Identity as architecture
I treat IAM as system design, not only tooling. Good identity work connects protocol choices, user journeys, access models, authoritative data sources, operational controls, and the business constraints that decide whether an architecture can actually ship.
