How to Evaluate Identity Integrations to Reduce Security Risks