top of page

39 results found with an empty search

  • Fortified ID | Identitetshantering (IAM)

    Fortified ID är en banbrytande plattform för modern & säker hantering av digitala identiteter. Byggd på zero trust-principer som stödjer moderna standarder som OAuth2, SAML och OpenID Connect gör integration med existerande system (Entra, AD, SQL, Google) smidig och framtidssäker. Fortified ID används i såväl privat som offentlig sektor för att säkra åtkomst till känslig information, delegerad administration. Plattformen är skalbar, platsformsagnostisk (moln/hybrid/on-prem) och anpassningsbar. Secure login and modern identity management for organizations Most read: IdP / MFA Forms Onbording Replace MIM Fortified ID develops modern products for secure login and identity management for organizations. Powerful Integrations Broad support for eID & MFA Swedish IAM expertise News What we do Fortified ID helps municipalities, authorities, regions and private companies with modern IAM. Protect your organization's applications, for employees, citizens, educational activities, e-services, healthcare personnel, etc. Centralize all authentication Delegated administration Smart user provisioning Modern dev ops infatructure See all your assets in one place Unique IAM-competence Authentication Password Reset Onboarding Municipality... ...gives employees the ability to reset passwords with Bank ID. Read Use Cases Government... ...has solved Joiner-Mover-Leaver (JML) for all its users using solutions from Fortified ID. Read more about JML Energy company... ...allows its customers to securely authenticate to my pages with Bank ID and employees to choose between several different MFA methods. Läs Read Use Cases Finance company ... ...uses Fortified ID to allow its customers to connect securely with BankID. Read more about Integrity Healthcare... ...uses solutions from Fortified ID to solve SITHS as a secure login method against ADFS. Read Use Cases Key Features Native integration Solutions from Fortified ID natively integrates with userstores in the cloud and on-premise. IAM specialists Fortified ID has long experience in getting its customers to take control of their digital identities. Our team has unique knowledge of how authorities, regions, municipalities and private companies should integrate all their services and applications. In order to gain control over their digital identities, a close dialogue is needed between the operating organization and the supplier. We place great importance on understanding our customers' challenges and ensuring that our solutions make a difference. About us Use cases BankID (13) 13 posts Freja eID (10) 10 posts Entra ID (5) 5 posts AD (5) 5 posts IAM (5) 5 posts Google (4) 4 posts SAML (4) 4 posts OIDC (4) 4 posts MFA (4) 4 posts CIAM (4) 4 posts DIGG (3) 3 posts Microsoft Authenticator (3) 3 posts Delegation (3) 3 posts ADFS (3) 3 posts Svenska pass (3) 3 posts SITHS (3) 3 posts Azure (3) 3 posts Password reset (3) 3 posts Authorization management (3) 3 posts oath (2) 2 posts EAM (2) 2 posts OpenID Connect (2) 2 posts See all use cases Get started with modern IAM 01 Download Describe your organisation and your IAM-challenge. 02 Demo Use this space to promote the business, its products or its services. 03 Roll out Together with our partners, we ensure that your solution is put into use. Partners

  • Healthcare | Fortified ID

    > Solutions > Verticals > Healthcare > Secure identity and login for Healthcare A cohesive Region IdP strategy Modern and controllable IAM for the public sector Swedish provider with regional experience Fortified ID helps healthcare organisations to simplify and secure login, SSO and authorization management for both staff, consultants and citizens – in line with regulatory requirements and complex IT environments Deep understanding of healthcare organizations IAM challenges Swedish healthcare operate in an environment where identity and authentication are governed by extensive regulations, high security requirements and many different user groups. Healthcare professionals, other regional staff, consultants and citizens have different needs for authentication methods and permissions. Fortified ID has worked closely with regions for more than 20 years and has built deep expertise in strong authentication, identity management and electronic signature. This experience makes it possible to handle both strategic choices and operational challenges in complex IAM environments, where HSA, SITHS, Inera, AD, Azure and local systems need to interact in a secure and sustainable way. Book a meeting Healthcare - PDF (SWE) Strong authentication adapted for all user groups Regions need to offer the right authentication method to the right users. For healthcare professionals, SITHS is required, today both as a card and mobile eID, with different clients such as NetID Enterprise, NetID Access and SITHS eID. Other regional personnel can use other methods such as OTP, hardware keys or e-IDs, while consultants often need equivalent access as employees. At the same time, citizens must be offered multiple login options, such as BankID, Freja eID and eIDAS, to access the regions' e-services. Fortified ID helps regions design and implement authentication solutions that meet these requirements without compromising security or user experience. Book a meeting Inera SSO and authorization throughout the entire healthcare chain After strong authentication, the user should not need to log in again during the same work session. To achieve this, support for single sign-on and proper management of session tickets, attributes and roles is required. With Fortified ID's solutions, regions can achieve SSO across both modern and legacy applications, based on standards such as SAML, OpenID Connect, ADFS and SAMBI. We also support ID mapping and ticket translation, so that the right information is delivered to each application. Authorization control can be customized both locally and centrally, including management of employee assignments, which is crucial when an identity acts in different roles in healthcare. Read more - Integrity Read more - Control Integration, management and long-term sustainability Fortified ID's solutions are built for modern operations and are adapted for DevOps-oriented organizations. It should be easy to automate, monitor and further develop the IAM solution regardless of the size of the region. We assist with integration of existing applications, API support where standard protocols are not sufficient, as well as connection to Inera's authentication services and IdP solutions. Through the combination of products and specialist expertise, we help regions reduce complexity, strengthen security and create a future-proof foundation for digital healthcare, administration and citizen services. Book a meeting Management Center Partners

  • Releases | Fortified ID

    Releases Fortified ID delivers products that are tailored for dev ops. Contact us at support@fortifiedid.se to get access to the download area. Below you can see all current releases Integrity Control Latest Release: - Access 3.5.0 2026 - 02 - 18 Read release notes Latest Release: - Portal 3.1.1 2025 - 05 - 02 Read release notes Latest Release: - Enrollment 3.1.0 2025 - 03 - 31 Read release notes Latest Release: - Radius 3.1.0 2025 - 03 - 31 Read release notes All technical documentation Latest Release: - Forms 3.2.0 2025 - 07 - 15 Read release notes Latest Release: - Password Reset 3.1.1 2026 - 02 - 13 Read release notes Latest Release: - Automate 3.0.1 2025 - 03 - 31 Read release notes Latest Release: - Management Center 1.3.1 2026 - 02 - 13 Read release notes

  • Life after MIM | Fortified ID

    Now that Microsoft has decided to phase out MIM (end-of-life), organizations need to plan for the next step. With Control from Fortified ID, the transition can be controlled and gradual. Control can replace both the portal and the synchronization engine, or be introduced in parallel to gradually take over functions. At the same time, new modern flows are enabled, such as self-registration with e-identifications such as BankID and Freja eID. A controlled life after MIM with Fortified ID Control Life after MIM Replace MIM at your own pace Reduce complexity and technical debt Create new opportunities beyond MIM Many organizations use Microsoft Identity Manager (MIM) to synchronize and keep user data up to date between different systems. MIM consists of a portal for control and administration and a synchronization engine for data flows between directories. Over time, many installations have been expanded with customizations and special solutions, which has made the environment complex and difficult to change. Now that Microsoft has decided to phase out MIM (end-of-life), organizations need to plan for the next step. With Control from Fortified ID, the transition can be controlled and gradual. Control can replace both the portal and the synchronization engine, or be introduced in parallel to gradually take over functions. At the same time, new modern flows are enabled, such as self-registration with e-identifications such as BankID and Freja eID. Microsoft has stopped further developing MIM and has announced that MIM will reach "end-of-support" in 2029. Already, many organizations are looking for complements/alternatives to the more vulnerable components of MIM, such as MIM Portal. MIM Portal is based on SharePoint 2019, which in turn reaches "end-of-life" on July 14, 2026 . Control from Fortified ID is a future-proof solution for IAM & IGA, regardless of whether users are stored in Entra ID, AD, SQL, Google, etc. End-of-life Book a meeting Control Demo In many MIM environments, MIM Service and Portal is used as the rules engine for authorization decisions, approval flows, and lifecycle management. These solutions are often tightly coupled with complex workflows and person-dependent customizations. With Control, this control can be moved to a modern service that is built for clarity, traceability, and ease of change. Control brings together decisions about access, roles, and permissions in a central view, making it possible to reduce or completely eliminate the dependency on MIM Service and Portal – without affecting underlying catalogs or sync flows. Move governance from MIM Service and portal to Control Keep MIM Synchronization – but in the right place During a MIM phase-out, it is common for MIM Synchronization to still be needed during a transition period to keep Active Directory and other data sources up to date. With Control, organizations can clearly separate governance from technology, where MIM Synchronization is reduced to just sync – not decision logic. This reduces the risk of errors, simplifies troubleshooting and makes the architecture more understandable. At the same time, better conditions are created to eventually replace synchronization with simpler or more modern solutions, as the business and risk picture allow. A future without MIM – step by step Once governance and decision logic have been moved from MIM Service and Portal to Control, and MIM Synchronization has been limited to a clear technical responsibility, it becomes possible to phase out MIM completely without stress or big bang migration. Control interacts naturally with Fortified ID's other solutions, such as Integrity and Confirm, creating a coherent identity chain from access decisions to verification. The result is a modern identity platform with clear component boundaries, reduced person dependency, and full control over identity and authorization – even long after MIM. Book a meeting Architecture All operations (read, write, update, delete) are performed by Fortified ID Control against its own SQL database. This SQL database is imported into the MIM synchronization engine via a management agent and thus becomes its own connector space. Book a meeting

  • Complement Google | Fortified ID

    Fortified ID as a complement to Google Complement Google Complement Google's products with secure login via optional e-identification to guarantee a safe and smooth user experience. Integrate delegated password recovery that enables users to easily reset their passwords without compromising security. Additionally, provide delegated administration of user accounts and permissions to facilitate user role management and access control. This solution improves security and efficiency in the management of Google products, while creating a better experience for both users and administrators. Fortified ID Control can be used as a complement to Google. Fortified ID Control offers a modern interface with configurable flows that can be adapted to the specific needs of the organization. With Fortified ID Control, organizations can implement self-service flows, delegated administration and automation. Fortified ID Control also includes several functions for validating, merging and enriching data. The flows can also be supplemented with attestation points, where one or more approvers must approve a request. For example, this can be applied in flows to change permissions, create new users or delete user accounts. Fortified ID Control also manages password changes, both for the user himself and via delegated administration. Control from Fortified ID Book a meeting Google Use Cases Advantages of Fortified ID Control as a complement to MIM: Modern and flexible interface Customizable flows to accommodate your organization's different use cases Simple software lifecycle management Can be implemented on-premise, in the cloud or as a hybrid solution Option to keep MIMsynchronization engine and replace MIM Portal Uses an own SQL database with a dedicated connector space in MIM synchronization engine Future-proof support and maintenance Benefits Book a meeting All operations (read, write, update, delete) are performed by Fortified ID Control against its own SQL database. This SQL database is imported into the MIM synchronization engine via a management agent and thus becomes its own connector space. Architecture Book a meeting

  • Verticals | Fortified ID

    > Solutions > Verticals > Verticals This is a space to promote the business, its products or its services. Use this opportunity to help site visitors become more familiar with the business and its offerings. Reach out to current and potential clients and customers to build a sense of connection and trust. Explain what makes the business unique. Identify the qualities that set it apart from its competitors and describe them, staying true to the brand's authentic voice. Add engaging details to catch readers' interest and hold their attention. Let them know how they can learn more about the business and take advantage of its products or services. Fortified ID hjälper myndigheter med stark autentisering för både anställda, konsulter och medborgare. Vi har lång erfarenhet av att integrera EFOS och Myndighets CA. Vi kan även samla alla e-tjänster under en central IdP och där erbjuda en mängd inloggningsmetoder som BankID, Freja eID m.m. Fortified ID kan även: Utföra inloggning på LOA 4 (Level of Assurance) Upprätta koppling mot alla interna datakällor för uppslag API erbjuds för appar som inte kan hanteras via t.ex. SAML/OpenID Connect. ID-mappning och ticket translation Fortified ID IdP kan agera som olika logiska IdP'er för att få en logisk separation för olika scenarier. Government Agencies Book a meeting Government Agencies-PDF Healthcare Gather all e-services under a central IDP with integration with different MFA methods, data sources and shared device login. Fortified ID is also able to offer: API for apps that cannot be managed via e.g. SAML/OpenID Connect. Obtain functionality such as ID mapping and “ticket translation” Connecting local IdP to Inera's authentication service Connecting local IdP to Inera's IDP (according to pattern with IdP Proxy) Book a meeting Healthcare-PDF Inera Fortified ID helps municipalities with strong authentication for both employees, consultants and citizens. Our partners help set up a central portal for all e-services under a central IDP and offer a variety of login methods. API is offered for apps that cannot be managed via e.g. SAML/OpenID Connect. ID mapping and ticket translation Fortified ID IdP can act as different logical IdP's to get a logical separation for different scenarios. Manage federations with the various choices required for different users. Municipalities Municipalities-PDF IAM / School DNP PDF Private Sector Fortified ID helps your business gain control over your digital identities. We can manage logins for internal users as well as consultants, customers, resellers or subcontractors. It is common for customers to want to simplify access and onboarding of "my pages" services, where historically users often had to reset the password every time they log in. Book a meeting External users MSSP Fortified ID's solutions are designed to fit large-scale implementations and several of the design decisions are made to facilitate Managed Security Service Providers. Our solutions are built with modern operations in mind and are a good fit for our partners who want to sell strong authentication as a service. The solution is easy to manage, automate, update and monitor and is well suited for many parallel implementations. ATEA ID IdP as a service Book a meeting

  • Solutions | Fortified ID

    Solutions We are experts in identity management and help your organization set up an authentication solution that works for the entire business, whether the users are employees/consultants or citizens/partners/retailers. With our long experience in integrating with a wide range of applications and systems, you can focus on your core business instead of authentication, authorization and access. Komplement MIM Fortified ID Control can be used as a complement to MIM. Fortified ID Control offers a modern interface with configurable flows that can be adapted to the specific needs of the organization. With Fortified ID Control, organizations can implement self-service, delegated administration and password reset flows Book a meeting Read more Fortified ID modernizes IAM for organizations by adding an API gateway. This creates conditions for supporting organizations in several scenarios. Integrity's API gateway can: act as a bridge for data exchange and data formatting, Cloud-to-cloud and cloud-to-native. e.g. enrichment of Custom Claims Provider in Azure act as backend support in a variety of applications, e.g. identity administration, outsourced configuration, self-registration, account sync, merge and enrich data from many different information sources. support ADFS MFA providers from Fortified ID. Can be run on-premise or in cloud (for example, for service delivery to multiple customers) Previously, Integrity from Fortified ID can solve strong authentication, single sign-on and an application portal. Of course, adapted for modern (DevOps) operation with option for container delivery, monitoring and traceability. API gateway IdP Broker / Proxy The number of Identity Providers (IdP's) continues to increase and there is a large variation in what types of use cases that these can implement. In addition to delivering a full-scale IdP, Fortified ID Integrity can act as a broker/proxy and thereby deliver functionality and meet requirements that existing solutions cannot meet for various reasons. Do you have an IdP that cannot be connected to a certain federation due to connection rules? Fortified ID Integrity is compatible with many federations such as Sweden Connect, Skolfederation, SAMBI, SWAMID, eIDAS. Fortified ID offers two options: You replace your existing IdP with Fortified ID Integrity that meets all connection requirements. You keep your existing IdP but let Fortified ID Integrity act as Proxy/Broker. which becomes an intermediary between your existing IdP and your federations, in a way that you can easily fulfill all connection requirements. Application Identity Gateway Fortified ID Application Identity Gateway adds an identity layer to your application or service without you having to program functionality yourself. This solution increases security by adding e-credentials, which ensures that access to your services is both safe and reliable. In addition, the traceability of accounts and permissions is improved, enabling better tracking and auditing of user activities in accordance with regulatory compliance for NIS, GDPR, etc. Book a meeting PDF ADFS adapter With the Fortified ID ADFS adapter, any MFA method or e-legitiomation can be added as an authentication method to ADFS. The solution is very cost-effective because the systems within the organization that are already connected to ADFS do not need to change anything! The graphical interface, the one that meets users, is fully customizable to be able to align with the organization's graphical profile. It is possible to turn off/on the requirement for MFA or eID authentication for a user based on a number of criteria, for example which system the user is about to log into, if the user is in the office or from home, if the user is connecting from a trusted unit etc Read More

  • Entra ID | Fortified ID

    Med Fortified IDs produkter kan ni effektivt komplettera Microsoft Entra och ta identitetshanteringen till nästa nivå. Våra lösningar är särskilt utformade för att möta kraven hos moderna IT-organisationer och erbjuder: • Stöd för e-legitimationer som BankID, Freja, ForeignID och SITHS • Delegerad administration – minska belastningen på IT genom att möjliggöra kontrollerad delegerad- och självservice • Automatiserad hantering av användare och grupper – effektiv onboarding och offboarding > Solutions > Entra ID > Fortified ID's solutions seamlessly extend Microsoft Entra, helping you elevate your identity and access management strategy. Designed for the needs of modern IT organizations, our offerings provide: Support for eIDs such as BankID, Freja, ForeignID, and SITHS – secure and user-friendly authentication Delegated administration – reduce IT workload by enabling controlled delegated and self-service Automated user and group management – streamline onboarding and offboarding with reduced manual effort Read more below to see how Fortified ID can strengthen your Entra ecosystem. Maximize the Value of Microsoft Entra with Fortified ID Authentication Delegated Admin Self-registration As organizations grow in size and complexity, managing users and groups in Microsoft Entra becomes an ongoing task—whether it's updating user attributes or adjusting group memberships. Placing all of this responsibility on IT can quickly lead to bottlenecks and inefficiencies. With Fortified ID, you can delegate these tasks to the individuals who are actually responsible for the users or groups—without compromising security or giving excessive permissions. This approach improves efficiency, enhances control, and reduces the workload on IT. Examples of delegated scenarios: Manage your own groups ("Manage my groups") Extend expiration dates for external consultants under your responsibility Create tailored workflows for different user types Teachers can reset passwords for their students Managers certify their users annually Fortified ID Forms enables you to create web-based forms for managing directory objects—such as users and groups in Microsoft Entra—and assign responsibilities to the right people. The solution leverages Microsoft Graph API to securely read and write data directly in Entra, ensuring compliance and control. Streamline User and Group Management in Microsoft Entra with Fortified ID Forms Microsoft Entra enables centralized authentication and access control for integrated applications. While it offers a range of built-in authentication methods, it lacks native support for several eID solutions that are widely used across Sweden, the Nordics, and the EU. Examples include: BankID (SE) Freja eID (SE) Foreign eID via eIDAS (EU) SITHS and EFOS (SE) Norwegian BankID (NO) ID-porten (NO) Suomi.fi (FI) With Fortified ID Access, you can easily extend Microsoft Entra to support these national eIDs. This allows your Entra-connected applications to offer secure, compliant, and user-friendly authentication options tailored to local and regional requirements. Extend Authentication Capabilities in Microsoft Entra with Fortified ID Access External users—such as consultants, vendors, or partners—often require accounts in Microsoft Entra to access customer environments and perform their work. Manually creating these accounts can be time-consuming for IT and introduces risks if the user's identity is not properly verified. With Fortified ID Forms, you can offer a secure and user-friendly self-registration process, where the user initiates account creation and verifies their identity using a trusted national eID, such as BankID, Freja, or other approved solutions. Example of a Self-Registration Flow: The user visits a designated company webpage and authenticates using their eID. Additional information is collected, such as email address, mobile number, and contact person. Optional data enrichment can be performed—for example, retrieving official address information from tax authorities. Upon account creation, several automated actions can be triggered: An email is sent to the account owner to assign access rights. A welcome email is sent to the user. The user may be automatically signed in to the organization's portal to begin work. This portal can be built using Fortified ID Portal. With Fortified ID Forms, you can tailor the self-registration process to match your organization’s security policies, workflows, and operational needs—while significantly reducing the burden on your IT team. Secure and Controlled Self-Registration for External Users with Fortified ID Forms BankID eIDAS EFOS Certificate Skolfederation Sweden Connect Sweden Connect Sambi SITHS eID Passkey Authenticator OTP Sambi Freja Freja SITHS eID Passkey Authenticator OTP Sambi Sambi Popular Secure MFA Methods Our solutions are based on a module-based architecture, which enables a wide range of advantages for automation, monitoring and efficient management. We know these qualities are central abilities both for operations managers and DevOps. This makes it easier to have control over IT environments and, by extension, your digital identities with cost efficiency.

  • Automate | Fortified ID

    Fortified ID Forms is an application for digitizing process flows. Examples can be creating users (e.g. employees, consultants, partners), editing users or listing "my users" or "my groups". With Forms you get access to a tool to create web-based flows to delegate the administration to the users responsible for certain information in a simple way. > Products > Control > Automate > Automate Fortified ID Automation provides the ability to extract data from one or more source systems, change or influence that data, and then update one or more target systems. An example application is extracting data from an HR system to identify newly registered users. These user objects can then be processed and automatically provisioned to target systems such as Active Directory, Google Workspace, or Microsoft Entra ID. Automate the management of identities and groups Automate group membership Send authentication requests to the Automate API Overview Use cases Get started HR and Personnel Systems Heroma: Integrated to retrieve personal and employment data from the HR system. SchoolSoft: Used to transfer student and staff data to the identity management system. IST: Mainly used in schools/preschools to fetch student and staff information for identity systems. NETSuite: Integrated to retrieve user and organizational data from the cloud-based ERP system. Directory Services & Identity Sources LDAP: Used to read and manage user data from directory services like Active Directory. LDIF: A standardized text format for importing/exporting directory information, often related to LDAP. OpenDJ: An open-source LDAP-compatible directory commonly used in identity management. Microsoft Entra: Used for managing identities and access within Microsoft’s cloud-based platform. Google: Enables synchronization with Google Workspace for account and group management. SCIM: A standard protocol for automatic provisioning of users between systems. Databases and Generic Data Sources SQL Server: Common integration for reading or writing data directly to a Microsoft SQL database. IBM DB2: Integration with this relational database allows for retrieving user data via SQL. ODBC/JDBC: Generic drivers to connect to various databases regardless of vendor. CSV: A simple file-based integration where user data is imported or exported in plain text format. ITSM and Ticketing Systems BMC Remedy: Integrated to automate ticket handling and create users from support workflows. ServiceNow: Used to automatically create accounts or retrieve user data through the ITSM platform. Web and API-Based Systems RESTGeneric: A flexible integration using REST APIs to communicate with external systems. Salesforce: Used to fetch or update user information in the CRM system. Joomla: Syncs user identities between a content management system and the IAM platform. Sometimes, company admins may want power users, team managers, or even external users to handle administrative tasks for a specific team or a subset of users within the organization. Granting full administrative permissions to these users isn’t the best practice or ideal approach—this is where the Delegated Administration feature comes in. Automate is a back-end service with a configuration UI for adding pipes that you choose whether they should execute on a schedule or via API calls. Automate does not have a UI for end users, if you are looking for such an application, Fortified ID Forms is the one to look at. A pipe consists of one or more valves where a valve is a configurable component for handling data. Mentioned below are source systems and target systems. See the Integration tab for which systems Automate can integrate with. See below for a number of use cases: Delegated Admins are users outside the main it administrators who are given limited administrative privileges to perform specific tasks within a particular area or department of an organization. This approach is common in large companies, as it allows other users to assist with certain activities while providing a degree of autonomy within their department. It also enhances flexibility and boosts efficiency, particularly when managing access within the prganisation. Platform Fortified ID Automate is available on multiple platforms. Windows, Linux, or Container (Docker) Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP) As a service through our partners. Contact us for more information. Contact us Contact us at info@fortifiedid.se or fill out our web form here: Contact us BankID eIDAS EFOS Certificate Skolfederation Sweden Connect Sweden Connect Sambi SITHS eID Passkey Authenticator OTP Sambi Freja Freja SITHS eID Passkey Authenticator OTP Sambi Sambi Popular Secure MFA Methods Our solutions are based on a module-based architecture, which enables a wide range of advantages for automation, monitoring and efficient management. We know these qualities are central abilities both for operations managers and DevOps. This makes it easier to have control over IT environments and, by extension, your digital identities with cost efficiency.

  • Confirm | Fortified ID

    In order for a user to be able to use strong authentication, it is preceded by an activation/registration for the user. With Fortified ID Enrollment, a user can do this easily on their own or designated administrators can do this for the user. For example, a support technician can prepare a mobile phone so that it both has the app (e.g. Microsoft Authenticator) installed but also is tied to the user's account. > Products > Integrity > Confirm > Confirm Confirm is a complete solution for secure identity verification when users call a helpdesk or support organization. The product is available in two variants, both of which protect against social engineering, identity fraud and incorrect access in sensitive cases. Why Confirm is needed Prevents unauthorized access and reduces the risk of data leaks Protects against social engineering and role hijacking Ensures proper case management in sensitive support situations Builds trust through transparency and strong authentication Makes verification fast, easy, and integrated into the helpdesk flow Overview Get started eID as a secure verification method in Confirm Confirm includes a dedicated flow for reverse eID verification, developed to ensure that the caller is indeed the individual stated. Below is an example with mobile BankID. 1. Support initiates the verification The employee enters the user's social security number and a verification text to be displayed in the BankID app. The system then sends a BankID request to the correct person. 2. Information and consent The user is informed that a verification is being initiated and that certain personal information is being shared for the purpose of establishing identity. Consent is required to continue. 3. Authentication in BankID The person receives a notification in their BankID app, reads the verification text and signs to confirm their identity. 4. Automatic validation in the system After signing, support receives immediate notification that the person has been authenticated with a valid BankID, along with relevant account data for the case. 5. Proof of possession To verify that the same individual is on the phone, the user can read out the verification text from their BankID app — a simple but effective proof of possession. 6. Secure and correct case handling Once the identity is confirmed, support can continue handling without the risk of confusion or fraud attempts. Confirm via verification code Confirm also offers a verification flow with a time-limited one-time code, designed to ensure that the caller is indeed the same individual who is logged into the service. 1. Login The user logs into the service with their username, password or e-ID. 2. Information and consent The service informs the user that personal information will be shared with support in order to enable identification and correct case management. The user must actively approve this before the function can be used. 3. Initiation of verification When contact with support is needed, the user selects the option "Verify me". The system then packages the relevant login data as well as any supplementary information from the customer's own system, such as customer number, case ID or user profile. The information is temporarily stored for use during validation. 4. Generation of verification code The system creates a unique and time-limited code that is displayed to the user on the screen. 5. Code Sharing The user reads the code to the support person on the phone. 6. Code Validation The support person enters the code into their system. Confirm checks that the code is valid, links it to the previously packaged login and customer data, and confirms that the person on the phone is the same logged-in user. 7. Confirmed Identity Once the verification is approved, support can continue the case in a secure and correct manner, with access to the information needed to help the user. Confirm offers either one-time code verification or reverse eID verification with BankID, allowing organizations to choose the method that best suits their processes and user groups. Both variants are based on clear consent, a strong connection between Confirm BankID eIDAS EFOS Certificate Skolfederation Svenska Pass Sweden Connect Sambi SITHS eID Passkey Authenticator eduID Telia Freja eID Freja orgID ID Porten Suomi.fi Authenticator OTP FIDO ADFS Popular Secure MFA Methods Our solutions are based on a module-based architecture, which enables a wide range of advantages for automation, monitoring and efficient management. We know these qualities are central abilities both for operations managers and DevOps. This makes it easier to have control over IT environments and, by extension, your digital identities with cost efficiency.

  • Videos | Fortified ID

    Videos DEMO: Delegerad administration för en butikskedja (Jysta) Patientjournaler i svenska ambulanser Fortified ID Attest Demo - create custom "Request-Approve" workflows Integrity - Enrollment Introduction Control - Automate - Introduction Microsoft Entra External eID login (SAML) Microsoft Entra External eID login (OIDC) Forms Demo - Delegated administration Forms - Demo external workforce Forms - Introduction Management Center - Configuration Management Center - Management Freja orgID onboarding Freja orgID offboarding Integrity - Application Portal Fortified ID Integrity - Enrollment Fortified ID Password Reset DEMO: Fortified ID Password Reset Demo: Fortified ID Password Reset Externa konton del 1 av 7 - Översikt och introduktion Externa konton del 2 av 7 - SKAPA - SJÄLVREGISTRERING Externa konton del 3 av 7 - ÄNDRA - DELEGERAD ADMINISTRATION Externa konton del 4 av 7 - ÄNDRA - SJÄLVADMINISTRATION OCH ANSÖK-GODKÄNN Externa konton del 5 av 7 - AUTENTISERA - & - AUKTORISERA Externa konton del 6 av 7 - AVSLUT-AVAKTIVERING-FÖRLÄNGNING

  • About us | Fortified ID

    Why Fortified ID Fortified ID helps municipalities, authorities, regions and private companies with modern IAM. Protect your organization's applications, for employees, citizens, educational activities, e-services, healthcare personnel, etc. Modern & flexible IAM Domain knowledge & experience Direct dialog Modern dev ops infrastructure Native Entra ID support Service focus About us We at Fortified ID have a background as product developers for Nordic Edge, Intel/McAfee and PhenixID. Fortified ID develops modern products for strong authentication and identity management that are designed for the new requirements that our customers face today. Our solutions are built with modern operations in mind, a solution that delivers what those responsible for IT operations demand (Dev-ops). It should be easy to manage, automate, update and monitor our products regardless of size of the implementation. We have long acted as advisors for many large organizations in the areas of strong authentication, identity management and electronic snignature.

  • Integrity | Fortified ID

    Med Integrity från Fortified ID skapar vi nya möjligheter för din organisation att hantera alla typer av inloggning, behörighetsstyrning samt single sign-on. Strong authentication & authorization control With Integrity from Fortified ID, we create new capability for your organization to manage all types of login, authorization control and single sign-on. Good user-experience must include both authentication and authorization. Our idea is to achieve safe identities for organization while making it easy for their users and the administrators. Methods Architecture Single Sign-On Simplify login for your users with Single Sign-On (SSO) while maintaining secure access to applications and data. Fortified ID has extensive experience in integration of applications and services to a central point of entry. Integrations are made via SAML, OpenID Connect, Radius or via our own API. The solution also enables: ID mapping. A user is called jdoe in one application but john. doe@fortified.se in another, we handle that type of mapping with abilities in Integrity. Ticket translation. Your organization has end-user applications that support e.g. OpenID Connect at the same time you want to give them access with e.g. a SAML federation. Here a translation will have to take place between the technicians, we solve that with Integrity. Single Sign-On Application portal Portal is a web-based application that contains all the applications that have been assigned to you. The purpose is that you should not have to remember addresses for the various applications you use in your everyday life. For example, if you have newly hired employees or contractors, you can easily give them a place to go (Fortified ID Portal) to find all the applications assigned to them. Fortified ID Portal supports Single Sign-On (SSO) for the published apps. The advantage of SSO is that after logging into the Fortified ID Portal, the user is automatically logged into the application they click on. Support is also available to add extended login if an app requires higher security than Portal. Look and feel of the portal can be easily adapted to the organization's preferences regarding colors, logo and language. The solution is made to run on the web as well as on mobile devices. See Movie With Fortified ID Enrollment, you can easily provide strong authentication for your users. There are different ways to provide your users with strong authentication, such as Passkeys, YubiKeys, generate one-time passwords (OTP/MFA) with mobile app or certificate-based login. In order for a user to be able to receive strong authentication, their account must be mapped to one of the methods above. This is called enrollment or registration. With Fortified ID Enrollment, a user can do this easily on their own or designated users can do this for other users. For example. can a support technician prepare a mobile so that it both has the app (e.g. Microsoft Authenticator) installed but also linked to the user's account. Enrollment API gateway Fortified ID modernizes IAM for organizations by adding an API gateway. This creates conditions for supporting organizations in several scenarios. Integrity's API gateway can: act as a bridge for data exchange and data formatting, Cloud-to-cloud and cloud-to-native. e.g. enrichment of Custom Claims Provider in Azure act as backend support in a variety of applications, e.g. identity administration, outsourced configuration, self-registration, account sync, merge and enrich data from many different information sources. support ADFS MFA providers from Fortified ID. Can be run on-premise or in cloud (for example, for service delivery to multiple customers) Previously, Integrity from Fortified ID can solve strong authentication, single sign-on and an application portal. Of course, adapted for modern (DevOps) operation with option for container delivery, monitoring and traceability. IdP Broker / Proxy The number of Identity Providers (IdP's) continues to increase and there is a large variation in what types of use cases that these can implement. In addition to delivering a full-scale IdP, Fortified ID Integrity can act as a broker/proxy and thereby deliver functionality and meet requirements that existing solutions cannot meet for various reasons. Do you have an IdP that cannot be connected to a certain federation due to connection rules? Fortified ID Integrity is compatible with many federations such as Sweden Connect, Skolfederation, SAMBI, SWAMID, eIDAS. Fortified ID offers two options: You replace your existing IdP with Fortified ID Integrity that meets all connection requirements. You keep your existing IdP but let Fortified ID Integrity act as Proxy/Broker. which becomes an intermediary between your existing IdP and your federations, in a way that you can easily fulfill all connection requirements. The threat landscape is constantly changing, which places new types of demands on a modern authentication solution with streamlined and cost-effective administration. With this rapidly changing reality, software needs to be kept up-to-date with more frequency than in the past to ensure reliability. With automated installation and upgrading, the system can be kept up to date with minimal downtime. The solution can be installed locally, in the cloud or as a hybrid solution. The ability to easily move the solution between test and production environments has been made extremely easy. Read more about automation in our technical documentation. Möjligheten att enkelt flytta lösningen mellan test och produktionsmiljöer har gjorts extremt enkel. Läs mer om automation i vår tekniska dokumentation. Automation Tech spec Integrity is designed with architecture that uses modern ways to install and upgrade the product. This also creates new possibilities for monitoring and analyzing how all parts of the system performs. Read more in our technical documentation. Download PDF Authentication methods BankID EFOS SITHS eID Skolfederation Passkey Suomi.fi Freja OrgID SAML Broker NetID OTP Azure ID-porten Freja eID Plus X.509 Certificate SITHS SWAMID Google FIN eID smart card eIDAS Svenska pass Sambi Telia eID ADFS Common smart card Monitoring Fortified ID's solutions are designed to offer real-time monitoring of how system resources are performing. This can apply to everything from individual secure methods or connections to applications or databases. Real-time monitoring provides good overview and creates the foundation for informed decisions. Read more about monitoring in our technical documentation. Logging Integrity from Fortified ID is also delivered with structured logging 􏰂CEF􏰃 intended to easily feed a SIEM system. Logging & analysis can be tailoried, whether they include reporting on who did what and when or as a basis for usage/invoicing. Monitoring & Logging Fortified ID Mobile Fortified ID Mobile is a free app that lets you log in without having to use a password – you can instead scan a QR code, use your fingerprint, face recognition or a PIN code. Fortified ID Mobile can be used in three ways: as a way to securely authenticate you if you have forgotten your password. See Fortified ID Password Reset for forgotten password. as a login method every time, with a one-time code to increase the security of your account. This is called two-step verification or multi-factor authentication. See Fortified ID Access for login and authorization management. as the only login method, where you only need to scan a QR code or approve the login via a button press on your phone. This is called passwordless login. Next gen software delivery Our solutions are based on a module-based architecture, which enables a wide range of advantages for automation, monitoring and efficient management. We know these qualities are central abilities both for operations managers and DevOps. This makes it easier to have control over IT environments and, by extension, your digital identities with cost efficiency. Tech spec ACCESS API RADIUS Strong authentication SAML OIDC ADFS CUSTOM OATH Single Sign-On Container Monitoring Automation Rapid deployment SIEM ready Configuration as code Standards SAML 2.0 OAUTH ADFS Sambi Open ID Connect FIDO2 Fortified ID API Sweden Connect Functions Container Monitoring Custom branding Redundancy HTTP/2 Asynchronous WCAG / accessibility Sweden Connect (LOA 4) Rolling upgrades Rapid deployment Custom UI HSM Shared sessions SIEM ready Configuration as code Installation Docker Linux GCP Windows Azure AWS Integrations Google Azure VMware Remote desktop Cambio Oracle Oracle Citrix Skolfederation Exchange Wordpress IST Sambi Sambi ServiceNow Office 365 Tieto Education Visma Zoom TDialog TDialog AWS Dropbox Box Aweria Nginx Apache Apache Contact us First name* Surname* E-mail* Phone Message Send Sambi Sweden Connect OTP Skolfederation Authenticator Certificate Passkey EFOS SITHS eID eIDAS Freja BankID Our solutions are based on a module-based architecture, which enables a wide range of advantages for automation, monitoring and efficient management. We know these qualities are central abilities both for operations managers and DevOps. This makes it easier to have control over IT environments and, by extension, your digital identities with cost efficiency. Popular Secure MFA Methods Government Healthcare Municipalities Private org With Fortified ID RADIUS server, you can easily provide strong authentication and authorization for remote users to access your network. It receives authentication requests from RADIUS clients, such as routers, firewalls, or VPNs, verifies the user's credentials, and returns an authorization decision to the client. Radius

  • Training | Fortified ID

    Training Knowledge in digital identity is central to succeed with your digitalization journey. Fortified ID offers a range of different training courses in digital identity that strengthen your organisations level of competence. Most courses are product independent and cover standards and best practices. Fortified ID's training provides your organization with knowledge in secure login, federation, identity management, decentralized identity and much more. Time: 9 - 16 - Location: Online - Free of charge Target Audience IT personnel with various roles such as architects, technical sales/presales, consultants, support engineers or system administrators. Knowledge prerequisites No prerequisites. Training content What is the purpose of Integrity Different use case and scenarios Overview of system requirements, installation, operation and management Overview of configuration TBD Fortified ID Integrity Introduktion Technical Overview - 3 hours Time: 9 - 12 - Location: Online - 4000 SEK Target Audience IT personnel with various roles such as architects, technical sales/presales, consultants, support engineers or system administrators. Knowledge prerequisites Fortified ID Integrity Administration and Configuration Training content Overview Data model Troubleshooting TBD Fortified ID Integrity Data Model and Troubleshooting - 3 hours Time: 9 - 16 - Location: Online - 8000 SEK What is Identity Federation? How does it work, and why should your enterprise care? The class is both theoretical and practical. Target Audience IT personnel with various roles such as architects, technical presales, consultants, support engineers or system administrators. Knowledge prerequisites Basic knowledge in the areas of HTTP. Training content Why Identity Federation? Use case examples of implementation of SAML, Federation and SSO Fundamentals of SAML 2.0 Single Sign-On (SSO) Architecture Messages with Encryption and Digital Signatures Debugging SAML Issues with Google Chrome and SAML-tracer Fundamentals of URL and Base64 Encoding, Cryptographic Hashing, RSA Encryption and Digital Signing SAML compared with WS-Trust, OAuth 2.0, and OpenID Connect. TBD Master Identity Federation SAML - 1 day Time: 8:30 - 12 - Location: Online - 4000 SEK Target Audience IT personnel with various roles such as architects, technical presales, consultants, support engineers or system administrators. Knowledge prerequisites Basic knowledge in the areas of HTTP. Training content Why Decentralized Identity? What is Verifiable Credentials? Use case examples EU Digital Identity Wallet (EUDI Wallet) Fundamentals of Verifiable Credentials Architecture Basic PKI functions, encryption and signatures Basic blockchain technology overview Fundamentals of Decentralized identifiers (DIDs), issuers, verifiers, holders and wallets Practical examples Debugging Personal reflections TBD Master Identity Wallets and Decentralized Identity Choose training* First name Surname E-mail* Company name* I hereby agree that Fortified ID may use the information above to be able to perform the services that the company offers. * Submit Time: 9 - 16 - Location: Online - 8000 SEK Target Audience IT personnel with various roles such as architects, technical sales/presales, consultants, support engineers or system administrators. Knowledge prerequisites Fortified ID Integrity Introduction - Technical Overview - 3 hours Good knowledge in the areas of LDAP, HTTP and federation. Training content Installation Configuration Data model Integrity Portal Integrity Web Infrastructure Integrity Enrollment (extra) Control - Password Reset (extra) Integrity RADIUS (extra) TBD Fortified ID Integrity Administration and Configuration - 1 day Registration

  • Freja orgID | Fortified ID

    On / off-boarding of Freja eID / orgID Freja eID / OrgID With Fortified ID's Freja OrgID packaging, you and your organization can easily: Authenticate users with a Freja OrgID Onboarding and offboarding of Freja OrgID. We offer three ways for onboarding: Self-administration, delegated by another user or automated Freja eID / OrgID Supply Support for all DIGG approved LOA2 and LOA3 methods. The school principal can choose which, or which, methods teachers and school staff should be able to choose. Dealer of BankID and Freja eID & OrgID. Flexibility With flexible configuration options, Fortified ID Integrity can both signal trust according to requirements and control when step-up authentication is required, based on incoming information in an authentication request, attributes from existing idp, etc. Fortified ID generates unique eppn for the school's teachers and students, which are stored in the organization's directory (eg AD, Google, Entra). Competence Our experts have extensive experience with federations both at national and international level, login methods and authentication levels. Fortified ID is always there as support to ensure a good and quality delivery. Architecture In the cloud or on-premise. Since the solution does not require communication with user directories, it can be run in the cloud. It is also possible to install it locally, i.e. on-premise. Book a meeting Global Accessibility with Freja Citizens from 167 countries around the world can register in Freja with their biometric passport. This means that both: People who live in Sweden but are not Swedish citizens People who live outside of Sweden can use Freja for secure digital identification. For companies that need to interact with a global target group, Freja is the only e-identification in Sweden that makes this possible – and opens the door to hundreds of millions of potential users worldwide. Book a meeting

  • Inera Reference Architecture | Fortified ID

    As the digitalization of healthcare accelerates, it is more important than ever that the solutions we build actually fit in. That is why we at Fortified ID are particularly proud of how our products harmonize with Inera’s reference architecture. The platform offers support that Regions are influenced by current standardized protocols, enabling interoperability, secure authentication, and delegated access. Link between Fortified ID and Inera's technical regulations, collaboration and function Inera Reference Architecture As the digitalization of healthcare accelerates, it is more important than ever that the solutions we build actually fit in. That is why we at Fortified ID are particularly proud of how our products harmonize with Inera’s reference architecture. The platform offers support that Regions are influenced by current standardized protocols, enabling interoperability, secure authentication, and delegated access. By following established frameworks and implementing effective provisioning methods, Fortified ID ensures a unified and reliable identity infrastructure that meets the requirements for both security and flexibility. Fortified ID and Ineras Reference Architecture Link between Fortified ID and the interaction and function of the Reference Architecture Identity Provider (IdP) Fortified ID offers robust IdP services that enable user authentication and the generation of secure identity certificates. The solutions support multiple authentication methods and protocols, ensuring interoperability and ease of use. This includes support for single sign-on (SSO) and authentication context management, which is in line with the requirements of the reference architecture. Certificate Issuance and Brokering Fortified ID’s platform enables the issuance of both identity and access certificates, with support for both front-channel and back-channel communication. Certificates are digitally signed and can be tailored to specific attributes according to the principle of data minimization, which meets the security requirements of the architecture. Identity Data Warehouse Fortified ID provides a consolidated data warehouse solution, following the “identity fabric” pattern, ensuring quality-assured identity information. The solution supports attribute-based authorization evaluation and can integrate data from multiple sources, including HR systems and credential registers, which is central to creating a unified user profile. Provisioning Service By automating the provisioning of identity data, Fortified ID helps organizations manage the identity lifecycle efficiently. The solution supports both push and pull provisioning patterns and is compatible with standard protocols such as SCIM. E-Certificate Issuer Fortified ID is only involved in the issuance of Fortified ID Mobile. In other cases, existing e-credentials, such as SITHS or BankID, are used. The solution meets high trust requirements and offers support for multi-factor authentication. Access Certificate Service Fortified ID issues and manages access certificates that enable fine-tuned access control based on policies and attributes. Access certificates are seamlessly integrated into e-services to meet security and authorization requirements. API Security Service Fortified ID's API security solutions provide system-level authentication and authorization, facilitating secure communication between systems. The solution includes support for tokens and encrypted connections according to modern standards. System Authentication and Authorization The platform enables secure authentication and authorization between systems through standardized protocols and token management. This includes support for delegation and verification of access rights. Delegated access from users Fortified ID implements delegated access solutions, which enable users to transfer access rights securely and efficiently, including across organizational boundaries. This supports multiple interaction patterns such as certificate exchange and re-authentication. Identity and Credential Federation Fortified ID's federation solutions ensure interoperability between different organizations and services through standardized trust frameworks and attribute exchange. They enable efficient collaboration through secure and reliable processes. Governance Service Fortified ID’s rule management is flexible and scalable, enabling you to implement and interpret rules in a machine-readable manner. The services support granular and dynamic access control rules. Access Governance and Compliance Support Services Fortified ID offers comprehensive governance and compliance support services, including logging and reporting to ensure compliance and access is properly regulated. Link between Fortified ID and the Reference Architecture Technical Regulations Technical Protocol and Format Breakdown Fortified ID provides support for modern technical protocols and formats required for authentication, federated login, and delegated access. The platform uses JSON Web Tokens (JWT) and other standardized certificate types, ensuring interoperability and secure management of identity and access data according to the recommendations in the reference architecture. Recommended protocols by capability Fortified ID implements the recommended protocols for federated login, SSO, and delegated access, such as SAML2, OpenID Connect, and OAuth 2.0. This alignment enables interoperability with e-services and supports different technical platforms in parallel. Fortified ID also focuses on providing support for both new and existing protocols, such as SAML2, which facilitates integration with existing systems. Protocols for Federated Login and SSO Fortified ID's solutions implement both OpenID Connect and SAML 2.0 for federated login and SSO. The services support authentication context and secure authentication request management, which follows the specific requirements listed in the reference architecture. The solutions also provide logout management capabilities in a manner that aligns with recommended standards. Delegated Access Protocols Fortified ID uses OAuth 2.0 as the primary protocol for delegated access, including flows such as Authorization Code. This enables secure access management between users and systems, as well as between different systems, addressing the needs highlighted in the architecture. Authentication Protocols Fortified ID solutions support modern authentication protocols, including Mutual-TLS with x.509 certificates and FIDO2. These protocols offer strong security through asymmetric encryption and support for multi-factor authentication, meeting the requirements for robust authentication for both users and systems. Technical Frameworks for Federation Fortified ID follows frameworks such as SAMBI, Sweden Connect, Verifiable credentials and OpenID Connect Federation to ensure interoperability and secure management of metadata between different identity providers and services. This supports trust frameworks and standards for federation, which is a key component of the reference architecture. Technical Frameworks for Provisioning The platform includes support for the SCIM protocol for efficient provisioning of identity data. This ensures that user information can be provided to systems and e-services in a standardized and quality-assured manner, which meets the recommendations in the architecture. PDF Book a meeting

  • FAQ | Fortified ID

    FAQ om Fortified ID – svar om digital identitet, IAM, IdP, e-legitimation, LoA 2–4, SITHS, IGA och digital tillit för offentlig och privat sektor. !

  • DNP | Fortified ID

    Fortified ID Integrity solves the challenges of Digital National Exams Digital National Examination (DNP) This page describes how Fortified ID Integrity can be used to meet the requirements for authentication against the Digital National Exam (DNP), via the School Federation. Many of the principals today use Microsoft Entra, Microsoft ADFS or Google as IdP. The challenge with these IdPs is that they do not support Swedish methods that may be required for a service! DNP Guide Book a meeting Read PDF DNP Demo Benefits Supply Support for all DIGG approved LOA2 and LOA3 methods. The school principal can choose which, or which, methods teachers and school staff should be able to choose. Dealer of BankID and Freja eID & OrgID. Flexibility With flexible configuration options, Fortified ID Integrity can both signal trust according to requirements and control when step-up authentication is required, based on incoming information in an authentication request, attributes from existing idp, etc. Fortified ID generates unique eppn for the school's teachers and students, which are stored in the organization's directory (eg AD, Google, Entra). Competence Our experts have extensive experience with federations both at national and international level, login methods and authentication levels. Fortified ID is always there as support to ensure a good and quality delivery. Architecture In the cloud or on-premise. Since the solution does not require communication with user directories, it can be run in the cloud. It is also possible to install it locally, i.e. on-premise. Book a meeting

  • Forms | Fortified ID

    Fortified ID Forms is an application for digitizing process flows. Examples can be creating users (e.g. employees, consultants, partners), editing users or listing "my users" or "my groups". With Forms you get access to a tool to create web-based flows to delegate the administration to the users responsible for certain information in a simple way. > Products > Control > Forms > Forms Fortified ID Forms is an application for digitizing process flows. Examples can be creating users (e.g. employees, consultants, partners), editing users or listing "my users" or "my groups". With Forms you get access to a tool to create web-based flows to delegate the administration to the users responsible for certain information in a simple way. With Forms, you can also build self-service flows and self-registration of users. In case of self-registration, a user proves himself with e.g. BankID where information is extracted and used to allow the user to create their own account. INTRO DEMO EXTERNAL USERS DEMO DELEGATED ADMIN Overview Use cases Get started Supplement Entra ID / Google with authentication with eLeg If your IdP does not support eLeg (BankID, Freja or Foreign ID, SITHS, EFOS), Fortified ID Access can easily be used as a complement to solve this. Read more CIAM Simple and smooth customer identity management (CIAM) Read more Create added value with the future of identity and access management! Increased digitalization in society also reinforces the importance of IAM. Read more Customer IAM (CIAM) for the public sector Self-registration, authorization management, and strengthened authentication Read more External accounts Choosing the right external account management tool is crucial to maintaining control and compliance, as well as creating a smooth and secure experience for users. Read more Sometimes, company admins may want power users, team managers, or even external users to handle administrative tasks for a specific team or a subset of users within the organization. Granting full administrative permissions to these users isn’t the best practice or ideal approach—this is where the Delegated Administration feature comes in. What are Delegated Admins? Delegated Admins are users outside the main it administrators who are given limited administrative privileges to perform specific tasks within a particular area or department of an organization. This approach is common in large companies, as it allows other users to assist with certain activities while providing a degree of autonomy within their department. It also enhances flexibility and boosts efficiency, particularly when managing access within the prganisation. What Can a Delegated Admin Do? Before implementing delegated administration, it’s crucial to clearly define what tasks the users with this access will be able to perform. As an IT administrator, you have full control over the system, but with delegated admins, you can selectively assign specific tasks they can assist with. Additionally, keep in mind that certain permissions—such as modifying permission sets, customizing standard objects, or editing page layouts—cannot be granted through this functionality and should remain the responsibility of the IT administrator. Platform Fortified ID Forms is available on multiple platforms. Windows, Linux, or Container (Docker) Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP) As a service through our partners. Contact us for more information. Contact us Contact us at info@fortifiedid.se or fill out our web form here: Contact us BankID eIDAS EFOS Certificate Skolfederation Sweden Connect Sweden Connect Sambi SITHS eID Passkey Authenticator OTP Sambi Freja Freja SITHS eID Passkey Authenticator OTP Sambi Sambi Popular Secure MFA Methods Our solutions are based on a module-based architecture, which enables a wide range of advantages for automation, monitoring and efficient management. We know these qualities are central abilities both for operations managers and DevOps. This makes it easier to have control over IT environments and, by extension, your digital identities with cost efficiency.

  • Products | Fortified ID

    Contact us First name* Surname* E-mail* Phone Message Send Read more Signing from Fortified ID meets the organization's need to apply legally binding signatures in a fast, secure and efficient manner. Read more APPLICATIONS: Access (MFA / SSO) Portal Enrollment Radius Handle all types of secure login including MFA and eID. Single sign-on portal with an agile IdP that can handle SAML, OIDC and ADFS. Control from Fortified ID is a solution that focuses on the secure and efficient management of digital identities and their permissions. The solution helps to simplify and automate processes for managing user permissions, role-based access, group memberships, onboarding/offboarding, and more. Read more APPLICATIONS: Forms Automate Attest Password reset Fortified ID ADCS REST Extensions enable organizations using Microsoft Active Directory Certificate Services to get more value from their existing certificate infrastructure. Read more Management Center is an independent service from Fortified ID that enables easy installation, upgrade, configuration and monitoring of all Fortified ID products. Read more Energy company Fortified ID protects a Swedish energy company's login for both internal and external users. Customers can securely authenticate to my pages with Bank ID and employees can choose from several different MFA methods. Read Use Case Energy company Fortified ID protects a Swedish energy company's login for both internal and external users. Customers can securely authenticate to my pages with Bank ID and employees can choose from several different MFA methods. Read Use Case Energy company Fortified ID protects a Swedish energy company's login for both internal and external users. Customers can securely authenticate to my pages with Bank ID and employees can choose from several different MFA methods. Read Use Case Finance company ...använder Fortified ID för att låta sina kunder ansluta säkert med BankID. Explore Swedish Healthcare Swedish Region uses solutions from Fortified ID to resolve SITHS as a secure login method against ADFS. The solution integrates with existing infrastructure and complements where existing solutions are not sufficient. Read use case

Search result

bottom of page