Independent reference. Not affiliated with any zero trust vendor. Updated Q1 2026.
ZeroTrustCost
Identity pillar deep dive

Identity fabric cost: legacy apps, service accounts and MFA extension

No single identity provider serves every use case in a modern enterprise. Identity fabric is the layered architecture that stitches together cloud IdPs, on-premise Active Directory, identity-aware proxies for legacy apps, secrets vaults for service accounts, and workload identity. This page costs each component, sizes the fabric by organisation, and answers the legacy-app and service-account questions that recur in our search-console data.

What it is

Identity fabric in Gartner terms

Identity fabric is the Gartner-defined approach to identity for zero trust that treats identity as a layered architecture rather than a single identity provider. The fabric stitches together on-premise Active Directory, cloud identity providers (Microsoft Entra, Okta, Ping, ForgeRock), HR systems of record (Workday, SuccessFactors, BambooHR), customer identity platforms (Auth0, Entra External ID, Okta Customer Identity), workload identity for cloud-native (SPIFFE / SPIRE), and the secrets vaults that handle non-human credentials. The principle is that no single identity provider can serve every use case in a modern enterprise; the fabric makes the multi-provider reality work coherently for zero trust.

The fabric approach has emerged because the single-IdP fantasy never matches enterprise reality. Even in greenfield cloud-native organisations, customer identity is usually a separate platform from workforce identity (different scaling profile, different pricing model, different feature set). Even in Microsoft-centric organisations, the legacy applications that do not speak SAML or OIDC need something other than direct Entra integration. Even in modern devops shops, service accounts and workload identity sit outside the human-identity provider. The fabric makes these realities coherent rather than fighting them.

For zero trust specifically, the fabric is the foundation that makes the Policy Engine work across the full estate. A Policy Engine that only understands users from one IdP is blind to half the actual access requests in the environment. A Policy Engine that sits on top of a coherent fabric, with consistent identity primitives for workforce, customers, service accounts, and workloads, can make access decisions across the full estate. The fabric is what makes universal zero trust enforcement possible.

Components

The seven components of an identity fabric

Per-user or per-account pricing for the components that make up a mature identity fabric. Some are mandatory, some are optional depending on use case.

ComponentPricePurpose
Cloud IdP (primary)$6 - $15 / user / monthWorkforce SSO, conditional access, MFA. Entra ID P1/P2, Okta Workforce Identity.
On-premise AD bridging$0 - $40K / yearSync workforce identity between cloud IdP and on-prem AD. Entra Connect free; OptiKey, OneLogin AD Connector paid.
Identity-aware proxy$5 - $10 / user / monthFront legacy apps that do not speak SAML/OIDC. Entra App Proxy, Google IAP, Cloudflare Access, Okta Access Gateway.
Secrets vault (service accounts)$30K - $400K / year + per-secretShort-lived token issuance for service accounts. Vault, AWS Secrets Manager, Azure Key Vault, CyberArk Conjur.
PAM (privileged human users)$15 - $40 / privileged user / monthSession recording, just-in-time elevation, password rotation for privileged human accounts.
Identity governance (IGA)$7 - $20 / user / monthAccess reviews, entitlement management, lifecycle automation.
Workload identity (SPIFFE/SPIRE)Open source + ops, or $50K - $300K commercialCryptographically verifiable identity for workloads. Service-to-service mTLS.
CIAM (customer identity)$0.10 - $1.50 / MAU / monthCustomer identity. Auth0, Microsoft Entra External ID, Okta Customer Identity. Separate from workforce identity in most fabrics.
Sizing

Identity fabric cost by organisation size

OrganisationScaleYear 1 licenseYear 1 totalOngoing / yearNotes
Mid-market500 users / 250 service accounts$120K - $260K$250K - $500K$160K - $320KCloud IdP plus identity-aware proxy plus secrets vault. PAM and IGA in Phase 2.
Upper mid-market2,000 users / 600 service accounts$300K - $650K$650K - $1.3M$400K - $850KFull fabric: cloud IdP, AD bridging, proxy, vault, PAM, IGA. Workload identity starting.
Enterprise5,000 users / 1,500 service accounts$700K - $1.6M$1.4M - $3.0M$900K - $1.8MMulti-region cloud IdP, full workload identity, CIAM for customer-facing apps.
Large enterprise10,000+ users / 3,000+ service accounts$1.6M - $4.0M$3.0M - $7.5M$2.0M - $4.5MMulti-IdP federation across business units, full workload identity at scale, dedicated identity engineering team.
Legacy applications

How to extend MFA to apps that do not speak SAML or OIDC

Legacy applications are the most common identity-fabric scope item. Mid-market and enterprise estates routinely have ten to fifty applications that do not support SAML, OIDC, or any modern identity protocol. These applications are often line-of-business critical (ERP, accounting, scheduling, manufacturing control), sometimes maintained by tiny vendor teams, sometimes built in-house decades ago. Direct integration with a modern IdP is not possible; the apps simply do not speak the protocols.

Three patterns work, in increasing order of long-term effectiveness. Identity-aware proxy places a reverse proxy in front of the app that handles authentication before traffic reaches the legacy back-end. Microsoft Entra Application Proxy, Google Identity-Aware Proxy, Cloudflare Access and Okta Access Gateway all offer this. Cost: $5 to $10 per user per month for users accessing the legacy app, plus one to three days of engineering per app for the proxy setup. This is the fastest path and the most cost-effective in year one. Legacy modernisation rewrites or wraps the app to speak modern identity protocols natively. This is the cleanest long-term solution but the highest one-time cost: budget $50K to $500K per app depending on its complexity. Compensating network controls wraps the legacy app in microsegmentation and ZTNA so that only authenticated identity-aware traffic ever reaches it, accepting that the app itself remains identity-blind. The compensating-control path is the cheapest in year one but the weakest in audit posture, particularly for SOC 2 and ISO 27001 audits that look for MFA enforcement.

Mature programmes use all three approaches in combination. Identity-aware proxy for the simple legacy apps where the proxy setup is straightforward and the app behaviour does not require deeper integration. Legacy modernisation for the strategic apps that will be in production for another five to ten years and merit the investment. Compensating network controls for the apps that will be retired or replaced within eighteen months and do not justify the modernisation cost. The portfolio approach is more expensive in total than any single approach, but it correctly addresses the heterogeneity of the legacy estate.

Service accounts

The zero trust pattern for non-human identities

Service accounts are the most common audit finding in mid-market and enterprise environments and the most common lateral-movement vector in incident-response cases. Verizon's 2024 Data Breach Investigations Report found stolen credentials in 38 percent of breaches; service-account credentials are disproportionately represented in the lateral-movement phase of breach scenarios because they are long-lived, often shared, and rarely rotated.

The zero trust pattern for service accounts is migration to short-lived tokens issued from a secrets vault. HashiCorp Vault, AWS Secrets Manager, Azure Key Vault and CyberArk Conjur all offer this. The consuming application requests a token from the vault on demand, uses it for the immediate call, and discards it. Token lifetimes are minutes or hours rather than years. Compromise of a single token has narrow blast radius; compromise of the vault itself is the new risk concentration, which is why vaults are treated as crown-jewel infrastructure with elevated security controls.

The cost is mostly engineering time, not licensing. A vault platform license runs $30K to $400K per year for mid-market scale, which is the visible cost. The hidden cost is the per-service-account migration work: every service account is a discrete task with its own application owner, its own consuming applications, and its own credential-rotation gotchas. A typical mid-market environment has 200 to 600 service accounts; allocating two to four hours of engineering per account works out to 400 to 2,400 hours of effort, or $80K to $400K loaded. That budget line does not appear on the licensing quote and is the most under-budgeted identity-pillar cost.

A useful sequencing trick: do the secrets vault rollout in parallel with universal MFA in Phase 1 of the zero trust rollout, rather than as a separate Phase 3 workstream. The two share most of the same engineering team (identity engineering) and benefit from the same change-management runway (everyone is paying attention to identity changes during the MFA rollout). Running them in parallel saves 20 to 30 percent of the engineering cost compared to running them sequentially.

Cross-links

Related cost references

Frequently asked

Identity fabric cost questions

What is an identity fabric?
Identity fabric is the Gartner-defined approach to identity for zero trust that treats identity as a layered architecture rather than a single identity provider. The fabric stitches together on-premise Active Directory, cloud identity providers (Entra ID, Okta, Ping), HR systems of record (Workday, SuccessFactors), customer identity (CIAM), workload identity (SPIFFE / SPIRE), and the secrets vaults that handle non-human credentials. The principle is that no single identity provider can serve every use case in a modern enterprise; the fabric makes the multi-provider reality work coherently for zero trust.
How does identity fabric cost differ from buying a single IdP?
A single identity provider for a 500-user mid-market organisation runs $120K to $260K in year-one licensing. An identity fabric for the same organisation runs $250K to $500K in year-one licensing across the components: cloud IdP plus on-premise AD bridging plus an identity-aware proxy for legacy apps plus a secrets vault for service accounts plus identity governance for the lifecycle. The doubling is real but addresses use cases a single IdP cannot serve well: legacy apps that do not speak SAML or OIDC, service accounts with static credentials, federation across multiple identity stores.
How do we extend MFA to legacy applications?
Three patterns work, in increasing order of long-term cost-effectiveness. Identity-aware proxy fronts the legacy app with a reverse proxy that handles authentication before traffic reaches the legacy back-end (Microsoft Entra Application Proxy, Google Identity-Aware Proxy, Cloudflare Access, Okta Access Gateway). Cost: $5 to $10 per user per month plus one to three days of engineering per app. Legacy modernisation rewrites or wraps the app to speak modern identity protocols, costing $50K to $500K per app but solving the problem permanently. Compensating network controls (microsegmentation plus ZTNA) wraps the legacy app in identity-aware traffic, accepting that the app itself remains identity-blind, which is the cheapest short-term path but the weakest audit posture.
How do we handle service-account zero trust?
Service accounts authenticate with static long-lived credentials that cannot perform MFA. The dominant zero trust pattern is migration to short-lived tokens issued from a secrets vault. HashiCorp Vault, AWS Secrets Manager, Azure Key Vault and CyberArk Conjur all offer this. The cost is mostly engineering time, not licensing: every service account is a discrete migration task with its own owner, consuming applications and credential-rotation gotchas. A typical mid-market environment has 200 to 600 service accounts; allocating two to four hours of engineering per account works out to 400 to 2,400 hours of effort, or $80K to $400K loaded. That is the budget line that does not appear on the licensing quote.
What is the IT-manager scenario from GSC?
Our search-console data shows a specific verbatim query from a mid-market IT manager or CTO at a 1,000 to 10,000-employee organisation in regulated industries asking about ROI and licensing cost for an identity zero trust platform that extends MFA to legacy systems, manages service accounts, and reduces help-desk friction. The honest answer is that no single product solves all three problems; an identity fabric approach is required. The licensing component runs $300K to $800K per year for a 2,000-user organisation, plus $200K to $600K in year-one engineering work for the legacy-app and service-account workstreams. Help-desk ticket reduction (40 to 60 percent on identity-related tickets) typically pays back the licensing cost over two to three years.
How do we federate Active Directory with cloud IdPs?
Three architectural patterns. Hybrid identity with directory sync (Microsoft Entra Connect, Okta AD Agent) replicates AD users and groups to the cloud IdP, with passwords either synchronised or authenticated against on-premise AD via pass-through authentication. Cheapest pattern, $0 to $30K incremental cost, but creates a dependency on on-premise AD availability. Federation via SAML or WS-Fed makes the cloud IdP authoritative for the user but federates back to AD for password validation. Mid-cost ($20K to $80K in connector and AD FS work). Cloud-first with AD retirement migrates users out of AD entirely, using the cloud IdP as the system of record. Highest one-time cost ($100K to $500K) but eliminates the on-premise dependency.
What is the ROI of the identity fabric?
Three quantifiable benefits. First, help-desk reduction: identity-related tickets typically fall 40 to 60 percent once SSO consolidation and self-service password reset are in place, saving $50K to $200K annually for a 1,000-user organisation. Second, breach-cost reduction: IBM's 2024 Cost of a Data Breach report attributes $1.51M of average reduction to organisations with mature identity controls. Third, productivity: SSO consolidation saves users 15 to 30 seconds per app login multiplied by 8 to 15 logins per workday, working out to roughly 5 to 12 minutes per user per day. For a 1,000-user organisation that is 80 to 200 person-hours per day, or roughly $1M per year in fully-loaded productivity. The first two are easily attributable; the third is real but harder to claim credit for in a budget review.