top of page

Strong authentication & authorization control

With Integrity from Fortified ID, we create new capability for your organization to manage all types of login, authorization control and single sign-on. Good user-experience must include both authentication and authorization. Our idea is to achieve safe identities for organization while making it easy for their users and the administrators.

Simplify login for your users with Single Sign-On (SSO) while maintaining secure access to applications and data. Fortified ID has extensive experience in integration of applications and services to a central point of entry. Integrations are made via SAML, OpenID Connect, Radius or via our own API. The solution also enables:

  • ID mapping. A user is called jdoe in one application but john. doe@fortified.se in another, we handle that type of mapping with abilities in Integrity.

  • Ticket translation. Your organization has end-user applications that support e.g. OpenID Connect at the same time you want to give them access with e.g. a SAML federation. Here a translation will have to take place between the technicians, we solve that with Integrity.

Single Sign-On

Application portal

Portal is a web-based application that contains all the applications that have been assigned to you. The purpose is that you should not have to remember addresses for the various applications you use in your everyday life. For example, if you have newly hired employees or contractors, you can easily give them a place to go (Fortified ID Portal) to find all the applications assigned to them.

 

Fortified ID Portal supports Single Sign-On (SSO) for the published apps. The advantage of SSO is that after logging into the Fortified ID Portal, the user is automatically logged into the application they click on. Support is also available to add extended login if an app requires higher security than Portal.

Look and feel of the portal can be easily adapted to the organization's preferences regarding colors, logo and language. The solution is made to run on the web as well as on mobile devices.
 

application_portal.png

With Fortified ID Enrollment, you can easily provide strong authentication for your users. There are different ways to provide your users with strong authentication, such as Passkeys, YubiKeys, generate one-time passwords (OTP/MFA) with mobile app or certificate-based login.

In order for a user to be able to receive strong authentication, their account must be mapped to one of the methods above. This is called enrollment or registration.

With Fortified ID Enrollment, a user can do this easily on their own or designated users can do this for other users. For example. can a support technician prepare a mobile so that it both has the app (e.g. Microsoft Authenticator) installed but also linked to the user's account.

Enrollment

enrollment.jpg

API gateway

Fortified ID modernizes IAM for organizations by adding an API gateway. This creates conditions for supporting organizations in several scenarios.

 

Integrity's API gateway can:

  • act as a bridge for data exchange and data formatting, Cloud-to-cloud and cloud-to-native. e.g. enrichment of Custom Claims Provider in Azure

  • act as backend support in a variety of applications, e.g. identity administration, outsourced configuration, self-registration, account sync, merge and enrich data from many different information sources.

  • support ADFS MFA providers from Fortified ID. Can be run on-premise or in cloud (for example, for service delivery to multiple customers)

Previously, Integrity from Fortified ID can solve strong authentication, single sign-on and an application portal. Of course, adapted for modern (DevOps) operation with option for container delivery, monitoring and traceability.

automation-bg_edited.jpg
api_vit.jpg

IdP Broker / Proxy

The number of Identity Providers (IdP's) continues to increase and there is a large variation in what types of use cases that these can implement. In addition to delivering a full-scale IdP,

Fortified ID Integrity can act as a broker/proxy and thereby deliver functionality and meet requirements that existing solutions cannot meet for various reasons.

 

Do you have an IdP that cannot be connected to a certain federation due to connection rules? Fortified ID Integrity is compatible with many federations such as Sweden Connect, Skolfederation, SAMBI, SWAMID, eIDAS. Fortified ID offers two options:

  • You replace your existing IdP with Fortified ID Integrity that meets all connection requirements.

  • You keep your existing IdP but let Fortified ID Integrity act as Proxy/Broker. which becomes an intermediary between your existing IdP and your federations, in a way that you can easily fulfill all connection requirements.

automation-bg_edited.jpg
broker_proxy.jpg

The threat landscape is constantly changing, which places new types of demands on a modern authentication solution with streamlined and cost-effective administration. With this rapidly changing reality, software needs to be kept up-to-date with more frequency than in the past to ensure reliability. With automated installation and upgrading, the system can be kept up to date with minimal downtime.

 

The solution can be installed locally, in the cloud or as a hybrid solution. The ability to easily move the solution between test and production environments has been made extremely easy. Read more about automation in our technical documentation.

Möjligheten att enkelt flytta lösningen mellan test och produktionsmiljöer har gjorts extremt enkel. Läs mer om automation i vår tekniska dokumentation.

Automation

automation.jpg
Tech spec

Integrity is designed with architecture that uses modern ways to install and upgrade the product. This also creates new possibilities for monitoring and analyzing how all parts of the system performs.

 

Read more in our technical documentation.

Authentication methods

BankID

EFOS

SITHS eID

Skolfederation

Passkey

Suomi.fi

 

Freja OrgID

SAML Broker

NetID

OTP

Azure

ID-porten

Freja eID Plus

X.509 Certificate

SITHS

SWAMID

Google

FIN eID smart card

 

eIDAS

Svenska pass

Sambi

Telia eID

ADFS

Common smart card

Monitoring

Fortified ID's solutions are designed to offer real-time monitoring of how system resources are performing. This can apply to everything from individual secure methods or connections to applications or databases. Real-time monitoring provides good overview and creates the foundation for informed decisions. Read more about monitoring in our technical documentation.

Logging

Integrity from Fortified ID is also delivered with structured logging 􏰂CEF􏰃 intended to easily feed a SIEM system. Logging & analysis can be tailoried, whether they include reporting on who did what and when or as a basis for usage/invoicing.

Monitoring & Logging

bg2_edited.jpg
monitoring.jpg

Fortified ID Mobile

Fortified ID Mobile is a free app that lets you log in without having to use a password – you can instead scan a QR code, use your fingerprint, face recognition or a PIN code.

 

Fortified ID Mobile can be used in three ways:

 

  • as a way to securely authenticate you if you have forgotten your password.

See Fortified ID Password Reset for forgotten password.

  • as a login method every time, with a one-time code to increase the security of your account. This is called two-step verification or multi-factor authentication.

See Fortified ID Access for login and authorization management.

  • as the only login method, where you only need to scan a QR code or approve the login via a button press on your phone. This is called passwordless login.

mobile-app.jpg

Next gen software delivery

Our solutions are based on a module-based architecture, which enables a wide range of advantages for automation, monitoring and efficient management. We know these qualities are central abilities both for operations managers and DevOps. This makes it easier to have control over IT environments and, by extension, your digital identities with cost efficiency.

ACCESS
API
RADIUS
Strong authentication
SAML
OIDC
ADFS
CUSTOM
OATH
Single Sign-On
Container
Monitoring
Automation
Rapid deployment
SIEM ready
Configuration as code

Standards

SAML 2.0

OAUTH

 

ADFS

Sambi

 

Open ID Connect

FIDO2

Fortified ID API

Sweden Connect

Functions

Container

Monitoring

Custom branding

Redundancy

 

HTTP/2

Asynchronous

WCAG / accessibility

Sweden Connect (LOA 4)

 

Rolling upgrades

Rapid deployment

Custom UI

HSM

 

Shared sessions

SIEM ready

Configuration as code

Installation

Docker

Linux

 

GCP

 

Windows

Azure

 

AWS

Integrations

Google

Azure

VMware

Remote desktop

Cambio

Oracle

Oracle

 

Citrix

Skolfederation

Exchange

Wordpress

IST

Sambi

Sambi

 

ServiceNow

Office 365

Tieto Education

Visma

Zoom

TDialog

TDialog

 

AWS

Dropbox

Box

Aweria

Nginx

Apache

Apache

Contact us

Sambi
Sweden Connect
OTP
Skolfederation
Authenticator
Certificate
Passkey
EFOS
SITHS eID
eIDAS
Freja
BankID

Our solutions are based on a module-based architecture, which enables a wide range of advantages for automation, monitoring and efficient management. We know these qualities are central abilities both for operations managers and DevOps. This makes it easier to have control over IT environments and, by extension, your digital identities with cost efficiency.

Popular Secure MFA Methods

radius_server.jpg

With Fortified ID RADIUS server, you can easily provide strong authentication and authorization for remote users to access your network.

 

It receives authentication requests from RADIUS clients, such as routers, firewalls, or VPNs, verifies the user's credentials, and returns an authorization decision to the client.

Radius

bottom of page