Back to projects

TechOps Automation Suite

A dual-system internal platform that monitors network health in real-time and automates user profile updates across Microsoft Azure and on-prem Active Directory—saving 10+ hours/month of manual work and closing the loop between HR, IT, and infrastructure.

Node.jsReactMicrosoft Graph APILDAPAzureTeams Webhooks

Context

Tech Support was bogged down by two constant drains on time and energy:

  • No real-time visibility into office connectivity across 50+ locations.
  • Manual user provisioning across disparate systems—Microsoft Azure, on-prem AD, HR, and proprietary ops software.

Each profile update involved triple-checking data across HR exports, local AD records, and internal ops fields—then syncing that manually across environments. Fragile, error-prone, and easily 10+ hours of monthly ops overhead.

Problem

  • No single source of truth across identity systems
  • Office VPN failures were detected after user complaints
  • Microsoft/Azure sync issues created invisible discrepancies
  • Reverse-sync limitations (cloud → on-prem) left critical updates stuck
  • High touchpoint handoffs between departments (HR, IT, Tech Support)
  • Repeated tasks. No versioning. No confirmation of state.

Sentry Tech • Microsoft Azure Profile Database Sync

Screenshot of the Sentry Tech TechOps Automation Suite showing the Microsoft Azure Profile Database Sync interface
The user interface provides a clean, step-by-step workflow for syncing profile data with clear visual indicators for each stage.

Intervention

I built a unified internal tool with two main components:

1. Real-time Health Monitor

  • Deployed to Azure
  • Checks VPN/office network status across all divisions every 30 seconds
  • Alerts Tech Support instantly via Teams webhook when a gateway goes down
  • Live dashboard tracks status across all regions

2. Microsoft Profile Sync Service

Ingests three live datasets:

  • HR exports (ADP) for title and manager data
  • Internal ops CSV for office location and department info
  • On-prem AD live read/write via LDAP

Core functionality:

  • Pulls entire Microsoft tenant via Graph API
  • Runs delta comparisons per user
  • Git-style UI for reviewing + approving changes

Applies changes via:

  • Microsoft Graph API (cloud)
  • LDAP injection (on-prem) if Azure rejects due to reverse-sync constraints

3. Failsafe Handling

  • Auto-bucket failed cloud syncs for on-prem LDAP fallback
  • Ask user for final approval before writing to server
  • Full logs, rollback-safe updates, and real-time system status

Architecture Flow

System Architecture

  1. Data Acquisition Layer
    • Microsoft Graph API connector
    • LDAP connector (on-prem AD)
    • HR data parser (ADP)
    • Internal ops CSV processor
  2. Processing Engine
    • Delta comparison engine
    • Change proposal calculator
    • Validation rules processor
  3. Action Layer
    • User review interface
    • Graph API write operations
    • LDAP fallback operations
    • Error handling and logging
  4. Monitoring System
    • Office connectivity tracker
    • VPN status monitor
    • Teams webhook alerts
    • Status dashboard

A comprehensive automation system bridging cloud and on-premises environments.

Results

  • Saved 10+ hours/month in tech support profile admin
  • Reduced VPN issue time-to-detection from hours to seconds
  • Achieved full sync coverage across on-prem + cloud identity systems
  • Tech support now owns proactive infrastructure, not just reactive fixes
  • Future-proofed profile sync logic with modular processing and external source support

Impact

The system transformed our operations from reactive to proactive. Instead of chasing problems, we now prevent them before they impact users.

— Internal feedback from the Tech Support team

Reflection

This wasn't a feature. It was a systems decision.

I built a flow that connected HR, infrastructure, and IT—without needing to rewrite our stack. It's one of my proudest builds because it didn't just solve a pain point; it created new capability inside the team.

I learned:

  • How to build update-safe, delta-based data systems
  • The edge cases in Azure's sync architecture
  • When to build tools that fit the org, not just the codebase

This is the kind of internal tooling that scales with the company.