Standard Binder
SKYE Identity Standard (SIS) v1.0
Two controls, one identity loop
SSO and SCIM are separate controls with one combined mission: the customer owns identity, and SKYE enforces it correctly.
SSO answers: “Can this person authenticate right now?”
SCIM answers: “Should this person exist in the app at all, and what access do they get?”
When both are enabled, they form the “zero-drift identity loop.”
- SKYE never stores customer passwords when SSO is enabled.
- Identity is tenant-bound. Every auth decision is evaluated inside an org/tenant boundary.
- Deprovisioning must be fast. If a user is removed in the customer’s IdP, SKYE access dies quickly.
- No silent failures. Every auth/provisioning event is auditable and visible to admins.
- Secure by default. Correct signature checks, correct validation, and correct rotation behavior.
- Org / Tenant: Customer environment with its own policies, IdP config, SCIM token(s), and role mappings.
- IdP: Identity Provider (Okta, Entra ID, Google Workspace, Ping, etc.).
- SSO Protocols: OIDC (preferred) and SAML 2.0 (must support).
- SCIM: SCIM 2.0 provisioning and group sync.
3.1 Supported protocols
- MUST support OIDC (Authorization Code + PKCE).
- MUST support SAML 2.0 for enterprise compatibility.
- MAY support both simultaneously per tenant, with one enforced as primary.
3.2 Tenant configuration and routing
- MUST support per-tenant IdP configuration (issuer/entity, callbacks/ACS, certs, JWKS).
- MUST support routing by domain hint, org slug, or email discovery.
3.3 Token/assertion validation
OIDC: validate signature via JWKS, issuer, audience, exp/nbf, nonce/state; reject missing claims.
SAML: validate XML signature against pinned cert(s); enforce audience/destination; prevent replay.
3.4 Account linking rules
- MUST link via stable identifiers (OIDC: sub+issuer; SAML: NameID/attribute + issuer).
- MUST tolerate email changes without identity breakage.
- MUST block takeover by email collision.
3.5 MFA and enforcement
- MUST allow tenant enforcement: “SSO required; disable password login.”
- MUST allow IdP MFA enforcement (record indicator when available).
- SHOULD support step-up auth for sensitive actions.
3.6 Session security
- MUST revoke sessions on deprovision/disable and role downgrade.
- MUST use short-lived tokens or rotating sessions.
- MUST set cookies securely (HttpOnly, Secure, SameSite).
4.1 SCIM compatibility
- MUST implement SCIM 2.0 endpoints: /scim/v2/Users and /scim/v2/Groups.
- MUST support create, update (PATCH), deactivate/disable, and optional delete.
- MUST support filtering and pagination as expected.
4.2 Provisioning lifecycle rules
- MUST support active=false disable semantics.
- MUST deprovision within SLA: target < 2 minutes (Enterprise), max < 15 minutes (Core).
- MUST ensure disable triggers session revocation.
4.3 Group sync → roles/permissions
- MUST support group-to-role mapping per tenant.
- MUST map by group ID (not name) to survive renames.
- MUST have deterministic conflict rules; SKYE default is least privilege.
4.4 Idempotency and retries
- MUST be idempotent to prevent duplicates.
- MUST tolerate retries and out-of-order events.
- MUST surface failures with actionable errors for admins.
Identity Console
Every tenant enabling SSO/SCIM must have an Identity Console section that exposes status, tools, and last-known errors.
- SSO status: enabled/disabled, protocol, issuer/entity, last successful login time
- SCIM status: enabled/disabled, last sync time, last error, token rotation controls
- Group mappings: IdP groups → SKYE roles
- Tools: Test SSO, validate JWKS/cert freshness, SCIM test user
- Security posture summary: SSO required, password disabled, MFA indicator
- Break-glass controls
Emergency admin access
- MUST support tenant-controlled break-glass for lockout scenarios.
- MUST require separate method, MFA, tight auditing, and optional IP allowlist.
- MUST alert and log every break-glass action.
WORM-grade mindset
Identity events must generate immutable audit entries across authentication, provisioning, and admin changes.
- Auth: login success/fail, logout, token refresh, session revoked
- Provisioning: SCIM user create/update/disable/delete; group membership changes; mapping results
- Admin: SSO config changes, SCIM token rotation, mapping edits, policy toggles
Retention: default 1 year (Core); 3–7 years (Enterprise option).
SKYE Production Gate
A deployment cannot be labeled “SKYE Production Certified” unless it passes:
- Correct OIDC/SAML validation (signature, issuer/audience, time windows, replay protections)
- Key/cert rotation tolerance (JWKS refresh; SAML rollover)
- Deprovision test: removal in IdP → access blocked within SLA
- Role mapping test: group change → deterministic permissions update
- Logging test: events present with correct tenant scoping
- Lockout resilience: break-glass works without unsafe shortcuts
| Profile | Default posture | Required controls |
|---|---|---|
| SIS-Core | Standard enterprise identity baseline for most tenants | SSO enabled; basic group-to-role mapping; audit logs 1 year; deprovision max < 15 minutes |
| SIS-Enterprise | Regulated / large org production gate | SSO required + password disabled; SCIM required; session revocation; audit logs 3+ years; deprovision target < 2 minutes; break-glass |
Consistency statement
“SKYE supports enterprise identity the right way: SSO controls authentication, SCIM controls lifecycle and access, and every change is audited.”