Skip to content

Overview of Authentication Federation

The SiX IDaaS & IAM Identity Application provides a fully OIDC/OAuth2-compliant Identity Provider (IdP) out of the box. This IdP concurrently supports SAML2, allowing clients to authenticate using either OIDC/OAuth2 or SAML2, depending on their specific integration requirements.

Developers can easily deploy a brandable and highly configurable IdP with minimal setup effort.

The platform is architected to decouple authentication from authorization, enabling flexible integration patterns and a clean separation of concerns. It also supports Federated Authentication, allowing the IdP to delegate user authentication to external identity providers.

Protocol Agnosticism

From a client's perspective, it can act as either an OIDC/OAuth2 or a SAML2 client to interact with the SiX IDaaS & IAM IdP, regardless of how the IdP handles the underlying authentication internally.

Enhanced Security

Following federation, your IdP users can benefit from Multi-Factor Authentication (MFA) and granular consent control for personal information sharing. Learn more at: Overview of Data Security & Privacy.

Delegated Authentication

Authentication federation refers to the process of delegated authentication. When the IdP within a SiX IDaaS & IAM tenant receives an authentication request, it delegates that request to a pre-configured external identity provider.


Why Federated Authentication Matters

Seamless Integration and Unified Identity

When deploying software—whether on-premises or as a SaaS solution—customers prefer utilizing their existing corporate accounts (e.g., credentials from Active Directory) rather than managing separate logins for every system. However, software still requires a reliable authentication mechanism to function, typically assigning each user a unique internal ID.

If every third-party application relies on its own isolated authentication system, data silos emerge. The same user ends up with different IDs across various systems, making end-to-end integration cumbersome. Without a unified identity, linking user data across platforms becomes a significant technical challenge.

The Solution: Federation with a Corporate IdP

By federating authentication with the customer’s existing IdP (such as corporate Active Directory), you resolve these identity conflicts. Here is the typical workflow:

  • User Authentication: When a user accesses your software, they are redirected to their familiar corporate IdP for login.
  • Global User ID: Upon successful authentication, your system receives a token containing the user’s Global Unique ID (e.g., an immutable object ID).
  • Local Account Mapping: Your software creates a local user account, assigns an internal ID, and links it to the Global ID provided by the IdP.
  • Seamless Integration: In end-to-end integration scenarios, the Global User ID serves as the consistent key to unify data across all federated systems.

Strategic Benefits

By implementing federation with SiX IDaaS & IAM, you provide your customers with:

  • Single Sign-On (SSO) – Users log in once to access all integrated systems.
  • Enhanced Security – Centralized enforcement of MFA and security policies.
  • Data Interoperability – Elimination of silos by linking user data across platforms using a universal identity.

Typical Federation Flow

Authentication Federation Flow


🔐 Federated Identity Provider Options

NoFederated IdPDescriptionTypical Use CaseCredential LocationPass-through SiX IDaaS & IAM?
1NoneNo federationLocal tenant-managed usersSiX IDaaS & IAMYes
2OIDC IdPPlatform acts as OIDC clientSSO with external OIDC providers (Azure, Google)Federated IdPNo
3SAML2 IdPPlatform acts as SAML2 SPSSO with external SAML2 providers (Okta, AD FS)Federated IdPNo
4HTTP/HTTPS IdPREST API-based authenticationCustom integration with legacy corporate directoriesFederated IdPYes
5Custom IdPForwarded encrypted auth flowAdvanced custom or proprietary identity systemsFederated IdPNo

A leading software solution provider