Group identity tenancy — extend KSA Entra ID vs separate India tenant with B2B federation.it.decisions.d02
P0
G
Summary
Drives every SSO integration and license model. Decision owner (sheet): IT Head + CISO. Sheet target: Wk 2.
Rationale prompt skeleton
Capture the rationale for this decision. Sheet-recorded justification: "Drives every SSO integration and license model.". Reference the evidence questions, name the alternatives considered, and explain how this decision propagates to design, BoM, and operating model.
Default options (2)
extend_ksa_tenant
Extend KSA Entra ID tenant
Single Entra ID tenant rooted in KSA; subsidiaries (incl. India GCC) added as domains/branches.
Pros
Cons
b2b_federation
B2B federation across separate tenants
Each holding/subsidiary keeps its own tenant; cross-tenant guest / B2B trust for shared apps.
Pros
Cons
Default approval chain
AdminExecutiveViewer
Linked evidence questions (3)
| id | prompt | workstream |
|---|---|---|
| it.identity_security.q01 | Identity provider(s) in use across the group — Entra ID (Azure AD), Okta, on-prem AD, Google. Tenant model: one tenant for everything, per-holding, per-subsidiary? | it.identity_security |
| it.identity_security.q02 | Confirm preferred identity model: extend KSA Entra ID tenant to subsidiaries (and to India GCC) vs. B2B federation across separate tenants. Driver: compliance / license / blast radius. | it.identity_security |
| it.gcc_context.q03 | Identity tenancy decision — extend KSA Entra ID to India, or separate India tenant with B2B federation? | it.gcc_context |