Identity and Access Management
Identity and access management (IAM) platforms authenticate users, enforce access policies, manage identity lifecycles, and federate trust across organisational boundaries. These systems underpin security controls across all other technology domains: a compromised identity provider exposes every integrated application.
This page covers centralised identity platforms providing authentication services, user directory, and access policy enforcement. Adjacent capabilities exist elsewhere: Privileged Access Management addresses elevated access controls, Multi-Factor Authentication details secondary authentication mechanisms, and Single Sign-On and Federation explains trust establishment patterns.
Assessment methodology
Tool assessments derive from official vendor documentation, published API references, release notes, and technical specifications as of 2026-01-11. Feature availability varies by product tier, deployment model, and region. Verify current capabilities directly with vendors during procurement.
Requirements taxonomy
This taxonomy defines evaluation criteria for identity and access management platforms. Requirements are organised by functional area and weighted by typical priority for mission-driven organisations operating across multiple jurisdictions with federated partner relationships.
Functional requirements
Core capabilities that define what an IAM platform must provide.
User authentication
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| F1.1 | Username/password authentication | Native credential store with password policy enforcement including complexity, history, and expiration rules | Full: configurable policies per realm/tenant, breach detection integration. Partial: fixed policies. | Review password policy documentation | Essential |
| F1.2 | Multi-factor authentication | Built-in support for secondary authentication factors beyond password | Full: TOTP, WebAuthn/passkeys, SMS, email, push notification. Partial: single method only. | Review MFA documentation; test factor enrollment | Essential |
| F1.3 | Passwordless authentication | Support for authentication without passwords using WebAuthn, FIDO2, or passkeys | Full: WebAuthn passwordless with device attestation. Partial: limited device support. None: password required. | Review passwordless documentation; test flow | Important |
| F1.4 | Social identity federation | Accept authentication from social providers (Google, Microsoft, Apple, Facebook) | Full: multiple providers, attribute mapping, account linking. Partial: limited providers. | Review social login documentation | Context-dependent |
| F1.5 | Adaptive authentication | Dynamic authentication requirements based on risk signals (location, device, behaviour) | Full: configurable risk policies, step-up authentication. Partial: basic conditional access. | Review adaptive auth documentation | Important |
| F1.6 | Brute force protection | Automatic protection against credential stuffing and brute force attacks | Full: account lockout, IP blocking, CAPTCHA, rate limiting. Partial: basic lockout only. | Review security documentation | Essential |
Protocol support
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| F2.1 | OpenID Connect support | Standards-compliant OIDC implementation for modern web and mobile applications | Full: OIDC Core, Discovery, Dynamic Registration, Session Management. Partial: Core only. | Review OIDC documentation; test with OIDC debugger | Essential |
| F2.2 | SAML 2.0 support | Support for SAML-based SSO with legacy and enterprise applications | Full: SP and IdP roles, metadata exchange, signing/encryption. Partial: IdP only. | Review SAML documentation; test with SAML tracer | Essential |
| F2.3 | OAuth 2.0 support | OAuth 2.0 authorisation server for API access control | Full: Authorization Code, PKCE, Client Credentials, Device Flow, Refresh Tokens. Partial: limited grants. | Review OAuth documentation | Essential |
| F2.4 | LDAP interface | LDAP protocol access for legacy application compatibility | Full: LDAP bind, search, compare with schema customisation. Partial: read-only or limited ops. | Review LDAP documentation; test with ldapsearch | Important |
| F2.5 | RADIUS support | RADIUS protocol for network access authentication (VPN, WiFi) | Full: PAP, CHAP, EAP methods. Partial: limited methods. None: no RADIUS. | Review RADIUS documentation | Context-dependent |
| F2.6 | SCIM provisioning | SCIM 2.0 for automated user provisioning to downstream applications | Full: SCIM 2.0 server and client, user/group operations. Partial: limited operations. | Review SCIM documentation | Important |
Directory services
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| F3.1 | User directory | Central storage of user accounts with profile attributes | Full: custom attributes, validation rules, schema extension. Partial: fixed schema. | Review user management documentation | Essential |
| F3.2 | Group management | Hierarchical group structures for permission aggregation | Full: nested groups, dynamic membership, group types. Partial: flat groups only. | Review group documentation | Essential |
| F3.3 | External directory sync | Synchronisation with external directories (AD, LDAP, HR systems) | Full: bidirectional sync, conflict resolution, scheduled jobs. Partial: one-way or manual. | Review sync documentation | Important |
| F3.4 | Custom schema support | Extensible user and group schemas for organisation-specific attributes | Full: custom attribute types, validation, indexing. Partial: limited extension. | Review schema documentation | Important |
| F3.5 | Self-service profile management | User access to view and update own profile attributes | Full: configurable editable fields, verification flows. Partial: limited fields. | Review self-service documentation | Important |
Identity lifecycle
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| F4.1 | Self-service registration | User self-registration with configurable approval workflows | Full: customisable forms, email verification, admin approval. Partial: basic registration. | Review registration documentation | Important |
| F4.2 | Automated provisioning | Automatic account creation/updates from authoritative sources | Full: event-driven provisioning, transformation rules. Partial: scheduled sync only. | Review provisioning documentation | Important |
| F4.3 | Deprovisioning workflows | Automated or triggered account disable/delete processes | Full: immediate disable, delayed delete, manager notification. Partial: manual only. | Review offboarding documentation | Essential |
| F4.4 | Access reviews and recertification | Periodic review of user access entitlements | Full: scheduled campaigns, manager attestation, automatic revocation. Partial: reporting only. | Review access review documentation | Important |
| F4.5 | Account recovery | Self-service account recovery through verified channels | Full: email, SMS, security questions, admin delegation. Partial: single method. | Review recovery documentation | Essential |
| F4.6 | Lifecycle automation | Workflow engine for identity lifecycle events | Full: custom workflows, approvals, escalation. Partial: fixed workflows. | Review workflow documentation | Desirable |
Access control
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| F5.1 | Role-based access control | Assignment of permissions through role membership | Full: custom roles, role hierarchy, separation of duties. Partial: fixed roles. | Review RBAC documentation | Essential |
| F5.2 | Attribute-based access control | Dynamic access decisions based on user and resource attributes | Full: policy language, real-time evaluation. Partial: limited attributes. | Review ABAC documentation | Desirable |
| F5.3 | Fine-grained authorisation | Granular permission control beyond role assignment | Full: resource-level permissions, conditions, denies. Partial: coarse permissions. | Review authorisation documentation | Important |
| F5.4 | Delegated administration | Scoped admin rights for organisational units | Full: tenant isolation, delegated domains. Partial: global admin only. | Review delegation documentation | Important |
| F5.5 | Consent management | User consent capture and enforcement for data processing | Full: consent flows, withdrawal, audit trail. Partial: basic consent. | Review consent documentation | Important |
Technical requirements
Infrastructure, architecture, and deployment considerations.
Deployment and hosting
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| T1.1 | Self-hosted deployment | Deployment on organisation-controlled infrastructure | Full: complete feature parity, documented deployment. Partial: feature limitations. None: SaaS only. | Review deployment documentation | Important |
| T1.2 | Container deployment | Official container images for Docker/Kubernetes deployment | Full: official images, Helm charts, operators. Partial: community images. | Check container registries, Helm repositories | Desirable |
| T1.3 | High availability | Redundant deployment eliminating single points of failure | Full: active-active clustering, automatic failover. Partial: active-passive. | Review HA architecture documentation | Essential |
| T1.4 | Geographic distribution | Multi-region deployment for latency and resilience | Full: configurable regions, data replication. Partial: single region. | Review multi-region documentation | Context-dependent |
| T1.5 | Database requirements | Backend database options and requirements | Document supported databases, versions, HA configurations | Review infrastructure documentation | Important |
Scalability and performance
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| T2.1 | Horizontal scaling | Capacity addition through additional nodes | Full: stateless nodes, load balancing. Partial: session affinity required. | Review scaling documentation | Important |
| T2.2 | Authentication throughput | Documented authentication capacity metrics | Full: published benchmarks with methodology. Partial: general claims. | Review performance documentation | Desirable |
| T2.3 | User capacity | Maximum supported user count and cost implications | Full: documented limits by tier. Partial: unclear limits. | Review limits documentation | Essential |
| T2.4 | Token performance | Token issuance and validation performance characteristics | Full: published token operation metrics. Partial: general guidance. | Review token documentation | Desirable |
Integration architecture
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| T3.1 | REST API | Comprehensive API for identity operations | Full: complete feature coverage, versioned, documented. Partial: limited coverage. | Review API documentation completeness | Essential |
| T3.2 | Event webhooks | Push notifications for identity events | Full: configurable events, retry logic, signing. Partial: limited events. | Review webhook documentation | Important |
| T3.3 | Pre-built connectors | Available integrations with common applications | List available connectors, note native vs marketplace | Review integrations catalogue | Desirable |
| T3.4 | SDK availability | Client libraries for application integration | Full: multiple languages, maintained, documented. Partial: limited languages. | Review SDK documentation | Important |
| T3.5 | Customisation extensibility | Extension points for custom logic (authentication flows, claims) | Full: custom code execution, policy language. Partial: configuration only. | Review extensibility documentation | Important |
Security requirements
Security controls and data protection capabilities.
Authentication security
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| S1.1 | Password hashing | Secure password storage using modern algorithms | Full: Argon2/bcrypt/scrypt with configurable parameters. Partial: SHA with salt. | Review security documentation | Essential |
| S1.2 | Credential encryption | Encryption of stored credentials and secrets | Full: HSM integration, encrypted storage. Partial: application encryption. | Review key management documentation | Essential |
| S1.3 | Session security | Secure session management and token handling | Full: secure cookies, token binding, rotation. Partial: basic sessions. | Review session security documentation | Essential |
| S1.4 | Phishing resistance | Protection against credential phishing attacks | Full: WebAuthn support, phishing-resistant MFA. Partial: standard MFA. | Review anti-phishing documentation | Important |
Audit and compliance
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| S2.1 | Comprehensive audit logs | Detailed logging of all identity operations | Full: authentication, admin actions, configuration changes, API calls. Partial: limited events. | Review audit log documentation | Essential |
| S2.2 | Log export and integration | Ability to export logs to external SIEM/logging systems | Full: real-time streaming, multiple formats. Partial: batch export. | Review log integration documentation | Important |
| S2.3 | Log retention | Configurable audit log retention periods | Full: configurable retention, archival. Partial: fixed retention. | Review retention documentation | Important |
| S2.4 | Compliance reporting | Pre-built reports for compliance requirements | Full: SOC 2, ISO 27001, GDPR reports. Partial: basic reports. | Review compliance documentation | Context-dependent |
Security certifications
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| S3.1 | SOC 2 certification | System and Organisation Controls Type 2 audit | Full: current SOC 2 Type II report. Partial: Type I or pending. | Request audit reports | Important |
| S3.2 | ISO 27001 certification | Information security management system certification | Full: current certification. Partial: in progress. | Verify certificate validity | Important |
| S3.3 | FedRAMP/StateRAMP | US government security authorisation | Full: authorised. Partial: in process. None: not applicable. | Check FedRAMP marketplace | Context-dependent |
| S3.4 | GDPR compliance | Demonstrated GDPR compliance for EU data | Full: DPA, documented compliance. Partial: self-attested. | Review DPA, privacy documentation | Important |
Operational requirements
Day-to-day administration and maintenance considerations.
Administration
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| O1.1 | Web administration console | Browser-based interface for system administration | Full: comprehensive UI, responsive, accessible. Partial: limited functionality. | Review admin console documentation | Essential |
| O1.2 | CLI administration | Command-line tools for scripted administration | Full: comprehensive CLI, scriptable. Partial: limited commands. | Review CLI documentation | Important |
| O1.3 | Infrastructure as code | Declarative configuration management | Full: Terraform/Pulumi providers, GitOps support. Partial: limited IaC. | Review IaC documentation | Desirable |
| O1.4 | Multi-tenancy | Logical separation for multiple organisational units | Full: isolated tenants, delegated admin. Partial: shared configuration. | Review multi-tenant documentation | Context-dependent |
Monitoring and observability
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| O2.1 | Health endpoints | API endpoints for service health monitoring | Full: liveness, readiness, detailed health. Partial: basic health. | Review health check documentation | Important |
| O2.2 | Metrics exposure | Operational metrics for monitoring systems | Full: Prometheus/OpenMetrics, detailed metrics. Partial: limited metrics. | Review metrics documentation | Important |
| O2.3 | Distributed tracing | Request tracing for debugging and performance analysis | Full: OpenTelemetry support. Partial: proprietary tracing. | Review tracing documentation | Desirable |
| O2.4 | Alerting capabilities | Built-in alerting for operational events | Full: configurable alerts, multiple channels. Partial: basic alerts. | Review alerting documentation | Desirable |
Backup and recovery
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| O3.1 | Configuration backup | Export/import of system configuration | Full: complete config export, version control friendly. Partial: limited export. | Review backup documentation | Essential |
| O3.2 | Data backup | User and group data backup capabilities | Full: automated backup, point-in-time recovery. Partial: manual backup. | Review data backup documentation | Essential |
| O3.3 | Disaster recovery | Documented DR procedures and capabilities | Full: documented RTO/RPO, tested procedures. Partial: general guidance. | Review DR documentation | Important |
Commercial requirements
Licensing, pricing, and vendor assessment considerations.
Pricing and licensing
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| C1.1 | Pricing model transparency | Clear, predictable pricing structure | Full: published pricing, calculator. Partial: quote required. | Review pricing documentation | Essential |
| C1.2 | Nonprofit/NGO pricing | Discounted or donated licensing for qualifying organisations | Full: documented programme, clear eligibility. Partial: case-by-case. | Contact vendor, review programme | Important |
| C1.3 | User-based vs consumption pricing | Pricing basis and scaling characteristics | Document model and scaling cost | Review pricing structure | Important |
| C1.4 | Feature tier transparency | Clear documentation of features by tier | Full: detailed feature matrix. Partial: general tier descriptions. | Review feature comparison | Essential |
Vendor assessment
| ID | Requirement | Description | Assessment criteria | Verification method | Typical priority |
|---|---|---|---|---|---|
| C2.1 | Vendor stability | Financial and operational stability indicators | Full: public company or substantial backing. Partial: startup with funding. | Research company background | Important |
| C2.2 | Development activity | Evidence of ongoing product development | Full: regular releases, public roadmap. Partial: infrequent updates. | Review release history, roadmap | Important |
| C2.3 | Support options | Available support tiers and response times | Full: 24/7 option, documented SLAs. Partial: business hours only. | Review support documentation | Important |
| C2.4 | Data portability | Ability to export data for migration | Full: complete data export, documented format. Partial: limited export. | Review export documentation | Essential |
| C2.5 | Jurisdictional considerations | Vendor headquarters and applicable legal regime | Document jurisdiction, CLOUD Act exposure, data processing locations | Review legal documentation | Important |
Comparison matrices
The following matrices provide side-by-side comparison of assessed tools. Assessments reflect documented capabilities as of 2026-01-11.
Rating key:
- ● Full support: Meets criteria completely
- ◐ Partial support: Meets criteria with limitations
- ○ Minimal support: Basic capability only
- ✗ Not supported: Capability absent
- $ Paid tier required
- E Enterprise tier required
- P Plugin/extension required
Solution overview
| Solution | Type | Licence | Current version | Deployment | Headquarters |
|---|---|---|---|---|---|
| Keycloak | FOSS | Apache 2.0 | 26.4.7 | Self-hosted, containers | CNCF (vendor-neutral) |
| authentik | FOSS | MIT (core) | 2025.12 | Self-hosted, containers | Germany (Authentik Security) |
| FreeIPA | FOSS | GPL v3 | 4.12.5 | Self-hosted (RHEL/Fedora) | Red Hat (US) |
| OpenLDAP | FOSS | OpenLDAP Public | 2.6.10 LTS | Self-hosted | OpenLDAP Foundation |
| Okta | Commercial | Proprietary | SaaS | Cloud only | United States |
| Microsoft Entra ID | Commercial | Proprietary | SaaS | Cloud only | United States |
| Auth0 | Commercial | Proprietary | SaaS | Cloud, private cloud | United States (Okta) |
| JumpCloud | Commercial | Proprietary | SaaS | Cloud, with agents | United States |
Protocol and standards support
| Solution | OIDC | SAML 2.0 | OAuth 2.0 | LDAP | RADIUS | SCIM |
|---|---|---|---|---|---|---|
| Keycloak | ● | ● | ● | ● | ◐ P | ● |
| authentik | ● | ● | ● | ● | ● E | ● |
| FreeIPA | ○ | ○ | ○ | ● | ● | ✗ |
| OpenLDAP | ✗ | ✗ | ✗ | ● | ✗ | ✗ |
| Okta | ● | ● | ● | ● | ● | ● |
| Microsoft Entra ID | ● | ● | ● | ◐ | ✗ | ● |
| Auth0 | ● | ● | ● | ✗ | ✗ | ◐ |
| JumpCloud | ● | ● | ● | ● | ● | ● |
Assessment notes:
- FreeIPA primarily functions as a Kerberos/LDAP directory with limited modern protocol support; OIDC/OAuth requires additional components
- OpenLDAP provides directory services only; authentication protocols require separate identity provider integration
- Microsoft Entra ID LDAP support requires Azure AD Domain Services (additional service)
- Auth0 SCIM support is provider-only (outbound provisioning), not server (inbound)
Authentication capabilities
| Solution | MFA methods | Passwordless | Social login | Adaptive auth | Brute force protection |
|---|---|---|---|---|---|
| Keycloak | ● TOTP, WebAuthn, SMS | ● | ● | ● | ● |
| authentik | ● TOTP, WebAuthn, SMS, Duo | ● | ● | ● | ● |
| FreeIPA | ◐ TOTP, RADIUS | ○ | ✗ | ○ | ◐ |
| OpenLDAP | ✗ | ✗ | ✗ | ✗ | ○ |
| Okta | ● TOTP, WebAuthn, push, SMS | ● | ● | ● | ● |
| Microsoft Entra ID | ● TOTP, WebAuthn, push, SMS | ● | ● | ● | ● |
| Auth0 | ● TOTP, WebAuthn, push, SMS | ● | ● | ● | ● |
| JumpCloud | ● TOTP, WebAuthn, push | ● | ● | ◐ | ● |
Assessment notes:
- Keycloak WebAuthn support is comprehensive including passkeys with device attestation
- authentik added Telegram as social login source in 2025.10; supports extensive social providers
- FreeIPA MFA relies on TOTP or external RADIUS; no native push notification
- OpenLDAP provides no native authentication UI; MFA requires application layer
Directory and lifecycle capabilities
| Solution | User directory | Group management | External sync | Self-service | Provisioning workflows |
|---|---|---|---|---|---|
| Keycloak | ● | ● | ● LDAP, AD | ● | ◐ |
| authentik | ● | ● | ● LDAP, AD, SCIM | ● | ● |
| FreeIPA | ● | ● | ◐ AD trust | ◐ | ○ |
| OpenLDAP | ● | ● | ◐ syncrepl | ✗ | ✗ |
| Okta | ● | ● | ● AD, LDAP, HR systems | ● | ● |
| Microsoft Entra ID | ● | ● | ● AD Connect | ● | ● |
| Auth0 | ◐ | ◐ | ◐ custom connections | ● | ◐ |
| JumpCloud | ● | ● | ● AD, Google, HR systems | ● | ● |
Assessment notes:
- Auth0 user directory is optimised for customer identity (B2C); less suited for workforce directory
- authentik introduced lifecycle workflows in 2025.4 with pre-defined permission bundles
- FreeIPA provides AD trust relationships rather than sync; requires specific configuration
- OpenLDAP syncrepl provides replication, not heterogeneous directory sync
Deployment and operations
| Solution | Self-hosted | Containers | HA support | Multi-region | IaC support |
|---|---|---|---|---|---|
| Keycloak | ● | ● Quarkus | ● | ● | ● Terraform |
| authentik | ● | ● Docker, K8s | ● | ◐ | ● Terraform |
| FreeIPA | ● | ◐ | ● | ◐ | ◐ Ansible |
| OpenLDAP | ● | ◐ | ● | ● | ◐ |
| Okta | ✗ | ✗ | ● | ● | ● Terraform |
| Microsoft Entra ID | ✗ | ✗ | ● | ● | ● Terraform |
| Auth0 | ○ Private Cloud | ✗ | ● | ● | ● Terraform |
| JumpCloud | ✗ | ✗ | ● | ● | ◐ |
Assessment notes:
- Keycloak 26.x is Quarkus-based with official container images and Kubernetes operator
- authentik removed Redis dependency in 2025.10, simplifying deployment
- Auth0 Private Cloud requires enterprise agreement and dedicated infrastructure
- FreeIPA containerisation is community-supported; production deployments typically use RPM
Security and compliance
| Solution | Encryption at rest | Audit logging | SOC 2 | ISO 27001 | GDPR tools |
|---|---|---|---|---|---|
| Keycloak | ● configurable | ● | N/A | N/A | ● |
| authentik | ● | ● | N/A | N/A | ● |
| FreeIPA | ● | ● | N/A | N/A | ◐ |
| OpenLDAP | ◐ | ◐ | N/A | N/A | ○ |
| Okta | ● | ● | ● | ● | ● |
| Microsoft Entra ID | ● | ● | ● | ● | ● |
| Auth0 | ● | ● | ● | ● | ● |
| JumpCloud | ● | ● | ● | ● | ● |
Assessment notes:
- Self-hosted solutions (Keycloak, authentik, FreeIPA, OpenLDAP) inherit certifications from infrastructure provider
- Commercial solutions provide compliance attestations for their platform
- authentik introduced PII masking in log streaming in 2025.7
Individual tool assessments
Keycloak
| Attribute | Value |
|---|---|
| Type | FOSS Identity Provider |
| Licence | Apache 2.0 |
| Current version | 26.4.7 (December 2025) |
| Stewardship | Cloud Native Computing Foundation (CNCF) incubating project |
| Primary deployment | Self-hosted (containers, Kubernetes, bare metal) |
| Documentation | https://www.keycloak.org/documentation |
| Source repository | https://github.com/keycloak/keycloak |
Keycloak is a comprehensive identity and access management solution providing SSO, identity brokering, user federation, and fine-grained authorisation. Red Hat donated the project to CNCF in April 2023, establishing vendor-neutral governance. The platform serves as the upstream project for Red Hat Build of Keycloak.
The 26.x series introduced Quarkus-based architecture replacing WildFly, delivering reduced memory footprint (approximately 50% reduction), faster startup times, and cloud-native deployment patterns. The architecture supports horizontal scaling with external database backends (PostgreSQL, MySQL, MariaDB, Oracle, Microsoft SQL Server).
Key strengths:
Comprehensive protocol coverage: Keycloak implements OIDC, OAuth 2.0, SAML 2.0, and LDAP with extensive configuration options. The OIDC implementation passes FAPI 2.0 conformance testing. Token exchange, device authorisation flow, and CIBA (Client Initiated Backchannel Authentication) are supported.
User federation architecture: LDAP and Active Directory federation supports read-only, read-write, and synchronisation modes. Custom federation providers enable integration with proprietary directories. Federation mappers transform attributes between source and Keycloak representations.
Identity brokering: Keycloak brokers authentication to external identity providers including OIDC, SAML, and social providers. First-login flows handle account linking, attribute import, and required actions.
Fine-grained authorisation services: Policy-based authorisation with permission evaluation supporting JavaScript, time-based, role-based, and user-based policies. Resource servers can delegate authorisation decisions to Keycloak.
Key limitations:
Operational complexity: Production deployment requires understanding of clustering, database configuration, cache tuning, and reverse proxy integration. Organisations without Kubernetes expertise face steeper learning curves.
No native RADIUS: RADIUS protocol requires third-party extensions. Organisations using RADIUS for VPN or WiFi authentication need additional components.
Theme customisation: Login page customisation uses FreeMarker templates requiring development expertise. The JavaScript SDK for client-side customisation adds complexity.
No managed service: Unlike commercial alternatives, Keycloak requires self-hosting. Organisations must provision infrastructure, handle upgrades, and maintain security patches.
Deployment and operations:
Self-hosted requirements vary by scale:
| Scale | Users | vCPU | Memory | Storage | Database |
|---|---|---|---|---|---|
| Small | Under 1,000 | 2 | 2 GB | 10 GB | PostgreSQL (single) |
| Medium | 1,000-50,000 | 4 | 4 GB | 50 GB | PostgreSQL (HA) |
| Large | Over 50,000 | 8+ | 8 GB+ | 100 GB+ | PostgreSQL (clustered) |
Container deployment uses official images from quay.io/keycloak/keycloak. Kubernetes deployment leverages the Keycloak Operator for automated configuration management.
Upgrade path from 26.x to 27.x (planned Fall 2025) includes database migration tooling. The project maintains backwards compatibility within major versions.
Integration capabilities:
| Integration type | Capability |
|---|---|
| Admin API | Comprehensive REST API covering all functionality |
| Events | Event listeners for authentication, admin actions, user operations |
| SPIs | Service Provider Interfaces for custom authentication, federation, storage |
| Themes | Custom login, account, admin console themes |
| Extensions | Java-based extensions for custom functionality |
Cost model:
Keycloak is free to use under Apache 2.0. Costs derive from infrastructure and operations:
| Cost component | Typical range |
|---|---|
| Infrastructure | Cloud VM or container costs; budget 2-4 vCPU, 4-8 GB RAM for medium deployments |
| Database | PostgreSQL hosting; managed database for HA |
| Operations | Staff time for deployment, upgrades, monitoring |
| Support | Optional commercial support from Red Hat (subscription required) or consultancies |
Organisational fit:
Best suited for:
- Organisations requiring complete control over identity infrastructure
- Deployments with data sovereignty requirements precluding SaaS
- Teams with Kubernetes/container operations expertise
- Use cases requiring extensive customisation
Less suitable for:
- Organisations without infrastructure operations capacity
- Deployments where managed service reduces total cost of ownership
- Use cases prioritising time-to-value over control
authentik
| Attribute | Value |
|---|---|
| Type | FOSS Identity Provider |
| Licence | MIT (core), commercial features available |
| Current version | 2025.12 (December 2025) |
| Vendor | Authentik Security GmbH (Germany) |
| Primary deployment | Self-hosted (Docker, Kubernetes) |
| Documentation | https://docs.goauthentik.io |
| Source repository | https://github.com/goauthentik/authentik |
authentik is a modern identity provider emphasising flexibility and developer experience. The platform provides authentication, authorisation, and user management with a Python/Django backend and React frontend. Authentik Security GmbH, based in Germany, provides commercial support and enterprise features.
The 2025.10 release removed Redis dependency entirely, simplifying deployment to PostgreSQL only. The platform uses PostgreSQL for task queuing, caching, and WebSocket connections. This architectural change reduced operational complexity while increasing PostgreSQL connection requirements by approximately 50%.
Key strengths:
Flow-based authentication: Authentication flows are constructed from discrete stages (identification, password, MFA, consent) with conditional logic. This enables complex authentication scenarios without custom code. Flows are version-controlled and can be imported/exported.
Application proxy: Built-in reverse proxy (outpost) provides authentication for applications lacking native SSO support. Forward authentication headers or proxy with session validation work with legacy applications.
Modern UI/UX: The administration interface provides clear navigation with responsive design. User-facing interfaces (login, self-service) are customisable through theming. The 2025.10 release improved mobile viewport support.
Extensive integration support: Over 130 documented integration guides cover common applications. SCIM provisioning (enterprise feature) enables automated user lifecycle management.
Key limitations:
Enterprise feature gating: RADIUS EAP-TLS, SCIM OAuth authentication, and some advanced features require enterprise licence. Organisations needing these capabilities face licensing costs.
Single-database dependency: PostgreSQL-only architecture limits database choice. Organisations standardised on MySQL or other databases cannot use their existing infrastructure.
Smaller community: Compared to Keycloak, authentik has a smaller user community and fewer third-party resources. Troubleshooting may require vendor support.
Resource requirements: Full-featured deployment with proxy outposts requires more infrastructure than minimal Keycloak installations.
Deployment and operations:
Deployment options:
- Docker Compose for development and small production
- Kubernetes with Helm chart for production scale
- Gateway API support added in 2025.4
Resource requirements:
| Component | vCPU | Memory | Notes |
|---|---|---|---|
| Core server | 2 | 2 GB | PostgreSQL connection pool |
| Worker | 1 | 1 GB | Background tasks |
| Outpost (proxy) | 1 | 512 MB | Per outpost instance |
| PostgreSQL | 2 | 2 GB | Single instance minimum |
The 2025.12 release introduced desktop credential provider integrations (Windows, macOS, Linux) in alpha, enabling platform SSO scenarios.
Integration capabilities:
| Integration type | Capability |
|---|---|
| Admin API | REST API with OpenAPI specification |
| Events | Event streams to webhooks, AWS EventBridge (2025.2+) |
| Expressions | Python expressions for policy evaluation, flow logic |
| Blueprints | Declarative configuration in YAML |
| Outposts | Proxy, LDAP, RADIUS outposts for protocol translation |
Cost model:
Core platform is MIT-licensed. Enterprise features require subscription:
| Component | Licence | Cost |
|---|---|---|
| Core platform | MIT | Free |
| Enterprise features | Commercial | Contact vendor |
| Support | Commercial | Contact vendor |
| Infrastructure | Self-hosted | Cloud/on-premises costs |
Enterprise features include: RADIUS EAP-TLS, SCIM OAuth, event maps, access certification campaigns, advanced reporting.
Organisational fit:
Best suited for:
- Organisations preferring modern Python/Django stack
- Deployments requiring application proxy for legacy applications
- Teams valuing EU-based vendor for GDPR alignment
- Use cases benefiting from flow-based authentication design
Less suitable for:
- Organisations requiring MySQL/MariaDB backend
- Deployments needing RADIUS with EAP-TLS without enterprise licence
- Teams requiring maximum community resources
FreeIPA
| Attribute | Value |
|---|---|
| Type | FOSS Identity Management |
| Licence | GPL v3 |
| Current version | 4.12.5 (2025) |
| Stewardship | Red Hat (upstream for Red Hat Identity Management) |
| Primary deployment | Self-hosted (RHEL, Fedora, CentOS Stream) |
| Documentation | https://www.freeipa.org/page/Documentation |
| Source repository | https://pagure.io/freeipa |
FreeIPA provides centralised identity, policy, and audit (IPA) for Linux and POSIX environments. The platform integrates 389 Directory Server, MIT Kerberos, NTP, DNS, Dogtag certificate system, and SSSD into a unified management framework. Red Hat Identity Management is the downstream commercial product.
FreeIPA excels at Linux infrastructure authentication where Kerberos and LDAP are primary protocols. The platform provides certificate authority services, DNS management, and host-based access control. Active Directory trust relationships enable cross-forest authentication.
Key strengths:
Integrated Linux identity stack: Single solution for user/group management, Kerberos authentication, host management, sudo rules, SELinux user mapping, and certificate services. Reduces component sprawl for Linux-centric environments.
Active Directory trust: Establishes trust relationships with AD forests enabling AD users to access Linux resources with existing credentials. Does not require directory synchronisation.
Host-based access control: Centralised sudo rules, SELinux mappings, and host-based access policies apply across enrolled hosts. Management through CLI, web UI, or API.
Certificate authority: Integrated Dogtag CA issues certificates for hosts, services, and users. Automatic certificate renewal through certmonger.
Key limitations:
Limited modern protocol support: No native OIDC or OAuth 2.0 implementation. Web application SSO requires additional components (e.g., mod_auth_openidc, Keycloak integration). SAML support is basic.
Platform restriction: Officially supports RHEL, Fedora, and derivatives. Debian/Ubuntu packages exist but receive less testing. Windows clients require AD trust rather than native enrollment.
Monolithic architecture: All components deploy together; selective deployment is limited. Scaling requires replica servers rather than horizontal scaling of individual components.
Complex initial setup: First server installation configures DNS, Kerberos, LDAP, and CA simultaneously. DNS integration particularly requires careful planning.
Deployment and operations:
Minimum requirements for single server:
| Component | Requirement |
|---|---|
| OS | RHEL 9, Fedora 39+, CentOS Stream 9 |
| vCPU | 2 |
| Memory | 4 GB (8 GB recommended) |
| Storage | 20 GB (scales with user count) |
Replica servers provide high availability. Recommended topology: 2 servers minimum for production, geographically distributed for multi-site.
The 4.12.5 release addressed security vulnerabilities including CVE-2025-7493 (identity spoofing through Kerberos). Organisations should enable SID generation and PAC validation.
Integration capabilities:
| Integration type | Capability |
|---|---|
| CLI | ipa command with comprehensive subcommands |
| API | JSON-RPC and XML-RPC APIs |
| LDAP | Standard LDAP access to directory |
| Kerberos | MIT Kerberos KDC with PKINIT |
| Ansible | ansible-freeipa collection for automation |
Cost model:
| Component | Licence | Cost |
|---|---|---|
| FreeIPA | GPL v3 | Free |
| Infrastructure | Self-hosted | RHEL subscription or free OS |
| Support | Red Hat IdM | Included with RHEL |
RHEL subscription includes Red Hat Identity Management with commercial support. FreeIPA on Fedora or CentOS Stream operates without subscription cost.
Organisational fit:
Best suited for:
- Linux-centric infrastructure requiring centralised identity
- Organisations using RHEL with existing subscriptions
- Environments requiring integrated certificate services
- Use cases with Active Directory trust requirements
Less suitable for:
- Web application SSO as primary use case
- Cloud-native or SaaS-first architectures
- Organisations without Linux operations expertise
- Multi-platform environments prioritising modern protocols
OpenLDAP
| Attribute | Value |
|---|---|
| Type | FOSS Directory Server |
| Licence | OpenLDAP Public Licence |
| Current version | 2.6.10 LTS (May 2025) |
| Stewardship | OpenLDAP Foundation |
| Primary deployment | Self-hosted |
| Documentation | https://www.openldap.org/doc/ |
| Source repository | https://git.openldap.org/openldap/openldap |
OpenLDAP is a mature, high-performance LDAP directory server providing the foundational directory services layer for identity infrastructure. The project originated in 1998 as a continuation of University of Michigan LDAP development. OpenLDAP 2.6 became the Long Term Support (LTS) release in January 2025 with projected five-year support.
OpenLDAP functions as a directory service, not a complete identity provider. Authentication protocols (OIDC, SAML), MFA, and user self-service require additional components. Organisations use OpenLDAP as the directory backend for Keycloak, application authentication, or network device AAA.
Key strengths:
Performance and scalability: LMDB backend (Lightning Memory-Mapped Database, developed by OpenLDAP project) provides high-performance storage. Tested deployments support millions of entries with appropriate hardware.
Replication flexibility: Multi-provider (N-way multimaster) replication enables geographically distributed, fault-tolerant deployments. Sync replication (syncrepl) and delta-syncrepl minimise replication traffic.
Standards compliance: Full LDAPv3 implementation with extensive schema support. Overlay architecture enables modular functionality (password policy, referential integrity, access logging).
Operational maturity: Decades of production deployment have resolved edge cases. Extensive documentation and community knowledge exist for complex scenarios.
Key limitations:
Directory only: No authentication UI, no SSO protocols, no MFA, no user self-service. These require additional components or integration with identity providers.
Administrative complexity: Configuration (cn=config) uses LDAP itself, requiring LDAP expertise for administration. No web UI provided; ldap-utils or third-party tools required.
Deprecated backends: back-bdb and back-hdb removed in favour of back-mdb. Migrations from legacy installations require planning.
Limited modern protocol support: REST API requires overlays or external proxies. GraphQL, gRPC, or WebSocket access not native.
Deployment and operations:
Resource requirements scale with directory size:
| Scale | Entries | vCPU | Memory | Storage |
|---|---|---|---|---|
| Small | Under 10,000 | 1 | 1 GB | 1 GB |
| Medium | 10,000-100,000 | 2 | 4 GB | 10 GB |
| Large | Over 100,000 | 4+ | 8 GB+ | Proportional |
OpenLDAP 2.7 is planned for Fall 2025 with native RADIUS server implementation and scoped password policies.
Integration capabilities:
| Integration type | Capability |
|---|---|
| Protocol | LDAPv3, LDAPS, StartTLS |
| Backends | LMDB (primary), ldif, relay, meta, sql |
| Overlays | ppolicy, syncrepl, accesslog, memberof, refint, unique, auditlog |
| Tools | slapd, slapcat, slapadd, ldapsearch, ldapmodify |
Cost model:
| Component | Licence | Cost |
|---|---|---|
| OpenLDAP | OpenLDAP Public Licence | Free |
| Infrastructure | Self-hosted | Server/VM costs |
| Support | Community, third-party, or Symas | Varies |
Symas Corporation provides commercial OpenLDAP support. No vendor nonprofit programmes identified.
Organisational fit:
Best suited for:
- Directory service layer for identity provider integration
- Legacy application authentication (LDAP bind)
- Network device AAA backends
- Organisations with LDAP operations expertise
Less suitable for:
- Standalone identity provider requirements
- Modern web application SSO
- Organisations requiring managed solutions
- Teams without LDAP expertise
Okta
| Attribute | Value |
|---|---|
| Type | Commercial Identity Provider |
| Licence | Proprietary SaaS |
| Vendor | Okta, Inc. (United States) |
| Primary deployment | Cloud (multi-tenant SaaS) |
| Documentation | https://developer.okta.com |
| Admin documentation | https://help.okta.com |
Okta is a market-leading cloud identity platform serving enterprise workforce identity (Okta Workforce Identity) and customer identity (Okta Customer Identity, formerly Auth0 branded). This assessment focuses on Okta Workforce Identity for employee/contractor authentication.
Okta provides identity infrastructure as a service, eliminating self-hosting requirements. The platform integrates with thousands of applications through pre-built connectors, SCIM provisioning, and SSO protocols.
Key strengths:
Integration breadth: Over 7,000 pre-built application integrations in the Okta Integration Network (OIN). SCIM provisioning, SSO, and workflow automation available for major SaaS applications.
Universal Directory: Aggregates identities from multiple sources (AD, LDAP, HR systems) into unified directory. Profile mastering controls authoritative source per attribute.
Lifecycle automation: Workflows enable code-free automation of identity lifecycle events. Integration with HR systems triggers provisioning and deprovisioning.
Compliance and security: SOC 2 Type II, ISO 27001, FedRAMP High (OWA), and HIPAA compliance. Threat insight integration with Okta ThreatInsight for credential stuffing protection.
Key limitations:
SaaS only: No self-hosted deployment option. All data processed in Okta cloud (US, EU, AU regions available). CLOUD Act applies to US-headquartered vendor.
Cost at scale: Per-user pricing with feature tiers creates significant cost for large user counts. Enterprise features require higher tiers.
Complexity accumulation: Extensive configuration options across authentication policies, application assignments, and workflows require ongoing governance.
Auth0 integration: Okta’s acquisition of Auth0 created two platforms with different architectures. Migration paths between platforms are incomplete.
Deployment and operations:
Okta requires no infrastructure deployment. Implementation focuses on configuration:
| Phase | Typical duration | Activities |
|---|---|---|
| Directory integration | 1-2 weeks | AD/LDAP agent deployment, sync configuration |
| Application SSO | 1-4 weeks | Per-application SSO configuration |
| Provisioning | 2-4 weeks | SCIM configuration, attribute mapping |
| MFA rollout | 2-4 weeks | Policy configuration, user enrollment |
Okta agents (AD, LDAP, RADIUS) deploy on-premises for directory integration. Agents require outbound HTTPS; no inbound firewall rules needed.
Integration capabilities:
| Integration type | Capability |
|---|---|
| APIs | Management API, Authentication API, OAuth 2.0/OIDC |
| Webhooks | Event hooks for inline customisation |
| Workflows | No-code automation platform |
| SDK | Java, .NET, Python, Node.js, Go |
| Terraform | Official provider for IaC |
Cost model:
Okta uses per-user-per-month pricing with feature tiers:
| Tier | Features | Relative cost |
|---|---|---|
| SSO | Basic SSO, MFA | Base |
| Adaptive SSO | Adaptive authentication, device trust | +50% |
| Enterprise | Lifecycle management, API access management | +100% |
Okta for Good programme provides discounted or donated licences for qualifying nonprofits. Eligibility varies by region and organisation type. Application required.
Jurisdictional considerations:
| Factor | Assessment |
|---|---|
| Headquarters | United States |
| CLOUD Act exposure | Subject to US government data requests |
| Data residency | US, EU (Frankfurt), AU (Sydney) options |
| Subprocessors | Published list, primarily US-based |
Organisational fit:
Best suited for:
- Organisations prioritising managed identity service
- Deployments requiring extensive SaaS integration
- Microsoft 365 or Google Workspace environments needing additional IdP
- Teams without identity infrastructure expertise
Less suitable for:
- Organisations requiring self-hosted deployment
- Data sovereignty requirements precluding US vendors
- Cost-sensitive deployments with large user counts
- Use cases where open source meets requirements
Microsoft Entra ID
| Attribute | Value |
|---|---|
| Type | Commercial Identity Provider |
| Licence | Proprietary SaaS |
| Vendor | Microsoft Corporation (United States) |
| Primary deployment | Cloud (Azure) |
| Documentation | https://learn.microsoft.com/entra |
Microsoft Entra ID (formerly Azure Active Directory) is Microsoft’s cloud identity service, foundational to Microsoft 365, Azure, and Dynamics 365. The platform serves as both workforce and customer identity provider with extensive integration into Microsoft ecosystem.
Entra ID is included with Microsoft 365 subscriptions, making it the de facto identity provider for organisations using Microsoft cloud services. Standalone or enhanced capabilities require additional licensing.
Key strengths:
Microsoft ecosystem integration: Native SSO for Microsoft 365, Azure, and 3,500+ SaaS applications. Entra ID synchronises with on-premises Active Directory through Entra Connect.
Conditional access: Comprehensive policy engine combining user, device, location, and application context. Risk-based policies integrate with Entra ID Protection threat detection.
Device identity: Entra join and hybrid join provide device identity alongside user identity. Integration with Intune enables device compliance requirements in access policies.
Scale and availability: Microsoft operates one of the largest identity platforms globally. Published SLA of 99.99% uptime for authentication.
Key limitations:
Microsoft-centric: Deepest integration with Microsoft ecosystem; third-party integration varies. Organisations not using Microsoft 365 gain less value.
Complexity: Feature scope creates configuration complexity. Premium P2 licence required for comprehensive identity governance (access reviews, PIM).
LDAP limitations: No native LDAP interface. Entra Domain Services (additional service) provides LDAP for legacy applications requiring it.
Pricing structure: Feature fragmentation across Free, P1, P2, and Governance tiers complicates cost estimation. Enterprise features require Premium licensing.
Deployment and operations:
Entra ID is SaaS; deployment involves configuration rather than infrastructure:
| Component | Purpose | Requirements |
|---|---|---|
| Entra Connect | AD synchronisation | On-premises Windows server |
| Application Proxy | On-premises app access | Connector agent, outbound HTTPS |
| Provisioning agent | Cloud provisioning | For cloud-to-AD provisioning |
The November 2025 release introduced Entra Agent ID for AI agent identity management, expanding identity scope beyond human users.
Integration capabilities:
| Integration type | Capability |
|---|---|
| Microsoft Graph | Comprehensive API for identity operations |
| SCIM | Provisioning to integrated applications |
| Terraform | AzureRM and AzureAD providers |
| PowerShell | Microsoft.Graph PowerShell module (MSOnline deprecated) |
| SIEM | Streaming to Sentinel, Splunk, other SIEM |
Cost model:
Entra ID licensing:
| Tier | Included with | Additional cost |
|---|---|---|
| Free | Azure subscription | - |
| P1 | Microsoft 365 E3/A3, EMS E3 | Or standalone |
| P2 | Microsoft 365 E5/A5, EMS E5 | Or standalone |
| Governance | Add-on | Additional per-user |
Microsoft nonprofit programmes provide donated or discounted Microsoft 365, including Entra ID P1. Microsoft 365 Business Premium (donated) includes P1. E3/E5 grants available for qualifying organisations.
Jurisdictional considerations:
| Factor | Assessment |
|---|---|
| Headquarters | United States |
| CLOUD Act exposure | Subject to US government data requests |
| Data residency | Core directory data in region; some services process in US |
| EU Data Boundary | Available for EU customers, with limitations |
Organisational fit:
Best suited for:
- Organisations using Microsoft 365 as primary productivity suite
- Windows/Intune device management environments
- Deployments requiring AD synchronisation
- Teams with existing Microsoft expertise
Less suitable for:
- Non-Microsoft-centric environments
- Organisations avoiding US cloud providers
- Use cases requiring self-hosted identity
- Linux-centric infrastructure
Auth0
| Attribute | Value |
|---|---|
| Type | Commercial Identity Provider |
| Licence | Proprietary SaaS |
| Vendor | Okta, Inc. (United States) |
| Primary deployment | Cloud (multi-tenant), Private Cloud (enterprise) |
| Documentation | https://auth0.com/docs |
Auth0 provides developer-centric identity services for application authentication. Acquired by Okta in 2021, Auth0 continues operating as a distinct platform optimised for customer identity (CIAM) and application-embedded authentication.
Auth0 emphasises developer experience with extensive SDKs, quickstarts, and customisation options. The platform excels at embedding authentication into applications rather than serving as enterprise directory service.
Key strengths:
Developer experience: SDKs for 30+ languages/frameworks, comprehensive documentation, and sample applications. Universal Login provides customisable hosted authentication pages.
Extensibility: Actions (JavaScript functions) execute during authentication flows. Rules and hooks enable complex authentication logic without platform modification.
Customer identity focus: Social login, passwordless, and progressive profiling features suit customer-facing applications. Breached password detection integrates with authentication flows.
Auth for GenAI: April 2025 introduced Auth for GenAI with Token Vault for third-party API tokens, async authorisation for AI agent workflows, and fine-grained authorisation for RAG applications.
Key limitations:
Not a directory service: Auth0 user database is designed for customer accounts, not employee directory. No LDAP interface; limited HR system integration compared to workforce identity platforms.
Platform overlap with Okta: Okta and Auth0 have overlapping capabilities with unclear product boundary. Migration between platforms is non-trivial.
Enterprise pricing: Consumption-based pricing with MAU tiers. Enterprise features (private cloud, advanced customisation) require enterprise agreements.
Limited SCIM: SCIM support is outbound only (Auth0 provisioning to applications), not inbound (applications provisioning to Auth0).
Deployment and operations:
Auth0 SaaS requires no infrastructure. Private Cloud deployment (enterprise tier) provides dedicated infrastructure:
| Deployment | Availability | Requirements |
|---|---|---|
| Public cloud | All plans | None |
| Private cloud | Enterprise | Dedicated contract, managed by Auth0 |
Auth0 operates regions in US, EU, AU, and JP. Data residency corresponds to tenant region selection.
Integration capabilities:
| Integration type | Capability |
|---|---|
| Management API | Comprehensive API for tenant management |
| Authentication API | OAuth 2.0, OIDC, passwordless endpoints |
| Actions | JavaScript code execution in authentication flows |
| SDK | Extensive language/framework coverage |
| Marketplace | Pre-built integrations and extensions |
Cost model:
Auth0 uses monthly active user (MAU) pricing:
| Tier | MAU included | Features |
|---|---|---|
| Free | 25,000 | Basic authentication |
| Essentials | 10,000 | SSO, custom domains, MFA |
| Professional | 10,000 | Actions, external databases |
| Enterprise | Custom | Private cloud, advanced features |
Auth0 for Startups and Auth0 for Social Impact programmes provide credits for qualifying organisations.
Jurisdictional considerations:
| Factor | Assessment |
|---|---|
| Headquarters | United States (Okta subsidiary) |
| CLOUD Act exposure | Subject to US government data requests |
| Data residency | US, EU, AU, JP regions |
| Private cloud | Enterprise option for dedicated infrastructure |
Organisational fit:
Best suited for:
- Customer-facing application authentication
- Developer teams building custom applications
- B2C or B2B SaaS applications
- Use cases requiring extensive customisation
Less suitable for:
- Enterprise workforce identity (use Okta Workforce instead)
- Legacy application SSO requiring LDAP
- Organisations needing comprehensive directory services
- Cost-sensitive high-MAU deployments
JumpCloud
| Attribute | Value |
|---|---|
| Type | Commercial Directory Platform |
| Licence | Proprietary SaaS |
| Vendor | JumpCloud Inc. (United States) |
| Primary deployment | Cloud with device agents |
| Documentation | https://jumpcloud.com/support |
JumpCloud provides cloud directory services unifying user management across identity, device, and access. The platform positions as a cloud alternative to on-premises Active Directory, managing authentication for macOS, Windows, and Linux workstations alongside SSO and RADIUS services.
JumpCloud differentiates through cross-platform device management. The JumpCloud agent authenticates users against the cloud directory while providing device policy enforcement.
Key strengths:
Cross-platform directory: Single directory for macOS, Windows, and Linux. Agent-based authentication eliminates need for on-premises domain controllers.
Device management integration: Device policies (disk encryption, screen lock, patch management) enforce alongside identity policies. MDM capabilities included without separate product.
Cloud RADIUS: Cloud-hosted RADIUS service for WiFi and VPN authentication. RADIUS configuration without on-premises RADIUS server.
Cloud LDAP: LDAP interface for applications requiring LDAP bind authentication. Eliminates need for separate LDAP infrastructure.
Key limitations:
Agent dependency: Full functionality requires JumpCloud agent on managed devices. BYOD or unmanaged devices have limited policy enforcement.
Enterprise feature pricing: Advanced features (conditional access, identity governance) require higher tiers. Feature packaging complexity.
US-centric infrastructure: Primary infrastructure in US. International organisations may experience latency.
Smaller ecosystem: Fewer pre-built integrations than Okta or Microsoft Entra ID. Custom integrations may require additional effort.
Deployment and operations:
JumpCloud deployment centres on agent installation:
| Component | Purpose | Installation |
|---|---|---|
| Windows agent | Device auth, policy | MSI installer |
| macOS agent | Device auth, policy | PKG installer |
| Linux agent | Device auth, policy | DEB/RPM packages |
| AD integration | Directory sync | On-premises connector |
| LDAP integration | External LDAP sync | Configuration |
Agent deployment can use software distribution or group policy for bulk rollout.
Integration capabilities:
| Integration type | Capability |
|---|---|
| API | v1 and v2 REST APIs |
| SCIM | Inbound and outbound provisioning |
| Terraform | Community provider available |
| Webhooks | Event notifications |
| PowerShell | JumpCloud PowerShell module |
Cost model:
JumpCloud uses per-user pricing:
| Tier | Features | Relative cost |
|---|---|---|
| Free | 10 users, basic features | - |
| Core | Directory, SSO, MFA | Base |
| Device management | + device policies | + device cost |
| Platform | Full platform | Combined |
JumpCloud for Good programme provides discounts for qualifying nonprofits. Application required.
Jurisdictional considerations:
| Factor | Assessment |
|---|---|
| Headquarters | United States |
| CLOUD Act exposure | Subject to US government data requests |
| Data residency | Primary US, additional regions |
Organisational fit:
Best suited for:
- Organisations replacing on-premises AD with cloud directory
- Multi-platform (Windows/macOS/Linux) device environments
- Deployments requiring integrated device management
- IT teams seeking unified platform
Less suitable for:
- Pure SaaS environments without managed devices
- Organisations with existing robust MDM
- Large enterprises with complex directory requirements
- Data sovereignty requirements excluding US vendors
Selection guidance
Decision framework
+------------------------------------------------------------------+| IAM PLATFORM SELECTION |+------------------------------------------------------------------+ | +----------v-----------+ | Self-hosted required?| +----------+-----------+ | +---------------+--------------------+ | | Yes | No | v v +---------+---------+ +---------+---------+ | Data sovereignty | | Microsoft 365 | | or compliance | | primary platform? | | requirement? | +---------+---------+ +---------+---------+ | | +----------+------------+ +-------+-------+ | | | | Yes | No | Yes | No | v v v v +-------+-------+ +---------+----------++-----+-----+ +------+-----+ | Microsoft | | Customer or || Keycloak | | Keycloak | | Entra ID | | workforce identity?|| (full IAM)| | or | +---------------+ +---------+----------++-----+-----+ | authentik | | | +------+-----+ +----------+-----------+ | | | | v v Customer | Workforce |+-----+-----+ +------+-----+ v v| Consider | | FreeIPA | +-------+-------+ +-------+-------+| FreeIPA | | (Linux- | | Auth0 | | Okta or || for Linux | | centric) | | (CIAM focus) | | JumpCloud || infra | +------------+ +---------------+ +---------------++-----------+Recommendations by organisational context
Minimal IT capacity
Organisations without dedicated IT staff benefit from managed platforms eliminating infrastructure operations:
| Scenario | Recommendation | Rationale |
|---|---|---|
| Microsoft 365 user | Microsoft Entra ID (included) | No additional cost, integrated experience |
| Google Workspace user | JumpCloud or Okta | Cross-platform directory service |
| SaaS-first, limited budget | JumpCloud Free tier | 10 users included, device management |
Avoid: Self-hosted solutions (Keycloak, authentik, FreeIPA, OpenLDAP) without operations capacity.
Established IT function
Organisations with IT teams can evaluate trade-offs between managed services and self-hosting:
| Scenario | Recommendation | Rationale |
|---|---|---|
| Data sovereignty requirement | Keycloak or authentik | Self-hosted, EU vendor option (authentik) |
| Enterprise SaaS integration | Okta | Broadest integration catalogue |
| Microsoft-centric | Microsoft Entra ID | Deepest Microsoft integration |
| Linux infrastructure | FreeIPA | Integrated Kerberos, LDAP, CA |
| Custom application authentication | Auth0 | Developer-centric, extensible |
Consider: Operational overhead of self-hosted vs subscription cost of managed services.
Specific constraints
| Constraint | Recommendation | Notes |
|---|---|---|
| EU data residency | authentik (self-hosted, EU vendor) or Keycloak (self-hosted) | Commercial options offer EU regions but remain US-headquartered |
| CLOUD Act avoidance | Self-hosted FOSS only | All US-headquartered commercial options subject to CLOUD Act |
| Limited budget | Keycloak, authentik, or included Entra ID | FOSS eliminates licence cost; Entra ID included with M365 |
| Field deployment, offline operation | Keycloak or FreeIPA | Self-hosted with local authentication capability |
Migration paths
| From | To | Complexity | Approach |
|---|---|---|---|
| On-premises AD | Entra ID | Medium | Entra Connect sync, staged migration |
| On-premises AD | JumpCloud | Medium | AD integration, gradual agent rollout |
| On-premises AD | Keycloak | High | LDAP federation, protocol migration |
| Okta | Auth0 | High | API migration, feature mapping differences |
| Auth0 | Okta | High | User migration, integration reconfiguration |
| Any | Keycloak | Medium-High | Protocol-based integration, user import |
Resources and references
Official documentation
| Solution | Documentation URL | API reference |
|---|---|---|
| Keycloak | https://www.keycloak.org/documentation | https://www.keycloak.org/docs-api/latest/rest-api/ |
| authentik | https://docs.goauthentik.io | https://docs.goauthentik.io/developer-docs/api/ |
| FreeIPA | https://www.freeipa.org/page/Documentation | https://freeipa.readthedocs.io/en/latest/ |
| OpenLDAP | https://www.openldap.org/doc/ | Man pages (slapd.conf, slapd-config) |
| Okta | https://developer.okta.com | https://developer.okta.com/docs/api/ |
| Microsoft Entra ID | https://learn.microsoft.com/entra | https://learn.microsoft.com/graph/api/resources/identity |
| Auth0 | https://auth0.com/docs | https://auth0.com/docs/api |
| JumpCloud | https://docs.jumpcloud.com | https://docs.jumpcloud.com/api/ |
Relevant standards
| Standard | Description | Relevance |
|---|---|---|
| RFC 6749 | OAuth 2.0 Authorization Framework | API authorisation |
| OpenID Connect Core 1.0 | OIDC specification | Modern SSO |
| SAML 2.0 | OASIS SAML specification | Enterprise SSO |
| RFC 4510-4519 | LDAP Technical Specification | Directory services |
| SCIM 2.0 | System for Cross-domain Identity Management | User provisioning |
| FIDO2/WebAuthn | W3C Web Authentication | Passwordless authentication |
Related procurement resources
| Resource | Purpose | Location |
|---|---|---|
| NIST SP 800-63 | Digital identity guidelines | https://pages.nist.gov/800-63-3/ |
| CISA Zero Trust Maturity Model | Identity pillar assessment | https://www.cisa.gov/zero-trust-maturity-model |
| ISO/IEC 24760 | Identity management framework | ISO catalogue |