top of page

39 results found with an empty search

  • Confirm | Fortified ID

    In order for a user to be able to use strong authentication, it is preceded by an activation/registration for the user. With Fortified ID Enrollment, a user can do this easily on their own or designated administrators can do this for the user. For example, a support technician can prepare a mobile phone so that it both has the app (e.g. Microsoft Authenticator) installed but also is tied to the user's account. > Products > Integrity > Confirm > Confirm Confirm is a complete solution for secure identity verification when users call a helpdesk or support organization. The product is available in two variants, both of which protect against social engineering, identity fraud and incorrect access in sensitive cases. Why Confirm is needed Prevents unauthorized access and reduces the risk of data leaks Protects against social engineering and role hijacking Ensures proper case management in sensitive support situations Builds trust through transparency and strong authentication Makes verification fast, easy, and integrated into the helpdesk flow Overview Get started eID as a secure verification method in Confirm Confirm includes a dedicated flow for reverse eID verification, developed to ensure that the caller is indeed the individual stated. Below is an example with mobile BankID. 1. Support initiates the verification The employee enters the user's social security number and a verification text to be displayed in the BankID app. The system then sends a BankID request to the correct person. 2. Information and consent The user is informed that a verification is being initiated and that certain personal information is being shared for the purpose of establishing identity. Consent is required to continue. 3. Authentication in BankID The person receives a notification in their BankID app, reads the verification text and signs to confirm their identity. 4. Automatic validation in the system After signing, support receives immediate notification that the person has been authenticated with a valid BankID, along with relevant account data for the case. 5. Proof of possession To verify that the same individual is on the phone, the user can read out the verification text from their BankID app — a simple but effective proof of possession. 6. Secure and correct case handling Once the identity is confirmed, support can continue handling without the risk of confusion or fraud attempts. Confirm via verification code Confirm also offers a verification flow with a time-limited one-time code, designed to ensure that the caller is indeed the same individual who is logged into the service. 1. Login The user logs into the service with their username, password or e-ID. 2. Information and consent The service informs the user that personal information will be shared with support in order to enable identification and correct case management. The user must actively approve this before the function can be used. 3. Initiation of verification When contact with support is needed, the user selects the option "Verify me". The system then packages the relevant login data as well as any supplementary information from the customer's own system, such as customer number, case ID or user profile. The information is temporarily stored for use during validation. 4. Generation of verification code The system creates a unique and time-limited code that is displayed to the user on the screen. 5. Code Sharing The user reads the code to the support person on the phone. 6. Code Validation The support person enters the code into their system. Confirm checks that the code is valid, links it to the previously packaged login and customer data, and confirms that the person on the phone is the same logged-in user. 7. Confirmed Identity Once the verification is approved, support can continue the case in a secure and correct manner, with access to the information needed to help the user. Confirm offers either one-time code verification or reverse eID verification with BankID, allowing organizations to choose the method that best suits their processes and user groups. Both variants are based on clear consent, a strong connection between Confirm BankID eIDAS EFOS Certificate Skolfederation Svenska Pass Sweden Connect Sambi SITHS eID Passkey Authenticator eduID Telia Freja eID Freja orgID ID Porten Suomi.fi Authenticator OTP FIDO ADFS Popular Secure MFA Methods Our solutions are based on a module-based architecture, which enables a wide range of advantages for automation, monitoring and efficient management. We know these qualities are central abilities both for operations managers and DevOps. This makes it easier to have control over IT environments and, by extension, your digital identities with cost efficiency.

  • Videos | Fortified ID

    Videos DEMO: Delegerad administration för en butikskedja (Jysta) Patientjournaler i svenska ambulanser Fortified ID Attest Demo - create custom "Request-Approve" workflows Integrity - Enrollment Introduction Control - Automate - Introduction Microsoft Entra External eID login (SAML) Microsoft Entra External eID login (OIDC) Forms Demo - Delegated administration Forms - Demo external workforce Forms - Introduction Management Center - Configuration Management Center - Management Freja orgID onboarding Freja orgID offboarding Integrity - Application Portal Fortified ID Integrity - Enrollment Fortified ID Password Reset DEMO: Fortified ID Password Reset Demo: Fortified ID Password Reset Externa konton del 1 av 7 - Översikt och introduktion Externa konton del 2 av 7 - SKAPA - SJÄLVREGISTRERING Externa konton del 3 av 7 - ÄNDRA - DELEGERAD ADMINISTRATION Externa konton del 4 av 7 - ÄNDRA - SJÄLVADMINISTRATION OCH ANSÖK-GODKÄNN Externa konton del 5 av 7 - AUTENTISERA - & - AUKTORISERA Externa konton del 6 av 7 - AVSLUT-AVAKTIVERING-FÖRLÄNGNING

  • About us | Fortified ID

    Why Fortified ID Fortified ID helps municipalities, authorities, regions and private companies with modern IAM. Protect your organization's applications, for employees, citizens, educational activities, e-services, healthcare personnel, etc. Modern & flexible IAM Domain knowledge & experience Direct dialog Modern dev ops infrastructure Native Entra ID support Service focus About us We at Fortified ID have a background as product developers for Nordic Edge, Intel/McAfee and PhenixID. Fortified ID develops modern products for strong authentication and identity management that are designed for the new requirements that our customers face today. Our solutions are built with modern operations in mind, a solution that delivers what those responsible for IT operations demand (Dev-ops). It should be easy to manage, automate, update and monitor our products regardless of size of the implementation. We have long acted as advisors for many large organizations in the areas of strong authentication, identity management and electronic snignature.

  • Integrity | Fortified ID

    Med Integrity från Fortified ID skapar vi nya möjligheter för din organisation att hantera alla typer av inloggning, behörighetsstyrning samt single sign-on. Strong authentication & authorization control With Integrity from Fortified ID, we create new capability for your organization to manage all types of login, authorization control and single sign-on. Good user-experience must include both authentication and authorization. Our idea is to achieve safe identities for organization while making it easy for their users and the administrators. Methods Architecture Single Sign-On Simplify login for your users with Single Sign-On (SSO) while maintaining secure access to applications and data. Fortified ID has extensive experience in integration of applications and services to a central point of entry. Integrations are made via SAML, OpenID Connect, Radius or via our own API. The solution also enables: ID mapping. A user is called jdoe in one application but john. doe@fortified.se in another, we handle that type of mapping with abilities in Integrity. Ticket translation. Your organization has end-user applications that support e.g. OpenID Connect at the same time you want to give them access with e.g. a SAML federation. Here a translation will have to take place between the technicians, we solve that with Integrity. Single Sign-On Application portal Portal is a web-based application that contains all the applications that have been assigned to you. The purpose is that you should not have to remember addresses for the various applications you use in your everyday life. For example, if you have newly hired employees or contractors, you can easily give them a place to go (Fortified ID Portal) to find all the applications assigned to them. Fortified ID Portal supports Single Sign-On (SSO) for the published apps. The advantage of SSO is that after logging into the Fortified ID Portal, the user is automatically logged into the application they click on. Support is also available to add extended login if an app requires higher security than Portal. Look and feel of the portal can be easily adapted to the organization's preferences regarding colors, logo and language. The solution is made to run on the web as well as on mobile devices. See Movie With Fortified ID Enrollment, you can easily provide strong authentication for your users. There are different ways to provide your users with strong authentication, such as Passkeys, YubiKeys, generate one-time passwords (OTP/MFA) with mobile app or certificate-based login. In order for a user to be able to receive strong authentication, their account must be mapped to one of the methods above. This is called enrollment or registration. With Fortified ID Enrollment, a user can do this easily on their own or designated users can do this for other users. For example. can a support technician prepare a mobile so that it both has the app (e.g. Microsoft Authenticator) installed but also linked to the user's account. Enrollment API gateway Fortified ID modernizes IAM for organizations by adding an API gateway. This creates conditions for supporting organizations in several scenarios. Integrity's API gateway can: act as a bridge for data exchange and data formatting, Cloud-to-cloud and cloud-to-native. e.g. enrichment of Custom Claims Provider in Azure act as backend support in a variety of applications, e.g. identity administration, outsourced configuration, self-registration, account sync, merge and enrich data from many different information sources. support ADFS MFA providers from Fortified ID. Can be run on-premise or in cloud (for example, for service delivery to multiple customers) Previously, Integrity from Fortified ID can solve strong authentication, single sign-on and an application portal. Of course, adapted for modern (DevOps) operation with option for container delivery, monitoring and traceability. IdP Broker / Proxy The number of Identity Providers (IdP's) continues to increase and there is a large variation in what types of use cases that these can implement. In addition to delivering a full-scale IdP, Fortified ID Integrity can act as a broker/proxy and thereby deliver functionality and meet requirements that existing solutions cannot meet for various reasons. Do you have an IdP that cannot be connected to a certain federation due to connection rules? Fortified ID Integrity is compatible with many federations such as Sweden Connect, Skolfederation, SAMBI, SWAMID, eIDAS. Fortified ID offers two options: You replace your existing IdP with Fortified ID Integrity that meets all connection requirements. You keep your existing IdP but let Fortified ID Integrity act as Proxy/Broker. which becomes an intermediary between your existing IdP and your federations, in a way that you can easily fulfill all connection requirements. The threat landscape is constantly changing, which places new types of demands on a modern authentication solution with streamlined and cost-effective administration. With this rapidly changing reality, software needs to be kept up-to-date with more frequency than in the past to ensure reliability. With automated installation and upgrading, the system can be kept up to date with minimal downtime. The solution can be installed locally, in the cloud or as a hybrid solution. The ability to easily move the solution between test and production environments has been made extremely easy. Read more about automation in our technical documentation. Möjligheten att enkelt flytta lösningen mellan test och produktionsmiljöer har gjorts extremt enkel. Läs mer om automation i vår tekniska dokumentation. Automation Tech spec Integrity is designed with architecture that uses modern ways to install and upgrade the product. This also creates new possibilities for monitoring and analyzing how all parts of the system performs. Read more in our technical documentation. Download PDF Authentication methods BankID EFOS SITHS eID Skolfederation Passkey Suomi.fi Freja OrgID SAML Broker NetID OTP Azure ID-porten Freja eID Plus X.509 Certificate SITHS SWAMID Google FIN eID smart card eIDAS Svenska pass Sambi Telia eID ADFS Common smart card Monitoring Fortified ID's solutions are designed to offer real-time monitoring of how system resources are performing. This can apply to everything from individual secure methods or connections to applications or databases. Real-time monitoring provides good overview and creates the foundation for informed decisions. Read more about monitoring in our technical documentation. Logging Integrity from Fortified ID is also delivered with structured logging 􏰂CEF􏰃 intended to easily feed a SIEM system. Logging & analysis can be tailoried, whether they include reporting on who did what and when or as a basis for usage/invoicing. Monitoring & Logging Fortified ID Mobile Fortified ID Mobile is a free app that lets you log in without having to use a password – you can instead scan a QR code, use your fingerprint, face recognition or a PIN code. Fortified ID Mobile can be used in three ways: as a way to securely authenticate you if you have forgotten your password. See Fortified ID Password Reset for forgotten password. as a login method every time, with a one-time code to increase the security of your account. This is called two-step verification or multi-factor authentication. See Fortified ID Access for login and authorization management. as the only login method, where you only need to scan a QR code or approve the login via a button press on your phone. This is called passwordless login. Next gen software delivery Our solutions are based on a module-based architecture, which enables a wide range of advantages for automation, monitoring and efficient management. We know these qualities are central abilities both for operations managers and DevOps. This makes it easier to have control over IT environments and, by extension, your digital identities with cost efficiency. Tech spec ACCESS API RADIUS Strong authentication SAML OIDC ADFS CUSTOM OATH Single Sign-On Container Monitoring Automation Rapid deployment SIEM ready Configuration as code Standards SAML 2.0 OAUTH ADFS Sambi Open ID Connect FIDO2 Fortified ID API Sweden Connect Functions Container Monitoring Custom branding Redundancy HTTP/2 Asynchronous WCAG / accessibility Sweden Connect (LOA 4) Rolling upgrades Rapid deployment Custom UI HSM Shared sessions SIEM ready Configuration as code Installation Docker Linux GCP Windows Azure AWS Integrations Google Azure VMware Remote desktop Cambio Oracle Oracle Citrix Skolfederation Exchange Wordpress IST Sambi Sambi ServiceNow Office 365 Tieto Education Visma Zoom TDialog TDialog AWS Dropbox Box Aweria Nginx Apache Apache Contact us First name* Surname* E-mail* Phone Message Send Sambi Sweden Connect OTP Skolfederation Authenticator Certificate Passkey EFOS SITHS eID eIDAS Freja BankID Our solutions are based on a module-based architecture, which enables a wide range of advantages for automation, monitoring and efficient management. We know these qualities are central abilities both for operations managers and DevOps. This makes it easier to have control over IT environments and, by extension, your digital identities with cost efficiency. Popular Secure MFA Methods Government Healthcare Municipalities Private org With Fortified ID RADIUS server, you can easily provide strong authentication and authorization for remote users to access your network. It receives authentication requests from RADIUS clients, such as routers, firewalls, or VPNs, verifies the user's credentials, and returns an authorization decision to the client. Radius

  • Training | Fortified ID

    Training Knowledge in digital identity is central to succeed with your digitalization journey. Fortified ID offers a range of different training courses in digital identity that strengthen your organisations level of competence. Most courses are product independent and cover standards and best practices. Fortified ID's training provides your organization with knowledge in secure login, federation, identity management, decentralized identity and much more. Time: 9 - 16 - Location: Online - Free of charge Target Audience IT personnel with various roles such as architects, technical sales/presales, consultants, support engineers or system administrators. Knowledge prerequisites No prerequisites. Training content What is the purpose of Integrity Different use case and scenarios Overview of system requirements, installation, operation and management Overview of configuration TBD Fortified ID Integrity Introduktion Technical Overview - 3 hours Time: 9 - 12 - Location: Online - 4000 SEK Target Audience IT personnel with various roles such as architects, technical sales/presales, consultants, support engineers or system administrators. Knowledge prerequisites Fortified ID Integrity Administration and Configuration Training content Overview Data model Troubleshooting TBD Fortified ID Integrity Data Model and Troubleshooting - 3 hours Time: 9 - 16 - Location: Online - 8000 SEK What is Identity Federation? How does it work, and why should your enterprise care? The class is both theoretical and practical. Target Audience IT personnel with various roles such as architects, technical presales, consultants, support engineers or system administrators. Knowledge prerequisites Basic knowledge in the areas of HTTP. Training content Why Identity Federation? Use case examples of implementation of SAML, Federation and SSO Fundamentals of SAML 2.0 Single Sign-On (SSO) Architecture Messages with Encryption and Digital Signatures Debugging SAML Issues with Google Chrome and SAML-tracer Fundamentals of URL and Base64 Encoding, Cryptographic Hashing, RSA Encryption and Digital Signing SAML compared with WS-Trust, OAuth 2.0, and OpenID Connect. TBD Master Identity Federation SAML - 1 day Time: 8:30 - 12 - Location: Online - 4000 SEK Target Audience IT personnel with various roles such as architects, technical presales, consultants, support engineers or system administrators. Knowledge prerequisites Basic knowledge in the areas of HTTP. Training content Why Decentralized Identity? What is Verifiable Credentials? Use case examples EU Digital Identity Wallet (EUDI Wallet) Fundamentals of Verifiable Credentials Architecture Basic PKI functions, encryption and signatures Basic blockchain technology overview Fundamentals of Decentralized identifiers (DIDs), issuers, verifiers, holders and wallets Practical examples Debugging Personal reflections TBD Master Identity Wallets and Decentralized Identity Choose training* First name Surname E-mail* Company name* I hereby agree that Fortified ID may use the information above to be able to perform the services that the company offers. * Submit Time: 9 - 16 - Location: Online - 8000 SEK Target Audience IT personnel with various roles such as architects, technical sales/presales, consultants, support engineers or system administrators. Knowledge prerequisites Fortified ID Integrity Introduction - Technical Overview - 3 hours Good knowledge in the areas of LDAP, HTTP and federation. Training content Installation Configuration Data model Integrity Portal Integrity Web Infrastructure Integrity Enrollment (extra) Control - Password Reset (extra) Integrity RADIUS (extra) TBD Fortified ID Integrity Administration and Configuration - 1 day Registration

  • Freja orgID | Fortified ID

    On / off-boarding of Freja eID / orgID Freja eID / OrgID With Fortified ID's Freja OrgID packaging, you and your organization can easily: Authenticate users with a Freja OrgID Onboarding and offboarding of Freja OrgID. We offer three ways for onboarding: Self-administration, delegated by another user or automated Freja eID / OrgID Supply Support for all DIGG approved LOA2 and LOA3 methods. The school principal can choose which, or which, methods teachers and school staff should be able to choose. Dealer of BankID and Freja eID & OrgID. Flexibility With flexible configuration options, Fortified ID Integrity can both signal trust according to requirements and control when step-up authentication is required, based on incoming information in an authentication request, attributes from existing idp, etc. Fortified ID generates unique eppn for the school's teachers and students, which are stored in the organization's directory (eg AD, Google, Entra). Competence Our experts have extensive experience with federations both at national and international level, login methods and authentication levels. Fortified ID is always there as support to ensure a good and quality delivery. Architecture In the cloud or on-premise. Since the solution does not require communication with user directories, it can be run in the cloud. It is also possible to install it locally, i.e. on-premise. Book a meeting Global Accessibility with Freja Citizens from 167 countries around the world can register in Freja with their biometric passport. This means that both: People who live in Sweden but are not Swedish citizens People who live outside of Sweden can use Freja for secure digital identification. For companies that need to interact with a global target group, Freja is the only e-identification in Sweden that makes this possible – and opens the door to hundreds of millions of potential users worldwide. Book a meeting

  • Inera Reference Architecture | Fortified ID

    As the digitalization of healthcare accelerates, it is more important than ever that the solutions we build actually fit in. That is why we at Fortified ID are particularly proud of how our products harmonize with Inera’s reference architecture. The platform offers support that Regions are influenced by current standardized protocols, enabling interoperability, secure authentication, and delegated access. Link between Fortified ID and Inera's technical regulations, collaboration and function Inera Reference Architecture As the digitalization of healthcare accelerates, it is more important than ever that the solutions we build actually fit in. That is why we at Fortified ID are particularly proud of how our products harmonize with Inera’s reference architecture. The platform offers support that Regions are influenced by current standardized protocols, enabling interoperability, secure authentication, and delegated access. By following established frameworks and implementing effective provisioning methods, Fortified ID ensures a unified and reliable identity infrastructure that meets the requirements for both security and flexibility. Fortified ID and Ineras Reference Architecture Link between Fortified ID and the interaction and function of the Reference Architecture Identity Provider (IdP) Fortified ID offers robust IdP services that enable user authentication and the generation of secure identity certificates. The solutions support multiple authentication methods and protocols, ensuring interoperability and ease of use. This includes support for single sign-on (SSO) and authentication context management, which is in line with the requirements of the reference architecture. Certificate Issuance and Brokering Fortified ID’s platform enables the issuance of both identity and access certificates, with support for both front-channel and back-channel communication. Certificates are digitally signed and can be tailored to specific attributes according to the principle of data minimization, which meets the security requirements of the architecture. Identity Data Warehouse Fortified ID provides a consolidated data warehouse solution, following the “identity fabric” pattern, ensuring quality-assured identity information. The solution supports attribute-based authorization evaluation and can integrate data from multiple sources, including HR systems and credential registers, which is central to creating a unified user profile. Provisioning Service By automating the provisioning of identity data, Fortified ID helps organizations manage the identity lifecycle efficiently. The solution supports both push and pull provisioning patterns and is compatible with standard protocols such as SCIM. E-Certificate Issuer Fortified ID is only involved in the issuance of Fortified ID Mobile. In other cases, existing e-credentials, such as SITHS or BankID, are used. The solution meets high trust requirements and offers support for multi-factor authentication. Access Certificate Service Fortified ID issues and manages access certificates that enable fine-tuned access control based on policies and attributes. Access certificates are seamlessly integrated into e-services to meet security and authorization requirements. API Security Service Fortified ID's API security solutions provide system-level authentication and authorization, facilitating secure communication between systems. The solution includes support for tokens and encrypted connections according to modern standards. System Authentication and Authorization The platform enables secure authentication and authorization between systems through standardized protocols and token management. This includes support for delegation and verification of access rights. Delegated access from users Fortified ID implements delegated access solutions, which enable users to transfer access rights securely and efficiently, including across organizational boundaries. This supports multiple interaction patterns such as certificate exchange and re-authentication. Identity and Credential Federation Fortified ID's federation solutions ensure interoperability between different organizations and services through standardized trust frameworks and attribute exchange. They enable efficient collaboration through secure and reliable processes. Governance Service Fortified ID’s rule management is flexible and scalable, enabling you to implement and interpret rules in a machine-readable manner. The services support granular and dynamic access control rules. Access Governance and Compliance Support Services Fortified ID offers comprehensive governance and compliance support services, including logging and reporting to ensure compliance and access is properly regulated. Link between Fortified ID and the Reference Architecture Technical Regulations Technical Protocol and Format Breakdown Fortified ID provides support for modern technical protocols and formats required for authentication, federated login, and delegated access. The platform uses JSON Web Tokens (JWT) and other standardized certificate types, ensuring interoperability and secure management of identity and access data according to the recommendations in the reference architecture. Recommended protocols by capability Fortified ID implements the recommended protocols for federated login, SSO, and delegated access, such as SAML2, OpenID Connect, and OAuth 2.0. This alignment enables interoperability with e-services and supports different technical platforms in parallel. Fortified ID also focuses on providing support for both new and existing protocols, such as SAML2, which facilitates integration with existing systems. Protocols for Federated Login and SSO Fortified ID's solutions implement both OpenID Connect and SAML 2.0 for federated login and SSO. The services support authentication context and secure authentication request management, which follows the specific requirements listed in the reference architecture. The solutions also provide logout management capabilities in a manner that aligns with recommended standards. Delegated Access Protocols Fortified ID uses OAuth 2.0 as the primary protocol for delegated access, including flows such as Authorization Code. This enables secure access management between users and systems, as well as between different systems, addressing the needs highlighted in the architecture. Authentication Protocols Fortified ID solutions support modern authentication protocols, including Mutual-TLS with x.509 certificates and FIDO2. These protocols offer strong security through asymmetric encryption and support for multi-factor authentication, meeting the requirements for robust authentication for both users and systems. Technical Frameworks for Federation Fortified ID follows frameworks such as SAMBI, Sweden Connect, Verifiable credentials and OpenID Connect Federation to ensure interoperability and secure management of metadata between different identity providers and services. This supports trust frameworks and standards for federation, which is a key component of the reference architecture. Technical Frameworks for Provisioning The platform includes support for the SCIM protocol for efficient provisioning of identity data. This ensures that user information can be provided to systems and e-services in a standardized and quality-assured manner, which meets the recommendations in the architecture. PDF Book a meeting

  • FAQ | Fortified ID

    FAQ om Fortified ID – svar om digital identitet, IAM, IdP, e-legitimation, LoA 2–4, SITHS, IGA och digital tillit för offentlig och privat sektor. !

  • DNP | Fortified ID

    Fortified ID Integrity solves the challenges of Digital National Exams Digital National Examination (DNP) This page describes how Fortified ID Integrity can be used to meet the requirements for authentication against the Digital National Exam (DNP), via the School Federation. Many of the principals today use Microsoft Entra, Microsoft ADFS or Google as IdP. The challenge with these IdPs is that they do not support Swedish methods that may be required for a service! DNP Guide Book a meeting Read PDF DNP Demo Benefits Supply Support for all DIGG approved LOA2 and LOA3 methods. The school principal can choose which, or which, methods teachers and school staff should be able to choose. Dealer of BankID and Freja eID & OrgID. Flexibility With flexible configuration options, Fortified ID Integrity can both signal trust according to requirements and control when step-up authentication is required, based on incoming information in an authentication request, attributes from existing idp, etc. Fortified ID generates unique eppn for the school's teachers and students, which are stored in the organization's directory (eg AD, Google, Entra). Competence Our experts have extensive experience with federations both at national and international level, login methods and authentication levels. Fortified ID is always there as support to ensure a good and quality delivery. Architecture In the cloud or on-premise. Since the solution does not require communication with user directories, it can be run in the cloud. It is also possible to install it locally, i.e. on-premise. Book a meeting

  • Forms | Fortified ID

    Fortified ID Forms is an application for digitizing process flows. Examples can be creating users (e.g. employees, consultants, partners), editing users or listing "my users" or "my groups". With Forms you get access to a tool to create web-based flows to delegate the administration to the users responsible for certain information in a simple way. > Products > Control > Forms > Forms Fortified ID Forms is an application for digitizing process flows. Examples can be creating users (e.g. employees, consultants, partners), editing users or listing "my users" or "my groups". With Forms you get access to a tool to create web-based flows to delegate the administration to the users responsible for certain information in a simple way. With Forms, you can also build self-service flows and self-registration of users. In case of self-registration, a user proves himself with e.g. BankID where information is extracted and used to allow the user to create their own account. INTRO DEMO EXTERNAL USERS DEMO DELEGATED ADMIN Overview Use cases Get started Supplement Entra ID / Google with authentication with eLeg If your IdP does not support eLeg (BankID, Freja or Foreign ID, SITHS, EFOS), Fortified ID Access can easily be used as a complement to solve this. Read more CIAM Simple and smooth customer identity management (CIAM) Read more Create added value with the future of identity and access management! Increased digitalization in society also reinforces the importance of IAM. Read more Customer IAM (CIAM) for the public sector Self-registration, authorization management, and strengthened authentication Read more External accounts Choosing the right external account management tool is crucial to maintaining control and compliance, as well as creating a smooth and secure experience for users. Read more Sometimes, company admins may want power users, team managers, or even external users to handle administrative tasks for a specific team or a subset of users within the organization. Granting full administrative permissions to these users isn’t the best practice or ideal approach—this is where the Delegated Administration feature comes in. What are Delegated Admins? Delegated Admins are users outside the main it administrators who are given limited administrative privileges to perform specific tasks within a particular area or department of an organization. This approach is common in large companies, as it allows other users to assist with certain activities while providing a degree of autonomy within their department. It also enhances flexibility and boosts efficiency, particularly when managing access within the prganisation. What Can a Delegated Admin Do? Before implementing delegated administration, it’s crucial to clearly define what tasks the users with this access will be able to perform. As an IT administrator, you have full control over the system, but with delegated admins, you can selectively assign specific tasks they can assist with. Additionally, keep in mind that certain permissions—such as modifying permission sets, customizing standard objects, or editing page layouts—cannot be granted through this functionality and should remain the responsibility of the IT administrator. Platform Fortified ID Forms is available on multiple platforms. Windows, Linux, or Container (Docker) Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP) As a service through our partners. Contact us for more information. Contact us Contact us at info@fortifiedid.se or fill out our web form here: Contact us BankID eIDAS EFOS Certificate Skolfederation Sweden Connect Sweden Connect Sambi SITHS eID Passkey Authenticator OTP Sambi Freja Freja SITHS eID Passkey Authenticator OTP Sambi Sambi Popular Secure MFA Methods Our solutions are based on a module-based architecture, which enables a wide range of advantages for automation, monitoring and efficient management. We know these qualities are central abilities both for operations managers and DevOps. This makes it easier to have control over IT environments and, by extension, your digital identities with cost efficiency.

  • Products | Fortified ID

    Contact us First name* Surname* E-mail* Phone Message Send Read more Signing from Fortified ID meets the organization's need to apply legally binding signatures in a fast, secure and efficient manner. Read more APPLICATIONS: Access (MFA / SSO) Portal Enrollment Radius Handle all types of secure login including MFA and eID. Single sign-on portal with an agile IdP that can handle SAML, OIDC and ADFS. Control from Fortified ID is a solution that focuses on the secure and efficient management of digital identities and their permissions. The solution helps to simplify and automate processes for managing user permissions, role-based access, group memberships, onboarding/offboarding, and more. Read more APPLICATIONS: Forms Automate Attest Password reset Fortified ID ADCS REST Extensions enable organizations using Microsoft Active Directory Certificate Services to get more value from their existing certificate infrastructure. Read more Management Center is an independent service from Fortified ID that enables easy installation, upgrade, configuration and monitoring of all Fortified ID products. Read more Energy company Fortified ID protects a Swedish energy company's login for both internal and external users. Customers can securely authenticate to my pages with Bank ID and employees can choose from several different MFA methods. Read Use Case Energy company Fortified ID protects a Swedish energy company's login for both internal and external users. Customers can securely authenticate to my pages with Bank ID and employees can choose from several different MFA methods. Read Use Case Energy company Fortified ID protects a Swedish energy company's login for both internal and external users. Customers can securely authenticate to my pages with Bank ID and employees can choose from several different MFA methods. Read Use Case Finance company ...använder Fortified ID för att låta sina kunder ansluta säkert med BankID. Explore Swedish Healthcare Swedish Region uses solutions from Fortified ID to resolve SITHS as a secure login method against ADFS. The solution integrates with existing infrastructure and complements where existing solutions are not sufficient. Read use case

  • ADCS REST Extensions | Fortified ID

    ADCS REST Extensions Fortified ID ADCS REST Extensions gives organizations using Microsoft Active Directory Certificate Services the ability to get more value from their existing certificate infrastructure. Book meeting Download PDF Popular use cases with Fortified ID's customers are to use the organization's CA for: electronic signatures of PDF documents and transactions activation of certificate-based mobile apps certificate-based login with smart cards or yubikeys (FIDO2) activation of certificates for protection of devices activation of certificates to link an identity to a device (BYOD) Fortified ID ADCS Rest extension gives organizations the ability to: issuance of certificates in real time simple and smooth connection of the product to existing solution expand the number of services that can use the certificates Use cases Microsoft provides a Certificate Authority (CA) for Windows called Active Directory Certificate Services (ADCS). ADCS is common in Swedish companies. Fortified ID ADCS REST Extensions enables a more dynamic issuance of certificates from ADCS via API calls. The APIs that ADCS offers are asynchronous and time-dependent, which means that services with real-time requirements (e.g. electronic signatures or activation of mobile apps) cannot consume these APIs. ADCS API Book meeting Contact us First name* Surname* E-mail* Phone Message Send

  • Management Center | Fortified ID

    Management Center är en självständig tjänst från Fortified ID som möjliggör enkel installation, uppgradering, konfiguration och övervakning av samtliga Fortified ID-produkter. > Products > Management Center > Management Center is an independent service from Fortified ID that provides easy installation, upgrade, configuration and monitoring of all Fortified ID products. Overview Screen dumps Get started All communication with underlying products is done via standards-based APIs, which provides several benefits: Small footprint – The products are delivered without configuration UI, configuration is done via Management Center. Independent updates – Management Center can be updated without affecting the underlying products. Optimized performance – Underlying products remain focused on their core tasks without unnecessary administrative overhead. Centralized administration – Management Center handles all Fortified ID products, providing a consistent user experience. Versioned configuration – With 'snapshot' functionality, configurations can be easily version-controlled. Flexible availability – The Management Center can be disabled without affecting the underlying products. With Management Center you get a clear overview and easy management of an installed product. Monitoring Log management Upgrades Management The Management Center provides a clear overview and makes it easy to change an existing configuration. With snapshot support, configuration versions can be easily managed. All products have a unified interface that makes it easy to manage the different products from Fortified ID. Configuration Platform Fortified ID Management Center is available on multiple platforms. Windows, Linux, or Container (Docker) Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP) As a service through our partners. Contact us for more information. Contact us Contact us at info@fortifiedid.se or fill out our web form here: Contact us

  • Control | Fortified ID

    Control från Fortified ID är en lösning som fokuserar på säker och effektiv hantering av digitala identiteter och dess behörigheter. Lösningen hjälper till att förenkla och automatisera processer för att hantera användarbehörigheter, rollbaserad åtkomst, grupptillhörigheter, on-boarding/off-boarding med mera. Modern Identity Management Control from Fortified ID is a solution that focuses on secure and efficient management of digital identities and their permissions. The solution helps simplify and automate processes for managing user permissions, role-based access, group memberships, on-boarding/off-boarding and more. This provides more efficient and cost-saving management of the organization's processes for identity management, without compromising on security. Forms Automate Attest Password reset Password reset Attest Automate Forms With the various functions of Control from Fortified ID, the organization can simplify and ensure that the right user has access to the right system and data, while providing better control and overview when reporting. Identity lifecycle control Government Healthcare Municipalities Private org Forms is an application for digitizing process flows. Examples can be creating users (e.g. employees, consultants, partners), editing users or listing "my users" or "my groups". With Forms you get access to a tool to create web-based flows to delegate the administration to the users responsible for certain information in a simple way. With Forms, you can also build self-service flows and self-registration of users. In case of self-registration, a user proves himself with e.g. BankID where information is extracted and used to allow the user to create their own account. Forms Movie Automation provides the ability to read data from one or more systems, change or influence the data and then write it to one or more source systems. Examples could be reading data from an HR system and looking for newly created users, reading in these users and creating them in, for example, Active Directory, Google or Microsoft Entra ID. All without the influence of an administration or user. Automation Attest adds for Forms and Automation the ability to bring in approval flows. Instead of a user being created/changed directly, one or more users must approve this change. An example could be requesting access to a group that protects a resource where, for example, a group administrator/owner must approve who gets access to the resource. The solution can be installed locally, in the cloud or as a hybrid solution. The ability to easily move the solution between test and production environments has been made extremely easy. Read more about automation in our technical documentation. Attest Password Reset from Fortified ID simplifies the handling of secure password reset for all organizations. Users can easily and securely create a new password through self-service without having to contact their employer's IT support. Your organization becomes more efficient as the time that the end user does not have access can be significantly shortened. In addition, IT personnel can also devote themselves to more constructive and proactive work. On behalf of Password Reset from Fortified ID has a function to delegate password reset to another user, we call it password reset "on behalf of". It can be a manager, service desk, teacher or other selected function. Password Reset Read more Tech spec Control is designed with architecture that uses modern ways to install and upgrade the product. Read more in our technical documentation. Integrationer Google Azure Installation Docker Linux ODBS/JDBC GCP Entra ID LDAP Windows Azure SQL Server AWS Next gen software delivery Our solutions are based on a module-based architecture, which enables a wide range of advantages for automation, monitoring and efficient management. We know these qualities are central abilities both for operations managers and DevOps. This makes it easier to have control over IT environments and, by extension, your digital identities with cost efficiency. Tech spec Onboarding Workflow IGA Automate Attest Container Monitoring Automation Rapid deployment SIEM ready Configuration as code Forms Delegated admin IDM ∞ Contact us First name* Surname* E-mail* Phone Message Send

  • Signing | Fortified ID

    Signing Signing from Fortified ID is a secure and robust solution for signing data electronically. Signing from Fortified ID meets the organization's need to apply legally binding signatures in a fast, secure and efficient way. With Signing, users can sign documents electronically through e-identifications such as BankID or Freja eID, which ensures both reliability and simplicity in the signing process. Book meeting A stand-alone signature service is a central sub-component of Fortified ID Signing. Here, e-identification is used as a tool for the user to be able to securely express his intention to sign a specific document or transaction. When the user initiates the signing process, the actual creation of the e-signature takes place within the stand-alone signature service, ensuring that the signing process is separate from the original application that the user interacts with. Use cases Standards such as XAdES, PAdES and SAML are used to ensure compatibility with different systems and legal requirements. By adhering to these established standards, the application can be integrated with a wide range of e-ID solutions and service providers, enabling users to sign documents and transactions in a secure and legally binding manner, regardless of the e-ID they use. Built on standards Book meeting Popular use cases with Fortified ID's customers are to use the organization's CA for: electronic signatures of PDF documents and transactions activation of certificate-based mobile apps certificate-based login with smart cards or yubikeys (FIDO2) activation of certificates for protection of devices activation of certificates to link an identity to a device (BYOD) Fortified ID ADCS Rest extension gives organizations the ability to: issuance of certificates in real time simple and smooth connection of the product to existing solution expand the number of services that can use the certificates Use cases Contact us First name* Surname* E-mail* Phone Message Send Centralized signature hub Signing from Fortified ID acts as a central signature hub for the organization, facilitating the integration, tracking and administration of electronic signatures. The solution can be implemented on-premise, in the cloud or as a hybrid solution, which provides flexibility in use and operation. Each service integrated with Sign can be customized with unique settings, such as which signature methods should be available to users.

  • Portal | Fortified ID

    Fortified ID Portal ger användare en tydlig översikt över de applikationer och tjänster de har tillgång till. Tilldelning av applikation kan enkelt styras baserat på roll, grupp eller andra definierade egenskaper. > Products > Integrity > Portal > Portal Fortified ID Access is a secure and flexible authentication platform. With ready-to-use authentication methods, you can create a secure and user-friendly login experience for your workforce, external accounts, and customers to your organization's applications and services. Overview Use cases Get started Norwegian BankID Norwegian BankID or the ID port for conditional access (Conditional Access) to resources in Entra ID Read more Complement ServiceNow with eLeg authentication If your IdP does not support eLeg (BankID, Freja or Foreign ID, SITHS, EFOS), Fortified ID Access can easily be used as a complement to solve this. Read more Supplement Entra ID / Google with authentication with eLeg If your IdP does not support eLeg (BankID, Freja or Foreign ID, SITHS, EFOS), Fortified ID Access can easily be used as a complement to solve this. Read more CIAM Simple and smooth customer identity management (CIAM) Read more IdP Broker / Proxy Fortified ID Integrity is compatible with many federations such as Sweden Connect, Skolfederation, SAMBI, SWAMID, eIDAS. Read more Digital National Exams (DNP) Connect your applications and services to Fortified ID Access for authentication, authorization, and single-sign on (SSO) Read more Act as SAML IdP or OIDC OP Connect your applications and services to Fortified ID Access for authentication, authorization, and single-sign on (SSO) Read more Portal is a web-based application that contains all the programs that have been assigned to you. The purpose is that you should not have to remember addresses to the different applications that you use in your everyday life. For example, if you have newly hired or hired staff, you can easily give them one place to go (Fortified ID Portal) to find all the applications that have been assigned to them. Fortified ID Portal supports Single Sign-On (SSO) for the apps that are published. The advantage of SSO is that after logging in to Fortified ID Portal, the user is automatically logged in to the application they click on. There is also support for adding extended login if an app requires higher security than Portal. Easily adapt to your organization's graphic profile. Use your own background image, logo, favicon and theme colors. Support for custom graphics Strong Authentication Securely access your applications with a single set of authentication methods. Reduce the number of times a user needs to authenticate as Single Sign-On (SSO) support is included. Single Sign-On (SSO) Platform Fortified ID Access is available on multiple platforms. Windows, Linux, or Container (Docker) Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP) As a service through our partners. Contact us for more information. Contact us Contact us at info@fortifiedid.se or fill out our web form here: Contact us BankID eIDAS EFOS Certificate Skolfederation Sweden Connect Sweden Connect Sambi SITHS eID Passkey Authenticator OTP Sambi Freja Freja SITHS eID Passkey Authenticator OTP Sambi Sambi Popular Secure MFA Methods Our solutions are based on a module-based architecture, which enables a wide range of advantages for automation, monitoring and efficient management. We know these qualities are central abilities both for operations managers and DevOps. This makes it easier to have control over IT environments and, by extension, your digital identities with cost efficiency.

  • BankID | Fortified ID

    Smooth integration with BankID to all applications BankID Protect logins to internal resources, my pages, supplier portals or similar with BankID. Issuance of BankID is handled outside the organization BankID is a method most people use privately Requires minimal administration in the organization Standardized integration Fortified ID is a reseller of BankID certificates needed to give users the ability to use BankID as a login method. BankID login available to everyone with Fortified ID From July 2025, new legal requirements on digital accessibility will also apply to the private sector. Is your BankID solution ready? Accessibility is no longer a choice – it is a requirement. With the new law on accessibility to digital services, companies must comply with standards such as WCAG 2.1 level AA and EN 301 549. An important part that is affected is the login flow with BankID, especially when QR codes are used between devices. Common challenges with BankID QR codes For people with; impaired vision, motor disabilities, cognitive difficulties or digital inexperience, the moving QR code in the BankID flow can be difficult to perceive and scan in time. Short display time, unclear placement and lack of assistive technology support create obstacles – and thus accessibility deficiencies. Fortified ID solves the problem We help you: Implement accessible display of BankID's QR code Ensure that your flows comply with WCAG 2.1 level AA Meet the requirements of EN 301 549 Make it easier for all users to identify themselves - regardless of their circumstances We offer compatible components, consulting and technical implementation that allow you to quickly and smoothly meet legal requirements - without compromising user experience or security. Read more on bankid.com Book a meeting BankID for business The MFA methods, BankID, are something many organizations want to use to a greater extent, also for their employees: Many users already have a BankID and know how it works The issuance of BankID is handled by another party. Cost savings. However, many organizations are hesitant to implement it, as many users are unwilling to use their “private” e-Legitimate in the service. Fortified ID's solution “BankID for civil servants” can help you! BankID for Business - PDF (SWE) Book a meeting

  • Enrollment | Fortified ID

    In order for a user to be able to use strong authentication, it is preceded by an activation/registration for the user. With Fortified ID Enrollment, a user can do this easily on their own or designated administrators can do this for the user. For example, a support technician can prepare a mobile phone so that it both has the app (e.g. Microsoft Authenticator) installed but also is tied to the user's account. > Products > Integrity > Enrollment > Enrollment In order for a user to be able to use strong authentication, it is preceded by an activation/registration for the user. With Fortified ID Enrollment, a user can do this easily on their own or designated administrators can do this for the user. For example, a support technician can prepare a mobile phone so that it both has the app (e.g. Microsoft Authenticator) installed but also is tied to the user's account. Overview Get started OATH-SW and OATH-HW can be easily activated for Microsoft Authenticator, Google Authenticator, YubiKeys or equivalent. Registration of Passkeys (WebAuthn/Fido2) Fortified ID's own mobile application for strong and secure authentication Platform Fortified ID Enrollment is available on multiple platforms. Windows, Linux, or Container (Docker) Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP) As a service through our partners. Contact us for more information. Contact us Contact us at info@fortifiedid.se or fill out our web form here: Contact us BankID eIDAS EFOS Certificate Skolfederation Sweden Connect Sweden Connect Sambi SITHS eID Passkey Authenticator OTP Sambi Freja Freja SITHS eID Passkey Authenticator OTP Sambi Sambi Popular Secure MFA Methods Our solutions are based on a module-based architecture, which enables a wide range of advantages for automation, monitoring and efficient management. We know these qualities are central abilities both for operations managers and DevOps. This makes it easier to have control over IT environments and, by extension, your digital identities with cost efficiency.

  • MIM Complement | Fortified ID

    Fortified ID as a complement to Microsoft Identity Manager (MIM) Complement MIM Microsoft's Identity and Access Management (IAM) product suite, Microsoft Identity Manager (MIM), offers a number of components that enable organizations to manage the lifecycle of their identities and permissions across multiple systems. Microsoft has stopped further developing MIM and has announced that MIM will reach "end-of-support" in 2029. Many organizations are already looking for supplements/alternatives to the more vulnerable components of MIM, such as MIM Portal. MIM Portal is based on SharePoint 2019, which in turn reaches "end-of-life" in 2026. Fortified ID Control can be used as a complement to MIM. Fortified ID Control offers a modern interface with configurable flows that can be adapted to the specific needs of the organization. With Fortified ID Control, organizations can implement self-service flows, delegated administration and automation. Fortified ID Control also includes several functions for validating, merging and enriching data. The flows can also be supplemented with attestation points, where one or more approvers must approve a request. For example, this can be applied in flows to change permissions, create new users or delete user accounts. Fortified ID Control also manages password changes, both for the user himself and via delegated administration. Control from Fortified ID Book a meeting Government Agencies-PDF Skapa nytt konto som sedan hanteras av MIM sync Återställ lösenord som sedan verkställs av MIM sync Ändra gruppmedlemsskap som sedan hanteras av MIM sync Exempel på gränssnittet för grupphantering Exempel på gränssnittet för hantering av "Mina användare" Exempel på gränssnittet för Portalen från Fortified ID Exempel på gränssnittet för "Skapa ny användare" Exempel på gränssnittet för "Skapa ny användare" Advantages of Fortified ID Control as a complement to MIM: Modern and flexible interface Customizable flows to accommodate your organization's different use cases Simple software lifecycle management Can be implemented on-premise, in the cloud or as a hybrid solution Option to keep MIMsynchronization engine and replace MIM Portal Uses an own SQL database with a dedicated connector space in MIM synchronization engine Future-proof support and maintenance Benefits Book a meeting All operations (read, write, update, delete) are performed by Fortified ID Control against its own SQL database. This SQL database is imported into the MIM synchronization engine via a management agent and thus becomes its own connector space. Architecture Book a meeting

Search result

bottom of page