Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Reference Architecture: Identity Management

Status: Proposed | Date: 2025-07-29

When to Use This Pattern

Use when building:

  • Applications requiring user login via government or enterprise identity providers
  • Single sign-on across multiple services
  • Integration with Australian Government Digital ID or verifiable credentials
  • Services that need separate standard-user and privileged-user access paths

Do not use this pattern to create a new identity provider when a managed identity platform can meet the need.

Overview

Use a managed identity platform as the relying-party integration point for applications. Add a broker layer only when the service must normalise multiple upstream identity providers, verifiable credentials, or policy requirements that applications should not implement directly.

Identity Federation Pattern

The pattern separates standard user authentication from privileged administration. Both paths issue standard OIDC/SAML claims to downstream applications, with audit logging and policy enforcement at the managed platform or broker layer.

Key Benefits:

  • Single integration point for multiple upstream providers
  • Standard OIDC/SAML interface for downstream applications
  • Separate privileged and standard user domains
  • Centralised policy enforcement and audit logging

Core Components

flowchart TB
    subgraph standard[Standard User Domain]
        users[Users]
        providers[Identity Providers]
    end

    subgraph privileged[Privileged User Domain]
        admins[Administrators]
        pim[Privileged Identity Management]
    end

    platform[Managed Identity Platform / Broker]
    apps[Applications]

    users -->|authenticate| providers
    providers -->|OIDC/SAML claims| platform
    admins -->|elevate| pim
    pim -->|privileged claims| platform
    platform -->|validated tokens| apps

Project Kickoff Steps

  1. Define Trust Boundaries - Follow ADR 001: Application Isolation to separate identity runtime, application runtime, and administrative access paths
  2. Deploy Runtime - Follow ADR 002: AWS EKS for Cloud Workloads only for broker components that cannot be provided by a managed platform
  3. Configure Identity Federation - Follow ADR 013: Identity Federation Standards for OIDC-first integration, SAML fallback, claim mapping, and downstream consumer configuration
  4. Configure Persistence - Follow ADR 018: Database Patterns for broker state, session metadata, and configuration storage where required
  5. Secure Secrets and Logs - Follow ADR 005: Secrets Management for OIDC client secrets and ADR 007: Centralised Security Logging for authentication audit trails
  6. Privileged Administration - Follow ADR 012: Privileged Remote Access for break-glass and administrator access

Implementation Considerations

Provider and Claim Design:

  • Prefer OIDC for new integrations; use SAML only where the upstream provider cannot support OIDC
  • Define required claims, optional claims, and claim transformation rules before application integration
  • Avoid persistent cross-service identifiers unless there is a lawful and documented need
  • Keep application authorization decisions close to the application while centralising authentication and identity proofing

Privacy & PII Protection:

  • Minimise collected identity attributes to what each service needs
  • Prevent tracking across services using persistent identifiers unless explicitly justified
  • Prohibit disclosure of identity information for marketing purposes
  • Ensure voluntary Digital ID participation where legislation requires it
  • Define breach notification and fraud incident response processes

Assurance and Administration:

  • Match identity proofing and authentication levels to transaction risk and data sensitivity
  • Separate standard user login from privileged administration and support step-up authentication for high-risk actions
  • Maintain audit trails for login, consent, claim release, privilege elevation, and administrative configuration changes
  • Implement fallback authentication for critical services

Standards Compliance: