Skip to content

Identity & SSO

TapPass federates human login with any OIDC or SAML IdP, and issues workload identities via SPIFFE/SPIRE for agent-to-agent trust.

ProviderProtocolsGo to
Azure AD (Entra ID)OIDC + SAMLAzure AD
OktaOIDC + SAMLOkta
Google WorkspaceOIDCGoogle Workspace
OneLogin, JumpCloud, generic IdPsSAML 2.0SAML 2.0
Workloads (agents, services)SPIFFE / SPIRESPIFFE / SPIRE

Users sign in via SSO → TapPass issues a session → session is used to administer the platform (manage agents, view audit trail, set policy).

User → TapPass → IdP → TapPass → dashboard session

Agents / services authenticate via mTLS using SPIFFE SVIDs — no human credentials, no long-lived API keys.

Agent (SVID) → mTLS → TapPass → verifies trust domain → issues scoped token
  • Domain allowlist — only users with corporate email can log in.
  • Group / role mapping — IdP groups map to TapPass RBAC roles.
  • Session hygiene — session lifetime follows IdP policy (MFA, re-auth).
  • Offboarding — deactivate in IdP, user loses access within 60 seconds (sessions expire).
  • LDAP / Active Directory (direct bind) — use an IdP (Azure AD, Okta) in front of LDAP instead.
  • Generic OAuth 2.0 for user login — only the named OIDC providers above.