An approach to authentication that allows end-users whose identity and credentials are managed by a third party to access corporate resources. For example, instead of requiring users to create a new username and password to access a particular resource, an organization can allow access by leveraging users' existing social identities such as Facebook, Twitter, LinkedIn, Google, or Amazon.