Technical Deep Dive5 min read

CAEP and Shared Signals: Real-Time Session Management Explained

The Continuous Access Evaluation Protocol enables instant session revocation across your stack. How TigerIdentity implements the OpenID Shared Signals Framework.

TigerIdentity Team|January 20, 2026

When an employee is terminated, how long until their access is actually revoked? With traditional IAM, it can take hours or even days. CAEP (Continuous Access Evaluation Protocol) and the Shared Signals Framework (SSF) solve this by enabling real-time security event propagation.

In this deep dive, we'll explore how CAEP works, why it matters for modern security, and how TigerIdentity implements it to achieve sub-second session revocation across your entire infrastructure.

The Session Revocation Problem

Traditional IAM systems operate on a polling or batch sync model. When a critical security event occurs, there's a dangerous gap between the event and the enforcement:

Traditional Approach Timeline:

1

2:00 PM - Employee Terminated

Security incident begins

2

2:15 PM - HR Updates HRIS

Manual process completed

3

3:00 PM - IT Receives Ticket

Waiting in queue behind other tasks

4

5:30 PM - Access Finally Revoked

3.5 hours of exposure window

With CAEP:

All sessions are revoked within seconds of the HRIS update. No tickets, no delays, no exposure window.

What Is CAEP?

Continuous Access Evaluation Protocol

  • Part of the OpenID Shared Signals Framework (SSF) specification
  • Enables real-time event streaming between security systems
  • Standardized event types (session-revoked, credential-change, compliance-violation, etc.)
  • Push-based model instead of polling - events arrive instantly

CAEP transforms identity security from a batch-oriented, eventually-consistent model into a real-time, event-driven architecture. Instead of waiting for sync jobs to run every 15 minutes or hour, security events are pushed immediately to all participating systems.

How It Works

CAEP events are transmitted as signed JSON Web Tokens (JWTs) containing structured security event data. Here's what a session revocation event looks like:

{
  "typ": "secevent+jwt",
  "events": {
    "https://schemas.openid.net/secevent/caep/event-type/session-revoked": {
      "subject": {
        "format": "email",
        "email": "[email protected]"
      },
      "event_timestamp": 1706198400,
      "reason_admin": "Employee termination",
      "initiating_entity": "HR System"
    }
  }
}

When TigerIdentity receives this event, it immediately:

  1. 1.Validates the JWT signature to ensure authenticity
  2. 2.Identifies all active sessions for the subject ([email protected])
  3. 3.Revokes sessions across all connected applications
  4. 4.Propagates the event to downstream systems via their CAEP endpoints
  5. 5.Logs the event for audit and compliance reporting

This entire process completes in under one second, turning what used to be hours of exposure into milliseconds.

CAEP Event Types

The CAEP specification defines multiple event types for different security scenarios. TigerIdentity supports all standard events and allows custom event types:

Event TypeTriggerTigerIdentity Action
session-revokedEmployee terminatedRevoke all active sessions
token-claims-changeRole/department changeRe-evaluate active policies
credential-changePassword resetForce re-authentication
assurance-level-changeDevice compliance failStep up or deny access
device-compliance-changeMDM violation detectedRestrict access scope
compliance-violationPolicy breach detectedAlert security team + restrict

TigerIdentity's CAEP Implementation

TigerIdentity provides a complete CAEP infrastructure that acts as both a receiver and transmitter of security events:

Event Hub

Central event processor receiving signals from 50+ integrations including Okta, Azure AD, WorkOS, and custom systems.

Sub-Second Propagation

Events processed and enforced in under 1 second across all connected systems. No polling delays.

Bidirectional Signals

Both receive events from identity providers AND emit events for downstream applications and services.

This architecture ensures that security events flow seamlessly across your entire identity ecosystem, from HR systems to SaaS applications to internal services.

Configuration Example

Setting up CAEP in TigerIdentity is straightforward. Here's a complete configuration showing how to receive events from Okta and your HR system, then propagate them to your applications:

caep:
  enabled: true

  receivers:
    - name: okta-events
      type: ssf
      endpoint: https://company.okta.com/.well-known/ssf-configuration
      events: [session-revoked, credential-change]

    - name: hr-system
      type: webhook
      endpoint: https://hr.company.com/events
      events: [employee-terminated, department-changed]

  transmitters:
    - name: downstream-apps
      events: [session-revoked, token-claims-change]
      subscribers:
        - https://app1.company.com/caep
        - https://app2.company.com/caep

  actions:
    session-revoked:
      - revoke_all_sessions
      - notify_security_team

    credential-change:
      - force_reauthentication

    token-claims-change:
      - reevaluate_policies
      - update_session_context

    device-compliance-change:
      - adjust_access_level
      - trigger_compliance_check

With this configuration, TigerIdentity automatically handles the entire event lifecycle - from receiving signals from upstream identity providers to enforcing policy decisions and propagating events to your applications.

Why CAEP Matters for Your Security Posture

Eliminate Exposure Windows

Reduce the time between a security event and enforcement from hours to milliseconds.

Improve Compliance Posture

Demonstrate to auditors that access is revoked immediately, not on the next sync cycle.

Reduce Operational Overhead

No more manual ticket workflows for every access change. Events trigger automated enforcement.

Enable Zero Standing Privilege

React instantly to context changes, making truly dynamic, just-in-time access practical at scale.

Ready for Real-Time Session Management?

See how TigerIdentity's CAEP implementation can eliminate your exposure windows and automate security enforcement across your entire stack.