Skip to main content

Identity provider flexibility capability

Every organization has different identity needs. You may standardize on one IdP, work with several, or bridge across providers.


Why this matters: Flexibility avoids lock‑in, supports mergers and partner access, and lets teams move at their own pace.

The challenge: Multiple directories and providers make consistent access and governance difficult.


Our solution

Use SecureAuth as the primary IdP or as a broker across providers like Microsoft Entra ID, Okta, and ADFS. Normalize attributes, translate tokens between SAML and OIDC, and enforce consistent policies.

Key benefits

✔ Choice without compromise across business units
✔ Centralized policy and logging for governance
✔ Smoother M&A by bridging identity systems
✔ Consistent user experience across providers

Investment considerations

  • Implementation approach: Establish trust by exchanging metadata and validating certificates, configure routing rules, normalize attributes, choose and document JIT or SCIM provisioning, test SAML↔OIDC token translation, and define fallback providers.
  • Expected benefits: Unified access across providers, reduced vendor lock in, smoother M&A and partner onboarding, centralized policy and audit, and a consistent user experience.
  • Scalability: Design failover across providers and regions, support high volume multi-IdP routing, cache metadata and keys, and monitor token translation and SCIM performance.

Learn more


Frequently asked questions (FAQ)

Q: Can one application accept users from multiple IdPs?
A: Yes. Use brokering and routing rules to select the right provider per user.

Q: Do you support JIT and SCIM?
A: Yes. Choose based on lifecycle needs and app capabilities.

Q: Can we translate SAML to OIDC?
A: Yes. Use token translation where required while you modernize apps.

Q: How do we handle guest and partner users?
A: Support external IdPs with scoped policies and step‑up for sensitive actions.

Q: How is auditing handled across providers?
A: Centralize logs and policy outcomes for a unified audit trail.