Professional abstract network technology representing cloud identity and Zero Trust security

Cloud Identity & Zero Trust for Modern Business

Unified identity across Apple, Linux, and Windows—without domain controllers, VPNs, or infrastructure that assumes everyone's in the office. We architect and deploy JumpCloud, Okta, Microsoft Entra ID, and open-source platforms based on what actually fits your environment, not which vendor pays us the best commission.

Cloud Directory & Zero Trust Identity

Active Directory was built for a world where work happened inside four walls on Windows PCs. But modern business doesn't have borders like the 90s Windows world did. Your team works from home, the coffee shop, or client sites. Half your apps live in the cloud. You've got Macs, iPads, Linux servers, and maybe some Windows laptops—all needing secure access to the same resources. Stretching AD across this landscape means VPNs, domain controllers, Group Policy workarounds for Macs, and a mounting list of "that doesn't work for Apple users" frustrations.

Cloud directory platforms—JumpCloud, Okta, Microsoft Entra ID (Azure AD), and open-source solutions like Authentik or Keycloak—were built for this hybrid reality from day one. Every device authenticates through one unified directory. Single sign-on works for cloud apps and on-premise services. MFA, device posture checks, and conditional access policies enforce Zero Trust security without requiring users to remember whether they're "on the network" or not. And because it's cloud-native, there's no server hardware, CALs, or patching overhead.

magnumit evaluates and implements the right identity platform for your environment—not the one with the best reseller margin. JumpCloud works brilliantly for Apple-first organisations and SMBs (we're certified partners). Okta fits enterprises with complex compliance requirements. Entra ID makes sense if you're heavily invested in Microsoft 365. Open-source platforms like Authentik give you full control and zero licensing costs. We assess your stack, map dependencies, and design the architecture that actually fits—then migrate you there with MFA, device trust, SSO, and Zero disruption.

Identity & Zero Trust Services

Cloud Directory Migration & Deployment

Platform selection, architecture design, and deployment of cloud identity platforms: JumpCloud, Okta, Microsoft Entra ID (Azure AD), or open-source solutions. Complete migration from on-premise Active Directory or first-time directory implementation for cloud-first organisations.

What's included
  • Platform evaluation and recommendation (JumpCloud, Okta, Entra ID, Authentik, Keycloak)
  • Migration planning from Active Directory with zero downtime strategy
  • User and group provisioning across Mac, Windows, Linux, iOS/iPadOS devices
  • Directory federation and hybrid identity sync (AD + cloud coexistence)
  • LDAP/SAML compatibility for legacy apps and services
  • Admin delegation and role-based access control (RBAC)

Single Sign-On (SSO) Integration

Seamless access to all your cloud and on-premise applications with one set of credentials. SAML, OAuth, and OIDC integrations for Google Workspace, Microsoft 365, Slack, Zoom, and custom apps.

What's included
  • SAML SSO for 200+ pre-built connectors (Xero, Salesforce, Atlassian, etc.)
  • OAuth/OIDC integration for modern web apps
  • RADIUS authentication for Wi-Fi (802.1X) and VPN
  • Legacy app integration using LDAP or Kerberos
  • Automated user provisioning and de-provisioning (SCIM)
  • Session management and forced re-authentication policies

Multi-Factor Authentication (MFA)

Enforce MFA across every login: devices, apps, VPN, Wi-Fi. Push notifications, TOTP, hardware keys (YubiKey, WebAuthn), and SMS/email options for users at every technical level.

What's included
  • Push-based MFA via mobile apps (JumpCloud Protect, Duo, Okta Verify)
  • Time-based one-time passwords (TOTP) with Google Authenticator, Authy
  • Hardware security keys (YubiKey, Touch ID, Windows Hello)
  • SMS and email MFA for users without smartphones
  • Conditional MFA (enforce for sensitive apps, skip for trusted devices)
  • MFA bypass management and emergency access procedures

Zero Trust Device Posture & Conditional Access

Trust nothing by default. Enforce compliance before granting access: require disk encryption, OS updates, MDM enrolment, and approved device state before users can authenticate.

What's included
  • Device trust enforcement (only MDM-enrolled devices can authenticate)
  • Conditional access policies based on user, device, location, and time
  • FileVault/BitLocker encryption verification before login
  • OS version compliance (block outdated macOS, Windows, iOS versions)
  • Integration with Jamf, Intune, or open-source MDM platforms
  • Network-based conditional access (different rules for office vs remote)

Apple + Linux + Windows Unified Management

One directory for every platform. macOS binds natively via Open Directory integration. Linux servers authenticate via LDAP/SSSD. Windows joins the cloud domain. No more platform silos or workarounds.

What's included
  • macOS local account management with password sync and FileVault integration
  • Linux PAM/SSSD authentication with sudo policy enforcement
  • Windows cloud domain join (native Azure AD join or LDAP-based)
  • iOS/iPadOS managed Apple ID integration via Apple Business Manager
  • Cross-platform group policies (different enforcement per OS)
  • SSH key management and certificate-based authentication

Migration & Directory Transition Services

Structured migration from on-premise Active Directory to cloud identity with minimal business disruption. Hybrid coexistence, phased user cutover, and complete AD decommissioning support.

What's included
  • AD to cloud migration planning and runbook development (JumpCloud, Okta, Entra ID)
  • Hybrid identity sync (coexist AD + cloud platform during transition)
  • User and computer object migration with password reset coordination
  • Application dependency mapping (what still needs AD?)
  • GPO translation to cloud policies or MDM profiles
  • Post-migration AD decommissioning and cost recovery analysis

Why Choose magnumit for JumpCloud & Cloud Identity

We Recommend What Actually Fits

We've deployed JumpCloud for Apple-first schools and studios (we're certified partners—it works beautifully for that use case). We've implemented Okta for professional firms with complex compliance requirements. We've integrated Entra ID for organisations heavily invested in the Microsoft ecosystem. And we've built open-source identity platforms for clients who want full control without vendor lock-in. Every recommendation is based on your actual requirements and team capability—not which vendor gives us the best kickback.

We Actually Understand How Macs Work

Most identity consultants treat Macs like broken Windows PCs. We don't. We've been architecting Apple-first infrastructure since macOS Server was a thing. Our identity implementations bind Macs properly (no directory utility hacks), integrate with Jamf for device trust, escrow FileVault keys correctly, and enforce the same security posture as Windows—without assuming you're running domain controllers. Linux servers get the same treatment: LDAP/SSSD authentication, group policies, SSH key management, and sudo controls that actually work.

Security Isn't Something We Add Later

MFA, device trust, conditional access, and encrypted credentials aren't things we "enable when you have time." They're designed in from day one. Before a user can log in, we verify disk encryption is enabled, the OS version is current, the device is enrolled in MDM, and it's on your approved hardware list. We integrate 802.1X so untrusted devices can't reach your network even if they guess the Wi-Fi password. Security that actually works, not box-ticking exercises for compliance audits.

We Don't Do Rip-and-Replace Migrations

Moving from Active Directory doesn't mean taking everyone offline for three days whilst we panic-migrate 200 user accounts. We design phased transitions: AD and cloud directory coexist whilst we migrate users in waves (IT team first to catch the issues, then departments one at a time). Apps move to SSO gradually. Domain controllers stay online until everything's validated and working. Most organisations finish in 6-12 weeks with zero business disruption. And we document what we did so your team actually understands the new architecture.

Cloud Identity Solutions by Industry

Canterbury Schools & Education

Primary, secondary, and tertiary institutions

  • Cloud directory for student and staff authentication (no Windows Server licensing)
  • Integration with Apple School Manager and Google Workspace for Education
  • RADIUS authentication for 802.1X Wi-Fi (BYOD and school-owned devices)
  • Teacher-managed student groups with automated provisioning per term
  • Chromebook, Mac, and Windows device support from one directory
  • MFA for staff, simplified login for students (grade-level policies)

Christchurch Creative Studios

Design studios, production houses, media agencies

  • Mac-native authentication with Jamf integration and FileVault key escrow
  • SSO for Adobe Creative Cloud, Frame.io, Slack, and collaboration tools
  • Linux render farm authentication with SSH key management
  • Conditional access: MFA for remote users, certificate auth for office Macs
  • Freelancer temporary access with automated deprovisioning
  • No VPN required—Zero Trust access from anywhere

Professional Services Firms

Law firms, accounting practices, consultancies

  • Compliance-ready identity with audit logging and privileged access management
  • Microsoft 365 and Xero SSO integration with conditional MFA
  • Device trust enforcement (only firm-managed laptops can access client data)
  • Partner and client guest access with time-limited credentials
  • Encrypted password vaults and secure credential sharing
  • ISO 27001 and legal privilege documentation support

Growing SMBs (10-150 staff)

Scaling Christchurch businesses outgrowing Google Workspace passwords

  • Cloud directory deployment at $3-12/user/month (vs Windows Server + CALs)
  • SSO for SaaS apps (no more password spreadsheets)
  • Mac, Windows, and Linux workstation management from one console
  • Remote/hybrid workforce support without complex VPN infrastructure
  • Scalable architecture that grows from 10 to 500 users without redesign
  • Training for internal IT or office managers to operate ongoing

Frequently asked questions

Common questions about working with magnumit

How do you decide which cloud identity platform to recommend?

We evaluate your existing stack, platform mix, and security requirements. JumpCloud fits Apple-first SMBs with 10-500 users beautifully—strong Mac/Linux support, straightforward pricing, and easy integration with Jamf. Okta works for enterprises needing advanced compliance features, extensive app catalog, and enterprise support. Entra ID (Azure AD) makes sense if you're heavily invested in Microsoft 365 and already licensing E3/E5. Open-source platforms like Authentik or Keycloak give you full control and zero licensing costs but require more operational expertise. We map your dependencies, provide a comparison matrix, and recommend what actually fits—not what has the best reseller margin.

When should we migrate from Active Directory to cloud identity?

If you're managing more Macs than Windows PCs, supporting remote/hybrid workers, running mostly cloud apps (Google Workspace, Microsoft 365), struggling with VPN complexity, or your on-premise domain controllers are end-of-life—you're likely ready. Cloud identity works best for organisations between 10-1000 users where "the office" isn't a single physical location anymore. We assess your environment, map dependencies, and provide a migration recommendation during your strategy session.

Can cloud directory platforms replace Active Directory completely?

For most organisations, yes. Modern cloud platforms provide Windows domain join, Mac binding, Linux authentication, SSO, MFA, and group policies—everything AD does plus modern Zero Trust features. However, if you run legacy apps hardcoded to AD LDAP, on-premise Exchange, or Windows Server infrastructure that requires domain trusts, you may need hybrid identity (cloud + AD coexistence) rather than full replacement. We map your dependencies and design the right architecture—whether that's full migration, hybrid coexistence, or a phased transition.

How does cloud identity work with Jamf for Apple devices?

Cloud identity platforms and Jamf integrate seamlessly. The identity platform handles user authentication (SSO, MFA, passwords), whilst Jamf manages device configuration (profiles, apps, compliance, inventory). Users authenticate to their Mac via their cloud credentials, FileVault recovery keys escrow to both platforms, and device trust policies ensure only Jamf-enrolled Macs can authenticate. It's the same separation you'd have with AD + Jamf, but without domain controllers or VPNs. Works with JumpCloud, Okta, Entra ID, or open-source platforms.

How does device posture enforcement actually work?

Before a user can authenticate, the identity platform checks: Is the device enrolled in MDM (Jamf/Intune)? Is disk encryption enabled (FileVault/BitLocker)? Is the OS version approved? Is the device on the trusted hardware list? If any check fails, authentication is denied until the device complies. This works for logging into the Mac/PC, accessing SSO apps, connecting to Wi-Fi (RADIUS), and VPN access. It's automatic, enforced at every login, and doesn't rely on users "choosing" to be secure. Supported across all major cloud identity platforms.

What MFA options work for non-technical users?

Push notifications are simplest: user taps "Approve" on their phone when logging in. For users without smartphones, we configure SMS or email MFA codes. For high-security roles (IT admins, finance), we enforce hardware keys (YubiKey, Touch ID). You can also set conditional MFA: require it for remote access but skip it for office-connected trusted devices. Most organisations see 95%+ MFA adoption within two weeks with proper onboarding.

How much does cloud identity cost compared to Active Directory?

Cloud platforms charge per-user/month (typically $5-15 depending on features and platform). Active Directory requires Windows Server licenses, CALs for every user, domain controller hardware, backup infrastructure, patching overhead, and specialist admin knowledge. For most organisations, cloud identity costs less than running on-premise AD once you account for hardware, licensing, and admin time. The bigger win is operational—no more patching domain controllers at 2am or dealing with replication issues. We provide a TCO comparison during your strategy session based on your actual user count and requirements.

Can cloud identity work with our existing Google Workspace or Microsoft 365?

Yes. Cloud identity platforms integrate as the identity provider for Google Workspace (SAML SSO), Microsoft 365 (federated auth), and 200+ other cloud apps. Users log in once with their cloud credentials and get automatic access to Gmail, Drive, Office 365, Slack, Xero—whatever you've configured. User provisioning is automated via SCIM (when someone's added to the directory, accounts are created in all connected apps). Deprovisioning works the same way. Works across JumpCloud, Okta, Entra ID, and open-source platforms.

What happens if the cloud identity platform goes offline—can we still work?

Most platforms cache credentials locally on macOS, Windows, and Linux, so users can still log into devices offline (last 30-90 days of passwords cached depending on platform). However, SSO apps and new logins require internet connectivity to the cloud infrastructure (99.9-99.99% uptime SLAs depending on platform). For organisations with strict uptime requirements, we design hybrid architectures with local fallback authentication or implement high-availability platforms like Okta with on-premise agents.

Do you provide ongoing support after cloud identity deployment?

We can, but it's optional. Some clients want us to monitor and manage their identity platform ongoing ($1,500-3,500/month depending on user count and platform), which includes user provisioning, policy updates, integration changes, and incident response. Others prefer to run it themselves—in which case we document everything properly, train your team, and provide support when you need it. Most clients start with managed service for 3-6 months then transition to self-operation with our on-call support.

Serving Organisations Across New Zealand

Based in Christchurch with cloud identity deployments across Canterbury's education, creative, and professional sectors. JumpCloud migrations and Zero Trust implementations delivered nationwide.

Christchurch & Canterbury Service Areas

Christchurch CBD Riccarton Papanui Fendalton Merivale Addington Sydenham Selwyn Waimakariri Rolleston Lincoln Rangiora Kaiapoi

Cloud identity consulting and migration services available nationwide across New Zealand.

Ready to Move Beyond Active Directory?

Book a strategy session and we'll assess your current identity infrastructure, map dependencies, and design a migration path to modern cloud directory with JumpCloud, with clear recommendations and no obligation to proceed.