Skip to main content
By the end of this guide, you will have a Maverics deployment that automatically fails over between identity providers when one becomes unavailable — keeping your users authenticated without any service interruption.
Console terminology: In the Maverics Console, Continuity is configured as a Continuity Strategy under Identity Fabric. In YAML, this maps to a connector with type: continuity.

Why Identity Continuity?

Unplanned identity provider outages can lock out every user in the organization. Whether your cloud IdP has a regional failure, a network partition isolates your on-premises directory, or a provider pushes a breaking change — the result is the same: nobody can log in. Identity Continuity ensures uninterrupted access by automatically routing authentication to a healthy backup IdP when the primary becomes unavailable. The Maverics Orchestrator monitors each identity provider’s health and switches traffic transparently, with no user action required. Two primary use cases drive most Continuity deployments:
  • Cloud IdP fails over to on-premises directory — Your primary cloud IdP (e.g., Okta, Entra ID) becomes unavailable, and the Orchestrator routes authentication to an on-premises LDAP or AD connector.
  • Cloud IdP fails over to another cloud IdP — Your primary cloud IdP becomes unavailable, and the Orchestrator routes to a secondary cloud provider.
Identity Continuity is about high availability — keeping authentication working when a provider goes down. If you need to permanently migrate users from one identity provider to another, see the IdP Migration guide instead.
Architecture diagram showing Maverics Orchestrator routing authentication between multiple identity providers with health checks

Prerequisites

  • A running Maverics Orchestrator — If you have not installed the Orchestrator yet, follow the Quick Start guide or see the installation reference.
  • At least two identity provider connectors configured — You need a primary and one or more backup identity providers. See the Identity Fabric reference for supported providers and connector setup.
  • A deployment configured — Your Orchestrator needs an active deployment with a configured storage provider. See the Publishing Deployment Configs overview for setup details.

Configure Identity Continuity

1

Configure your identity providers

You need at least two identity services — a primary that handles authentication under normal conditions and one or more backups that take over when the primary is unavailable. Each provider gets its own Identity Fabric connector with independent credentials and configuration.
  1. Navigate to Identity Fabric in the sidebar and click Create.
  2. Select your primary provider type from the list (e.g., Okta (OIDC), Microsoft Entra ID (OIDC), or Generic OIDC Configuration).
  3. Fill in the connector form with your primary IdP’s credentials — client ID, client secret, and discovery URL.
  4. Click Save.
  5. Repeat steps 1-4 for each backup identity provider.
Name your connectors clearly (e.g., primary-okta and backup-entra-id) to make the failover order obvious when configuring the Continuity Strategy.
The Orchestrator can maintain active connections to both providers simultaneously. Users authenticating against either provider will have a seamless experience.
2

Enable health monitoring on each identity service

Health monitoring must be enabled on each individual IdP connector, not on the Continuity connector itself. The Orchestrator polls each IdP’s health endpoint at a configurable interval and uses the results to decide when to trigger failover.
  1. Open each identity service you configured in the previous step.
  2. Scroll to Identity Service Health Monitoring and enable it.
  3. Configure the health check settings:
SettingRecommended (Testing)Recommended (Production)Description
Polling frequency10s30s-60sHow often the Orchestrator checks the IdP’s health
Timeout10s10sHow long to wait for a health check response before marking it as failed
Failover threshold33Number of consecutive failures before triggering failover
Fallback threshold33Number of consecutive successes before routing traffic back
  1. Optionally enable Custom Health Check for more granular control over what constitutes a healthy response.
  2. Click Save.
  3. Repeat for each identity service in your Continuity configuration.
For OIDC-based identity services, health checks automatically call the well-known endpoint and authorization server. For LDAP/AD services, health checks attempt a connection and bind.
3

Create a Continuity Strategy

The Continuity Strategy is the component that orchestrates failover between your identity providers. It wraps your IdP connectors and adds routing logic based on health status.
  1. Navigate to Identity Fabric in the sidebar and click Create.
  2. Select Continuity Strategy from the list.
  3. Enter a name for the strategy (e.g., ha-failover).
  4. In the Fallback Strategy section, add your identity providers in priority order — primary first, then backups. The dropdown lists only identity services you have already configured.
Maverics Console showing the Continuity Strategy creation dialog with Name, Fallback Strategy, and Schema Abstraction Layer sections
See the Continuity connector reference for all available configuration fields.
4

Configure the Schema Abstraction Layer

The Schema Abstraction Layer maps attributes from different IdPs to consistent names. When failover occurs, your applications receive the same attribute names regardless of which IdP authenticated the user.For example, one IdP might call the email attribute preferred_username while another calls it mail. The Schema Abstraction Layer normalizes both to a single attribute name (e.g., email) that your applications can rely on.
Diagram showing how Maverics normalizes attribute names across Okta and Azure AD to consistent values
  1. In the Continuity Strategy configuration, scroll to the Schema Abstraction Layer section.
  2. For each attribute your applications need (e.g., email, name, role), click to add a row.
  3. Enter the normalized attribute Name (what your applications will see).
  4. Map it to the corresponding claim name from each identity service.
  5. Optionally set a Default value for cases where the attribute is unavailable from any IdP.
  6. Click Save.
Schema Abstraction Layer configuration showing attribute mapping across identity providers
5

Bind the Continuity Strategy to your application

Update your application configuration to use the Continuity Strategy as its authentication provider instead of a specific IdP connector. This is the same binding pattern used in other authentication guides — the only difference is that you reference the Continuity Strategy instead of an individual IdP.
  1. Navigate to User Flows in the sidebar and open your application’s User Flow.
  2. Under Access Control Policies, select the Continuity Strategy from the Select an authentication provider dropdown.
  3. For headers or claims, update the provider to the Continuity Strategy and select attributes from the Schema Abstraction Layer.
  4. Click Publish Preview to review changes, then click Publish to deploy.
For SAML and OIDC app user flows, select the Continuity Strategy from the Authentication menu. For proxy app user flows, create an access control policy and select the Continuity Strategy as the authentication provider.
The Orchestrator handles protocol translation automatically. Your application does not need to support the same protocol as your identity providers. For example, an OIDC application can authenticate users through a SAML or LDAP identity provider — the Orchestrator translates between protocols transparently.
6

Test your Continuity Strategy

The Maverics Console includes a simulation feature that lets you test failover behavior without waiting for a real outage. When publishing changes, you can enable simulation to cycle through test phases automatically.
  1. When publishing your configuration, toggle Simulate Continuity Strategy.
  2. Set a time interval for the simulation cycle (e.g., 60 seconds per phase).
  3. Click Publish to deploy with simulation enabled.
The simulation cycles through test phases automatically. During each phase, open an incognito/private browser window, navigate to your application URL, and verify the correct IdP login page appears.
Timeline showing Continuity simulation test phases: primary, failover to secondary, tertiary, fallback
The simulation runs through these phases:
  1. Test primary — Authenticate using your primary IdP credentials. Verify login works normally.
  2. Test failover to secondary — The primary appears unavailable. Open an incognito window, go to your app URL, and verify the login redirects to your secondary (backup) IdP.
  3. Test tertiary (if configured) — The secondary also appears unavailable. Verify failover to the third IdP.
  4. Test fallback — The secondary comes back online. Verify traffic routes back to the secondary.
  5. Test fallback to primary — The primary comes back online. Verify traffic routes back to the primary.
For each phase, use a fresh incognito window to avoid cached sessions interfering with the test.
Your Maverics Orchestrator is automatically routing authentication between your identity providers based on health status.

Troubleshooting

Check the Orchestrator’s debug logs for health check messages. Look for log entries like:
level=debug msg="idp health check failed: well-known metadata unavailable"
Common causes:
  • The well-known endpoint or LDAP server is not reachable from the Orchestrator’s network.
  • The unhealthyThreshold has not been reached yet — the Orchestrator requires the configured number of consecutive failures before triggering failover.
  • Health monitoring is not enabled on the individual IdP connectors (health checks are configured on each connector, not on the Continuity connector itself).
Verify the Schema Abstraction Layer mappings cover all attributes your application needs. Each IdP may use different claim names for the same data (e.g., email vs mail vs preferred_username).Check that attributes[].mapping entries exist for every IdP listed in the failover.idps array. If a mapping is missing for an IdP, the attribute will be empty when that IdP handles authentication.
Simulation mode is only available through the Console UI publish flow. Verify that you:
  1. Toggled the Simulate Continuity Strategy switch before publishing.
  2. Set a time interval for the simulation cycle.
  3. Published the configuration after enabling simulation.
Check the Orchestrator logs for simulation-related messages. If you are using direct configuration (YAML), simulation mode is not available — test failover manually by making the primary IdP’s health check endpoint unreachable.
Verify that healthyThreshold is configured on the individual IdP connectors. The Orchestrator requires the configured number of consecutive healthy checks before routing traffic back to a recovered IdP.Also check:
  • The health check interval — enough time must pass for the required number of healthy checks to accumulate.
  • The recovered IdP’s health check endpoint is actually responding successfully.
  • The Orchestrator logs show health check success messages for the recovered IdP.