SSO & Identity
OIDC and SAML federation with Entra ID, Okta, Google Workspace, or any standards-compliant IdP. Native email/password is available as a controlled fallback.
Your IT team has onboarded a dozen SaaS vendors this year. FrontLine fits the standard playbook — SAML 2.0 / OIDC, SCIM provisioning, just-in-time user creation, group-mapped role assignment — so no bespoke integration work is needed and access reviews fold into your existing IdP processes.
Standards-based federation, configured the way your IT team expects
We support SAML 2.0 (preferred for enterprise IdPs) and OIDC with PKCE. Group-to-role mapping is re-evaluated on every sign-in, so role changes in your IdP take effect on next session. IdP client secrets are encrypted at rest using a stable SSO_SECRET_KEY that survives deploys. JWT session tokens carry the tenant claim and are immutable for the request lifecycle. Native email/password is disabled by default in production tenants; per-tenant flags can re-enable it for break-glass scenarios.
What's covered out of the box
Audit-ready artifacts your reviewers can lean on
- SOC 2 Type II audit in progress — access-management controls
- Aligned with NIST 800-63B AAL2 for authenticator assurance
- ISO/IEC 27001 access-control framework
- Encrypted IdP secrets via age-keyed SOPS at deploy time
What security and compliance reviewers actually ask
Can you enforce SSO-only access with no password fallback?+
How do you handle IdP role changes mid-session?+
What happens to existing sessions when an IdP connection is rotated?+
Are authentication events logged?+
Run this past your security team
We share security overviews, RLS policy DDL, audit-event schemas, and SOC 2 progress on request. Book a 30-minute security review with the founders.