Chapter 2: Design Methods

Engineering principles, failure analysis, decision logic, and key design dimensions

2.1 Design Principles and Basis

Sound identity authentication architecture rests on a set of executable engineering principles — not abstract guidelines, but actionable rules that can be verified during design review, commissioning, and audit. Each principle below is paired with a technical basis and a verification method, ensuring that the design remains traceable from concept to acceptance test.

#PrincipleTechnical BasisVerification Method
1Single authoritative identity — choose one primary source per identity type (human/device/service)Audit integrity; prevents split-brain identity decisionsIdentity source inventory; no duplicate provisioning paths
2Certificate-based auth for devices (EAP-TLS) — eliminate shared secretsCryptographic binding; phishing-resistant; non-repudiationEAP-TLS coverage report; no PEAP-MSCHAPv2 in production zones
3Least privilege by default — deny-all baseline, explicit allow by roleBreach containment; limits lateral movementRBAC test cases; no "catch-all" permit rules
4Separation of duties (SoD) — split identity admin, policy admin, security audit rolesFraud prevention; compliance requirementRole matrix review; no single account with all privileges
5Policy-as-code mindset — version-control AAA/NAC policies; changes require peer reviewChange safety; rollback capability; drift detectionGit history for policy files; change approval records
6Fail-safe behavior defined per zone — fail-closed for critical; limited fail-open with compensating controlsAvailability vs. security balance; zone-based risk toleranceGame-day simulation; verify fallback VLAN ACL restrictions
7Immutable and time-synced audit — NTP everywhere; near-real-time log forwarding; tamper-evident storageForensics integrity; compliance evidenceNTP drift dashboard; SIEM ingest gap monitoring
8Segment by identity, not IP alone — dynamic VLAN/ACL/SGT and micro-segmentationZero trust principle; IP-based segmentation is insufficientRole-to-VLAN mapping tests; SGT policy verification
9Lifecycle automation — joiner/mover/leaver triggers; certificate auto-enroll; service account rotationOperational reliability; eliminates manual errorProvisioning SLA reports; cert renewal lead-time monitoring
10Compatibility with legacy — managed exceptions (MAB, PSK, MAC allowlist) with tighter ACLsGradual migration; avoids big-bang disruptionException register with expiry dates; monthly review
11Observability first — every decision emits structured logs; dashboards exist before mass rolloutTroubleshootability; baseline before enforcementSIEM dashboard review; correlation ID present in all log types
12Redundancy and capacity headroom — AAA/IdP/SIEM sized for peak auth stormsResilience; Monday-morning and power-recovery scenariosStress test at 3× normal load; failover drill results

2.2 Failure Causes → Recommendations

Understanding failure patterns is as important as designing for success. The following table documents eight major failure mechanism groups observed in enterprise identity authentication deployments, along with their consequences, avoidance strategies, and verification methods. Each entry represents a real-world failure mode that has caused production outages or security incidents.

Failure MechanismWhat HappensAvoidance / RecommendationVerification Method
Weak identity mappingUsers get wrong VLAN/ACL; over-privilege or under-privilegeNormalize attributes; enforce naming conventions; use role registrySampling + RBAC tests; role/VLAN correlation report
RADIUS overloadAuth timeouts; mass disconnect during peak (Monday morning, power recovery)HA cluster + load balancer + caching; size for peak × storm factorStress test at peak auth/s; verify N+1 headroom
PKI misconfigured templatesCert spoofing or unusable certs; EAP-TLS failuresEKU constraints; key size policy (RSA 2048+ or ECDSA P-256); auto-enroll controlsTemplate review checklist; cert chain validation test
Poor fallback designOutage escalates; critical staff locked outDefine zone-based fallback VLAN with minimal ACL; pre-approve break-glass listGame-day simulation; fallback VLAN ACL verification
Guest portal bypassUntrusted devices access internal resourcesStrict guest VLAN isolation + DNS filtering + account expiryPenetration test + NAC isolation reports
Shared admin accountsNo accountability; audit trail brokenUnique admin IDs + PAM + MFA; forbid shared credentials; alert on shared useDevice config audit; TACACS accounting review
Missing time syncLogs unusable in incident; correlation impossibleEnforce NTP on all nodes; monitor drift; block devices with excessive driftSIEM drift dashboard; NTP offset alerts
Mis-scoped conditional accessLegitimate users blocked; helpdesk floodPilot rings; exceptions with approval; telemetry-based tuning before enforcementCA policy monitoring; false-positive rate tracking
Inconsistent log formatsCorrelation impossible; forensics failAdopt CEF/JSON schema; normalize fields; parser regression testsSIEM parser tests; field presence validation

2.3 Core Design / Selection Logic

The design selection process follows a structured decision tree that classifies access type, evaluates device management status and certificate readiness, and maps to the appropriate authentication and authorization method. This ensures that every access scenario has a deterministic policy outcome, with no ambiguous or undefined states.

Access Control Decision Tree
Figure 2.1: Core Design Decision Tree — Access type classification leading to EAP-TLS, ZTNA+MFA, or PAM+TACACS+ outcomes

Decision Steps

  1. Classify identities: human / device / service / privileged. Each type has different trust requirements and lifecycle management needs.
  2. Define trust: certificate issuance model, revocation model (CRL/OCSP), factor requirements (single/MFA/phishing-resistant).
  3. Choose enforcement points: switch/AP (802.1X), VPN/ZTNA gateway, PAM jump host, firewall — each with appropriate protocol support.
  4. Select policy language: RBAC baseline + ABAC for conditions (device posture, location, risk score, time-of-day).
  5. Define exception handling: legacy endpoints, IoT devices, break-glass admins — each with documented compensating controls and expiry.
  6. Define observability and acceptance: success rates, latency targets, coverage percentages, audit completeness criteria.

2.4 Key Design Dimensions

Every design decision involves trade-offs across multiple dimensions. The following table provides a structured framework for evaluating those trade-offs, ensuring that performance, reliability, maintainability, compatibility, cost, and compliance requirements are all addressed in the design documentation.

DimensionKey ConsiderationsEngineering TargetsTrade-off Notes
Performance / UXAuth latency, roaming stability, captive portal usabilityRADIUS p95 <800ms; roam interruption <150ms; portal onboard <2minTighter security (more checks) increases latency
Stability / ReliabilityHA design, failover time, policy rollback capabilityAAA availability ≥99.9%; failover <30s; rollback <5minActive-active adds complexity and cost
MaintainabilityCertificate renewal automation, template versioning, runbooksCert renewal lead time 14–30 days; zero manual cert operations at scaleAutomation requires PKI maturity and MDM integration
Compatibility / ExtensibilityVendor support for CoA, SGT, APIs; future integration hooksStandard protocols only (EAP-TLS, RADIUS, TACACS+, SAML/OIDC)Vendor-proprietary features risk lock-in
LCC / TCOLicensing + ops time + incident cost reduction3-year net cost after incident reduction; FTE ops effort per 1000 usersEAP-TLS reduces long-term incident costs; NAC posture adds licensing overhead
Energy / EnvironmentalAppliance power consumption, PoE budgeting for edge sensors/APsPoE budget with 15% safety margin; closet thermal within vendor limitsHigh-density AP deployments require careful PoE planning
ComplianceAudit retention, SoD, encryption standards, privacy minimizationLog retention 180–365 days; TLS for all log transport; SoD enforced in rolesLonger retention increases storage cost; privacy rules may limit log fields