Every military operation has a PACE plan—Primary, Alternate, Contingency, Emergency. It’s how you ensure communications continue when conditions degrade. When Primary fails, you fall back to Alternate. When Alternate fails, Contingency. When everything fails, Emergency.

Identity infrastructure needs the same resilience. Zero Trust mandates continuous authentication. But what happens when your cloud IDP is unreachable? When the network degrades? When you’re operating at the tactical edge with zero connectivity?

A graphic showing four operational states—Primary, Alternate, Contingency, and Emergency—with icons and brief descriptions of their cloud or identity management roles, highlighting PACE Planning and Zero Trust principles for enhanced DDIL Resilience.

This framework applies PACE planning to identity, mapping each tier to specific products and capabilities that maintain Zero Trust authentication regardless of connectivity conditions.

 

The Identity Resilience Challenge

The DoD FY27 Zero Trust mandate requires continuous authentication, phishing-resistant MFA, and unified SSO. These requirements assume your identity provider is always reachable.

That assumption fails in DDIL environments:

  • Disconnected: No network connectivity to cloud services
  • Denied: Adversary jamming or intentional air-gap
  • Intermittent: Sporadic connectivity that can’t support continuous verification
  • Limited: Bandwidth too constrained for real-time authentication

Organizations operating in these conditions face a choice: abandon Zero Trust principles when connectivity degrades, or build identity infrastructure that maintains security across all conditions.

PACE planning provides the framework for the second option.

 

Primary Tier: Zero Trust ICAM Foundations

Primary is your first choice—the optimal path when conditions are favorable. For identity, that’s your enterprise cloud IDP: Microsoft Entra ID, Okta, Ping Identity, or whichever provider serves as your authoritative identity source.

The Enterprise Identity Gap

DISA is federating ICAM instances across DoD, creating a single identity provider point for millions of users. The intent is clear: unified identity for the enterprise.

The reality is messier. Legacy applications speak LDAP when your IDP speaks OIDC. Mission-critical systems predate modern authentication protocols. Custom access policies are hardwired into application code. Rewriting every app isn’t feasible.

So organizations accept risk. Non-standard apps remain outside the identity fabric. The Primary tier has gaps.

Identity Orchestration

Strata’s Identity Orchestration inserts an abstraction layer between applications and identity providers. It translates protocols, maps schemas, and enforces policies—so any app can connect to any IDP without code changes.

Primary tier capabilities:

  • Legacy apps get modern authentication: Extend Entra ID, Okta, or Ping to applications that only understand LDAP or legacy SAML
  • No vendor lock-in: Migrate between IDPs on your terms without rewriting applications
  • Preserve custom policies: Keep access rules while modernizing infrastructure
  • Accelerate Authority to Operate: Modernize apps without refactoring that triggers full security reviews

NIST 800-53 IA Controls

Your Primary tier must satisfy Identification and Authentication (IA) controls:

  • IA-2: Uniquely identify and authenticate users
  • IA-2(1): MFA for privileged accounts
  • IA-2(2): MFA for all network access
  • IA-8: Authenticate external users

Identity Orchestration enables these controls across your entire application portfolio—not just apps that natively support modern protocols.

 

Alternate Tier: Multi-IDP Resilience

The Alternate tier is your backup when Primary fails. For identity, that means having a secondary IDP ready to take over seamlessly.

The Federal Identity Landscape

Federal and DoD environments navigate multiple identity architectures:

  • FICAM: The government’s standardized approach to identity under GSA
  • SE-ICAM: Department of State’s implementation for diplomatic operations
  • DISA ICAM Federation: Unifying identity across DoD with the Master User Record (MUR)
  • T-ICAM: Army’s effort to extend enterprise identity to the tactical edge

Each represents different IDPs, policies, and schemas. They need to work together.

The Multi-IDP Challenge

When Primary fails, Alternate must take over without:

  • Losing active sessions
  • Forcing operators to repeatedly sign in as connectivity flickers—pulling focus from the mission to fight their login screen
  • Breaking access policies
  • Creating audit gaps

Different IDPs use different schemas and claim formats. Failover becomes a translation problem.

Schema Abstraction

Strata’s Identity Continuity includes a Schema Abstraction Layer that maps schemas across incompatible IDPs:

  1. Orchestration layer detects Primary IDP degradation
  2. Failover triggers based on configurable health checks
  3. Schema Abstraction Layer translates claims to Alternate IDP’s format
  4. Users continue working without interruption

This works for cloud-to-cloud failover (Entra ID to Okta, Okta to Ping) and sets the foundation for Contingency tier failover to on-premises systems.

Ready to build identity resilience into your infrastructure? Talk to an engineer about your PACE identity plan.

 

Contingency Tier: Identity Continuity

The Contingency tier is where PACE planning gets serious. Primary failed. Alternate is unreachable. You’re operating in degraded conditions—connectivity exists, but it’s unreliable, high-latency, or intermittent.

This is where most Zero Trust architectures break.

The Degraded Network Problem

Zero Trust assumes continuous verification. That model depends on reaching your IDP. In degraded conditions:

  • Authentication requests time out
  • Session validations fail
  • Policy evaluations stall
  • Users get locked out of mission-critical systems

The natural response is to lower security—extend session timeouts, cache credentials longer, skip re-authentication. Every one of those choices creates attack surface.

Identity Continuity Architecture

A flowchart showing identity providers (Entra ID, Keycloak), Strata Mavericks components, and their connections to legacy, modern, and TAK/ATAK applications within a Zero Trust Framework.

On-premises Keycloak serves as your Contingency tier IDP. It runs at your location—forward operating base, ship, regional command—wherever you need local identity services.

Health monitoring continuously checks your Primary and Alternate cloud IDPs. When connectivity degrades below thresholds, the system prepares to fail over.

Automatic failover transitions authentication to local Keycloak. Active sessions are preserved. Policies continue to be enforced.

Local audit logging captures every authentication decision at the edge. When connectivity returns, logs synchronize with enterprise systems.

How Failover Works

  1. Normal operation: Users authenticate against enterprise IDP
  2. Degradation detected: Health checks identify latency or availability issues
  3. Failover triggered: Authentication routes to local Keycloak
  4. Local operation: Keycloak handles all authentication with consistent policies
  5. Connectivity restored: Failback occurs; edge audit logs synchronize

What Gets Preserved

  • Active sessions: Users don’t get logged out during failover
  • Access policies: Rules apply regardless of which IDP is active
  • Audit trail: Every decision is logged and reconciled
  • Strong authentication: CAC/PKI, FIDO2, and phishing-resistant MFA continue working

NIST 800-53 CP-7 Alignment

CP-7 (Alternate Processing Site) requires “security measures equivalent to those of the primary site.” Identity Continuity satisfies this for identity services with equivalent authentication, consistent policies, and compliant audit logging.

 

Emergency Tier: Air-Gapped Identity

The Emergency tier is your last resort. Primary, Alternate, and Contingency have all failed or been intentionally severed. You’re operating in true DDIL with zero ability to reach cloud services.

True DDIL Scenarios

  • Contested electromagnetic spectrum: Adversary jamming prevents connectivity
  • Intentional air-gap: Operational security requires disconnection
  • Expeditionary deployment: Beyond reliable communications infrastructure
  • Covert operations: Any external connection would compromise the mission

Identity infrastructure must operate with zero runtime dependency on external services.

Identity Hub: Pre-Synchronized Edge Identity

A flowchart showing data synchronization from Extra ID at Home Station to Keycloak, Identity Hub, and AI Gateway at Tactical Edge, linking to Applications with TAK/ATAK and AI Agent—highlighting DDIL Resilience for secure operations.

Capabilities: FIPS 140-3 | Sovereign Cloud | IL5-IL7 | Air-Gap

Pre-deployment sync: Before the link is severed, Identity Hub synchronizes user identities from enterprise IDP to local Keycloak at the edge.

Local authentication: When disconnected, Keycloak serves as the authoritative identity source with CAC/PKI, FIDO2, and certificate-based authentication.

Zero cloud dependency: All authentication and authorization decisions are made locally.

Audit capture: Every decision is logged locally and reconciled when connectivity returns.

Compliance at the Edge

  • FIPS 140-3: Validated cryptographic modules for government environments
  • Sovereign Cloud Ready: GCC High endpoint support
  • IL5-IL7 Architectures: Complete isolation from commercial cloud

AI Agents at the Edge

The same identity orchestration that secures humans and services extends to AI agents at the tactical edge through the AI Identity Gateway:

  • On-premises deployment: No cloud dependency — agent identity runs at the edge
  • Scoped, short-lived credentials: Token exchange with per-tool TTLs ensures agents get only the access they need, only for as long as they need it
  • Runtime policy enforcement: OPA-based policies translate from enterprise to edge
  • Delegation chain auditing: Full traceability from human to agent to tool
  • Human-in-the-loop (coming soon): Approval workflows for sensitive agent operations

Reconciliation

When connectivity returns:

  • Staging area: Edge changes validate before touching authoritative records
  • Audit reconciliation: Local logs merge with enterprise systems
  • Identity updates: Users modified at the edge synchronize back with conflict flagging

 

PACE Tier Overview

TierConditionStrata ProductCapability
PrimaryFull cloud connectivityIdentity OrchestrationEnterprise IDP integration, protocol translation
AlternatePrimary IDP unavailableIdentity Orchestration + ContinuityMulti-IDP failover, schema abstraction
ContingencyDegraded / intermittentIdentity ContinuityLocal Keycloak failover, session preservation
EmergencyDenied / air-gappedIdentity Hub + AI GatewayPre-synchronized edge identity, zero cloud dependency

 

Building Your PACE Identity Plan

Step 1: Establish Primary

  • Inventory your identity landscape and IDPs
  • Deploy Identity Orchestration between apps and IDPs
  • Connect non-standard apps without code changes
  • Establish baseline authentication and access policies

Step 2: Configure Alternate

  • Identify backup IDP (cloud-to-cloud failover)
  • Configure health monitoring and failover thresholds
  • Test failover with outage simulations
  • Document for NIST 800-53 CP compliance

Step 3: Deploy Contingency

  • Deploy Keycloak to edge locations
  • Configure phishing-resistant authentication flows (CAC/PKI, FIDO2)
  • Set failover thresholds for degraded conditions
  • Test session preservation and policy enforcement
  • Document reconciliation procedures

Step 4: Prepare Emergency

  • Identify air-gapped deployment locations
  • Deploy Identity Hub and edge infrastructure
  • Configure pre-deployment sync scopes
  • Establish reconciliation and staging procedures
  • Train operators for disconnected operations

 

Bottom Line

PACE planning for identity isn’t optional for defense operations. It’s not a nice-to-have for organizations in contested environments. It’s a requirement for maintaining Zero Trust when the conditions Zero Trust assumes—continuous connectivity—don’t exist.

Strata’s identity platform provides the complete PACE stack:

  • Primary: Identity Orchestration connects any app to any IDP
  • Alternate: Schema Abstraction enables seamless multi-IDP failover
  • Contingency: Identity Continuity maintains authentication in degraded conditions
  • Emergency: Identity Hub delivers air-gapped identity at the tactical edge

Build resilience into your identity infrastructure before you need it. The worst time to plan for IDP availability is when it’s already down.

Build your PACE identity plan: