Skip to content

Common Source Systems

After Active Directory and Microsoft 365, EDP should prioritize source systems that improve lifecycle visibility, operational correlation, governance, and audit readiness.

This page lists common systems to consider. It is not a commitment to integrate every system. Use the source inventory, business value, access feasibility, and pilot goals to decide what comes next.

Candidate Source System Categories

CategorySystems to ConsiderWhy They Matter
Identity and AccessEntra ID, Okta, Duo, Ping, KeycloakCloud identities, MFA, SSO, app assignments, access posture
HR and WorkforceWorkday, UKG, ADP, BambooHR, PaylocityAuthoritative employee lifecycle, departments, managers, job status
Service Desk and ITSMServiceNow, Jira Service Management, Freshservice, ManageEngine ServiceDesk PlusTickets, requests, changes, incidents, assets, approvals
Endpoint ManagementIntune, Jamf, SCCM or MECM, Tanium, NinjaOne, PDQDevice inventory, compliance, ownership, patch posture
Security PlatformsMicrosoft Defender, CrowdStrike, SentinelOne, Tenable, Rapid7, QualysRisk, vulnerabilities, endpoint security, exposure management
Email and CollaborationExchange Online, Teams, SharePoint, Slack, Zoom, Google WorkspaceCommunication, memberships, sites, mailboxes, collaboration governance
Network and InfrastructureVMware vCenter, Hyper-V, Proxmox, Nutanix, Meraki, Fortinet, Palo Alto, CiscoVMs, hosts, firewalls, VPNs, network inventory, capacity
Cloud PlatformsAzure, AWS, GCPCloud resources, IAM, costs, tags, inventory, policy posture
Backup and Disaster RecoveryVeeam, Rubrik, Cohesity, CommvaultBackup coverage, restore status, recovery readiness
Finance and ERPNetSuite, Dynamics 365, SAP, Oracle, QuickBooksVendors, cost centers, assets, purchasing, financial context
CMDB and AssetServiceNow CMDB, Lansweeper, Snipe-IT, GLPIAsset lifecycle, ownership, dependencies, inventory reconciliation
Monitoring and ObservabilityDatadog, New Relic, LogicMonitor, PRTG, Zabbix, PrometheusService health, alerts, uptime, infrastructure telemetry
Security Awareness and GRCKnowBe4, Proofpoint, Archer, Drata, Vanta, OneTrustTraining, controls, risk, compliance evidence
Source Control and DevOpsGitHub, GitLab, Azure DevOps, JenkinsRepositories, pipelines, deployments, change history
Data and Database PlatformsSQL Server, PostgreSQL, MySQL, Oracle, SnowflakeExisting operational databases and reporting sources
Facilities and Physical SecurityBadge systems, camera systems, visitor managementPhysical access and lifecycle correlation
Telephony and Contact CenterRingCentral, Teams Phone, Zoom Phone, Five9, GenesysCall queues, users, licensing, operational metrics

After Active Directory and Microsoft 365, prioritize:

  1. HR or workforce system
  2. Service desk or ITSM system
  3. Endpoint management platform
  4. Security awareness or training platform
  5. Virtualization or cloud platform
  6. Backup or disaster recovery platform

Why HR Matters Early

The HR or workforce system is often the missing authoritative source for identity lifecycle. Active Directory and Microsoft 365 can show accounts and access, but HR usually explains whether a person is active, starting, changing roles, on leave, terminated, assigned to a department, or reporting to a specific manager.

When EDP combines HR, Active Directory, Microsoft 365, and service desk data, it can answer lifecycle questions that usually require multiple spreadsheets:

  • Has every new hire been provisioned correctly?
  • Are terminated users disabled everywhere?
  • Are active users assigned the right licenses?
  • Are accounts missing managers, departments, or employee identifiers?
  • Do access requests match role or department expectations?
  • Are onboarding and offboarding tickets aligned with actual system state?

Selection Criteria

Use these criteria when deciding which source system to integrate next:

  • The system participates in a high-value operational workflow.
  • The data crosses or reconciles with at least one existing source.
  • The source owner is identified and willing to support the integration.
  • A supported API, export, or access pattern exists.
  • Required permissions can be granted safely.
  • Data sensitivity and retention rules are understood.
  • The integration creates reusable entities, marts, dashboards, or workflow value.
  • The connector can be operated repeatably through the platform runtime.

Documentation Expectations

Before a candidate becomes an active integration, document:

  • Source owner
  • Technical owner
  • Data steward
  • Access pattern
  • Connector option
  • Credential requirements
  • Data sensitivity
  • Refresh expectations
  • Raw landing targets
  • ODS entities
  • Data Vault structures
  • Data Mart outputs
  • Quality checks
  • Support path

Use the Source System Inventory and Connector Standard to keep these decisions consistent.