Scaling National Digital Identity Through Federated Department IDPs

IAM Architecture · June 2025 · 12 min read

National digital identity systems — Aadhaar in India, UAEPass in the UAE, Singpass in Singapore — represent one of the most transformative infrastructure investments a government can make. They promise seamless, secure Single Sign-On across hundreds of public services. But as adoption scales, a structural problem silently emerges: the integration model starts to collapse under its own weight.

This post explores that structural flaw, its real-world consequences, and a clean architectural solution grounded in standard federated identity principles. The pattern is applicable to any country deploying a national digital identity infrastructure.

The Rise of National Digital Identities

Over the past decade, governments worldwide have launched centralized digital identity platforms that allow citizens to prove who they are — online, instantly, and securely. These systems typically rely on industry standards such as OAuth 2.0OpenID Connect (OIDC), or SAML 2.0 to issue verifiable identity tokens that third-party applications can trust.

🇮🇳
India
Aadhaar Auth
🇦🇪
UAE
UAE Pass
🇧🇭
Bahrain
eKey
🇸🇦
Saudi Arabia
Nafath
🇸🇬
Singapore
Singpass

In each of these ecosystems, the national identity system acts as the authoritative Identity Provider (IdP). Any application — a tax portal, a health records system, a business licensing platform — becomes a Service Provider (SP) that delegates authentication to the national IdP. Citizens log in once and are authenticated across services. It is elegant in concept.

IAM Fundamentals

In SAML/OIDC terminology, the Identity Provider (IdP) is the authority that verifies identity and issues tokens. The Service Provider (SP) is the application that trusts and consumes those tokens. A trust relationship must be established between every IdP–SP pair before federation can occur.

The Problem: A Mesh of Unmanageable Integrations

Modern governments are not monolithic. A country operates through a hierarchy: federal ministries, state departments, municipal offices, and dozens of agencies within each. Each of these entities builds and maintains multiple citizen-facing applications — permit portals, health dashboards, utility platforms, education registries, subsidy management systems, and more.

When every one of these applications integrates directly with the national digital identity system, the result is a sprawling mesh of SP registrations. Consider: a single federal ministry might have 8–15 applications. Multiply that by 20 departments at the national level, then add state and local equivalents, and you can easily arrive at hundreds or thousands of registered Service Providers at the national IdP.

Current State The Mesh Problem — Direct SP Integrations at Scale
NATIONAL DIGITAL ID (IdP Core) Health Portal Lab Records Insurance Ministry of Health Tax Filing GST Portal e-Refunds Ministry of Finance e-Passport Visa Tracker Border Ctrl Ministry of Interior Road Licence Vehicle Reg Dept of Transport Pension Mgmt Job Portal Ministry of Labour School Enrol Uni Admissions Ministry of Education Direct SP–IdP Trust (each requires separate config & maintenance)

Each dashed line = a separately registered trust relationship at the National IdP. Hundreds of such connections create an unmanageable mesh.

Why This Becomes Unmanageable

Each Service Provider registration at the national IdP is not a one-time task. It requires ongoing management: certificate rotations, metadata updates, attribute mapping changes, security audits, version upgrades, and deprecation handling. When multiplied across hundreds of SPs, the national IdP team faces an impossible operational burden that doesn’t scale.

Beyond operations, the security blast radius grows with every new direct connection. A misconfigured SP, a leaked client secret, or a stale SAML metadata entry becomes a potential entry point. The national identity system — the crown jewel of national digital infrastructure — is directly exposed to the security posture of every application team that has ever integrated with it.

The Real Numbers

A mid-sized country with 20 federal departments, each running 10 applications, plus 10 state governments each with 5 departments and 8 applications each, produces 600+ direct SP registrations at the national IdP — before local government services or private sector integrations are counted.

The Solution: A Federated Hierarchy of Department IDPs

The fix is elegant and well-precedented in enterprise IAM: introduce an intermediate Identity Provider at the department level. Instead of each application integrating directly with the national identity system, each government department deploys and operates its own IdP. The department IdP then federates upward to the national IdP as a single trusted entity.

Applications within a department integrate only with their department’s IdP. Citizens authenticate through the national identity system, but the trust chain is clean, bounded, and hierarchical.

Proposed Architecture Federated Department IDP Model — Clean Hierarchy

Each department registers exactly ONE trust relationship with the National IdP. All applications connect only to their department's IDP.

How the Authentication Flow Works

The citizen experience remains seamless. When a user visits a Health Ministry application, the application redirects to the Health Department IDP. That IDP, not recognizing the citizen’s session, redirects further to the National Digital Identity System — Aadhaar, Singpass, or UAEPass. The citizen authenticates once. The national IdP issues an assertion to the department IdP, which translates or passes the identity claim down to the application. The citizen is logged in.

This is called IdP Chaining or Proxied Authentication — a well-supported pattern in platforms such as Keycloak, PingFederate, ForgeRock, Microsoft Entra ID External Identities, and AWS Cognito.

Key Benefits of the Federated Hierarchy Model

Dramatically Fewer SP Registrations at National IdP

Instead of 600+ SPs, the national system manages only as many registrations as there are departments — perhaps 20–50. This is a transformational reduction in operational complexity.

Departmental Autonomy & Agility

Each department onboards, configures, and manages its own applications independently. New apps go live without requiring changes at the national level. Departments move at their own pace.

Reduced Blast Radius

A security incident at one department's IdP is contained within that department. The national identity core is insulated from the security posture of individual applications.

Workforce Identity Consolidation

The department IdP can serve both citizens (via federation with national IdP) and government employees (via internal directory integration). One IdP, two populations, zero duplication.

Attribute Enrichment

Department IDPs can enrich the national identity token with department-specific attributes — roles, clearance levels, internal identifiers — before passing claims to applications.

Protocol Flexibility

Legacy applications speaking SAML 1.1 can be served by a modern department IdP that federates via OIDC to the national layer. The department IdP acts as a protocol bridge.

Before vs. After: A Structural Comparison

Dimension Direct Integration (Current) Federated Dept IDP (Proposed)
SP Count at National IdP Hundreds to thousands One per department (20–50)
Onboarding new app National IdP team involvement required Department manages independently
Certificate rotation Each SP rotates independently Department handles internally
Security isolation Core exposure risk Blast radius contained
Workforce SSO Separate IAM required Unified citizen & staff login
Protocol support Must match national protocol Protocol bridging supported
Attribute enrichment Central complexity Context-aware claims
Maintenance overhead Central bottleneck Distributed scalability

Implementation Considerations

Choosing a Department IDP Platform

Department IDPs should be deployed on platforms capable of acting as both a Service Provider (toward the national IdP) and an Identity Provider (toward department applications). Strong candidates include Choosing a Department IDP PlatformKeycloak , WSO2 Identity Server  , Gluu Server , PingFederateForgeRock Access Management, and cloud-native options like Microsoft Entra External ID or AWS Cognito. The choice depends on the department’s technical capacity, data sovereignty requirements, and existing procurement frameworks.

Establishing Trust at the National Level

The national digital identity authority must define a formal SP onboarding policy for department IDPs. This includes security baseline requirements (PKCE enforcement, signed requests, token binding), a metadata exchange process, and SLA commitments. The national IdP should require each registered department IdP to pass a security certification before being permitted to relay citizen identity claims to downstream applications.

Session Management and Logout Propagation

A three-tier architecture introduces complexity in Single Logout (SLO). When a citizen logs out, the logout signal must propagate from the application, through the department IdP, up to the national IdP, and back down to all other sessions. Both SAML SLO and OIDC Back-Channel Logout specifications support this, but implementation requires careful testing and fallback handling for partial propagation failures.

Token Claim Mapping and Privacy

Department IDPs serve as natural claim transformation layers. The national IdP may issue a minimal identity token — perhaps just a verified national identifier and age range. The department IdP can map this to internal role assignments, pseudonymise the national identifier for privacy, and issue a richer, department-scoped access token to the application. This enforces the principle of least privilege at the data layer.

Privacy By Design

Each department IdP can maintain a pairwise pseudonymous identifier for citizens, mapping the national ID to a department-specific opaque subject identifier. Applications in one department can never correlate citizen activity with another department's applications — even if both are using the same national identity to authenticate.

Conclusion

The direct-integration model for national digital identity is a short-term convenience that becomes a long-term liability. As government digitization deepens, the number of citizen-facing applications will only grow. Without structural change, national identity systems risk becoming operational bottlenecks, security liabilities, and barriers to the very digital transformation they were designed to enable.

The federated department IDP model is not a new concept — it mirrors the hub-and-spoke federation topologies used in large enterprises and academic identity federations for decades. What is new is the need to advocate for its deliberate adoption in government IAM strategy, often against the inertia of “just integrate directly.”

The payoff is substantial: a national identity core that stays lean and secure, departments that move at their own pace, and citizens who experience seamless, privacy-respecting authentication across every government service they interact with.

TL;DR

Don't connect every government application directly to your national identity system. Give each department its own IdP. Connect departments to the national core. This reduces SP registrations from hundreds to dozens, isolates security risk, enables departmental autonomy, and supports both citizen and workforce identity — all on proven open standards.

Ready to turn insight into action? Let's talk about your identity strategy.

The Challenge

The Challenge The payload undergoes validation procedures to ensure its integrity and compliance with predefined standards. Subsequently, it triggers the invocation of a third-party web service, facilitating seamless integration and data exchange within the established ecosystem.

Enter Tata Power Smart Meter: An innovative solution designed to address these challenges head-on. By harnessing real-time monitoring and two-way communication capabilities, Tata Power Smart Meter enables precise measurement of electricity consumption. This not only ensures accurate billing but also facilitates remote reading and efficient energy management. With the ability to detect faults quickly and enable proactive maintenance, the smart meter enhances the reliability of the electricity distribution system.

However, implementing such advanced technology comes with its own set of challenges. Ensuring the integrity and compliance of the data transmitted by the smart meter is crucial for its seamless integration into the existing utility ecosystem. This necessitates stringent validation procedures and robust data exchange mechanisms.

This is where Centroxy steps in: With its expertise in system integration and data management, Centroxy proposes a solution to streamline the handling of incoming data. The challenge lies in developing a centralized Dispatcher system capable of efficiently managing the influx of data from Tata Power Smart Meters. This system must not only optimize performance but also ensure comprehensive monitoring and analysis of the data flow.

What did
Centroxy do

We will implement a centralized Dispatcher system designed to handle incoming payloads efficiently. This system will incorporate multithreading capabilities to enhance performance. Upon receiving a payload, the Dispatcher will meticulously log each step of the request and subsequent processes for comprehensive monitoring and analysis. The Dispatcher will serve as a pivotal component in our architecture, ensuring seamless coordination and management of payload processing. By logging detailed information at each stage, including the initial request and subsequent steps, our system will enable thorough monitoring and retrospective analysis for continuous optimization and quality assurance.

The Results

The technology that we use to support Travel:esim

Drupal
MySQL

Ready to reduce your technology cost?

More Insights

See More Insights

Unifying 7 DISCOMs on a Single Platform

Tata Power’s distribution arm manages electricity supply across 7 independently operated DISCOMs (Distribution Companies) spanning multiple Indian states. Each DISCOM operated with its own siloed meter reading and billing mobile application, a separate web portal, and dedicated infrastructure — creating a costly, complex, and difficult-to-maintain technology landscape.

Centroxy Solutions was engaged to design and deliver a Unified Platform — a single, multi-tenant application capable of serving all 7 DISCOMs without disrupting ongoing meter reading and billing operations, while fully honouring each DISCOM’s unique regulatory compliance requirements.

Learn more

Powering global travel connectivity with Travel eSIM

Centroxy partnered with Travel eSIM as its technology partner to deliver a complete, production-ready eSIM platform within 15 days. The solution enables travellers to instantly purchase and activate mobile data across 100+ countries, eliminating roaming charges and the need for physical SIM cards. The platform supports secure payments, instant eSIM delivery, and seamless compatibility across iOS and Android devices, while providing a scalable foundation for future business partnerships.

Learn more
Contact us

Partner with Us for Comprehensive IT

We’re happy to answer any questions you may have and help you determine which of our services best fit your needs.

Your benefits:
What happens next?
1

We Schedule a call at your convenience 

2

We do a discovery and consulting meeting 

3

We prepare a proposal 

Schedule a Free Consultation