Enterprise Identity Integration: Entra ID, SPIFFE, OPA, and Beyond

Enterprise Identity Integration: Entra ID, SPIFFE, OPA, and Beyond

The previous post outlined our five-phase enterprise roadmap — closing the gap between connectivity tool and enterprise infrastructure. The response was immediate: which identity providers? Which policy engines? Which compliance tools?

This post answers those questions. The design principle is simple: enterprises already have answers to "who is this?", "are they allowed?", "what did they do?", and "are they still trusted?" Pilot should consume those answers, not reinvent them.

The Principle: Consume, Don't Reinvent

Every enterprise already runs identity infrastructure. They have spent years deploying it, writing policies for it, training staff on it, and passing audits against it. When a new connectivity layer arrives and says "here's our identity system, use it instead" — that is a non-starter.

The right approach: Pilot accepts proof from enterprise systems as authorization for network operations. An OIDC token from Entra ID is proof. A SPIFFE SVID is proof. A certificate from your internal CA is proof. A Kerberos ticket is proof. Pilot does not care which system issued the proof. It cares that the proof is cryptographically valid and matches the network's requirements.

This is how TLS works. A web server does not care whether your certificate came from Let's Encrypt, DigiCert, or your company's internal CA. It verifies the chain. Pilot should work the same way for agent identity.

Identity Providers

Microsoft Entra ID (Azure AD)

Every Microsoft shop runs Entra ID. It is the identity backbone for Microsoft 365, Azure, and increasingly for non-Microsoft workloads. For Pilot, Entra ID integration means:

Google Workspace & GCP

Google Cloud's Workload Identity Federation allows workloads to exchange credentials from external identity providers for short-lived Google credentials. For Pilot:

Okta / Auth0 / OneLogin

The same OIDC pattern applies to any compliant identity provider. What makes these interesting beyond basic OIDC:

Active Directory / LDAP

On-premises enterprises that have not fully migrated to cloud identity still run Active Directory. Integration here is less elegant than OIDC but equally necessary:

Cloud IAM (AWS / GCP / Azure)

Agents running on cloud infrastructure already have workload identity:

The pattern: the cloud provider is just another OIDC issuer. Pilot's OIDC join rule already handles this — it is a matter of configuring the right issuer URL and audience.

Policy Engines

Open Policy Agent (OPA)

OPA is becoming the lingua franca for authorization policy in cloud-native infrastructure. Kubernetes admission controllers, Envoy proxies, Terraform plans, CI/CD pipelines — they all evaluate Rego policies. Pilot should speak the same language.

Instead of hardcoded tag-matching rules, imagine Pilot evaluating Rego policies at SYN time:

package pilot.access

default allow = false

# Backend services can reach databases on port 5432
allow {
    input.src.tags[_] == "backend"
    input.dst.tags[_] == "database"
    input.dst_port == 5432
}

# Frontend can reach API on HTTP ports
allow {
    input.src.tags[_] == "frontend"
    input.dst.tags[_] == "api"
    input.dst_port in {80, 443}
}

# Monitoring can reach anything on the metrics port
allow {
    input.src.tags[_] == "monitoring"
    input.dst_port == 9090
}

Enterprises that already write OPA policies for their Kubernetes clusters would use the exact same policy language for Pilot access control. One policy framework, two enforcement points.

HashiCorp Vault

Vault solves two problems that Pilot's enterprise roadmap needs:

Audit & Compliance

SIEM Integration

Phase 2 of the roadmap adds structured audit events at the registry level. But "structured JSON logs" is only the first step. Enterprises need those events flowing into their existing security monitoring:

OpenTelemetry

Audit logs answer "what happened." Traces answer "how did it flow." OpenTelemetry integration means:

Compliance Evidence

SOC 2, ISO 27001, HIPAA, and FedRAMP audits require evidence that access controls exist and are enforced. Pilot should generate:

Certificate Infrastructure

Enterprise PKI

Large organizations run internal Certificate Authorities — Microsoft AD Certificate Services (AD CS), EJBCA, Venafi, or Smallstep. Pilot's CA-based join rule (Phase 4) should accept certificates from these existing CAs:

ACME (Automated Certificate Management)

The Let's Encrypt model for Pilot: automated certificate issuance with proof of authorization.

Device & Workload Context

Device Trust Signals

Identity answers "who is this?" Device trust answers "should we trust the machine it's running on?" Enterprise endpoint management tools provide these signals:

Kubernetes-Native Identity

For containerized agents, the Kubernetes cluster provides identity without any external system:

SPIFFE Federation Across Organizations

The most interesting cross-org scenario: two companies federate their SPIFFE trust domains. Company A's SPIRE infrastructure and Company B's SPIRE infrastructure exchange trust bundles. Now:

This is how B2B agent collaboration should work — not by sharing API keys or VPN credentials, but by federating existing identity infrastructure.

What We're Building First

The full list above is the vision. Here is the priority order based on enterprise demand:

  1. OIDC (Phase 5) — covers Entra ID, Google, Okta, Auth0, AWS/GCP/Azure IAM, and any compliant provider. One implementation, broad reach.
  2. SPIFFE (Phase 5) — covers Kubernetes-native identity, SPIRE deployments, and cross-org federation. The most sophisticated integration.
  3. OPA policy evaluation — the policy lingua franca. Enterprises already write Rego. Pilot should evaluate it.
  4. Vault PKI — dynamic certificate issuance for CA-based join rules. Eliminates static secrets.
  5. SIEM forwarding — structured event shipping to Splunk/Sentinel/Elastic. Not just logs — native integration.
  6. SCIM lifecycle — automated deprovisioning when identity is revoked upstream. Closes the revocation loop.
  7. Device trust signals — conditional join rules based on endpoint compliance. Later priority, high value for regulated industries.

Items 1-2 are in the Phase 5 roadmap. Items 3-7 represent a Phase 6+ expansion that builds on the same foundation.

The Pattern

Every integration follows the same pattern:

  1. Enterprise system issues proof (token, certificate, ticket, device attestation).
  2. Agent presents proof to join a Pilot network.
  3. Registry validates proof against the network's configured trust anchor (JWKS, CA root, trust bundle).
  4. Agent joins with its enterprise identity mapped to its Pilot address.
  5. Audit trail links the Pilot address to the enterprise identity.

The proof format changes. The validation logic changes. The pattern does not. This is why OIDC comes first — it is the most universal proof format, and it covers the widest range of enterprise identity providers with a single implementation.

Enterprise Readiness Report

Full gap analysis, standards alignment matrix, and the five-phase roadmap. Available as a PDF.

Download PDF  ·  View on GitHub  ·  Enterprise Roadmap