top of page

Automate

control_white.png

Fortified ID Automation provides the ability to extract data from one or more source systems, change or influence that data, and then update one or more target systems.

An example application is extracting data from an HR system to identify newly registered users. These user objects can then be processed and automatically provisioned to target systems such as Active Directory, Google Workspace, or Microsoft Entra ID.

  • Automate the management of identities and groups

  • Automate group membership

  • Send authentication requests to the Automate API

Automate is a back-end service with a configuration UI for adding pipes that you choose whether they should execute on a schedule or via API calls. Automate does not have a UI for end users, if you are looking for such an application, Fortified ID Forms is the one to look at. A pipe consists of one or more valves where a valve is a configurable component for handling data.

Mentioned below are source systems and target systems. See the Integration tab for which systems Automate can integrate with.
See below for a number of use cases:

Delegated Admins are users outside the main it administrators who are given limited administrative privileges to perform specific tasks within a particular area or department of an organization. This approach is common in large companies, as it allows other users to assist with certain activities while providing a degree of autonomy within their department. It also enhances flexibility and boosts efficiency, particularly when managing access within the prganisation.

BankID
eIDAS
EFOS
Certificate
Skolfederation
Sweden Connect
Sweden Connect
Sambi
SITHS eID
Passkey
Authenticator
OTP
Sambi
Freja
Freja
SITHS eID
Passkey
Authenticator
OTP
Sambi
Sambi

Popular Secure MFA Methods

Our solutions are based on a module-based architecture, which enables a wide range of advantages for automation, monitoring and efficient management. We know these qualities are central abilities both for operations managers and DevOps. This makes it easier to have control over IT environments and, by extension, your digital identities with cost efficiency.

bottom of page