Strong authentication & authorization control

With Integrity from Fortified ID, we create new capability for your organization to manage all types of login, authorization control and single sign-on. Good user-experience must include both authentication and authorization. Our idea is to achieve safe identities for organization while making it easy for their users and the administrators.

Popular Secure MFA Methods

We stick our chin out and say we have the most modern and agile authentication solution on the market. Our long experience in integration gives our customers a product that solves all authentication scenarios. We integrate with all the common applications but also many of the national methods that can often be unique to a country or union. Our modular architecture gives us the ability to easily add new secure methods when requested by our customers. Which MFA methods that are presented to an end user can be tailored based on context/group affiliation/role etc.

  • Logo
    BankID
  • Logo
    Freja eID Plus
  • Logo
    Freja OrgID
  • Logo
    EFOS
  • Logo
    Foreign eID
  • Logo
    Certifikat

Next gen software delivery

Our solutions are based on a module-based architecture, which enables a wide range of advantages for automation, monitoring and efficient management. We know these qualities are central abilities both for operations managers and DevOps. This makes it easier to have control over IT environments and, by extension, your digital identities with cost efficiency.

  • WEB
  • API
  • Radius
  • SAML
  • OIDC
  • ADFS
  • Custom
  • OATH
  • Strong authentication
  • Single Sign-On
  • Container
  • Automation
  • Monitoring
  • Rapid deployment
  • Configuration as code
  • SIEM ready

Single Sign-On

Simplify login for your users with Single Sign-On (SSO) while maintaining secure access to applications and data. Fortified ID has extensive experience in integration of applications and services to a central point of entry. Integrations are made via SAML, OpenID Connect, Radius or via our own API. The solution also enables:

Monitoring

Monitoring

Fortified ID's solutions are designed to offer real-time monitoring of how system resources are performing. This can apply to everything from individual secure methods or connections to applications or databases. Real-time monitoring provides good overview and creates the foundation for informed decisions. Read more about monitoring in our technical documentation

Logging

Integrity from Fortified ID is also delivered with structured logging 􏰂CEF􏰃 intended to easily feed a SIEM system. Logging & analysis can be tailoried, whether they include reporting on who did what and when or as a basis for usage/invoicing.

Automation

The threat landscape is constantly changing, which places new types of demands on a modern authentication solution with streamlined and cost-effective administration. With this rapidly changing reality, software needs to be kept up-to-date with more frequency than in the past to ensure reliability. With automated installation and upgrading, the system can be kept up to date with minimal downtime. The solution can be installed locally, in the cloud or as a hybrid solution. The ability to easily move the solution between test and production environments has been made extremely easy. Read more about automation in our technical documentation.

Application portal

Integrity from FortifiedID comes with a web-based application portal that collects all applications that each user has rights to see. Which login methods are displayed when logging in can be tailoried depending on the type of user. The appearance of the portal can be easily customized to the organization's preferences regarding colors, logo and language. Solution is made to run on web as well as in mobile devices.

See movie

API gateway

Fortified ID modernizes IAM for organizations by adding an API gateway. This creates conditions for supporting organizations in several scenarios. Integrity's API gateway can:

Previously, Integrity from Fortified ID can solve strong authentication, single sign-on and an application portal. Of course, adapted for modern (DevOps) operation with option for container delivery, monitoring and traceability.

IdP Broker / Proxy

The number of Identity Providers (IdP's) continues to increase and there is a large variation in what types of use cases that these can implement. In addition to delivering a full-scale IdP, Fortified ID Integrity can act as a broker/proxy and thereby deliver functionality and meet requirements that existing solutions cannot meet for various reasons. Do you have an IdP that cannot be connected to a certain federation due to connection rules? Fortified ID Integrity is compatible with many federations such as Sweden Connect, Skolfederation, SAMBI, SWAMID, eIDAS. Fortified ID offers two options:

MFA app

Fortified ID offers a mobile app for multi-factor authentication. The app can generate one-time codes for a variety of well-known applications and services. For smooth profile activation in the app, we also offer an cost- effective activation portal. The enrollment tool can also be used to activate hardware tokens or software tokens from other providers such as Yubico, Feitian, RSA or other mobile apps such as Google Authenticator, Microsoft Authenticator or other MFA-applications that support the OAuth standard.

Technical specification

Integrity is designed with architecture that uses modern ways to install and upgrade the product. This also creates new possibilities for monitoring and analyzing how all parts of the system performs. Read more in our technical documentation.

Login methods

  • BankID
  • Freja eID Plus
  • Freja OrgID
  • eIDAS
  • EFOS
  • X.509 Certifikat
  • SAML Broker
  • Swedish passports
  • SITHS eID
  • SITHS
  • NetID
  • Sambi
  • Skolfederation
  • SWAMID
  • OTP
  • Telia eID
  • Passkey
  • Google
  • Azure
  • ADFS
  • Suomi.fi
  • FIN eID smart card
  • ID-porten
  • Common smart card

Standards

  • SAML 2.0
  • Open ID Connect
  • ADFS
  • Own API
  • OAUTH
  • FIDO2
  • Sambi
  • Sweden Connect

Features

  • Container
  • Rolling Upgrades
  • HTTP/2
  • Shared sessions
  • Monitoring
  • Rapid deployment
  • Asynchronous
  • SIEM ready
  • Own branding
  • Own UI
  • WCAG / A11y
  • Configuration as code
  • Redundancy
  • HSM
  • Sweden Connect (LOA 4)

Installation

  • Docker
  • Windows
  • GCP
  • AWS
  • Linux
  • Azure

Integrations

  • Google
  • ServiceNow
  • Citrix
  • AWS
  • Azure
  • Office 365
  • Skolfederation
  • Dropbox
  • VMware
  • Tieto Education
  • Exchange
  • Box
  • Remote desktop
  • Visma
  • Wordpress
  • Aweria
  • Cambio
  • Zoom
  • IST
  • Nginx
  • Oracle
  • TDialog
  • Sambi
  • Apache

Self enrollment of hardware and software tokens

Contact us

We like dialog and discussion around the best ways to solve IAM-related challenges. Contact us and we will listen to your problems and share our thoughts on digital identities.

By clicking Send, you agree that Fortified ID AB stores your information to assist with the content of your request.

© 2022 FortifiedID AB – All Rights Reserved [email protected]