Strong authentication & authorization control
With Integrity from Fortified ID, we create new capability for your organization to manage all types of login, authorization control and single sign-on. Good user-experience must include both authentication and authorization. Our idea is to achieve safe identities for organization while making it easy for their users and the administrators.
Simplify login for your users with Single Sign-On (SSO) while maintaining secure access to applications and data. Fortified ID has extensive experience in integration of applications and services to a central point of entry. Integrations are made via SAML, OpenID Connect, Radius or via our own API. The solution also enables:
-
ID mapping. A user is called jdoe in one application but john. doe@fortified.se in another, we handle that type of mapping with abilities in Integrity.
-
Ticket translation. Your organization has end-user applications that support e.g. OpenID Connect at the same time you want to give them access with e.g. a SAML federation. Here a translation will have to take place between the technicians, we solve that with Integrity.
Single Sign-On
Application portal
Portal is a web-based application that contains all the applications that have been assigned to you. The purpose is that you should not have to remember addresses for the various applications you use in your everyday life. For example, if you have newly hired employees or contractors, you can easily give them a place to go (Fortified ID Portal) to find all the applications assigned to them.
Fortified ID Portal supports Single Sign-On (SSO) for the published apps. The advantage of SSO is that after logging into the Fortified ID Portal, the user is automatically logged into the application they click on. Support is also available to add extended login if an app requires higher security than Portal.
Look and feel of the portal can be easily adapted to the organization's preferences regarding colors, logo and language. The solution is made to run on the web as well as on mobile devices.
With Fortified ID Enrollment, you can easily provide strong authentication for your users. There are different ways to provide your users with strong authentication, such as Passkeys, YubiKeys, generate one-time passwords (OTP/MFA) with mobile app or certificate-based login.
In order for a user to be able to receive strong authentication, their account must be mapped to one of the methods above. This is called enrollment or registration.
With Fortified ID Enrollment, a user can do this easily on their own or designated users can do this for other users. For example. can a support technician prepare a mobile so that it both has the app (e.g. Microsoft Authenticator) installed but also linked to the user's account.
Enrollment
API gateway
Fortified ID modernizes IAM for organizations by adding an API gateway. This creates conditions for supporting organizations in several scenarios.
Integrity's API gateway can:
-
act as a bridge for data exchange and data formatting, Cloud-to-cloud and cloud-to-native. e.g. enrichment of Custom Claims Provider in Azure
-
act as backend support in a variety of applications, e.g. identity administration, outsourced configuration, self-registration, account sync, merge and enrich data from many different information sources.
-
support ADFS MFA providers from Fortified ID. Can be run on-premise or in cloud (for example, for service delivery to multiple customers)
Previously, Integrity from Fortified ID can solve strong authentication, single sign-on and an application portal. Of course, adapted for modern (DevOps) operation with option for container delivery, monitoring and traceability.
IdP Broker / Proxy
The number of Identity Providers (IdP's) continues to increase and there is a large variation in what types of use cases that these can implement. In addition to delivering a full-scale IdP,
Fortified ID Integrity can act as a broker/proxy and thereby deliver functionality and meet requirements that existing solutions cannot meet for various reasons.
Do you have an IdP that cannot be connected to a certain federation due to connection rules? Fortified ID Integrity is compatible with many federations such as Sweden Connect, Skolfederation, SAMBI, SWAMID, eIDAS. Fortified ID offers two options:
-
You replace your existing IdP with Fortified ID Integrity that meets all connection requirements.
-
You keep your existing IdP but let Fortified ID Integrity act as Proxy/Broker. which becomes an intermediary between your existing IdP and your federations, in a way that you can easily fulfill all connection requirements.
The threat landscape is constantly changing, which places new types of demands on a modern authentication solution with streamlined and cost-effective administration. With this rapidly changing reality, software needs to be kept up-to-date with more frequency than in the past to ensure reliability. With automated installation and upgrading, the system can be kept up to date with minimal downtime.
The solution can be installed locally, in the cloud or as a hybrid solution. The ability to easily move the solution between test and production environments has been made extremely easy. Read more about automation in our technical documentation.
Möjligheten att enkelt flytta lösningen mellan test och produktionsmiljöer har gjorts extremt enkel. Läs mer om automation i vår tekniska dokumentation.
Automation
Tech spec
Integrity is designed with architecture that uses modern ways to install and upgrade the product. This also creates new possibilities for monitoring and analyzing how all parts of the system performs.
Read more in our technical documentation.
Authentication methods
BankID
EFOS
SITHS eID
Skolfederation
Passkey
Suomi.fi
Freja OrgID
SAML Broker
NetID
OTP
Azure
ID-porten
Freja eID Plus
X.509 Certificate
SITHS
SWAMID
FIN eID smart card
eIDAS
Svenska pass
Sambi
Telia eID
ADFS
Common smart card
Monitoring
Fortified ID's solutions are designed to offer real-time monitoring of how system resources are performing. This can apply to everything from individual secure methods or connections to applications or databases. Real-time monitoring provides good overview and creates the foundation for informed decisions. Read more about monitoring in our technical documentation.
Logging
Integrity from Fortified ID is also delivered with structured logging CEF intended to easily feed a SIEM system. Logging & analysis can be tailoried, whether they include reporting on who did what and when or as a basis for usage/invoicing.
Monitoring & Logging
Fortified ID Mobile
Fortified ID Mobile is a free app that lets you log in without having to use a password – you can instead scan a QR code, use your fingerprint, face recognition or a PIN code.
Fortified ID Mobile can be used in three ways:
-
as a way to securely authenticate you if you have forgotten your password.
See Fortified ID Password Reset for forgotten password.
-
as a login method every time, with a one-time code to increase the security of your account. This is called two-step verification or multi-factor authentication.
See Fortified ID Access for login and authorization management.
-
as the only login method, where you only need to scan a QR code or approve the login via a button press on your phone. This is called passwordless login.
Next gen software delivery
Our solutions are based on a module-based architecture, which enables a wide range of advantages for automation, monitoring and efficient management. We know these qualities are central abilities both for operations managers and DevOps. This makes it easier to have control over IT environments and, by extension, your digital identities with cost efficiency.
Standards
SAML 2.0
OAUTH
ADFS
Sambi
Open ID Connect
FIDO2
Fortified ID API
Sweden Connect
Functions
Container
Monitoring
Custom branding
Redundancy
HTTP/2
Asynchronous
WCAG / accessibility
Sweden Connect (LOA 4)
Rolling upgrades
Rapid deployment
Custom UI
HSM
Shared sessions
SIEM ready
Configuration as code
Installation
Docker
Linux
GCP
Windows
Azure
AWS
Integrations
Azure
VMware
Remote desktop
Cambio
Oracle
Oracle
Citrix
Skolfederation
Exchange
Wordpress
IST
Sambi
Sambi
ServiceNow
Office 365
Tieto Education
Visma
Zoom
TDialog
TDialog
AWS
Dropbox
Box
Aweria
Nginx
Apache
Apache
Contact us
Our solutions are based on a module-based architecture, which enables a wide range of advantages for automation, monitoring and efficient management. We know these qualities are central abilities both for operations managers and DevOps. This makes it easier to have control over IT environments and, by extension, your digital identities with cost efficiency.
Popular Secure MFA Methods
With Fortified ID RADIUS server, you can easily provide strong authentication and authorization for remote users to access your network.
It receives authentication requests from RADIUS clients, such as routers, firewalls, or VPNs, verifies the user's credentials, and returns an authorization decision to the client.