Decision Matrix
The following table compares all five modes across the criteria that matter most when choosing a deployment pattern.| Criteria | OIDC Provider | SAML Provider | HTTP Proxy | LDAP Provider | AI Identity Gateway |
|---|---|---|---|---|---|
| Protocol | OpenID Connect | SAML 2.0 | HTTP | LDAP | MCP (Model Context Protocol) |
| Best for | Modern apps that consume OIDC tokens natively | Enterprise SAML apps with rigid federation requirements | Legacy apps where you cannot modify authentication code | LDAP-dependent apps that need a virtual directory | AI agents that invoke tools on behalf of users |
| App modification required | Yes — app must be an OIDC client (relying party) | Yes — app must be configured as a SAML SP | No — the Orchestrator proxies traffic transparently | No — the app connects to the Orchestrator as if it were an LDAP server | Yes — the AI agent must be an MCP/OAuth client |
| Identity delivery | JWT or opaque tokens (ID token, access token, refresh token) | Signed SAML assertions with mapped attributes | HTTP headers injected into upstream requests (e.g., SM_USER) | LDAP entries returned via bind and search operations | OAuth access tokens with MCP tool-scoped context |
| Authorization model | Per-app declarative rules or OPA policies | Per-app declarative rules | Location-based policies (different rules per URL path) | Service Extension-driven (custom Go logic) | OPA policies evaluated per-tool invocation |
| Session management | Cookie-based sessions with configurable lifetime | Cookie-based sessions with configurable lifetime | Cookie-based sessions with configurable lifetime | Per-connection LDAP bind state | Token-based (OAuth token lifetime) |
| Service Extensions | Optional hooks for custom claims, authentication, and authorization | Optional hooks for custom claims, authentication, and authorization | Optional hooks for request/response modification, headers, and authorization | Required for all core operations (bind, search, credential lookup) | Optional (OPA policies are the primary authorization mechanism) |
| Can combine with | SAML Provider, HTTP Proxy | OIDC Provider, HTTP Proxy | OIDC Provider, SAML Provider, LDAP Provider | HTTP Proxy | Standalone (runs alongside other modes on the same Orchestrator) |
Decision Flowchart
Use this decision tree to identify the right mode for your application. Start at question 1 and follow the path that matches your situation.- Does your application support OpenID Connect natively? If yes, use OIDC Provider. OIDC is the modern standard for authentication — if your app supports it, this is the most straightforward mode. (Your IdP does not need to support OIDC — the Orchestrator can translate from any upstream protocol.)
- Does your application only support SAML 2.0? If yes, use SAML Provider. Many enterprise apps (Salesforce, ServiceNow, Workday) require SAML assertions for federated SSO.
- Can you NOT modify the application’s authentication code at all? If yes, use HTTP Proxy. The Orchestrator sits in front of the app as a reverse proxy, handling authentication and injecting identity headers without any changes to the application.
- Does your application require LDAP directory lookups for authentication or user data? If yes, use LDAP Provider. The Orchestrator presents a virtual LDAP directory backed by modern cloud identity providers. This mode is often paired with HTTP Proxy for comprehensive legacy stack modernization.
- Are you securing AI agent-to-tool communication via MCP? If yes, use AI Identity Gateway. This mode adds identity, authorization, and audit to Model Context Protocol connections between AI agents and enterprise tools.
Protocol Translation
The Orchestrator’s mode determines what protocol your application speaks. The Identity Fabric connector determines what protocol your identity provider speaks. These are completely independent. This means you do not need to match your IdP’s protocol to your application’s protocol. For example:- An application that only speaks SAML can authenticate against an OIDC-only IdP (using SAML Provider mode with an OIDC connector)
- An application that only speaks OIDC can authenticate against a SAML-only IdP (using OIDC Provider mode with a SAML connector)
- An application behind HTTP Proxy can authenticate against an LDAP directory or any OIDC/SAML provider
Connector Compatibility
Every Orchestrator mode works with every Identity Fabric connector — the Orchestrator handles protocol translation between your identity provider and your application. However, some connectors are more commonly used with certain modes. The table below shows the typical pairings and notes for each combination.| Connector | OIDC Provider | SAML Provider | HTTP Proxy | LDAP Provider | AI Identity Gateway |
|---|---|---|---|---|---|
| Azure AD | Common | Common | Common | Common | Common |
| Okta | Common | Common | Common | Common | Common |
| PingFederate | Common | Common | Common | Possible | Possible |
| Auth0 | Common | Common | Common | Possible | Common |
| ADFS | Common | Common | Common | Possible | Possible |
| Amazon Cognito | Common | Possible | Possible | Possible | Common |
| Custom OIDC | Common | Common | Common | Possible | Common |
| Google Workspace | Common | Common | Common | Possible | Common |
| Custom SAML | Common | Common | Common | Rare | Rare |
| LDAP | Possible | Possible | Common | Common (as attr source) | Rare |
| Active Directory | Possible | Possible | Common | Common (as attr source) | Rare |
| Continuity | Common | Common | Common | Possible | Possible |
For a complete walkthrough on setting up Identity Continuity with automatic failover, see the Identity Continuity guide.
Common Combinations
Modes can run simultaneously on the same Orchestrator instance. Here are the most common combinations and when to use them.OIDC Provider + HTTP Proxy
Use this combination when your organization has both modern and legacy applications. Modern apps consume OIDC tokens directly from the Orchestrator’s OIDC Provider. Legacy apps that cannot be modified receive identity through HTTP headers injected by the proxy. Both share the same upstream identity providers and session infrastructure.HTTP Proxy + LDAP Provider
Use this combination for full legacy stack modernization. Many legacy applications depend on both header-based authentication (for the web tier) and LDAP directory lookups (for user data and group membership). Running both modes on the same Orchestrator provides a complete identity bridge — the proxy handles HTTP traffic while the virtual directory handles LDAP queries, both sourcing identity from modern cloud providers.OIDC Provider + SAML Provider
Use this combination to bridge modern and enterprise authentication protocols. The Orchestrator acts as both an OIDC authorization server and a SAML identity provider simultaneously. This enables protocol translation — upstream OIDC identity providers can feed downstream SAML service providers, or vice versa — making IdP migration possible without changing application configurations on either side.Deployment Topologies
The Common Combinations section above describes modes running together on a single Orchestrator instance. In production, organizations typically deploy multiple separate Orchestrator instances, each named and configured for a specific role. The Console manages all deployments from a single pane of glass. The patterns below are common starting points — many permutations are possible depending on your organization’s needs.Auth Provider
A centralized deployment running OIDC Provider and SAML Provider modes together. This deployment acts as the organization’s identity broker — modern apps connect via OIDC, enterprise apps connect via SAML, and both share the same upstream identity providers and session infrastructure. This is the most common starting point for organizations adopting the Orchestrator.AI Identity Gateway
A standalone deployment running only AI Identity Gateway mode. It secures MCP connections between AI agents and enterprise tools, enforcing identity, authorization, and audit on every tool invocation. Typically deployed alongside (but separate from) the Auth Provider so that AI identity workflows are isolated from traditional authentication traffic.HTTP Proxy
HTTP Proxy deployments follow two common patterns depending on the environment. Centralized proxy — A single HTTP Proxy deployment fronting multiple legacy applications. This is simpler to manage and works well when applications share similar authentication patterns and header requirements. Per-application proxy — A dedicated HTTP Proxy deployment for each legacy application. This provides isolation — each app gets its own configuration, policies, and scaling. Use this pattern when applications have different authentication requirements or when teams manage their own infrastructure.LDAP Provider
LDAP Provider deployments also follow two common patterns. Centralized — A single LDAP Provider deployment serving multiple LDAP-consuming applications across the network. This minimizes the number of deployments to manage and works well when applications share similar directory schemas. Co-located — An LDAP Provider deployed on the same server (or in the same pod) as the LDAP-consuming application. This keeps LDAP traffic local — the application connects to localhost rather than sending LDAP queries across the network. Use this pattern in security-sensitive environments or for applications with high LDAP query volume.Mode-Specific Guides
SSO with OIDC
Configure the Orchestrator as an OIDC Provider for modern single sign-on
Federate SAML Apps
Federate enterprise SAML applications through the Orchestrator
Add SSO to Web Apps
Protect legacy applications with reverse proxy authentication and header injection
IdP Migration
Migrate between identity providers with zero downtime
Identity Continuity
Set up automatic IdP failover with health monitoring and simulation testing
Mode Reference Pages
OIDC Provider
Complete OIDC Provider configuration reference
SAML Provider
Complete SAML Provider configuration reference
HTTP Proxy
Complete HTTP Proxy configuration reference
LDAP Provider
Complete LDAP Provider configuration reference
AI Identity Gateway
Complete AI Identity Gateway configuration reference
Apps & Routes
Shared app fields, authorization rules, and all 5 app types