 40+ new projects in 2022 - of all sizes (from about 10 days to more than 250 days) and of all types (scoping, audit, integration, TMA, CDS), with a commitment to results (fixed price) or to means (contracting).

Synetis is also able to organize the governance of the project: project management, organization and animation of the committee, progress and risk monitoring, deployment monitoring, etc.

Finally, Synetis supports its customers in change management and communication activities, from raising awareness among the various players to training and running skills transfer sessions.

Synetis is able tosupport its customers in the entire scope of digital identity through its consulting and project management activities:

Repository, lifecycle (process), role model, request management, self-service, provisioning, recertification, audit and compliance, etc. ;

Security repository, application inventory, SSO (eSSO, Web SSO, identity federation), MFA and adaptive authentication, API security, etc. ;

Inventory of resources and rights, centralization of privileged accounts, session registration, password rotation, etc. ;

Data classification, rights inventory, document access certification, access request process, etc. ;

Customer repository, on-boarding / off-boarding, consent, self-service, progressive profiling, synchronization, etc.

Protection and monitoring of

Our Digital Identity experts
answer your questions