All Products
Search
Document Center

Identity as a Service:Manage federated credential provider

Last Updated:Mar 31, 2026

Add a federated credential provider in IDaaS EIAM to let machine-to-machine (M2M) client services obtain access tokens using their existing identity — certificates, OIDC tokens, or cloud instance signatures — instead of long-lived static credentials.

Choose a provider type

IDaaS supports three federated credential provider types. Select the one that matches your client environment.

Provider typeBest forTypical environments
PCA (private certificate authority)Clients that authenticate with X.509 certificates issued by an internal CAPersonal development machines, devices with a Trusted Platform Module (TPM)
OIDC (OpenID Connect)Clients that already obtain OIDC tokens from an external identity provider (IdP)Kubernetes pods, GitHub Actions, CI/CD pipelines, Azure virtual machines, Google Cloud Compute Engine
PKCS#7Clients running on cloud instances that generate signed instance identity documentsAlibaba Cloud ECS, Alibaba Cloud ECI, AWS EC2

Prerequisites

Before you begin, ensure that you have:

  • An IDaaS instance with the EIAM service enabled

  • The required permissions to manage the IDaaS instance

  • (OIDC only) The issuer URL of your external IdP, reachable over HTTPS. Verify that {issuer}/.well-known/openid-configuration returns a valid JSON document containing at least issuer and jwks_uri fields before you proceed — the issuer cannot be changed after the provider is created

  • (PKCS#7, Amazon Cloud) The RSA-2048 root certificate for the AWS region where your client service is deployed. Download it from AWS public certificates for instance identity signature

Add a federated credential provider

  1. Log on to the IDaaS Management Console. In the left navigation pane, select IDaaS Management ConsoleEIAM, choose your IDaaS instance, and click Manage

  2. Go to Sign-In > Authentication Configuration > Federated Credential Provider Management, and click Add Federated Credential Provider.

  3. Under Select provider type, select PCA, OIDC, or PKCS#7.

    For background on how each provider type works, see Federated credential providers overview.
  4. Click Next, configure the parameters for your provider type (see the sections below), and click Confirm.

PCA parameters

A private certificate authority (PCA) provider validates client identity using X.509 certificates issued by your internal CA. The trust condition verifies the certificate content when a client calls the token endpoint.

FieldDescription
Federated credential providerA unique name for this provider. Use lowercase letters, digits, underscores (_), and hyphens (-). Maximum 64 characters.
Provider typePCA
Network access endpointThe endpoint IDaaS uses to fetch the certificate revocation list (CRL) and validate the root certificate. Use the shared endpoint (default, shared public network egress) unless you have purchased a dedicated endpoint.
Fill in verification certificateThe root certificate in PEM format. The content must start with -----BEGIN CERTIFICATE----- and end with -----END CERTIFICATE-----. Upload up to two root certificates to support certificate rotation.
Trust conditionThe condition IDaaS evaluates against the client certificate submitted to the token endpoint. Only requests that satisfy the condition receive an access token. Maximum 10,240 characters.
Description(Optional) A note explaining the purpose of this provider. Maximum 128 characters.

OIDC parameters

An OIDC provider validates client identity using OIDC tokens issued by an external identity provider. IDaaS verifies the token signature and evaluates the trust condition before issuing an access token.

Before you configure the issuer

The issuer cannot be changed after the provider is created. Before entering the issuer URL:

  1. Confirm the URL begins with https://.

  2. Append /.well-known/openid-configuration to the URL and open it in a browser or with curl. Verify the response contains issuer and jwks_uri fields.

  3. Copy the exact issuer value from the discovery document — use that value in the Issuer field, not the discovery endpoint URL itself.

OIDC configuration fields

FieldDescription
Federated credential providerA unique name for this provider. Use lowercase letters, digits, underscores (_), and hyphens (-). Maximum 64 characters.
Provider typeOIDC
Network access endpointThe endpoint IDaaS uses to fetch the JWKS (JSON Web Key Set) and verify token signatures. Use the shared endpoint (default) unless you have purchased a dedicated endpoint.
Trust sourceHow IDaaS obtains the public key to verify OIDC tokens. Three options are available — see Trust source options below.
IssuerThe issuer of the OIDC tokens your client submits. Must use HTTPS. Maximum 1,024 characters. Cannot be changed after creation.
ResourceServer IdentifierThe expected audience (aud) claim in the OIDC token. You can specify up to 5 values, each up to 256 characters. Defaults to the current IDaaS instance domain. If your client sets a different audience, update this field — otherwise token endpoint calls will fail.
Verification keyThe static public key used to verify token signatures. Required only when Trust source is set to Static configuration.
Trust conditionThe condition IDaaS evaluates against the OIDC token claims when a client calls the token endpoint. Issuer and audience are always validated as baseline checks. Maximum 10,240 characters.
Description(Optional) A note explaining the purpose of this provider. Maximum 128 characters.

Trust source options

OptionWhat IDaaS doesWhen to use
Issuer address parsing (recommended)Fetches {issuer}/.well-known/openid-configuration, then retrieves the JWKS from the jwks_uri in that documentYour IdP exposes a standard OIDC discovery endpoint
Public key address parsingFetches the JWKS directly from the URL you provideYour IdP exposes a JWKS endpoint but not a discovery document
Static configurationUses the public key you paste into the Verification key fieldYour IdP does not expose a network-accessible key endpoint

PKCS#7 parameters

A PKCS#7 provider validates client identity using signed instance identity documents generated by the cloud platform where your client service runs. Select the trust source that matches your cloud environment.

FieldDescription
Federated credential providerA unique name for this provider. Use lowercase letters, digits, underscores (_), and hyphens (-). Maximum 64 characters.
Provider typePKCS#7
Trust sourceSelect Alibaba Cloud if your client runs on ECS or ECI. Select Amazon Cloud if your client runs on EC2.
Signature validity periodThe maximum age of the PKCS#7 signature accepted at the token endpoint. Default: 3,600 seconds for Alibaba Cloud; 30 days for Amazon Cloud.
Signature timestamp expressionThe path IDaaS uses to extract the signing time from the submitted signature. Read-only — cannot be modified. Alibaba Cloud: pkcs7.payload.jsonData.audience.signingTime. Amazon Cloud: pkcs7.signingTime.
Root certificateThe root certificate used to verify the PKCS#7 signature. For Alibaba Cloud, IDaaS pre-fills the global Alibaba Cloud root certificate. For Amazon Cloud, you must use an RSA-2048 type root certificate — other types will not pass verification. Upload the RSA-2048 root certificate for the region where your client is deployed. If your service spans multiple regions, upload a certificate for each.
Account IDThe cloud account ID that owns the instance where your client service runs. Maximum 128 characters.
Instance ID signatureDefaults to the IDaaS instance ID.
Description(Optional) A note explaining the purpose of this provider. Maximum 128 characters.

Manage existing providers

After creating a federated credential provider, manage it from the Federated Credential Provider Management page:

  • Enable or disable: Toggle the Status switch to activate or deactivate the provider without deleting it.

  • View details: Click Details to review the provider's current configuration.

  • Update: Click Modify to change editable fields. Note that the Issuer field in OIDC providers cannot be changed after creation.

What's next