Skip to main content

Help us improve the Digital Marketplace - send your feedback

Through Technology Limited

Cloud Identity Management, Migration and Consolidation

This service provides expert support to address your challenges in managing identity on cloud services, including migration, consolidation from multiple systems, Joiner/Mover/Leaver (JML) processes, synchronisation, deduplication, security and day-to-day management.


  • End-to-end Service from Discovery to Early Life or Ongoing Support.
  • Consolidates identities from multiple Microsoft365 or Google Workplace Domains
  • Develops your identity management strategy for cloud / multi-cloud
  • Migrates identity between on-premise and cloud, or between clouds.
  • Improves/Establishes joiner/mover/leaver (JML) processes
  • Implements identity / authentication security and identity monitoring
  • Implements Privileged Identity Management tools and processes
  • Effective collaboration with third-party suppliers and internal teams
  • Supports or leads business engagement and communication
  • Supports business case creation, quantifying and measuring benefits


  • Improve user experience and security by removing duplicate identities
  • Improve efficiency and user experience by consolidating systems
  • Reduce license costs for multiple systems & environments
  • Improve security and license spend with effective JML processes
  • Identify and remove dormant accounts & license costs
  • Define / Develop effective identity strategy for cloud & multi-cloud
  • Expert supplier, experienced on with large central government identity management
  • Microsoft Gold Partner, but Technology agnostic supplier.
  • Fix identity issues holding back your digital and technology strategy


£300 a unit a day

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

1 5 6 9 7 4 1 7 2 8 8 6 5 0 9


Through Technology Limited Peter Hanney
Telephone: +44 (0)7913334794


Planning service
How the planning service works
Identity migration and consolidation can be a complex process where you have multiple cloud systems or thousands of users. We undertake a comprehensive discovery exercise, then plan any required changes to ensure that they are designed, tested and delivered on time and to budget. We work with or oversee any internal or third-party technical teams required along with your business users to ensure any user-impacting changes are well communicated, scheduled and managed. We can work within your existing planning and operational change processes or bring our own standard agile processes and tools should this be required. Where identity management forms part of a larger cloud implementation or migration project, we can either undertake the other elements (such as data migration and scheduling) or work openly and collaboratively with your internal teams or other suppliers to deliver the project's overall objectives.
Planning service works with specific services
Hosting or software services the planning service works with
  • Any identity management solution, including but not limited to..
  • Microsoft Azure Active Directory (AAD) and Microsoft Active Directory (AD)
  • Azure AD Connect and Active Directory Federation Services (ADFS)
  • Google Workspace / Directory
  • Amazon AWS Directory Services
  • Okta
  • Palo Alto Cloud Identity


Training service provided
How the training service works
For any user-impacting changes, we will provide user guidance in plain-English and an appropriate format, either providing the technical content for your user engagement team or producing written or video guidance directly for your end users. We will also train service desk teams in what changes to expect during any migration activity and in early life support, providing knowledgebase articles and service desk guidance to ensure the best possible user experience and high first-time-fix rates.
Training is tied to specific services

Setup and migration

Setup or migration service available
How the setup or migration service works
We provide an end-to-end service for cloud migration and identity management, starting from initial discovery where we take onboard user requirements, security/compliance requirements, infrastructure dependencies, business requirements, source and target systems, through design, planning, testing, implementation, early life support and onward if required. We are toolset agnostic and will work with your chosen migration tooling or recommend the best option. We also help establish identity management processes, including identity monitoring, privileged identity management and Joiner/Mover/Leaver (JML) to improve security, reduce costs and ensure identity remains well-managed in your organisation. All of our work aligns to the Technology Code of Practice, NCSC guidance and principles, applicable legislation (e.g. GDPR) ,best practice and is undertaken in accordance with our ISO27001 certified Security management system and processes.

We have previously led identity management and consolidation work for environments up to 100,000 users in central government. Please get in touch at any point to discuss your requirements or clarify any aspect of this service.
Setup or migration service is for specific cloud services

Quality assurance and performance testing

Quality assurance and performance testing service
How the quality assurance and performance testing works
Identity management is literally the key to our digital and technology platforms and services. We apply rigorous quality assurance and testing to all of our work and, where required, to your third-party suppliers and internal teams.

All of our work is subject to our own quality management processes and assessment. Performance planning is undertaken from initial discovery of your infrastructure and then any migration or processing activities will be performance tested to ensure we understand realistic throughput figures to feed into planning and scheduling activities. Our expert engineers can troubleshoot any performance issues with your existing cloud services or infrastructure.

Security testing

Security services
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy
  • Security testing
  • Security incident management
  • Security audit services
  • Other
Other security services
  • Implementing Authentication and Security measures including:
  • Privileged Identity Management
  • Authentication Solutions (Multi-factor & passwordless)
  • Identity Management & SIEM Implementation & Integration
  • Identity Protection
Certified security testers
Security testing certifications

Ongoing support

Ongoing support service
Types of service supported
  • Buyer hosting or software
  • Hosting or software provided by your organisation
  • Hosting or software provided by a third-party organisation
How the support service works
We tailor support to the customer's requirements and project scope, providing 1st-3rd line and early-life support as needed. We will work with your IT Service Management Tooling where this is preferable (e.g. as part of a wider service model) or can supply our own.

All customers' will have a named service manager responsible for any ongoing support and aftercare required.

Service scope

Service constraints
None. Any potential constraints would come from specifics of the customers' requirements and environment and be identified in our proposal.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Service levels, Service Hours and Service management tooling would be driven by customer need and discussed in procurement or through pre-procurement clarification of our service offering.

We either provide our own service management tooling, or utilise our customers' systems where joining an existing service model.
User can manage status and priority of support tickets
Online ticketing support accessibility
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
We typically use the same chat tools that your users are familiar with and using day-to-day, such as Microsoft Teams, Slack, Google or chat in your existing IT Service Management toolset. This removes the need to teach users (and their assistive technology) a new chat platform.

We fully recognise the importance of providing a great support experience for all users and will work with you to ensure this is well-managed.
Support levels
Service levels, Service Hours and Service management tooling would be driven by customer need and discussed in procurement or through pre-procurement clarification of our service offering.


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
British Standards Institute (BSI) - BSI Certificate Number IS 743920
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
Nothing, it covers the full scope of our G-Cloud Services.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications

Social Value

Fighting climate change

Fighting climate change

Through Technology is a Carbon Negative Business and formally assessed and certified as such with the PAS2060 Carbon Neutral Plus standard. This means that our services are operated to remove more carbon dioxide from the atmosphere than our business has created or will create in future, already significantly exceeding HM Government's Net Zero targets. Our business was designed with a very carbon-efficient business model. Building on this foundation, we have a process of continual improvement. We annually calculate our carbon footprint using the reputable service, identify further reductions in our environmental impact, then offset -double- the residual carbon footprint of our business through the same scheme reputable UK tree-planting scheme used to offset HM Government ministerial travel. Measuring our footprint every year, optimising it and offsetting double, scales with our business and automatically applies to every service we provide (through G-Cloud or elsewhere). Furthermore, because trees last for many years, our positive impact on carbon capture and storage will continue to grow greater and greater across the lifetime of our business. As a business, we are also focussed upon helping our customers achieve your outcomes. We consider environmental impact in the work we undertake as part of our services many of which involve carbon reduction through modernisation of systems and migration to the cloud. Fighting Climate Change is something we are passionate about. We are proud of the contribution we make as UK Small Business. It also shows our commitment to not only meet, but exceed government targets for fighting climate change and goals of Procurement Policy Notes PPN 06/20 (Social Value) and PPN 06/21 (Taking account of Carbon Reduction in major contracts). Further detail, including "Beyond Net Zero - The Through Technology Environmental Impact Plan" available upon request.
Covid-19 recovery

Covid-19 recovery

In Through Technology, we have a very strong focus on achieving value for the tax-payers money and on supporting the UK economy. We are a UK Small Business, paying all our taxes in the UK and operating in full compliance with UK Tax regulations. We are members of the TechUK industry body, volunteering time via our seat on their Justice and Emergency Services Committee to help to define and deliver best practice in work between the Digital & Technology industry and government. We are signatories to the UK Government Small Business Commissioner’s Prompt Payment Code. Meaning we commit to paying our supply chain within 30 days and have never yet failed to do so, even when we ourselves have faced delays in our payments. Our company principles include sharing knowledge and building capability with our customers’ internal teams. This can be seen in our “Insource Transition Support” service published on G-Cloud. Helping our customers insource and develop their internal teams will drive upskilling and job creation within our public sector customers. We have a defined standard business process to actively seek out opportunities for savings and cost avoidance for our customers in everything we do. This process has resulted in savings and cost avoidance of over £10M in the last 3 years, saving our customers more than we have cost them while we have also delivered all of our contracted scope. We have also created new jobs in our business during the Covid 19 pandemic and continue to collaborate effectively with our customers remotely through their choice of tooling and onsite following all current Covid guidance.
Tackling economic inequality

Tackling economic inequality

Through Technology are committed to fighting economic inequality. As a modern business without strong geographic ties, our hiring policy is to prioritise recruitment from areas of high social deprivation as identified in the Department for Levelling Up, Housing and Communities' English Indices of Deprivation). At present, 40% of our staff are from these areas and as our business grows, so will this percentage, ensuring that most of the tax-payer money spent on our services ends up in the local UK communities that need it the most. We are an equal opportunities employer that recognises and actively seeks out the benefits of diverse and inclusive teams to our business, to our customers and to wider society.
Equal opportunity

Equal opportunity

We are an equal opportunities employer that recognises and actively seeks out the benefits of diverse and inclusive teams to our business, to our customers and to wider society. This is built into our policies, procedures and contracts, and lived day to day. We have worked to remove any bias from our organisational processes, including subconscious bias where it may exist. An example is that the first stage of our recruitment process is anonymised, minimising the impact of any potential bias in CV and Application evaluation. We are signatories to the Armed Forces Covenant and seek proactively to recruit ex-forces personnel, overcoming some of their challenges in returning to civilian life. Our recruitment process for opportunities is intentionally designed to be accessible and open to all. Our teams working through G-Cloud are diverse and include people from different parts of the UK, age groups, ethnic origin, gender, disability and faith.


Through Technology’s defining characteristic is the quality of our people, so we take well-being very seriously and have a number of measures in place to support the well-being of our staff and people they work with. Despite our relative small size, we have a board member responsible for staff wellbeing and a number of policies and processes which we live every week to maintain it. Examples include: Providing private health cover for all employees, offering time out for voluntary work in our local communities (including current staff acting as school governors, volunteering careers guidance in schools, acting as community representatives and teaching practical philosophy/life skills), funding a qualified Mental Health First Aider within the business, fostering a culture that welcomes private or public discussion of mental health and well-being (including open discussion of our CEO’s personal experiences). We also care about the well-being of those we work with in our supply chain, our customers, and their third-party suppliers. If we identify any well-being or stress-related issues with colleagues outside our organisation, then we handle these sensitively through the appropriate process or channel.


£300 a unit a day
Discount for educational organisations

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.