Skip to main content

Authentication

Overview

This section explains how Keymate authenticates users across diverse scenarios — from browser-based login and direct credential exchange to federated identity from external providers. It covers the configurable authentication flow model, OIDC and OAuth protocol interactions, SAML federation, external identity provider integration, multi-factor and step-up authentication, and user provisioning through directory synchronization.

When to Read This Section

Read this section when you need to understand how Keymate verifies user identity, how authentication flows chain together, how external identity providers integrate through federation, or how multi-factor authentication strengthens access security.

Who Should Start Here

  • Architects designing authentication strategies for multi-Tenant environments
  • Developers integrating applications with Keymate's authentication endpoints
  • Security engineers configuring MFA policies and federation trust
  • Platform engineers setting up directory synchronization and user provisioning

Key Topics

Representative Journeys

  1. Authentication Flows — understand the flow chain model
  2. OIDC & OAuth Interaction Model — understand protocol-level interactions
  3. Federation & External IdPs — understand external identity integration
  4. SAML Federation Model — understand SAML-specific federation
  5. MFA & Step-Up Authentication — understand multi-factor enforcement
  6. Provisioning & SCIM — understand user lifecycle provisioning
  • Identity — identity model that authentication establishes
  • Token & Session — tokens and sessions that authentication produces
  • Authorization — policy evaluation that consumes authenticated identity
  • Security — security patterns built on authentication foundations