top of page

Forms

control_white.png

Fortified ID Forms is an application for digitizing process flows. Examples can be creating users (e.g. employees, consultants, partners), editing users or listing "my users" or "my groups". With Forms you get access to a tool to create web-based flows to delegate the administration to the users responsible for certain information in a simple way.

With Forms, you can also build self-service flows and self-registration of users. In case of self-registration, a user proves himself with e.g. BankID where information is extracted and used to allow the user to create their own account.

Sometimes, company admins may want power users, team managers, or even external users to handle administrative tasks for a specific team or a subset of users within the organization. Granting full administrative permissions to these users isn’t the best practice or ideal approach—this is where the Delegated Administration feature comes in.

What are Delegated Admins?

Delegated Admins are users outside the main it administrators who are given limited administrative privileges to perform specific tasks within a particular area or department of an organization. This approach is common in large companies, as it allows other users to assist with certain activities while providing a degree of autonomy within their department. It also enhances flexibility and boosts efficiency, particularly when managing access within the prganisation.

What Can a Delegated Admin Do?

Before implementing delegated administration, it’s crucial to clearly define what tasks the users with this access will be able to perform. As an IT administrator, you have full control over the system, but with delegated admins, you can selectively assign specific tasks they can assist with. Additionally, keep in mind that certain permissions—such as modifying permission sets, customizing standard objects, or editing page layouts—cannot be granted through this functionality and should remain the responsibility of the IT administrator.

BankID
eIDAS
EFOS
Certificate
Skolfederation
Sweden Connect
Sweden Connect
Sambi
SITHS eID
Passkey
Authenticator
OTP
Sambi
Freja
Freja
SITHS eID
Passkey
Authenticator
OTP
Sambi
Sambi

Popular Secure MFA Methods

Our solutions are based on a module-based architecture, which enables a wide range of advantages for automation, monitoring and efficient management. We know these qualities are central abilities both for operations managers and DevOps. This makes it easier to have control over IT environments and, by extension, your digital identities with cost efficiency.

bottom of page