top of page

Enrollment

integrity-white.png

In order for a user to be able to use strong authentication, it is preceded by an activation/registration for the user.

 

With Fortified ID Enrollment, a user can do this easily on their own or designated administrators can do this for the user. For example, a support technician can prepare a mobile phone so that it both has the app (e.g. Microsoft Authenticator) installed but also is tied to the user's account.

  • OATH-SW and OATH-HW can be easily activated for Microsoft Authenticator, Google Authenticator, YubiKeys or equivalent.

  • Registration of Passkeys (WebAuthn/Fido2)

  • Fortified ID's own mobile application for strong and secure authentication

BankID
eIDAS
EFOS
Certificate
Skolfederation
Sweden Connect
Sweden Connect
Sambi
SITHS eID
Passkey
Authenticator
OTP
Sambi
Freja
Freja
SITHS eID
Passkey
Authenticator
OTP
Sambi
Sambi

Popular Secure MFA Methods

Our solutions are based on a module-based architecture, which enables a wide range of advantages for automation, monitoring and efficient management. We know these qualities are central abilities both for operations managers and DevOps. This makes it easier to have control over IT environments and, by extension, your digital identities with cost efficiency.

bottom of page