Cybersecurity Reference > Glossary
What is Federated Identity or Identity Federation?
Think of it as building bridges between different identity silos—when a user logs in through one system, that authentication gets recognized and accepted by others in the federation. This is different from simply syncing passwords or copying user accounts everywhere. Instead, the systems establish trust relationships and exchange authentication tokens, so when you prove who you are to one system, the others take its word for it.
The mechanics involve identity providers (IdPs) that verify users and service providers (SPs) that trust those verifications. When you log into a corporate application using your company account, then access a partner organization's portal without logging in again, you're experiencing identity federation. The same technology powers "Sign in with Google" buttons, though enterprise implementations typically use protocols like SAML or OAuth. Federation reduces password fatigue and simplifies access management, but it also creates dependencies—if your identity provider goes down or gets compromised, every connected system feels the impact.
Origin
The breakthrough came with Security Assertion Markup Language (SAML), released in 2002 by OASIS. SAML provided a standardized way for systems to exchange authentication and authorization data in XML format. Around the same time, Shibboleth emerged as an open-source federation solution for higher education, where students needed access to resources across multiple universities. These technologies established the core principle: instead of sharing passwords or duplicating accounts, systems would share assertions about who had been authenticated.
The concept evolved significantly with OAuth (2006) and OpenID Connect (2014), which brought federation to consumer applications and mobile platforms. The enterprise world gradually adopted these consumer-grade protocols alongside SAML. The shift toward cloud services accelerated federation adoption—when your email is in one cloud, your CRM in another, and your HR system in a third, federation becomes essential rather than optional.
Why It Matters
The security implications cut both ways. Federation reduces attack surface by minimizing password-based authentication—fewer passwords mean fewer opportunities for credential theft. But it also creates high-value targets. Compromise an identity provider, and you've potentially compromised everything that trusts it. The 2020 SolarWinds attack demonstrated this risk when attackers used federated access to move laterally across customer environments.
Federation also enables zero-trust architectures by centralizing authentication decisions. Instead of each application making its own access choices, you can enforce consistent policies through your identity provider—requiring multi-factor authentication, checking device health, or blocking access from suspicious locations. This centralization makes security policies actually enforceable rather than aspirational. The challenge is implementation complexity. Federation protocols are intricate, trust relationships require careful configuration, and organizations often struggle with hybrid environments where some systems federate cleanly while others resist integration.
The Plurilock Advantage
Our team includes practitioners who've implemented federation at scale for government and enterprise clients, not consultants who'll hand you a reference architecture and walk away. We focus on making your existing environment work better rather than forcing wholesale replacement.
Learn more about our identity and access management services.
.




