Identity federation enables organizations to establish trusted relationships between different authentication systems, allowing users to access multiple applications across organizational boundaries without managing separate credentials for each system.
Visual Guard supports identity federation through industry-standard protocols, enabling your applications to leverage external identity providers while maintaining centralized authorization and access control. This approach separates authentication (verifying who the user is) from authorization (determining what they can do), providing both security and flexibility.
Visual Guard implements modern, standards-based protocols for secure identity federation
Authorization framework that enables applications to obtain limited access to user resources without exposing credentials.
Authentication layer built on top of OAuth 2.0 that provides user identity verification and profile information.
OAuth 2.0 answers the question: "What can this application do on behalf of the user?"
OpenID Connect answers the question: "Who is this user?"
In practice, they work together: OIDC handles authentication and provides user identity, while OAuth 2.0 manages authorization and resource access. Visual Guard uses both protocols to provide comprehensive identity federation capabilities.
VG Identity Server acts as a central authentication broker, bridging external identity providers with your applications while maintaining centralized authorization control.
When implementing identity federation, authentication and authorization become distinct concerns. External identity providers (Azure AD, Google Workspace, Okta) handle the authentication process—verifying who the user is. VG Identity Server then enriches this identity with application-specific permissions, roles, and business rules before granting access to resources.
User attempts to access an application protected by Visual Guard
VG Identity Server redirects to the configured external identity provider
User authenticates with their identity provider (Azure AD, Google, etc.)
VG Identity Server issues JWT tokens enriched with Visual Guard permissions
Visual Guard integrates with leading enterprise identity providers through standard OpenID Connect and OAuth 2.0 protocols
Native integration with Microsoft's cloud identity platform (formerly Azure AD).
Authenticate users with their Google corporate accounts.
Support for specialized enterprise identity platforms.
Because Visual Guard implements standard OAuth 2.0 and OpenID Connect protocols, any compliant identity provider can be integrated without custom development. This includes:
Organizations frequently need to grant access to external partners, suppliers, or contractors without creating and managing separate accounts.
Scenario: A manufacturing company provides access to its supply chain management application for multiple supplier organizations.
SaaS providers need to support customers who want to use their existing corporate identity providers rather than creating new accounts.
Scenario: A project management SaaS platform used by multiple enterprise customers.
Organizations transitioning from on-premises infrastructure to cloud services need authentication that works in both environments.
Scenario: A company with legacy PowerBuilder applications and new web applications.
Mergers and acquisitions often result in multiple identity systems that need to coexist during integration periods.
Scenario: A parent company acquires a subsidiary with different IT infrastructure.
Visual Guard uses JSON Web Tokens (JWT) as the primary mechanism for transmitting authentication and authorization information. JWTs are stateless, cryptographically signed, and contain claims about the user's identity and permissions.
A key capability of Visual Guard's federation implementation is the ability to enrich external identity claims with application-specific authorization information.
Identity information from the external IdP:
Visual Guard adds authorization claims:
Final token contains both:
Identity federation through Visual Guard supports modern application architectures and development frameworks
Leverage existing identity providers instead of managing separate credentials. Reduce password fatigue and support costs.
Rapidly onboard partners, customers, or acquired organizations without complex identity integration projects.
Delegate authentication to external providers while keeping centralized control over what users can access.
Implementation based on OAuth 2.0 and OpenID Connect ensures compatibility and future-proofs your architecture.