Case Studies
The following case studies are anonymised examples of real-world architectural work in regulated enterprise environments. They focus on architecture, security and delivery decisions rather than specific implementations or organisations.
Digital Workspace Migration – Secure Application Onboarding Pattern
End-to-end AS-IS / TO-BE analysis, identity flow validation, network constraints assessment and operational readiness.
RESTSOAPOpenAPIOIDCTLSKerberosEnterprise Security Baseline
Read full case study
Securing Legacy SOAP Integrations in a Modern Enterprise Architecture
Contract-first redesign, security requirements definition, authentication approach evaluation and interoperability testing.
SOAPWSDLWS-SecurityTLSAPI Gateway
Read full case study
Designing Consistent Identity and Authentication Flows Across Enterprise Applications
Implementation and review of OIDC and Kerberos flows, MFA integration and alignment with internal identity and security standards.
OIDCKerberosSAMLMFAActive Directory
Read full case study
Operational Monitoring Design for External SaaS Connectivity
Hybrid monitoring design for cloud and on-prem integrations using API-based checks and synthetic testing across proxy and identity layers.
SNMPRESTSOAPOAuth2Synthetic MonitoringHTTP ProbesProxiesObservability
Read full case study