Employee Onboarding Flow

Overview

GetTrusted's Employee Onboarding Flow creates hardware-backed enterprise device keys with dual-signed X.509 certificates for employees joining an organization. This flow combines personal identity management with organizational credentialing, resulting in a cryptographically verifiable chain of trust from the employee's hardware device through the organization's Certificate Authority.

Key Security Features:

  • Dual-Signature X.509 Certificates: Co-signed by employee's device key AND organization CA

  • Hardware-Backed Enterprise Keys: Generated in Secure Enclave/StrongBox/TPM (never exported)

  • OIDC Directory Integration: Employee identity validated via company SSO (Okta, Azure AD, etc.)

  • AWS KMS Protected CA: Organization CA private keys encrypted at rest in hardware security modules

  • Managed Data Sync: Automatic synchronization of employee persona and organizational contacts

  • Certificate Lifecycle: 365-day validity with automatic renewal support

Process Overview

Diana (a new employee at Acme Corp) has already authenticated via OIDC (Organization Signup Flow). Now she needs to create an enterprise device key that will be used for all organizational communications and access.

Diana's Perspective (New Employee)

1

Complete OIDC authentication

Diana completes OIDC authentication (Organization Signup Flow).

2

App prompts to create enterprise key

App prompts: "Create enterprise device key for Acme Corp".

3

Hardware generates key pair

Hardware generates new enterprise key pair in Secure Enclave/StrongBox.

4

Create X.509 CSR

App creates X.509 CSR (Certificate Signing Request) with employee info.

5

Device signs CSR

Device signs CSR with device key (first signature).

6

Send CSR to backend

CSR sent to backend with OIDC token for validation.

7

Organization CA signs certificate

Organization CA signs enterprise certificate (second signature).

8

Install certificate in hardware

Certificate installed in hardware with full chain.

9

Managed data syncs

Managed data syncs: Employee persona + organizational contacts auto-sync.

10

Enterprise key active

Enterprise key active: Diana can now use organizational identity.

Backend Perspective (GetTrusted API + Organization CA)

1

Receive enterprise key request

Enterprise key request arrives with OIDC token and device CSR.

2

Validate OIDC token

Validate OIDC token (JWT signature + claims: sub, email, email_verified).

3

Load organization CA key

Load organization CA private key from AWS KMS (encrypted at rest).

4

Extract directory ID

Extract directory ID from OIDC sub claim (e.g., "diana.prince").

5

Create X.509 certificate

Create X.509 certificate with employee subject and public key.

6

Sign certificate with Org CA

Sign certificate with organization CA (second signature).

7

Assemble certificate chain

Assemble certificate chain: [Enterprise Cert, Org CA Cert, Business CA Cert, Root CA].

8

Store certificate metadata

Store in Firestore /enterprise_device_keys/{key_id}.

9

Return signed certificate to device

Return signed certificate to mobile device.

10

Trigger managed data sync

Trigger managed data sync: Fetch employee persona from directory.

Process Flow Diagram

Cryptographic Security

Dual-Signature X.509 Certificate

TBS Certificate Structure:

Dual Signature Structure:

Certificate Chain Validation

Full PKI Hierarchy:

Security Guarantees

  1. Hardware-Backed Enterprise Keys

  • Enterprise private keys never leave Secure Enclave/StrongBox/TPM

  • Key generation happens entirely in hardware security module

  • Private keys cannot be extracted or exported

  1. Dual-Signature Verification

  • TWO independent signatures on same TBS certificate

  • Device signature proves delegation from personal identity

  • Organization CA signature proves organizational authorization

  • Both must be valid for certificate to be trusted

  1. OIDC Directory Integration

  • Employee identity validated via company SSO

  • Directory ID from OIDC sub claim (unique, immutable)

  • Email verification required (email_verified: true)

  • JWT signature verification prevents token tampering

  1. AWS KMS Key Protection

  • Organization CA private keys encrypted at rest

  • Decryption requires IAM authentication

  • Audit logging for all key usage

  • Automatic key rotation supported

  1. Certificate Chain Trust

  • Full PKI validation from device through organization to root

  • Each link in chain cryptographically verified

  • Expired certificates automatically rejected

  • Certificate revocation supported (future enhancement)

  1. Managed Data Security

  • Employee persona data read-only (cannot be tampered)

  • Organizational contacts auto-synced from directory

  • Data freshness guaranteed via periodic sync

  • Access controlled via enterprise key

  1. Production Resilience

  • Automatic retry with exponential backoff (1s, 2s, 4s)

  • 30-second timeout for enterprise key creation

  • Smart error classification (never retry implementation failures)

  • Immediate managed data sync after key creation

Strategic Implications

Enterprise Identity Lifecycle

Before GetTrusted:

With GetTrusted:

Certificate-Based Access Control

Dual-Signature Benefits:

  • Delegation Proof: Device signature proves employee authorized this enterprise key

  • Authorization Proof: Org CA signature proves organization authorized this employee

  • Non-Repudiation: Both parties cryptographically committed to relationship

  • Automatic Revocation: Organization can revoke CA signature without affecting device

Organizational Trust Hierarchy

Trust Levels:

Organizational Trust Grants:

  • Access to organizational shared resources

  • Managed persona and contacts (auto-synced)

  • Enterprise messaging and verification

  • Organizational compliance features

Last updated