When creating an application, whether it is for internal if authentication or compliance is required then the developer has some difficult issues to deal with:
Usually the application team will use what the method that they are most comfortable with to and own identity infrastructure. Database developers create user tables, login screens and processes, permission and authorization modules, account registration procedures, and profile management tools.
Many, many Data Stores with identity and privacy information spread all over the organizational Entity.
A large insurance company admitted they found more than 400 applications that contained Digital Identity and Private data information. This presents the following issues for organizations to deal with: