Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Puragen unveils PFAS treatment technology during UK ministerial visit

Compromised dYdX npm and PyPI packages deliver wallet stealer and RAT malware

DiDAX: Innovating DNA-based data applications

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » How to streamline zero trust using the shared signals framework
Identity

How to streamline zero trust using the shared signals framework

userBy userDecember 9, 2025No Comments7 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Zero Trust can help organizations reduce their attack surface and respond quickly to threats, but many companies still struggle to implement Zero Trust because security tools don’t reliably share signals. According to Accenture, 88% of organizations admit that they faced significant challenges when implementing such an approach. If the products cannot communicate, real-time access decisions will not work.

The Shared Signals Framework (SSF) aims to solve this problem with a standardized way to exchange security events. However, recruitment varies. For example, Kolide Device Trust currently does not support SSF.

Scott Bean, Senior IAM and Security Engineer at MongoDB, proposed a solution to the problem that provides an easy and intuitive way for teams to operate SSF across their environments.

This guide provides an overview of the workflow and step-by-step instructions for getting it up and running.

Problem – IAM tools do not support SSF

A core requirement of Zero Trust is continuous, reliable signals about user and device health. However, many tools do not support Continuous Access Evaluation Protocol (CAEP) SSF, making it difficult to share and act on these signals.

Teams often face three challenges:

Tools lack native SSF support Signal enrichment or correlation is required Managing SSF endpoints and token processing increases overhead

Without this interoperability, organizations struggle to enforce consistent policies. And in cases like Kolide Device Trust, important device events never reach systems like Okta.

Solution – SSF transmitter that converts Kolide issues into CAEP events

SSF is built on HTTPS requests, so the OpenID standard works with HTTP actions in Tines.

Scott developed a new workflow that integrates Kolide Device Trust with Tines, allowing them to send SSF signals to Okta. If the device is not compliant, Kolide sends a message to the workflow via a webhook. Tines strengthens the signal, verifies that it can be linked to the user, builds a Security Event Token (SET), and sends it to Okta.

In this way, Tines acts as the connective tissue that makes SSF work across distributed IT environments, even when individual tools do not natively support the standard.

Tines can:

Receive signals from Kolide (and similar tools) via webhooks when a device becomes non-compliant. Enrich and correlate those signals (e.g. map devices to users). Generate and sign a SET that meets SSF specifications. Deliver to Okta (and other identity providers) to enforce the required SSF metadata endpoints on Zero Trust hosts using API path prefixes, providing consuming systems with a standards-compliant location to fetch keys and decrypt tokens.

All of this makes zero trust enforcement faster, more reliable, and much easier to operate. IT teams can perform continuous real-time risk assessments of devices, respond quickly to threats, and adjust policies more flexibly. End users also benefit from automated remediation to optimize productivity and minimize IT intervention.

If you want to learn more about identity modernization, check out the Tines IAM guide to learn how the team is unifying device trust, access decisions, and least privilege enforcement through automation. Scott’s workflow is one of several real-world patterns under the hood.

Workflow overview

Tools needed:

Tines – Workflow orchestration and AI platform Kolide – Device reliability and posture monitoring Okta – Identity platform that receives CAEP events

Required credentials:

Tines API Key – “Team” scoped to the “Editor” role Kolide API Key – Read-only Kolide Webhook Signing Secret

Required resources:

An Okta domain (such as example.okta.com or example.oktapreview.com) or a branded domain.

structure:

This workflow creates a proof-of-concept SSF transmitter that can be registered with Okta and sends device compliance change CAEP events (sent as SETs) based on Kolide-generated issues. There are three elements:

1. Generate and save a SET signing key (SET is a signed JSON web token).

Create an RSA key pair and convert it to JWK format. Publish the public key for SSF recipients to verify the SET signature. Save your private JWK keyset as a Tines secret.

2. Expose the SSF transmitter API

SSF receivers (such as Okta) require:

A .well-known/sse-configuration endpoint that describes the transmitter A JWK endpoint that exposes the public key used to verify the SET signature A webhook that serves as the SSF API A trigger surface logic is returned A .well-known config logic returns the JWK

Once this is published, teams can register new SSF receivers with Okta at:

Security → Device Integration → Receiving Shared Signals

Then create a new stream using the API URL and the new `.well-known` endpoint.

3. Create, sign, and send SETs from Kolide events

Receive Kolide publication events via a webhook and validate them using a signing secret. Get device and user metadata from Kolide. Constructs a SET for device compliance change CAEP events. Sign the SET with the stored private key using the JWT_SIGN expression. Send the signed token to Okta’s security event endpoint.

This delivers real-time device compliance updates to Okta, allowing access policies to take immediate action.

Configuring a Workflow – Step-by-Step Guide

You can build and run this entire workflow using Tines Community Edition.

1. Log in to Tines or create a new account.

2. Navigate to the pre-built workflow in the library. Select Import. This will immediately display your new pre-built workflow.

3. Gather the required credentials

Tines API key (team scope with editor role) Kolide API key (read-only) Kolide webhook signing secret

These ensure that calls to Kolide are authenticated and webhooks are securely verified.

4. Gather the necessary resources

You will need an Okta tenant domain that looks like this:

example.oktapreview.com example.okta.com or a custom Okta branded domain

This domain is used when sending signed SETs to Okta’s security event endpoint.

Note: In the example provided, Scott is configured as a “push” provider rather than a “polling” provider, since the token is sent based on the incoming webhook, so there is no need to save state.

5. Generate a SET signing key

Create an RSA key using the Generate JWK Keyset action. Convert both public and private keys to JWK format (two event transformations). Store the resulting set of keys using a Tines secret.

This is required before Okta can accept and validate the SET.

6. Expose SSF transmitter API

SSF API webhooks include two branches.

.well-known endpoint trigger: Well-known event transform: Returns the SSF configuration that declares the transmitter’s capabilities JWKS endpoint trigger: JWK event transform: Returns a public JWK so that Okta can verify the signature

Once live, Okta can register this transmitter as a shared signal sender.

7. Connect Kolide and handle device issues

The Kolide integration flow follows these steps:

Webhooks: Kolide Webhook – Receives issue opened/resolved events Get device details – Get associated device metadata Device has user – Branching logic to check user is associated Get user details – Find user metadata in CAEP payload

Depending on whether the issue is new or resolved:

Build SET – Builds the CAEP device_compliance_change event. Sign the SET – Generate an SSF-compliant SET using the RSA private key you previously saved. Send SET – Sends the final signed token to Okta’s security event endpoint.

As soon as Okta receives and validates the SET, it updates the associated user’s risk level.

bring everything together

SSF exists to enable security tools to speak the same language and provide continuous insight into risk and device health. But when key tools don’t support standards, gaps exist and access policies lag behind real-world changes.

Tines bridges these gaps by enabling new intelligent workflows. These ensure that tools that do not support SSF can still send information in the same standardized way. By using Tines to generate, sign, and distribute compliance signals in real time, you can reap the benefits of SSF even if your source tools are not built for SSF.

If you’d like to try this workflow for yourself, you can do it in minutes using your free Tines account. And if you want to see how device state fits into your broader identity strategy, this guide to modern IAM workflows introduces practical patterns and real-world workflows like Scott’s that you can start building today.

Was this article interesting? This article is a contribution from one of our valued partners. Follow us on Google News, Twitter, and LinkedIn to read more exclusive content from us.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGoogle adds layered defenses to Chrome to block indirect prompt injection threats
Next Article Storm-0249 Using ClickFix, Fileless PowerShell, and DLL Sideloading to Escalate Ransomware Attacks
user
  • Website

Related Posts

Compromised dYdX npm and PyPI packages deliver wallet stealer and RAT malware

February 6, 2026

Claude Opus 4.6 discovers over 500 high-severity flaws across major open source libraries

February 6, 2026

AISURU/Kimwolf botnet launches record 31.4 Tbps DDoS attack

February 5, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Puragen unveils PFAS treatment technology during UK ministerial visit

Compromised dYdX npm and PyPI packages deliver wallet stealer and RAT malware

DiDAX: Innovating DNA-based data applications

Claude Opus 4.6 discovers over 500 high-severity flaws across major open source libraries

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.