Identity federation
Identity Verification Inter-System Sharing Onboarding into Portals and Services
IDPort
One Identity, Infinite Possibilities
Federated identity is a concept for securely sharing user identity across multiple systems. It is a mechanism that enables access to multiple services or applications using a single set of login credentials, without the need to create separate accounts for each system.
Our experience with banking systems inspired us to create a flexible and highly secure identity federation solution. It is purpose-built for modern digital banking systems and enterprise-grade security. It enables centralized management and robust protection for internal, external, and cloud-based applications in distributed environments.
User data is protected and shared in accordance with the highest security standards.
Our solution complies with the requirements of eIDAS, DORA, GDPR, PSD2, and other relevant regulations.
The modular system can be extended or customized based on specific requirements.
Federation Protocols
Open federation standards bridge the needs of centralized security with the distributed digital world of diverse applications and services.
Usability and Integration
Our federated approach allows the development of security methods to be decoupled from the lifecycle of business applications.
Performance and Reliability
High-performance technology delivers reliable support for everyday authentication needs, even in large-scale distributed environments.
We develop systems that help accelerate your business in the digital world
Secure Digitalization and User Convenience
Modern identity federation simplifies access management for both personal and enterprise applications. It replaces multiple login credentials with a single secure authentication system and enables data sharing between different systems and providers.
It minimizes security risks, eliminates the need to manage multiple accounts, and supports efficient integration of internal and external systems—resulting in improved user experience and cost savings.
The Monet+ System
Open federation standards bridge the needs of centralized security with the distributed digital ecosystem of various applications and services.
-
Support for OpenID Connect, OAuth, and SAML protocols for user authentication in any application.
-
OpenID Connect Session Management and PKCE extensions for more flexible satisfaction of diverse application security needs.
-
Federated Transaction Authorization (FTA) – a proprietary protocol for electronic signing and transaction authorization
-
Transaction authorization and secure display of sensitive data (e.g., payment card PIN), including dynamic linking.
-
Support for federation processes between mobile applications and mobile tokens.
-
Unique Response Claims Framework (RCF) for managing informational profiles of federated tokens.
Our federated approach allows the development of security methods to be decoupled from the lifecycle of business applications.
-
Applications use SAML and JWT tokens to create their own sessions.
-
API-friendly opaque access tokens and ultra-fast token introspection.
-
The SDKs cover all cryptographic and security functions for authentication, session management, access to protected resources, and more—enabling faster and more secure development of front-ends and mobile applications.
-
Configurable support for single sign-on and single logout without limiting application security requirements.
-
Strong WYSIWYS (What You See Is What You Sign) principles adapted to the applied security method.
-
Configurable contextual authentication (mobile/desktop, secure/public network, MDM-controlled device, etc.).
Modern security methods with advanced applied cryptography and a robust backend enable strong user authentication in any scenario.
-
Out-of-the-box support for current or legacy authentication methods (smart cards, certificates, mobile tokens, SMS OTP, username-password, Kerberos, hardware OTP).
-
Strengthening federated trust with optional use of signing keys protected by HSM.
-
Integrated abstraction of authentication methods for easy integration of authentication mechanisms.
-
Configurable concatenation of authentication methods for modular construction of authentication scenarios.
-
We comply with PSD2 RTS (SCA, CSC).
-
High Availability (HA) and Load Balancing (LB) for 24/7 operation
-
Scalable from tens to millions of clients
-
Intelligent health-check system
-
Token introspection supported by a fast in-memory cache with throughput of thousands of requests per second.
-
Distributed tracing compatible with Dapper/Zipkin.
-
Structured operational logs including correlation identifiers suitable for Elastic Stack analytics tools
Federation Protocols
Open federation standards bridge the needs of centralized security with the distributed digital ecosystem of various applications and services.
-
Support for OpenID Connect, OAuth, and SAML protocols for user authentication in any application.
-
OpenID Connect Session Management and PKCE extensions for more flexible satisfaction of diverse application security needs.
-
Federated Transaction Authorization (FTA) – a proprietary protocol for electronic signing and transaction authorization
-
Transaction authorization and secure display of sensitive data (e.g., payment card PIN), including dynamic linking.
-
Support for federation processes between mobile applications and mobile tokens.
-
Unique Response Claims Framework (RCF) for managing informational profiles of federated tokens.
Usability and Integration
Our federated approach allows the development of security methods to be decoupled from the lifecycle of business applications.
-
Applications use SAML and JWT tokens to create their own sessions.
-
API-friendly opaque access tokens and ultra-fast token introspection.
-
The SDKs cover all cryptographic and security functions for authentication, session management, access to protected resources, and more—enabling faster and more secure development of front-ends and mobile applications.
-
Configurable support for single sign-on and single logout without limiting application security requirements.
-
Strong WYSIWYS (What You See Is What You Sign) principles adapted to the applied security method.
-
Configurable contextual authentication (mobile/desktop, secure/public network, MDM-controlled device, etc.).
Authentication Methods and Security Features
Modern security methods with advanced applied cryptography and a robust backend enable strong user authentication in any scenario.
-
Out-of-the-box support for current or legacy authentication methods (smart cards, certificates, mobile tokens, SMS OTP, username-password, Kerberos, hardware OTP).
-
Strengthening federated trust with optional use of signing keys protected by HSM.
-
Integrated abstraction of authentication methods for easy integration of authentication mechanisms.
-
Configurable concatenation of authentication methods for modular construction of authentication scenarios.
-
We comply with PSD2 RTS (SCA, CSC).
Performance, Scalability, and Support
-
High Availability (HA) and Load Balancing (LB) for 24/7 operation
-
Scalable from tens to millions of clients
-
Intelligent health-check system
-
Token introspection supported by a fast in-memory cache with throughput of thousands of requests per second.
-
Distributed tracing compatible with Dapper/Zipkin.
-
Structured operational logs including correlation identifiers suitable for Elastic Stack analytics tools