ADR 013: Identity Federation Standards
Status: Proposed | Date: 2025-07-29
Context
Applications need to integrate with multiple identity providers including jurisdiction citizen identity services, enterprise directories, and cloud identity platforms. Current approaches use inconsistent protocols (SAML, OIDC, proprietary) creating integration complexity and security inconsistencies.
Modern identity federation requires support for emerging standards like verifiable credentials while maintaining compatibility with legacy enterprise systems.
Decision
Standardize on OpenID Connect (OIDC) as the primary federation protocol for all new identity integrations, with SAML 2.0 support only for legacy systems that cannot support OIDC.
Protocol Standards:
- Primary: OpenID Connect for modern identity providers and new integrations
- Legacy Support: SAML 2.0 only when upstream providers require it and OIDC is unavailable
- Security: Implement PKCE for OIDC public clients and proper token validation
- Compliance: Support Digital ID Act 2024 requirements for jurisdiction identity services
Architecture Requirements:
- Applications must integrate through managed identity platforms, not directly with identity providers
- Separate privileged and standard user domains for clear administrative access isolation
- Support multiple upstream identity providers per application
- Maintain audit trails distinguishing privileged from standard user activities
Identity Federation Flow:
Emerging Standards:
- Client applications can leverage emerging OIDC standards around verifiable credentials to simplify adoption of federated identity with jurisdiction providers
Consequences
Benefits:
- Consistent modern federation standard across all applications
- Better security through OIDC’s improved token handling and PKCE support
- Simplified integration with jurisdiction citizen identity services
- Clear separation of administrative and standard user access
Risks:
- Legacy systems may require SAML-to-OIDC translation overhead
- Dependency on external identity provider availability
- Additional complexity from managed identity platform requirements
Mitigation:
- Implement fallback authentication mechanisms for critical systems
- Choose identity platforms with high availability and data export capabilities
- Maintain audit trails following ADR 007: Centralized Security Logging