CAEP and Shared Signals: Real-Time Session Management Explained
The Continuous Access Evaluation Protocol enables instant session revocation across your stack. How TigerIdentity implements the OpenID Shared Signals Framework.
When an employee is terminated, how long until their access is actually revoked? With traditional IAM, it can take hours or even days. CAEP (Continuous Access Evaluation Protocol) and the Shared Signals Framework (SSF) solve this by enabling real-time security event propagation.
In this deep dive, we'll explore how CAEP works, why it matters for modern security, and how TigerIdentity implements it to achieve sub-second session revocation across your entire infrastructure.
The Session Revocation Problem
Traditional IAM systems operate on a polling or batch sync model. When a critical security event occurs, there's a dangerous gap between the event and the enforcement:
Traditional Approach Timeline:
2:00 PM - Employee Terminated
Security incident begins
2:15 PM - HR Updates HRIS
Manual process completed
3:00 PM - IT Receives Ticket
Waiting in queue behind other tasks
5:30 PM - Access Finally Revoked
3.5 hours of exposure window
With CAEP:
All sessions are revoked within seconds of the HRIS update. No tickets, no delays, no exposure window.
What Is CAEP?
Continuous Access Evaluation Protocol
- Part of the OpenID Shared Signals Framework (SSF) specification
- Enables real-time event streaming between security systems
- Standardized event types (session-revoked, credential-change, compliance-violation, etc.)
- Push-based model instead of polling - events arrive instantly
CAEP transforms identity security from a batch-oriented, eventually-consistent model into a real-time, event-driven architecture. Instead of waiting for sync jobs to run every 15 minutes or hour, security events are pushed immediately to all participating systems.
How It Works
CAEP events are transmitted as signed JSON Web Tokens (JWTs) containing structured security event data. Here's what a session revocation event looks like:
{
"typ": "secevent+jwt",
"events": {
"https://schemas.openid.net/secevent/caep/event-type/session-revoked": {
"subject": {
"format": "email",
"email": "[email protected]"
},
"event_timestamp": 1706198400,
"reason_admin": "Employee termination",
"initiating_entity": "HR System"
}
}
}When TigerIdentity receives this event, it immediately:
- 1.Validates the JWT signature to ensure authenticity
- 2.Identifies all active sessions for the subject ([email protected])
- 3.Revokes sessions across all connected applications
- 4.Propagates the event to downstream systems via their CAEP endpoints
- 5.Logs the event for audit and compliance reporting
This entire process completes in under one second, turning what used to be hours of exposure into milliseconds.
CAEP Event Types
The CAEP specification defines multiple event types for different security scenarios. TigerIdentity supports all standard events and allows custom event types:
| Event Type | Trigger | TigerIdentity Action |
|---|---|---|
| session-revoked | Employee terminated | Revoke all active sessions |
| token-claims-change | Role/department change | Re-evaluate active policies |
| credential-change | Password reset | Force re-authentication |
| assurance-level-change | Device compliance fail | Step up or deny access |
| device-compliance-change | MDM violation detected | Restrict access scope |
| compliance-violation | Policy breach detected | Alert security team + restrict |
TigerIdentity's CAEP Implementation
TigerIdentity provides a complete CAEP infrastructure that acts as both a receiver and transmitter of security events:
Event Hub
Central event processor receiving signals from 50+ integrations including Okta, Azure AD, WorkOS, and custom systems.
Sub-Second Propagation
Events processed and enforced in under 1 second across all connected systems. No polling delays.
Bidirectional Signals
Both receive events from identity providers AND emit events for downstream applications and services.
This architecture ensures that security events flow seamlessly across your entire identity ecosystem, from HR systems to SaaS applications to internal services.
Configuration Example
Setting up CAEP in TigerIdentity is straightforward. Here's a complete configuration showing how to receive events from Okta and your HR system, then propagate them to your applications:
caep:
enabled: true
receivers:
- name: okta-events
type: ssf
endpoint: https://company.okta.com/.well-known/ssf-configuration
events: [session-revoked, credential-change]
- name: hr-system
type: webhook
endpoint: https://hr.company.com/events
events: [employee-terminated, department-changed]
transmitters:
- name: downstream-apps
events: [session-revoked, token-claims-change]
subscribers:
- https://app1.company.com/caep
- https://app2.company.com/caep
actions:
session-revoked:
- revoke_all_sessions
- notify_security_team
credential-change:
- force_reauthentication
token-claims-change:
- reevaluate_policies
- update_session_context
device-compliance-change:
- adjust_access_level
- trigger_compliance_checkWith this configuration, TigerIdentity automatically handles the entire event lifecycle - from receiving signals from upstream identity providers to enforcing policy decisions and propagating events to your applications.
Why CAEP Matters for Your Security Posture
Eliminate Exposure Windows
Reduce the time between a security event and enforcement from hours to milliseconds.
Improve Compliance Posture
Demonstrate to auditors that access is revoked immediately, not on the next sync cycle.
Reduce Operational Overhead
No more manual ticket workflows for every access change. Events trigger automated enforcement.
Enable Zero Standing Privilege
React instantly to context changes, making truly dynamic, just-in-time access practical at scale.
Ready for Real-Time Session Management?
See how TigerIdentity's CAEP implementation can eliminate your exposure windows and automate security enforcement across your entire stack.
Related Articles
CAEP Event Hub
Explore TigerIdentity's central event processing infrastructure for real-time security signals.
Learn moreCAEP Integration Guide
Step-by-step documentation for implementing CAEP receivers and transmitters.
Read docsZero Standing Privilege: The Future of IAM
How real-time access evaluation enables true just-in-time privilege at enterprise scale.
Read article