Confirm

Confirm is a complete solution for secure identity verification when users call a helpdesk or support organization. The product is available in two variants, both of which protect against social engineering, identity fraud and incorrect access in sensitive cases.
Confirm offers either one-time code verification or reverse eID verification with BankID, allowing organizations to choose the method that best suits their processes and user groups. Both variants are based on clear consent, a strong connection between
Core features
Why Confirm is needed
-
Prevents unauthorized access and reduces the risk of data leaks
-
Protects against social engineering and role hijacking
-
Ensures proper case management in sensitive support situations
-
Builds trust through transparency and strong authentication
-
Makes verification fast, easy, and integrated into the helpdesk flow
eID as a secure verification method in Confirm
Confirm includes a dedicated flow for reverse eID verification, developed to ensure that the caller is indeed the individual stated. Below is an example with mobile BankID.
1. Support initiates the verification
The employee enters the user's social security number and a verification text to be displayed in the BankID app. The system then sends a BankID request to the correct person.
2. Information and consent
The user is informed that a verification is being initiated and that certain personal information is being shared for the purpose of establishing identity. Consent is required to continue.
3. Authentication in BankID
The person receives a notification in their BankID app, reads the verification text and signs to confirm their identity.
4. Automatic validation in the system
After signing, support receives immediate notification that the person has been authenticated with a valid BankID, along with relevant account data for the case.
5. Proof of possession
To verify that the same individual is on the phone, the user can read out the verification text from their BankID app — a simple but effective proof of possession.
6. Secure and correct case handling
Once the identity is confirmed, support can continue handling without the risk of confusion or fraud attempts.
Popular Secure MFA Methods
Our solutions are based on a module-based architecture, which enables a wide range of advantages for automation, monitoring and efficient management. We know these qualities are central abilities both for operations managers and DevOps. This makes it easier to have control over IT environments and, by extension, your digital identities with cost efficiency.