Meet us at RSAC 2026 to explore runtime security for agentic workloads.
Solutions

Identity Federation

Extend trust across clouds, clusters, and organizations. No shared secrets, no VPNs, no credential distribution.

Cross-Boundary Trust Is Always a Workaround

Two organizations need to talk. Or two clouds. Or two clusters that weren't supposed to need each other until last quarter. The solution is always the same: someone sets up a VPN, distributes shared credentials, or opens a firewall rule that's too broad — and then it stays that way forever.

VPNs create connectivity, not identity

A VPN tunnel lets traffic flow between environments, but once inside, there is no workload-level authentication. The tunnel becomes a trust boundary with no trust enforcement.

Cloud provider silos

AWS IAM, GCP IAM, and Azure AD are separate identity universes. A workload in one cloud cannot natively prove its identity to a workload in another — or to anything on-premises.

Shared secrets for cross-cluster comms

Connecting services across Kubernetes clusters means distributing API keys, certificates, or tokens. Each new cluster multiplies the sprawl — and the blast radius.

M&A integrations that drag on for months

Migrating to a shared identity platform takes quarters. Distributing shared credentials is immediate risk. Most teams pick the risk and call it temporary.

Cross-Boundary Trust Without Shared Secrets

Two environments exchange public certificates — not shared secrets. Workloads in one domain can now verify identities from the other. A built-in OIDC provider integrates with any system that supports OIDC — cloud IAM, CI/CD platforms, SaaS APIs, partner systems.

2

Integrate with any cloud or SaaS

Riptides issues standard OIDC tokens for your workloads. Any system that supports OIDC — AWS, GCP, Azure, CI/CD platforms, SaaS APIs — can validate them natively.

3

Replace long-lived cloud credentials

Workloads exchange their Riptides identity for temporary, scoped cloud credentials from AWS, GCP, or Azure. No IAM keys stored anywhere.

4

Reach systems that don't support mTLS

For legacy systems, third-party APIs, and SaaS platforms, Riptides issues signed tokens that carry the workload's identity and can be verified against a standard OIDC endpoint.

What Makes This Different

No shared secrets across boundaries

Trust is established by exchanging public root CA certificates, not by distributing keys or credentials. Compromising one domain does not yield credentials for another.

No VPN dependency for identity

Workloads authenticate directly to each other with mTLS, regardless of network path. The VPN can remain for connectivity; identity no longer depends on it.

M&A integration in days, not months

Two organizations exchange trust bundles. Cross-organization service communication is secured in days — with full identity-based access control from the start.

No long-lived cloud credentials

On-premises, edge, and multi-cloud workloads all use the same OIDC federation mechanism for temporary cloud access. No IAM keys stored anywhere.

Where to Start

The Fastest Win

Replace long-lived cloud credentials with OIDC federation

Pick one cluster. Enable the OIDC provider. Configure AWS, GCP, or Azure to accept Riptides-issued tokens. Your workloads now get temporary, scoped cloud credentials — no IAM access keys stored anywhere. One cluster, one cloud provider, no cross-org coordination needed.

Then Expand

Cross-cluster and cross-cloud trust

Exchange trust bundles between Riptides deployments. Workloads across clusters, clouds, and regions authenticate directly with mTLS — no VPN required for identity.

Partner and M&A integration

Two organizations exchange trust bundles. Cross-organization service communication is secured in days — with full identity-based access control from the start.

Traditional vs. Riptides Federation

Traditional Riptides Federation
Trust mechanism Shared secrets, VPN tunnels, API keys Trust bundle exchange (public CA certs)
Identity across clouds Cloud-specific IAM, no interoperability SPIFFE IDs portable across any environment
Cloud credential access Long-lived IAM keys per environment OIDC federation for temporary credentials
Cross-cluster auth Shared secrets or unified mesh control plane Independent control planes, federated trust
Integration timeline Weeks to months Days
Revocation Rotate shared secrets everywhere Remove trust bundle or identity
Standards Proprietary per vendor SPIFFE, OIDC, X.509
Audit posture "We have VPN tunnels between environments" "Every cross-boundary connection is cryptographically authenticated"

Ready to secure your
workloads?

Kernel-level identity and enforcement. No code changes. Deploy in minutes.