An Identity Load Balancer decides where to send an authentication request when a system runs across multiple identity providers or services. It is the traffic controller for sign-ins, token validation, session routing, and single sign-on across complex architectures. Without it, authentication bottlenecks can bring down applications under high load.
Unlike standard network load balancers, an identity-aware load balancer operates at the application layer. It routes based on identity context: which user is signing in, which provider they use, which tenant they belong to, and what the policy says should happen next. It uses metadata from OAuth, OIDC, or SAML flows to make precise routing decisions.
The core functions include:
- Provider balancing: Distributing requests across multiple IdPs for resilience and failover.
- Policy enforcement: Checking the incoming identity against rules before it reaches the backend.
- Session continuity: Ensuring that multi-step auth flows stay with the same backend through stateful routing.
- Latency optimization: Directing traffic to the fastest available provider or region.
For systems with mixed identity stacks—like Azure AD, Okta, and custom OIDC—an identity load balancer prevents mismatches and dead ends in login flows. It can transparently switch providers when one fails, or balance across them to spread authentication load evenly. The result is higher uptime and predictable user access, even during spikes.