The logs showed one thing: the identity federation security certificate had expired.
Identity federation security certificates are the core trust mechanism in federated authentication systems. They validate that tokens and SAML assertions come from a trusted identity provider. Without them, single sign-on fails, cross-domain authentication breaks, and service integrations collapse under signature errors.
A security certificate in identity federation is an X.509 file containing a public key. The identity provider signs assertions with its private key. The service provider verifies those signatures using the public key from its trusted certificate. This process stops attackers from forging tokens and ensures only authorized identity providers can authenticate users.
Certificates have a lifecycle. They are issued, distributed, activated, rotated, and retired. Common causes of outage include expired certificates, mismatched keys, or incorrect metadata in the federation configuration. Certificate rotation is critical: schedule renewals before expiry, distribute them securely, and confirm both identity provider and service provider configurations point to the same active certificate.