Federated Identity
Each partner organization uses its own identity system (IdP). DIVE V3 links them together using open standards — OIDC and SAML. Users sign in once and can access shared resources across the coalition.
DIVE V3 shows how separate groups can share user identity and enforce strict access rules. Each group keeps control of its own data. Users sign in once and can reach shared resources.
DIVE V3 stands for Digital Interoperability Verification Experiment, Version 3. It is an open-source project that tests how Identity, Credentials, and Access Management (ICAM) can work across national borders.
The platform uses Zero Trust principles: every request is checked, every decision is logged, and nothing is trusted by default. Access rules use real user data — clearance level, country, and role — not just a username. This approach is called ABAC (rules-based access control).
DIVE V3 is built for teams exploring coalition interoperability. It is not production software, and it carries no warranty. Use it to learn, test ideas, and build on top of.
Each partner organization uses its own identity system (IdP). DIVE V3 links them together using open standards — OIDC and SAML. Users sign in once and can access shared resources across the coalition.
Access rules use real user data — clearance level, country, and job role. This is called ABAC (rules-based access control). Access is never "all-or-nothing." Each decision is precise and logged.
Access rules are written in a language called Rego. They live in version control and are applied across all instances. You can read, review, and audit them like any other code.
The platform maps clearance levels across 34 countries using NATO tables. Access is denied by default — a user must meet clear criteria to qualify. No guesswork. No exceptions.
Every service uses TLS (encrypted connections). No service trusts another by default. Secrets are stored in HashiCorp Vault, which rotates them and logs all access.
Every access decision and policy change is logged. Logs follow the ACP-240 format, so they are easy to share during audits. Nothing happens without a record.
The hub instance starts with 12 core services: identity (Keycloak), authorization (OPA), secrets (Vault), databases, and a reverse proxy. A single CLI command starts them all.
Partner organizations deploy a spoke instance. They receive an auth code to request enrollment with the hub. The hub admin reviews and approves each request.
Keycloak connects the hub and spoke identity providers over OIDC. Federation is credential-based — no admin passwords cross the wire. Spoke users can now reach hub resources.
Every request is checked against ABAC rules before access is granted. OPA checks clearance level, country, and role in real time. All decisions are logged right away.
Partner spoke instances that have established a trust relationship with this hub. Each spoke runs its own identity provider and is linked via the Zero Trust federation mesh.
All requests reviewed within 2–5 business days
Subscribe to milestone announcements and release notes.
Architecture guides, deployment docs, and API references.
Direct API integration for research or evaluation purposes.