OpenIAM
OpenIAM is a comprehensive identity and access management (IAM) platform that unifies federation, MFA, identity lifecycle management, and governance in a single solution. It supports modern authentication protocols like OpenID Connect (OIDC), OAuth 2.0, and SAML 2.0, while also providing reverse proxy–based SSO for legacy web applications that lack native federation support.
Key Capabilities
-
Standards-based SSO & federation: Supports SAML 2.0, OpenID Connect, and OAuth 2.0 for secure SSO and token-based authentication.
-
Flexible IdP or SP roles: Operates as an Identity Provider (e.g., for Office 365) or as a Service Provider integrated with external IdPs such as Microsoft Entra ID (Azure AD), providing flexibility in enterprise topologies.
-
MFA and authentication framework: Offers a broad range of MFA methods, including FIDO2/WebAuthn, OTP via SMS, email, or IVR, certificate-based authentication, and the OpenIAM mobile app.
-
REST APIs for integration: Exposes Swagger-documented REST APIs for administration, automation, and OAuth provider configuration, supporting integration into custom workflows.
Limitations
-
Advanced OAuth profiles: Documentation covers core OAuth/OIDC flows but lacks confirmation of support for Pushed Authorization Requests (PAR), DPoP, or mTLS-bound tokens.
-
SCIM provider role: While an outbound SCIM connector is documented, there is no public confirmation of a general-purpose inbound SCIM 2.0 provider with published schemas or endpoints.
-
Reverse proxy complexity: The rProxy layer introduces additional operational requirements (e.g., Apache plugin management, HA, TLS, and rewrite rules). Some legacy apps may not proxy seamlessly, making federation preferable where supported.
-
Deployment considerations: Delivered primarily as software or marketplace images, OpenIAM requires customer management of patching, certificate handling, and scaling, unlike fully managed SaaS IdPs.