This presentation will discuss how they enabled authentication in a zero trust environment by following the principles of least privilege.