User experience
By default, new IBMid EF configurations are configured at the email “domain level”, such that all new IBMids associated with the organization are created automatically via the IBMid JIT (“Just-In-Time”) provisioning service and are always authenticated through the partner’s identity provider.
Any partner IBMid user accounts which existed prior to establishing the IBMid EF configuration (and which use the standard IBMid native password-based authentication) can be converted to be authenticated by the partner IdP at the partner’s option.

Federated users enter their email address and click continue; at that point a lookup is made in the background of IBMid to verify if the email address/domain is associated with the user’s organization. The user is then redirected to their organization’s sign in experience. After authenticating successfully via the steps required by their organization, the user is returned back to IBMid with a "SAML assertion" attached. The IBMid system uses the email address in the "SAML assertion" to match them to an existing IBMid. Additionally, if an existing IBMid is not found, IBMid auto-provisions a new IBMid for the organizational user, based on the username information provided by the organization in the SAML assertion. Once this has been completed, they are returned to the originally requested IBM application as a fully recognized and authenticated IBMid user.
EF supports both Service provider-initiated (SP-initiated) sign on and Identity provider-initiated (IdP-initiated) sign on methods. For more details, please review the following sections below:
IBMid User Authentication vs IBM Applications Access
- Any user that logs on to IBMid can access MyIBM (myibm.ibm.com)
- To open support cases via the MySupport portal, a user requires a specific entitlement configured by IBM Support.
- Access to Passport Advantage (PAO) requires the user’s ID to be specifically entitled based upon approval by a customer’s PAO Primary Contact.
- To access IBM Planning Analytics (PA), an IBMid user must be configured into the appropriate PA workspace.
- Specific authorizations granted via the IBM Cloud Console allow an IBMid user to manage IBM Cloud account resources.
- Partners can have full control of the IBMid authentication process for all its users, including password policy, implementation of multiple factors, etc.
- User authentication via EF provides partners with enhanced auditability and operational awareness of IBMid usage.
- Management of IBMid creation and configuration is greatly simplified.
Service provider-initiated (SP-initiated) sign on User Experience
- The user has an account at the service provider site.
- The user attempts to access the protected resource from the service provider.
- The service provider initiates a SAML authentication request to the identity provider. The service provider redirects the user's browser to the identity provider.
- The user signs in.
- The identity provider generates a SAML authentication response that asserts that the user is authenticated.
- The service provider validates the SAML authentication response.
- The user's browser is redirected to the service provider target URL and the user is authorized to access the requested resource.
Identity provider-initiated (IdP-initiated) sign on User Experience
- The user has an account at the identity provider site.
- The user signs in to the identity provider site or uses the identity provider single sign-on URL to access the protected resource from the service provider.
- The identity provider initiates a SAML authentication response that asserts that the user is authenticated.
- The service provider validates the SAML authentication response.
- The user's browser is redirected to the service provider target URL and the user is authorized to access the requested resource.
IBMid User re-authentication
The 'remember me’ function is available and it will remember its user’s IBMid after the user selects Continue.
Federated users will not be automatically re-authenticated to IBMid via the failover cookie after their sessions expire (default timeout is 30 minutes of inactivity and 1 hour total). Many federating companies have requested this feature to force a more frequent authentication. Once the IBM application or IBMid session time out occurs, any further authentication will be redirected back to your IdP for re-authentication. Whether the user is required to authenticate with your IdP again is controlled by your IdP's session lifetime settings. If 'remember me' is enabled for the user, and your IdP has a longer lifetime than IBMid, the user may not notice re-authentication to IBMid happening. Otherwise, the user will have to re-authenticate with IBMid again.