All Products
Search
Document Center

Identity as a Service:IDaaS default security design

Last Updated:Mar 31, 2026

Alibaba Cloud IDaaS is an identity product from the Alibaba Cloud security team. It ships with strong security controls already enabled. You don't need to configure protection from scratch — the five measures below are active the moment you create an instance.

What's enabled by default:

  • Two-factor authentication (2FA) for all end users, with intelligent mode to reduce unnecessary prompts

  • Risk control for high-impact administrator operations

  • Manual authorization required for every application

  • High-complexity password policy

  • Request signature and data encryption for cross-origin and synchronization scenarios

Note: When availability and security conflict, IDaaS prioritizes security. The default configurations aim for maximum out-of-the-box protection, but cannot guarantee compliance with every industry-specific standard.

Two-factor authentication

Two-factor authentication (2FA) is enabled by default for all IDaaS instances. After signing in with a password, users must complete a second verification step via SMS or email before accessing any application.

Because all applications connect to IDaaS through single sign-on (SSO), enabling 2FA once protects every connected application automatically.

Two-factor authentication

Intelligent mode

Requiring 2FA on every sign-in can be disruptive for users who work from a consistent environment. Intelligent mode — also enabled by default — evaluates the current device, access environment, and account status to determine whether 2FA is needed for a given session.

When nothing about the context looks suspicious, users can go days without being prompted, with no reduction in security posture.

Risk control for administrator operations

Administrator accounts carry far greater permissions than regular user accounts. A compromised administrator account can cause serious damage, so IDaaS applies Alibaba Cloud's risk control system to key management operations.

When an operation's risk level exceeds a threshold, IDaaS triggers a verification step requiring 2FA with the mobile phone number attached to the Alibaba Cloud account. For sensitive operations performed by a sub-administrator, the owner must also confirm the action.

Risk control for administrator operations

The following operations are covered by default (10+ total):

  • Delete an instance

  • Delete accounts in batches

  • Delete an application

  • Key rotation

Manual application authorization

When you connect an application to IDaaS for SSO, no one — including administrators — can access it until an admin explicitly defines the authorization scope. This default enforces the principle of least privilege and prevents unintended access proliferation as you add more applications over time.

Manual application authorization

Password policy

IDaaS supports password-based sign-in by default and ships with a high-complexity password policy. The default requirements are:

  • Must contain an uppercase letter

  • Must contain a lowercase letter

  • Must contain a number

  • Must contain a special character

  • Cannot contain the account name

Password policy

Adjust the policy at any time to balance security requirements with your organization's usability needs.

Request signature and data encryption

HTTPS secures data in transit but cannot guarantee end-to-end integrity at the application layer. IDaaS adds two protection layers on top of HTTPS for cross-origin requests and account synchronization scenarios. Both are enabled by default.

Signature layer: When a cross-origin request is made, the request content is signed with a private key. The receiver verifies the signature using the corresponding public key, confirming the content was not tampered with in transit. This applies to some SSO scenarios and outbound account synchronization.

Encryption layer: Synchronized data is encrypted end-to-end before leaving IDaaS. By default, password information is not synchronized, which helps prevent information leakage from misconfiguration or accidental exposure. Future releases will add full-process encryption for SAML SSO, extending this protection to meet high-security requirements in finance and government sectors.

Request signature and data encryption