How Applications Fit into a Deployment
A typical Maverics deployment looks like this:- Identity Fabric — connect one or more identity providers (Entra ID, Okta, LDAP, etc.) that authenticate your users
- Applications — register the services the Orchestrator protects, each with a type that matches how the service communicates (HTTP, OIDC, SAML, or MCP)
- Policies — define who can access what, which identity providers handle authentication, and what identity information flows to each application
Applications and User Flows
In the Maverics Console, applications and policies are connected through User Flows. A User Flow is a Console-only concept that ties together an application, its authentication policies, header mappings, and identity provider bindings into a single manageable unit. The typical Console workflow is:- Create an Identity Fabric connector (e.g., Entra ID)
- Create an Application (e.g., a proxy app for your legacy HR portal)
- Create a User Flow that binds the application to the identity provider, defines sign-on policies, and configures what identity information reaches the application
policies, headers, and attrProviders blocks.
App Types and Orchestrator Modes
Each application has a type that determines which protocol it uses and which Orchestrator mode it connects to. Choose the app type that matches how your service communicates.| App Type | Orchestrator Mode | Protocol | When to Use |
|---|---|---|---|
| Proxy | HTTP Proxy | HTTP | Legacy apps — identity via headers, no code changes |
| OIDC | OIDC Provider | OIDC | Modern apps with native OpenID Connect support |
| SAML | SAML Provider | SAML 2.0 | Enterprise apps requiring SAML assertions |
| MCP Proxy | AI Identity Gateway | MCP | AI agents accessing upstream MCP servers |
| MCP Bridge | AI Identity Gateway | MCP + REST | Expose REST APIs as MCP tools for AI agents |
App Type Pages
Each app type has its own page with Console UI setup steps and configuration reference.Proxy App
Identity-aware reverse proxy for legacy and header-based applications
OIDC App
Register OIDC clients with the Orchestrator’s built-in OIDC Provider
SAML App
Register SAML Service Providers with the Orchestrator’s SAML Provider
MCP Proxy App
Proxy MCP traffic to upstream MCP servers with identity injection
MCP Bridge App
Expose REST APIs as MCP tools using OpenAPI specifications
Related Pages
Identity Fabric
Configure the identity providers that authenticate users for your applications
Authorization
Authorization rules that control who can access what
Service Extensions
Custom request/response modification and API endpoints
Sessions
Session storage for user authentication state
Transport Layer Security (TLS)
Named TLS profiles for upstream connections and IdP communication
Choosing a Mode
Decision framework for selecting the right Orchestrator mode