Federation & SSO
Tetrapus ships a complete enterprise identity surface: SAML 2.0 service provider, OpenID Connect relying party and OpenID Provider, SCIM 2.0 directory sync, WebAuthn passkeys, and PIV/CAC smart card binding. Pre-tested against Okta, Azure AD, ADFS, Keycloak, Ping Identity, and Google Workspace.
Where each surface fits
Three roles in the federation taxonomy: Tetrapus as service-consumer (SAML SP, OIDC RP), Tetrapus as the identity-issuer (OIDC OP), and Tetrapus as the policy-enforcer (SCIM target, WebAuthn challenger, smart card binder). All three coexist per Org.
Supported Identity Providers
Any standards-compliant SAML 2.0 IdP or OIDC provider will work — the list above is the matrix we test against in CI. For custom or self-hosted IdPs, see the SAML or OIDC consumer pages.
Multi-tenant scoping
Every federation primitive is scoped to an Org. A single Tetrapus cluster hosts unrelated tenants whose IdPs,
SCIM bearer tokens, OIDC OP clients, smart card bindings, and WebAuthn credentials never cross. Tables
enforce this with a non-null org_id
foreign key and unique-by-Org indices on logical names.
Questions?
Reach out for help with integration, deployment, or custom domain codecs.