Identity Broker · LaaS

Connect all your identity providers.One Hub. Custom claims per app.

Stop configuring each app for each provider. Identity Hub sits in the middle — it normalizes, transforms, and routes identity from any IdP to any Service Provider, with fully custom claims.

Stop rebuilding identity integrations for every application. The Hub maps the exact claim to each need — you define the policy, it handles the rest.

Identity Providers

Azure AD
Google WS
Okta
LDAP
+ any SAML/OIDC IdP

IDENTITY HUB

Policy Engine

Service Providers

Cloudflare WARP
FortiGate
Palo Alto
Cisco ISE
ERP / SAP
GitLab
+ any SAML/OIDC SP
Compliance-ready by design
NIS2 Art. 21ENS Básica · Media · AltaISO 27001:2022GDPR

The identity integration hell

Every team feels it. Most just live with it.

Multiple IdPs, multiple configurations

Each app must be configured N times — once per identity provider. When you add a new IdP, you reconfigure every app. When a provider changes, you touch everything.

N × M configurations

Heterogeneous claims

Azure sends `userPrincipalName`, Google sends `email`, Okta sends `login`. Each IdP speaks a different dialect. Your apps suffer the incompatibilities.

Incompatible vocabularies

Changing provider = reconfigure everything

Migrating from Azure to Okta means touching every app, every SP, every integration. Projects that last months. Risk of regression everywhere.

Months of migration

Hub + Policy + Claims

The trio that transforms identity

01

Connect your providers

OIDC or SAML — Azure AD, Okta, Google Workspace, LDAP. All at once, without limits. Each provider registers once in the Hub.

One-time setup
02

Define your policies

match_rules: which provider + which group. claim_mappings: what each app receives. A policy is the bridge between your providers and your Service Providers.

Zero app changes
03

Your apps get exactly what they need

Fully custom claims per SP. The VPN gets `role + device_compliant`. The ERP gets `email + cost_center + manager`. The app doesn't know which IdP authenticated the user.

Custom vocabulary
Built from real-world identity architecture

Built for the Hub model

Not another IdP. The broker between all your IdPs and all your apps.

N:1 Federation

N external providers, one single SP endpoint. The policy routes and normalizes. Apps stay blissfully unaware of your provider landscape.

Custom claims per SP

Each application receives exactly the claims it needs. Its own vocabulary, not the IdP's. Define mappings once, reuse forever.

Policy engine

match_rules + claim_mappings. Change the policy, not the app. Add a new provider without touching a single SP configuration.

Provider failover

If Azure goes down, Okta takes over automatically. No manual intervention. Your users don't notice. Your apps don't notice.

Full audit trail

Every authentication logged: who, from which provider, which claims were emitted, result. Compliance-ready out of the box.

Multi-tenant for MSPs

Manage dozens of clients from a single panel. Each with their own providers, SPs and policies. Full isolation.

Use cases

Real scenarios where the Hub makes the difference.

Enterprise

Azure AD + Google Workspace

Your employees are in Azure. Your contractors are in Google. The app only talks to the Hub. Federation policy routes each user to the right claims — regardless of their origin.

1 Hub · 2 IdPs · 1 SP config
MSP

Managing multiple clients

Deploy Identity Hub as a service. Each client gets an isolated tenant with their own providers, SPs and policies. You manage everything from one place.

1 deployment · N tenants · infinite scale
Zero Trust

Cloudflare WARP + Zero Trust

The Hub emits the claims Cloudflare needs: role, device_compliant, department. No matter which IdP the user came from. The policy handles the translation.

Any IdP → custom claims → Cloudflare

Where we're going

A roadmap built on the Hub concept — identity as infrastructure.

Live
  • N:1 federation via policies
  • Custom claims per SP
  • OIDC + SAML on both sides
  • Multi-tenant for MSPs
Coming soon
  • Automatic provider failover
  • SCIM 2.0 provisioning
  • Self-service onboarding + billing
  • Passkeys / WebAuthn
Vision
  • Context-aware adaptive MFA
  • Identity Confidence Score
  • eIDAS / sovereign identity
  • Claims as code

Want to be part of this? Nexocyber Networks has 4 projects in flight.

Meet the team & investors

Ready to simplify your identity infrastructure?

Join teams already using Identity Hub to tame their identity complexity.