One identity surface.
Users, agents, clients.

AIOP ships with a complete identity provider — full OAuth 2.1, OpenID Connect, MFA and passkeys — and federates cleanly with the IdPs you already run. The same scope system governs human users, AI agents and the clients that talk to your APIs. SSO, role-based access and named-human attestation work the same regardless of where authentication actually lives.

Protocols
OAuth 2.1 · OIDC · SAML 2.0
Federation
EntraID · Okta · Keycloak · others
Synchronisation
SCIM with automatic role mapping
Coverage
Users · agents · clients
Capabilities

Four things you get out of the box.

01

A full IDP, ready to deploy.

AIOP includes a production-grade identity provider with OAuth 2.1, OpenID Connect, SAML 2.0, MFA (TOTP and WebAuthn) and passkey support. Stand up authenticated workloads on day one — no separate IdP procurement, no extra vendor in the contract.

02

Federation with what you already have.

Already running EntraID, Okta, Keycloak or another OIDC- or SAML-capable provider? AIOP federates with it. Group claims map to AIOP roles automatically; SCIM keeps users, attributes and assignments in sync — no shadow directory, no manual provisioning.

03

One scope system for users and agents.

The same fine-grained role and permission model that controls what your people can see also controls what your agents can do. Every scope defines exactly which data, which steps and which integrations a session — human or agentic — is allowed to reach.

04

Authenticate every client through one IDP.

Desktop apps, mobile devices, portals and micro-frontends sign in through AIOP over OAuth 2.1. The same APIs they consume afterwards are gated by the same identity — internal and external surfaces under one contract, no second authentication system to maintain.

Where it fits

Three deployment patterns.

  1. Greenfield

    No existing IdP

    Use AIOP's identity provider as your primary IdP. Self-service onboarding, MFA enforced, passkeys for staff. You ship without procuring a separate identity vendor.

  2. Federated

    Plug into EntraID, Okta or Keycloak

    Your existing IdP stays the source of truth. AIOP federates over OIDC or SAML; group claims map to AIOP roles automatically, SCIM keeps everything in sync. No user migration, no shadow directory.

  3. Multi-client

    Desktop, mobile and micro-frontends

    Authenticate every client surface — internal portal, partner portal, mobile app, micro-frontend — through one IDP. OAuth 2.1 across the board; the APIs they reach afterwards inherit the same identity.

One scope system

Same access rules. People, agents, everything in between.

When an agent acts on your behalf, it should be governed by the same role and permission system that controls your teams. No second access model, no parallel admin surface — the scopes you define for people apply, unchanged, to every agent that runs inside the platform.

See the platform
Built on AIOP

Identity is a primitive, not an add-on.

Identity sits at Layer 2 of the eight-layer architecture. Every signal carries the authenticated subject; every consequential action requires an attested identity to proceed. Whether the subject came from AIOP's IDP or a federated provider, the downstream contract is identical.

  • OAuth 2.1 + OpenID Connect compliant.
  • SAML 2.0 federation for established IdPs.
  • WebAuthn and passkey support out of the box.
  • SCIM-based user, attribute and role synchronisation.
  • Per-tenant multi-IdP routing — different organisations, different identity sources.
  • All sign-in, sign-out and step-up events captured in the Audit Stream.
  • Sovereign deployments keep identity data inside your perimeter.

Talk through your identity setup.

Tell us what you run today — EntraID, Okta, Keycloak, something else, or nothing yet. We'll show the cleanest path to authenticated AIOP, including the client and agent flows.