<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://connect.verint.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>Federated authentication.</title><link>https://connect.verint.com/documentation/vcpssp/w/vcpssp/77478/federated-authentication</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 13</generator><item><title>Federated authentication.</title><link>https://connect.verint.com/documentation/vcpssp/w/vcpssp/77478/federated-authentication</link><pubDate>Thu, 02 Apr 2026 15:52:30 GMT</pubDate><guid isPermaLink="false">4ea52478-325c-46c6-b7b8-6c8b42b8e71f:99106b6c-92c9-4f2f-a691-a0f5285d9b64</guid><dc:creator>Verint Connect</dc:creator><comments>https://connect.verint.com/documentation/vcpssp/w/vcpssp/77478/federated-authentication#comments</comments><description>Current Revision posted to Verint Identity by Verint Connect on 4/2/2026 3:52:30 PM&lt;br /&gt;
&lt;div class="madcap-theme-wrapper"&gt;
&lt;div class="madcap"&gt;
&lt;span class="madcap.content.embed" style="display:none;"&gt;GPjgdYuLsToLX1fo9qqQTAl34f7/Avj8tloc/nVJl0bfdgb6d7AOfcewkRHgz8xEOCMLAImpPHMKhKUpU4U/q0kyLnGJ8+KUzUofrSH6lnG05MzpJnLaPGVdUaGKdTDM9JDX6EBHDjNA/QT+dq+FKN4FFn3C2yCrTCuEoNvx23ZTWMLJnwtQZzKTNG6JW8lMiD3DcSzgaP6fzGBqkpzxvA9aCFEtc16JghC/rt57yAuKI2m6gaZAbI+yAPlRYD1+&lt;/span&gt;&lt;span class="madcap.content.embed" style="display:none;"&gt;GPjgdYuLsToLX1fo9qqQTAl34f7/Avj8tloc/nVJl0bfdgb6d7AOfcewkRHgz8xEOCMLAImpPHMKhKUpU4U/q0kyLnGJ8+KUzUofrSH6lnG05MzpJnLaPGVdUaGKdTDM9JDX6EBHDjNA/QT+dq+FKHVtg7Inqf9d7cztASjki5qx8OMdm4rz5rVnR1ePFh6q6HkEnX5kD22ganMV+WtVCaW54acTi9NiyHZyDfX9yrM=&lt;/span&gt;
        &lt;div id="mc-main-content"&gt;
            
            &lt;p class="Body"&gt;With federated user authentication, your Identity Provider (IdP) authenticates users in your company or organization. When a user signs in to a &lt;span class="Emphasis"&gt;Verint Identity-enabled&lt;/span&gt; product, the IdP&amp;#160;vouches for the identity of the user. Verint Identity-enabled products  are Verint applications and services that support Single Sign-On (SSO) through Verint Identity. &lt;/p&gt;
            &lt;h3 class="t2_Topic_Title2"&gt;Identity V2 and Identity V1&lt;/h3&gt;
            &lt;p&gt;With Verint Identity, a federated authentication flow involves the user who wants to access a Verint Identity-enabled product, the Verint Identity Service, the identity platform used by Verint, and your IdP. &lt;/p&gt;
            &lt;p class="Body"&gt;Identity V2 and Identity V1 are Verint Identity options based on different identity platforms used by Verint.&lt;/p&gt;
            &lt;p class="st_Subtopic"&gt;Identity V2&lt;/p&gt;
            &lt;p&gt;Identity V2 uses an industry-standard identity platform which supports OpenID Connect (OIDC) and SAML (Security Assertion Markup Language)&amp;#160;2.0 for exchanging authentication information. Identity V2 supersedes Identity V1 and provides the platform for new configurations.&lt;/p&gt;
            &lt;p class="Body"&gt;
                &lt;img src="https://verintconnect.com/cfs-filesystemfile/__key/madcap-flare-theme/identityintegration-vcp-identity+integration-images/tec_5F00_id_5F00_oidc_5F00_config.png?_=639107419433288622" title="Identity V2 configuration" alt="Identity V2 configuration showing IdP connection to the Verint Identity V2 platform and Verity Identity components" class="screen_noborder" /&gt;
            &lt;/p&gt;
            &lt;p class="st_Subtopic"&gt;Identity V1&lt;/p&gt;
            &lt;p class="Body"&gt;Identity V1 uses Microsoft Entra ID&amp;#160;as its identity platform. If Microsoft Entra ID&amp;#160;is the primary IdP for your company or organization, Verint supports Microsoft Entra ID&amp;#160;business to business (B2B)&amp;#160;collaboration to exchange authentication information. Identity V1 also supports SAML&amp;#160;2.0 for non-Entra ID&amp;#160;IdPs.&lt;/p&gt;
            &lt;div class="messageNote"&gt;
                &lt;p&gt;If Microsoft Entra ID&amp;#160;is the primary IdP for your company or organization, direct SAML&amp;#160;2.0 integration requires Identity V2.&lt;/p&gt;
            &lt;/div&gt;
            &lt;p&gt;
                &lt;img src="https://verintconnect.com/cfs-filesystemfile/__key/madcap-flare-theme/identityintegration-vcp-identity+integration-images/tec_5F00_id_5F00_b2b_5F00_configuration.png?_=639107419429818992" class="screen_noborder" title="Identity V1 configuration" alt="Identity V1 configuration showing the Microsoft Entra ID platform and Verint Identity components" /&gt;
            &lt;/p&gt;
            &lt;h3 class="t2_Topic_Title2"&gt;OpenID Connect&lt;/h3&gt;
            &lt;p class="Body"&gt;OIDC is an open authentication standard that uses JSON Web Tokens (JWTs) for transmitting user authentication information. The tokens include details about users and their authentication status. OIDC also enhances the standardization of scopes and claims, making it easier for different systems to communicate with each other.&lt;/p&gt;
            &lt;p class="Body"&gt;Typically, the OIDC flow for user authentication is:&lt;/p&gt;
            &lt;ol&gt;
                &lt;li value="1"&gt;
                    &lt;p&gt;A user accesses a Verint application or service. &lt;/p&gt;
                &lt;/li&gt;
                &lt;li value="2"&gt;
                    &lt;p&gt;The Verint Identity Service sends an OIDC&amp;#160;authentication request to the customer IdP.&lt;/p&gt;
                &lt;/li&gt;
                &lt;li value="3"&gt;
                    &lt;p&gt;The IdP&amp;#160;validates the credentials for the user and obtains authorization.&lt;/p&gt;
                &lt;/li&gt;
                &lt;li value="4"&gt;
                    &lt;p&gt;The IdP&amp;#160;issues an identity (JWT)&amp;#160;token and sends it to the Verint Identity platform.&lt;/p&gt;
                &lt;/li&gt;
                &lt;li value="5"&gt;
                    &lt;p&gt;The Verint application grants the user access.&lt;/p&gt;
                &lt;/li&gt;
            &lt;/ol&gt;
            &lt;p&gt;
                &lt;img src="https://verintconnect.com/cfs-filesystemfile/__key/madcap-flare-theme/identityintegration-vcp-identity+integration-images/tec_5F00_id_5F00_idp_5F00_flow_5F00_oidc.png?_=639107419432803476" class="screen_noborder" title="Federated authentication flow" alt="Federated authentication flow between a user, a Verint app, the Verint V2 Identity Service, and a customer IdP" /&gt;
            &lt;/p&gt;
            &lt;p&gt;OIDC&amp;#160;is supported by Identity V2 only.&lt;/p&gt;
            &lt;h3 class="t2_Topic_Title2"&gt;SAML 2.0&lt;/h3&gt;
            &lt;p class="Body"&gt;SAML&amp;#160;2.0 is an open standard for the exchange of authentication information using security assertions, which are XML-based statements that contain information about a user’s identity, attributes, and authentication status. Both Identity V2 and Identity V1 support SAML 2.0. &lt;/p&gt;
            &lt;p class="st_Subtopic"&gt;SAML 2.0 certificates&lt;/p&gt;
            &lt;p class="Body"&gt;A SAML&amp;#160;2.0 trust relationship involves a signing certificate used to ensure that authentication requests and responses are genuine. Certificates consist of a private key and public key (a key pair). When the IdP&amp;#160;sends a SAML assertion, it is signed with the private key and, to verify the signature when it receives the SAML&amp;#160;assertion, Verint requires the public key. With SAML, the private key is referred to as the signing certificate and the public key is referred to as the verification certificate. &lt;/p&gt;
            &lt;p class="Body"&gt;Signing certificates have a scheduled expiration date. Typically, if the signing certificate passes its scheduled expiration date, single sign-on (SSO) fails and your company will need to renew or replace the certificate. &lt;/p&gt;
            &lt;p class="st_Subtopic"&gt;SP-initiated authentication flow &lt;/p&gt;
            &lt;p class="Body"&gt;With SAML&amp;#160;2.0, SP-initiated flows are the default authentication flow between Verint Identity and your IdP. An SP-initiated authentication flow starts with Verint as &lt;span class="Emphasis"&gt;Service Provider&lt;/span&gt; (SP). Users sign in to a Verint application or service, the Verint Identity Service redirects the request to the IdP for authentication, and, if authentication is successful, the Identity Service grants the user access to the application. Both Identity V2 and Identity V1 support SP-initiated flows with SAML&amp;#160;2.0.&lt;/p&gt;
            &lt;p&gt;When a user starts a new session, the SP-initiated flow requires the user to sign in to authenticate with the IdP. The authentication flow is seamless:&lt;/p&gt;
            &lt;ol&gt;
                &lt;li value="1"&gt;
                    &lt;p&gt;The user wants to access a licensed Verint application or service.&lt;/p&gt;
                &lt;/li&gt;
                &lt;li value="2"&gt;
                    &lt;p&gt;The Verint Identity Service redirects the user access request to the IdP.&lt;/p&gt;
                &lt;/li&gt;
                &lt;li value="3"&gt;
                    &lt;p&gt;The IdP&amp;#160;authenticates the user, and redirects the request back to the Verint Identity Service.&lt;/p&gt;
                &lt;/li&gt;
                &lt;li value="4"&gt;
                    &lt;p&gt;The Verint Identity Service verifies that the user has permission to access the application  and grants the user access.&lt;/p&gt;
                &lt;/li&gt;
                &lt;li value="5"&gt;
                    &lt;p&gt;The user is signed in to the application or service.&lt;/p&gt;
                &lt;/li&gt;
            &lt;/ol&gt;
            &lt;p class="Body"&gt;
                &lt;img src="https://verintconnect.com/cfs-filesystemfile/__key/madcap-flare-theme/identityintegration-vcp-identity+integration-images/tec_5F00_id_5F00_idp_5F00_flow.png?_=639107419432647243" class="screen_noborder" title="SP-initiated user authentication flow" alt="Service provider-initiated user authentication flow" /&gt;
                
            &lt;/p&gt;
            &lt;p class="Body"&gt;If  the user has an active session with the IdP, the user does not need to reenter their credentials when they request access to the Verint application or service. &lt;/p&gt;
            &lt;p class="Body"&gt;
                &lt;img src="https://verintconnect.com/cfs-filesystemfile/__key/madcap-flare-theme/identityintegration-vcp-identity+integration-images/tec_5F00_id_5F00_idp_5F00_flow_5F00_idp_5F00_session.png?_=639107419432647243" title="Authentication flow for an established session" class="screen_noborder" alt="Authentication flow for a user with an established session" /&gt;
                
            &lt;/p&gt;
            &lt;p class="st_Subtopic"&gt;IdP-initiated authentication flow &lt;/p&gt;
            &lt;p class="Body"&gt;With an IdP-initiated flow, a user signs in to your company IdP&amp;#160;portal and selects the Verint application or service they want to access. The IdP authenticates the user and redirects the user request to the Identity Service which grants access to the required application. &lt;/p&gt;
            &lt;div class="messageNote"&gt;
                &lt;p&gt;Identity V2 supports  IdP-initiated authentication flows for access to Workforce Engagement (WFE) and Data Insights Bot only. Idp-initiated flows are not supported by Identity V1.&lt;/p&gt;
            &lt;/div&gt;
            &lt;p class="Body"&gt;
                &lt;img src="https://verintconnect.com/cfs-filesystemfile/__key/madcap-flare-theme/identityintegration-vcp-identity+integration-images/tec_5F00_id_5F00_idp_2D00_initiated_5F00_flow.png?_=639107419432647243" title="IdP-initiated flow for initial sign-in" alt="IdP-initiated flow for initial sign-in showing a user request for access authenticated by the IdP" class="screen_noborder" /&gt;
            &lt;/p&gt;
            &lt;p class="Body"&gt;For an IdP-initiated flow, Verint Identity requires you to identify the Verint application or service to which your Idp sends users. When a user requests access to that application or service, your IdP&amp;#160;initiates the flow for sign-in. &lt;/p&gt;
            &lt;p class="Body"&gt;For each Verint product or service, Verint Identity requires a separate SAML&amp;#160;2.0 federation. Each federation requires  its own signing certificate. &lt;/p&gt;
            &lt;h3 class="t2_Topic_Title2"&gt;Microsoft Entra&amp;#160;ID&amp;#160;B2B collaboration&lt;/h3&gt;
            &lt;p class="Body"&gt;If Microsoft Entra ID&amp;#160;is the primary IdP for your company or organization, or if your primary IdP uses a  domain name verified in Entra ID,&amp;#160;you can set up Microsoft Entra ID&amp;#160;B2B&amp;#160;collaboration with Identity V1 to exchange user authentication information. &lt;/p&gt;
            &lt;p class="Body"&gt;
                &lt;p&gt;With B2B&amp;#160;collaboration, if your Microsoft Entra tenant forwards authentication requests to another IdP (such as Okta), Microsoft automatically passes authentication requests from Verint Identity to the IdP.&lt;/p&gt;
                &lt;p class="Body"&gt;Entra ID&amp;#160;B2B&amp;#160;collaboration is available with Identity V1 only.&lt;/p&gt;
            
            &lt;p class="rt_Related_topics"&gt;&lt;span class="autonumber"&gt;&lt;span class="Bold"&gt;Related topics&lt;/span&gt;&lt;/span&gt;&amp;#160;&lt;/p&gt;
            &lt;p class="Body"&gt;&lt;a href="https://verintconnect.com/documentation/vcpssp/w/vcpssp/77481/verint-identity-overview" class="MCXref_0"&gt;Verint Identity overview&lt;/a&gt;
            &lt;/p&gt;
            &lt;p class="Body"&gt;&lt;a href="https://verintconnect.com/documentation/vcpssp/w/vcpssp/77480/non-federated-authentication" class="MCXref_0"&gt;Non-federated authentication&lt;/a&gt;
            &lt;/p&gt;
            &lt;p class="Body"&gt;&lt;a href="https://verintconnect.com/documentation/vcpssp/w/vcpssp/77492/identity-v2-and-v1-comparison" class="MCXref_0"&gt;Identity V2 and V1 comparison&lt;/a&gt;
            &lt;/p&gt;
            &lt;p class="Body"&gt;&lt;a href="https://verintconnect.com/documentation/vcpssp/w/vcpssp/77477/configuring-verint-identity" class="MCXref_0"&gt;Configuring Verint Identity&lt;/a&gt;
            &lt;/p&gt;
        &lt;/p&gt;&lt;/div&gt;
        
    
&lt;/div&gt;
&lt;/div&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item></channel></rss>