Designing Consistent Identity and Authentication Flows Across Enterprise Applications

Implementation and review of OIDC and Kerberos flows, MFA integration and alignment with internal identity and security standards.

Context

The enterprise application landscape included multiple systems with fragmented identity integrations and inconsistent authentication approaches implemented at application level.

Problem

Applications implemented identity and authentication differently, leading to security gaps, complex user authentication journeys and increased operational overhead during onboarding and maintenance.

Constraints

  • Multi-forest Active Directory environment
  • Regulatory and internal requirements for MFA
  • Legacy application limitations and technology constraints

My role

Solution Architect responsible for implementing and reviewing authentication and authorisation flows in applications, validating identity integrations, and aligning them with enterprise identity and security standards.

Solution

Defined a standard identity integration approach and review checklist to ensure consistent authentication and authorisation handling, clear ownership boundaries, and audit-ready flows across applications—without breaking legacy constraints.

Diagram placeholder (redacted / coming soon)

Key decisions

  • Implemented standard authentication flows using OIDC and Kerberos at application level
  • Reviewed and aligned token claims and identity attributes
  • Enforced MFA and conditional access requirements based on defined security baselines

Outcome

  • Consistent user authentication experience across enterprise applications
  • Reduced risk of misconfigured identity integrations
  • Improved auditability of authentication and authorisation flows
  • Clear separation of responsibilities between identity provider, proxy and application
  • Easier onboarding of applications into the identity landscape

Technologies & Standards

OIDCKerberosSAMLMFAActive Directory