Chapter 1: System Components

Architecture boundaries, component roles, working principles, and engineering metrics

1.1 System Architecture

The system architecture is organized into two primary deployment boundaries: the Data Center / Core, which hosts authoritative identity and policy services, and the Sites / Edge, which contains enforcement points closest to end users and devices. Both boundaries are connected via redundant WAN links (MPLS/SD-WAN), and each site is designed with local survivability capabilities to maintain critical access even during WAN interruptions.

The authoritative identity plane (AD/LDAP, IdP, PKI) resides in the core, ensuring a single source of truth for all identity decisions. Policy engines (RADIUS, TACACS+, NAC) operate in an active-active or N+1 cluster configuration. Enforcement points at the edge consume policy decisions via standardized protocols and apply them at the port, SSID, or application level.

Component Deployment Boundary Diagram
Figure 1.1: Component Deployment Boundary — Data Center/Core (left) and Sites/Edge (right) with redundant WAN interconnects

Module Relationships & Flows

ModuleRoleKey InteractionsRedundancy Model
AD/LDAP DirectoryAuthoritative identity, groups, device objectsProvides identity attributes to RADIUS, NAC, PAM; receives HR feedMulti-master replication; ≥2 DCs at different sites
IdP (SAML/OIDC)User authentication, MFA, conditional access tokensIssues tokens to ZTNA/Apps; consumes AD/LDAP; receives MDM/EDR postureActive-active or cloud HA; failover within seconds
PKI/CACertificate issuance and revocation for EAP-TLSIssues device certs via SCEP/EST; OCSP/CRL queried by RADIUSOffline root + online issuing CA; OCSP cluster
RADIUS802.1X network access authentication and authorizationQueries AD/LDAP; validates PKI; returns VLAN/ACL/SGT to switch/APN+1 cluster behind load balancer or DNS SRV
TACACS+Device admin login + command authorization + accountingQueries AD; logs commands to SIEM; enforces role-based command setsPrimary/secondary pair; fallback to local (restricted)
NACProfiling, posture assessment, quarantine, guest portalIntegrates with switches/APs via RADIUS/SNMP/API; queries MDM/EDRHA policy nodes; posture data replicated
ZTNA/VPNRemote access enforcement with per-app policyIntegrates with IdP for MFA/CA; queries NAC/EDR for postureGlobal load balancer; multi-region gateways
PAMPrivileged session brokering, vault, recordingBrokers SSH/RDP to network devices; integrates with TACACS+; logs to SIEMClustered vaults; session recording replicated
SIEMLog correlation, alerts, retention, dashboardsIngests from all modules via TLS syslog/CEF; NTP-synchronizedDistributed collectors; hot/warm/cold storage tiers
NTPTime synchronization for all nodesProvides stratum time to all infrastructure componentsInternal stratum hierarchy; ≥2 stratum-1 sources

Core / Optional / Support Distinction

CategoryComponentsRationale
CoreAD/IdP, PKI, RADIUS/TACACS+, SIEM+NTP, Switch/AP enforcementRequired for basic identity-based access control and audit
OptionalAdvanced posture checks (EDR/MDM), SGT/TrustSec, SOAR playbooksEnhances security posture; adds complexity and licensing cost
SupportCMDB, ITSM ticketing, vulnerability scanners for posture signalsImproves operational governance and change control

1.2 Components and Functions

Each component in the identity authentication stack has a well-defined primary responsibility, set of inputs and outputs, engineering metrics, and associated mismatch risks. The component grid below provides a structured reference for procurement, capacity planning, and acceptance testing. Understanding these interdependencies is critical for avoiding cascading failures during deployment or operational changes.

Component Functions Grid
Figure 1.2: Component Overview Grid — 12 core components with protocols, HA methods, and key metrics
ComponentPrimary ResponsibilityInputsOutputsKey MetricsMismatch Risks
AD/LDAP DirectoryAuthoritative identities, groups, device objectsHR feed, admin changesLDAP/Kerberos, group attributesReplication latency <15 min; DC uptime ≥99.9%Stale groups cause over-privilege; replication delay breaks login
IdP (SAML/OIDC)User authentication, MFA, conditional accessUser credentials, device signalsTokens/assertionsAuth latency p95 <1.5s; MFA success rateToken misconfig causes app lockout
PKI/CACert issuance/revocation for EAP-TLSCSR, device identityCert, CRL/OCSPOCSP p95 <300ms; revocation propagation <1hWeak templates enable spoofing; revocation delay
RADIUS802.1X authN, dynamic authZ, accountingEAP requests, identity attrsAccept/Reject + VLAN/ACL/SGTAuth p95 <800ms; success rate ≥99%Too-strict policies cause mass outages
TACACS+Admin authN/Z + command controlAdmin login, rolePermit/deny commands + logsCommand log completeness 100%Shared accounts break accountability
NACProfiling, posture, quarantine, guestDHCP/SNMP/EDR/MDMRole/VLAN/ACL changes, CoAQuarantine time <60sFalse profiling disrupts IoT operations
Switch/AP/WLCEnforcement at access edgeRADIUS decisionsPort state, VLAN/ACL/SGT802.1X stability; failover timeFirmware limitations break EAP-TLS
ZTNA/VPNRemote access enforcementIdP tokens, device postureTunnel/app accessConnection p95 <3s; step-up accuracySplit tunnel errors cause data leakage
PAMPrivileged session brokeringApprovals, vault credsSession recording, audited accessRecording coverage 100%; checkout TTLBypass paths allow unrecorded admin
SIEMCorrelation, alerts, retentionLogs from all modulesAlerts, dashboards, evidenceIngest EPS headroom 30%; retention 180–365dTime drift ruins correlation
NTPTime sync for audit integrityStratum sourcesTime offset controlOffset <100ms inside domainUnsynced clocks invalidate audit
FirewallNetwork segmentation and policy enforcementTraffic flows, ACL rulesPermit/deny, loggingThroughput; rule hit rate; latencyOverly permissive rules negate segmentation

1.3 Working Principles

Startup / Initialization

Before any authentication can occur, the system must establish its trust anchors and verify temporal consistency. This initialization sequence ensures that all components are operating from a known-good state before accepting live traffic.

  • Establish trust anchors: CA root distribution to endpoints/switches; IdP signing keys published; RADIUS shared secrets configured and rotated.
  • Verify time: NTP sync for all nodes; alert if offset exceeds threshold (100 ms internal, 1 s external). No authentication should proceed if time is unsynced on policy nodes.
  • Load policies: RADIUS/TACACS+ policy sets, NAC profiles, conditional access rules, PAM roles — all version-tagged and staged before enforcement.

Normal Operation

During steady-state operation, the system processes three primary authentication flows, each with distinct protocols and decision paths. All flows emit structured audit events to SIEM with correlation IDs.

  • Wired/Wi-Fi: Endpoint presents cert → RADIUS validates chain + revocation → maps identity to role → returns VLAN/ACL/SGT → switch/AP enforces.
  • Admin access: User authenticates to PAM (MFA) → session to device uses TACACS+ for command-level authorization → accounting logs to SIEM.
  • Remote access: IdP authenticates + conditional access evaluates → ZTNA grants app access with least privilege; abnormal risk triggers step-up or block.

Exception & Recovery Chains

Exception TriggerSystem BehaviorRecovery ActionSIEM Alert
Expired device certificateEndpoint placed in remediation VLAN; NAC triggers certificate renewal workflow; user notifiedMDM/auto-enrollment issues new cert; endpoint re-authenticatesAlert if threshold of failures exceeded
Compromised admin account attempts forbidden commandTACACS+ denies command; PAM session flagged; SOAR opens incidentPassword reset + token revoke; session terminated; incident documentedCritical alert — privilege abuse
Time drift on a switch causes invalid accounting timestampsNTP monitoring alert; device moved to maintenance window; logs tagged "time_untrusted"NTP fix applied; post-fix validation includes log continuity testWarning alert — audit integrity risk
RADIUS cluster node failureClient failover to secondary node; site survivability policy activates if WAN also failsNode restored or replaced; health check confirms recoveryMajor alert — AAA availability
OCSP responder unavailableCritical zones fail-closed; standard zones allow only remediation VLANOCSP responder restored; cached responses expire; normal auth resumesMajor alert — PKI trust chain