Supported Identity Providers
| Provider | Auth Method | Key Capabilities |
|---|---|---|
| Okta | OAuth / API Key | Users, groups, MFA enrollment, SSO apps, system logs |
| Google Workspace | OAuth | Users, groups, MFA status, admin reports, organizational units |
| Azure AD / Entra ID | OAuth (App Registration) | Users, groups, MFA registration, conditional access, sign-in logs |
| OneLogin | API Key | Users, roles, MFA status, app assignments |
| JumpCloud | API Key | Users, groups, MFA, device associations |
| Auth0 | API Key | Users, connections, MFA enrollment |
| Duo | API Key | MFA enrollment, authentication logs |
| PingOne | API Key | Users, groups, MFA policies |
| AWS Identity Store | IAM Role | SSO users and groups in AWS Organizations |
| Office 365 | OAuth | Users, groups, licenses, MFA status |
| Zoho (IDP) | API Key | Users, groups, directory data |
What Data Is Collected
- User Directory
- MFA Status
- Authentication Logs
LowerPlane syncs your full user directory from the identity provider:
- Full name, email address, and username
- Department and job title (if available)
- Account status (active, suspended, deactivated)
- Creation date and last login time
- Assigned groups and roles
- Licensed applications and SSO assignments
How Identity Data Maps to Compliance
Identity provider data directly addresses critical controls across every framework:| Requirement | ISO 27001 | SOC 2 | HIPAA | GDPR | PCI-DSS |
|---|---|---|---|---|---|
| MFA enforcement | A.9.4.2 | CC6.1 | 164.312(d) | Art. 32 | 8.3 |
| Access provisioning | A.9.2.2 | CC6.2 | 164.312(a) | Art. 32 | 7.1 |
| Access reviews | A.9.2.5 | CC6.3 | 164.308(a)(4) | Art. 32 | 7.1.2 |
| Account deactivation | A.9.2.6 | CC6.2 | 164.312(a) | Art. 17 | 8.1.3 |
| Password policies | A.9.4.3 | CC6.1 | 164.312(a) | Art. 32 | 8.2 |
| Privileged access | A.9.2.3 | CC6.1 | 164.308(a)(4) | Art. 32 | 7.1.1 |
Automated Tests from Identity Providers
When an identity provider is connected, LowerPlane automatically creates and runs these tests:- MFA enrolled for all users — Verifies every active user has at least one MFA factor registered.
- No inactive accounts — Flags accounts that have not logged in within a configurable period (default: 90 days).
- SSO enforced for critical applications — Checks that key applications are accessed through SSO rather than local credentials.
- Admin accounts use strong MFA — Verifies privileged accounts use hardware keys or authenticator apps, not SMS.
- Deactivated users have no active sessions — Confirms terminated employee accounts are fully deprovisioned.
- Password policy meets requirements — Validates minimum length, complexity, and rotation requirements.
People Directory Integration
Identity provider data syncs into the People directory alongside HR data. When both an HR system and identity provider are connected:- HR system provides employment data (name, department, start/end date, status).
- Identity provider provides access data (MFA status, account status, last login).
- LowerPlane matches records by email address.
- The combined record gives you a complete compliance view per employee.
- Access reviews: Compare active employees to active accounts and flag mismatches.
- Offboarding verification: Confirm terminated employees have deactivated accounts.
- MFA compliance: Track MFA enrollment rates across the organization.
Connection Guides
Connecting Okta
Connecting Okta
- In Okta Admin Console, go to Security > API > Tokens.
- Create a new token with a descriptive name (e.g., “LowerPlane Read-Only”).
- Copy the token value immediately — it is only shown once.
- In LowerPlane, navigate to Integrations > Okta and paste the token.
- Enter your Okta domain (e.g.,
yourcompany.okta.com). - Click Connect to verify and begin the initial sync.
Connecting Google Workspace
Connecting Google Workspace
- In LowerPlane, navigate to Integrations > Google Workspace and click Connect.
- You will be redirected to Google’s OAuth consent screen.
- Sign in with a Google Workspace super admin account.
- Grant the requested permissions (read-only access to directory, reports, and admin settings).
- After authorization, you are redirected back to LowerPlane and the sync begins.
Connecting Azure AD / Entra ID
Connecting Azure AD / Entra ID
- In the Azure Portal, register a new application under App registrations.
- Grant the following API permissions:
User.Read.All,Group.Read.All,Directory.Read.All,AuditLog.Read.All. - Create a client secret and note the Application (client) ID and Directory (tenant) ID.
- In LowerPlane, navigate to Integrations > Azure Active Directory.
- Enter the tenant ID, client ID, and client secret.
- Click Connect to verify credentials and start syncing.
Troubleshooting
| Issue | Resolution |
|---|---|
| MFA data not appearing | Check that the API key or OAuth scope includes access to MFA enrollment data. Some providers require admin-level permissions. |
| User count mismatch | Verify the integration scope. Some providers filter by user status (active only) or organizational unit. |
| Authentication logs are empty | Log collection may require additional permissions or an enterprise-tier subscription with your provider. |
| Sync takes too long | Large directories (10,000+ users) may take several minutes. The initial sync is always the longest. |