Omnissa logo
Engineering
Security

Shared Signals Framework as a Core Enabler of Zero Trust Architecture

KKartik Patel
January 7th, 2026
Shared Signals Framework as a Core Enabler of Zero Trust Architecture

Introduction

The Shared Signals Framework (SSF) and the standard signal protocols like CAEP are a critical component of modern Zero Trust Architecture (ZTA). Zero Trust requires continuous validation of users, devices, and sessions based on near real-time context. Traditional, siloed security tools cannot exchange information quickly enough to respond to dynamic threats. SSF solves this problem by providing a standard way for identity providers, applications, and security services to share risk, event, and policy signals in near real-time.

By enabling interoperability between different vendors and platforms, SSF transforms Zero Trust from a theoretical principle into a practical, enforceable, and scalable security model.


SSF Adoption at Omnissa


What is SSF and CAEP?

Example CAEP Event (device compliance):

{
    "iss": "https://idp.example.com/123456789/",
    "jti": "24c63fb56e5a2d77a6b512616ca9fa24",
    "iat": 1615305159,
    "aud": "https://sp.example.com/caep",
    "txn": 8675309,
    "sub_id": {
        "format": "complex",
        "device": {
            "format": "iss_sub",
            "iss": "https://idp.example.com/123456789/",
            "sub": "e9297990-14d2-42ec-a4a9-4036db86509a"
        },
        "tenant": {
            "format": "opaque",
            "id": "123456789"
        }
    },
    "events": {
        "https://schemas.openid.net/secevent/caep/event-type/device-compliance-change": {
            "current_status": "not-compliant",
            "previous_status": "compliant",
            "initiating_entity": "policy",
            "reason_admin": {
                "en": "Location Policy Violation: C076E8A3"
            },
            "reason_user": {
                "en": "Device is no longer in a trusted location."
            },
            "event_timestamp": 1615304991643
        }
    }
}

Omnissa’s Implementation Vision

The Security Events Service (SES) centralizes configurations and security event routing across Omnissa products. It is designed as an independent microservice, not embedded within Access or UEM, but built on top of Omnissa’s platform services like:

Why Independent?

The vision is clear: SES understands SSF and CAEP protocols so that none of the Omnissa products (UEM, Intelligence, Access) need to implement protocol logic. They simply forward events to SES, which:

Integration Flow:


Bootstrapping Flow

  1. Admin adds a partner in SES UI.
  2. System generates:
    • Partner specific well-known URL: https://<tenant>/.well-known/ssf-configuration/ssf/subscribers/<partner id>
    • OAuth2 client with ssf.read and ssf.manage scopes.
  3. Partner uses these credentials to configure event streams via SSF APIs.

Engineering Challenges & Solutions

1. Signal Routing

2. Queueing for Scale

Spikes happen—e.g., a UEM compliance policy change can trigger thousands of events. We evaluated:

3. Protocol Versioning

CAEP evolved from Draft 1 to stable spec. Solution:

4. Authentication & Scopes


APIs and Developer Experience

Omnissa exposed SSF-compliant APIs for partners:

Discovery

GET /.well-known/ssfconfiguration/secevents/ssf/subscribers/{id}

Create Stream

POST /secevents/ssf/subscribers/{id}/stream
Content-Type: application/json
Authorization: Bearer <access_token>

{
  "delivery": {
    "method": "urn:ietf:rfc:8935",
    "endpoint_url": "https://partner.example.com/events"
  },
  "events_requested": [
    "https://schemas.openid.net/secevent/caep/event-type/device-compliance-change"
  ]
}

Status & Verification

GET /secevents/ssf/subscribers/{id}/status
POST /secevents/ssf/subscribers/{id}/verify

Broader Ecosystem Adoption

Beyond these specific integrations, SSF adoption is growing across the security ecosystem:

This ecosystem momentum highlights SSF as the emerging standard for inter-vendor trust communication.


Conclusion

The Shared Signals Framework (SSF) is more than a technical specification—it is the backbone of operational Zero Trust. Through real-world integrations such as Cloudflare–Okta, Omnissa–Okta, and Apple Business Manager–Omnissa, SSF proves its value in:

As organizations continue to adopt Zero Trust, SSF will serve as the foundation that allows security tools to collaborate dynamically, turning Zero Trust from a concept into a daily operational reality.


References

  1. OpenID Foundation – Shared Signals Framework (SSF)
  2. Shared Signals Framework - The Blueprint for Modern IAM
  3. Okta - Enhancing Security with Okta Identity Threat Protection and Omnissa
  4. Omnissa Okta Integration Demo – Shared Signals Framework: Enabling Real-Time Risk Sharing
  5. Cloudflare Blog – Cloudflare & Okta integration with SSF for Zero Trust
  6. IBM Security – Verify Antenna and SSF adoption
  7. SailPoint – Continuous Identity with Shared Signals (Identiverse 2024 keynote)
  8. Google - Google Workspace Shared Signals Framework (SSF) Integration Guide
Shared Signals Framework
CAEP
RISC
Security
Zero Trust