4 min read

The Daily Grind: Advocating for Developers' Access

Should developers be allowed to register apps in Azure Entra ID? We explore both sides of this heated debate and propose a balanced, modern approach that fosters agility without compromising governance —especially in the context of government IT.
The Daily Grind: Advocating for Developers' Access

The Meeting Room Bottleneck

Imagine this: It's 2:30 PM on a typical Tuesday. I'm stuck in another "governance" session with managers who haven't written a line of code quite some time. We're debating whether Sarah—a seasoned developer with a decade of experience—should be allowed to tweak a redirect URI for an application she's been meticulously crafting for the past six months.

The absurdity of it all isn't lost on me. This is a person capable of designing microservices handling millions of transactions, implementing robust zero-trust security measures, and debugging complex authentication flows in their sleep. Yet, she's blocked from making a minor adjustment to an application registration without logging a ticket and waiting three days for someone in "IT Security" to simply copy-paste her request.

This is my reality in government IT. And honestly, it's incredibly frustrating.

The Unspoken Costs

Let me share the true toll of this pervasive control-first mindset. Just last month, our team was scrambling to launch a citizen-facing portal before a legislative deadline. We had everything polished: the frontend was smooth, the APIs were secure, and all tests passed. But we hit a wall because we needed to add a single scope to our app registration for a last-minute integration.

That crucial request lingered in someone's queue for four days. Four days when our team was effectively sidelined, taxpayer resources were wasted on idle developers, and citizens waited longer for an essential service.

When the change finally went through, the "security expert" spent precisely 30 seconds clicking a checkbox. Thirty seconds that effectively cost us four days of critical progress.

Understanding the Apprehension

After fifteen years in this field, I've come to understand this: the managers aren't malicious. They're genuinely apprehensive.

They've witnessed the fallout from poorly managed environments. They recall the incident from 2018 when a production service account key was mistakenly left in a GitHub repository. They've inherited cloud tenants that resemble digital hoards—hundreds of orphaned application registrations with bewildering names like "test-app-dont-delete" and "johns-prototype-v2."

Their caution stems from a legitimate desire to prevent harm. But somewhere along the way, we've conflated risk management with risk avoidance. We've constructed systems that shield us from errors by effectively paralyzing all forward movement.

The Personal Cost of Red Tape

What truly disheartens me? It's seeing talented developers grow disillusioned and depart for the private sector.

Consider Marcus, one of our most brilliant architects. He joined public service driven by a desire to make a tangible difference. He envisioned modernizing citizen services, crafting inclusive digital experiences, and using technology to bridge the gap between government and its people.

But after two years of battling ticket systems just to perform his core duties, he burned out. His final email to the team was poignant: "I can't spend more time fighting the organization than I spend addressing the actual problems we're here to solve."

We're not just losing valuable expertise; we're losing the individuals who genuinely care enough to strive for improvement.

A Story of Empowerment

Allow me to recount one of the rare instances where we genuinely succeeded. We had a pilot project with a forward-thinking executive who opted to empower his developers. We granted senior developers on three teams the autonomy to manage their own application registrations, coupled with clear guidelines and regular reviews.

The results? Our deployment frequency surged by 300%. The time-to-market for new features shrank by weeks. And surprisingly, security incidents didn't increase—they actually decreased because developers finally possessed the visibility into their own configurations to identify issues proactively.

Most significantly, the developers were happier. They felt trusted. They embraced ownership. They began staying late, not out of obligation, but because they were genuinely excited about what they were creating.

Charting a Balanced Course

I'm not advocating for a free-for-all. My argument is for intelligent delegation. Here's what experience has shown me works:

  • Begin with trust, then layer safeguards: Provide developers with read access to everything. Let them learn by observing how existing applications are set up. Knowledge forms the bedrock of sound security.
  • Empower senior staff: Your senior developers and team leads are not interns. They are accomplished professionals who have earned their expertise. Entrust them with managing application registrations for their own projects.
  • Automate routine tasks: Leverage the built-in protections within cloud platforms. Require administrative approval for high-risk permissions. Establish automated audits to identify dormant registrations. Design templates and standards that make the secure path the easiest one.
  • Measure what truly matters: Track deployment frequency, lead time, and developer satisfaction alongside traditional security metrics. You can't improve what you don't track.

The Broader Impact

This isn't merely about developer efficiency. It's fundamentally about serving citizens more effectively. Every day we're delayed by bureaucratic friction is a day citizens wait longer for vital services. Every talented developer who leaves because they're stifled is a loss to the public good.

Government IT has a responsibility to operate with maximum efficiency and effectiveness. We are stewards of taxpayer funds and public trust. We simply cannot afford to squander either on unnecessary bureaucratic hurdles.

The Imperative for Change

The future of government IT doesn't demand a choice between security and agility. It requires constructing systems that are both robustly secure and highly responsive, both well-governed and empowering.

We need leaders who grasp that trust is not a vulnerability—it's a multiplier of capability. We need processes that facilitate rather than impede. We need to shift from asking "How can we prevent every mistake?" to "How can we recover from them swiftly and learn quickly?"

Most importantly, we must never forget our core purpose: to serve. Not to control, not to gatekeep, but to enable exceptional work that benefits the public.

My Ongoing Commitment

Each morning, I awaken and choose to engage in these battles anew. I argue in meetings, draft proposals, build proof-of-concepts, and strive to influence perspectives one conversation at a time.

Some days, I question if it's truly worth the effort. Some days, I consider joining Marcus in the private sector, where trust is often the norm and bureaucratic hurdles are the exception.

But then I recall why I'm here. I'm here because government technology is profoundly important. I'm here because citizens deserve digital services that actually function. I'm here because the next generation of public servants shouldn't have to fight the same struggles I face today.

So tomorrow, I'll rise and do it all over again. Because the ultimate objective isn't merely control.

It's progress.

And progress hinges on trust.

DigitalOcean Referral Badge