In today's increasingly networked world, cybersecurity is an ever-increasing need for companies and governments. One critical part of any organization’s cybersecurity is managing the users who can access their computers, networks, software applications and data. Identifying, authenticating and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restrictions with established identities is known as identity management. Verifying that the entity seeking access really is the correct identity is referred to as authentication. Modern organizations need efficient, user-friendly and secure methods to verify, authenticate and manage user identities and access to the organization’s sensitive - and frequently highly diverse – electronic resources.

In both government and industry, it is common that individuals have working relationships at multiple sites or subsidiary locations under a single corporation or organization. Ensuring only trusted individuals have access to the right resources requires the ability to accurately manage the attributes about an individual and provide state changes of that information to all corporate resources in a timely manner. To strengthen the security posture, the person’s identity must be tied to all digital records.

OneID enables organizations to securely manage their users’ identities across the various resources – including access to the ever-growing resources that must operate securely in the cloud. As organizations begin to leverage more cloud SaaS solutions, OneID enhances the organization’s security by providing the ability to tie the user's identity to the authentication process.


The OneID solution combines custom-developed code with proven commercial software to provide three core components; (1) back-end processes and administrative utilities to reconcile identity data received from multiple partners within an organization into a single unique identifier; (2) an interface that dynamically displays authentication options to the user based on the assurance level required; and (3) an Attribute Exchange Service for consumption by enterprise applications. The management of the identity remains with the source system, thus improving the accuracy and timeliness of modifications.


The OneID design is the result of years of Integrated Project Teams (IPT) providing their requirements and unique needs. OneID addressed the reality that many corporations do not have a single “on boarding” solution for all corporate identities. The OneID architecture is based on industry standards with flexibility during implementation to meet the demands of heterogeneous environments.

Potential Applications

Corporations who have merged with others or have multiple independent directories and need to build a central or enterprise identity directory can benefit from OneID algorithms and user interfaces developed to solve the complex task of reconciliation/correlation.

Existing commercial Identity Management services providers could benefit from the government-focused solution and the expertise of subject matter experts who have resolved the unique requirements.

OneID solves governance issues that still exist in many commercial Identity Management systems today.

Reference Number