BondingAI

Identity and Access Architecture

Imported content for Identity and Access Architecture.

Identity and Access Architecture

Executive Summary

The bondingAI Platform uses WorkOS exclusively for authentication and authorization. This document addresses concerns about external traffic and demonstrates why this architecture is the optimal choice for enterprise deployments.

Key Point: WorkOS handles only identity verification. Zero business data (chats, documents, AI responses, analytics) leaves the customer's cloud environment.


Architecture Overview

Data Flow Separation

The following diagram illustrates the clear boundary between business data (which remains entirely within the customer's Azure environment) and authentication data (handled by WorkOS).

Authentication Flow


Data Classification

Data CategoryExamplesStorage LocationLeaves Customer Cloud
Chat ContentMessages, AI responses, conversation historyCustomer PostgreSQLNo
DocumentsUploaded files, PDFs, knowledge baseCustomer Azure BlobNo
EmbeddingsVector representations, RAG dataCustomer PGVectorNo
AnalyticsUsage metrics, KPIs, dashboardsCustomer PostgreSQLNo
Company DataOrganizations, domains, configurationsCustomer PostgreSQLNo
User IdentityEmail, name, organization membershipWorkOSYes (auth only)
SSO ConfigSAML/OIDC provider settingsWorkOSYes (auth only)
Access TokensJWT tokens for session managementWorkOSYes (auth only)

WorkOS Security and Compliance

WorkOS maintains enterprise-grade security certifications and compliance standards:

CertificationStatusDescription
SOC 2 Type 2CertifiedAnnual audit of security controls, availability, and confidentiality
GDPRCompliantEuropean data protection regulation compliance
CCPACompliantCalifornia Consumer Privacy Act compliance
HIPAABAA AvailableBusiness Associate Agreement available for healthcare customers
PCI DSSCertifiedPayment Card Industry Data Security Standard

Security Practices:

  • Annual third-party penetration testing
  • External code audits
  • Encrypted data at rest and in transit (TLS 1.3)
  • Trust Center with publicly available compliance documentation
  • Data Processing Addendum (DPA) available

WorkOS processes only the data sent from identity providers during authentication. No business application data is transmitted to or stored by WorkOS.


Why Not Alternative Solutions

Cost Impact

Replacing WorkOS with alternative solutions such as Microsoft Entra External ID, Auth0, or a custom-built authentication system would result in drastically increased costs for the customer:

Cost CategoryWith WorkOSWith Alternative
Implementation TimelineReady to go~ 2-3 months
Custom Admin PortalIncludedMust build
Directory Sync (SCIM)IncludedAdditional licensing or custom development
Ongoing MaintenanceIncludedCustomer responsibility

Feature Gap

Removing WorkOS means losing access to enterprise-ready features that would need to be rebuilt:

  • Admin Portal: Built-in self-service portal for customer IT administrators to configure SSO and directory sync without vendor support
  • Directory Sync: Automatic user provisioning/deprovisioning from Azure AD, Okta, Google Workspace
  • Multi-IdP Support: Simplified integration with multiple identity providers per organization
  • Fine-Grained Authorization (FGA): Resource-level permission management

Development Burden

CapabilityWorkOSCustom/Alternative
SSO Configuration UIBuilt-in Admin PortalMust design and build
SCIM ImplementationTurnkeyMust implement SCIM server
Multi-tenant OrganizationsNative supportMust architect
Enterprise SSO (SAML/OIDC)Pre-built connectorsMust build each integration

Risk Analysis

Risks of Replacing WorkOS

RiskImpactMitigation Effort
Extended development timeline2-3x longer implementationSignificant
Custom admin portal requiredHigh development costHigh
Maintenance burden shifts to customerOngoing operational costPermanent
Loss of enterprise B2B featuresReduced competitivenessRequires custom development
Security responsibility transferCustomer must maintain auth securityContinuous

Why External Authentication Traffic is Acceptable

The separation of authentication from business data is a recognized architectural best practice adopted by leading technology companies:

Industry Adoption:

  • Vercel, Netlify, Webflow use WorkOS for authentication
  • OpenAI and Slack separate authentication traffic from business data
  • Plaid and other fintech companies follow this pattern

Technical Rationale:

  • Authentication tokens contain only identity claims (who the user is)
  • Business data (what the user does) never traverses external networks
  • JWT validation uses public JWKS endpoints (cryptographic verification, no data exposure)
  • TLS 1.3 encryption protects all authentication traffic

Compliance Alignment:

  • SOC 2, GDPR, and HIPAA frameworks recognize the distinction between identity data and business data
  • Authentication-as-a-Service is an accepted pattern for regulated industries

Summary

The bondingAI Platform architecture maintains a clear separation between:

ConcernHandled ByLocation
Identity (who is the user)WorkOSExternal (secure)
Business Data (what the user does)Customer AzureInternal (customer-controlled)

Benefits of Current Architecture:

  1. Data Sovereignty: All business data remains within the customer's Azure environment
  2. Enterprise Security: SOC 2 Type 2, GDPR, HIPAA-ready authentication infrastructure
  3. Reduced Complexity: Pre-built enterprise features eliminate custom development
  4. Cost Efficiency: Included features would cost significantly more to build and maintain
  5. Industry Standard: Architecture pattern validated by leading B2B SaaS companies

Replacing WorkOS would increase implementation costs, extend timelines, and shift ongoing security and maintenance responsibilities to the customer without improving data privacy, as business data already remains entirely within the customer's environment.

On this page