Control and manage your certificates

Greater flexibility and control in management and signing documents

  • No installation required on any device
  • Identity Robust authentication
  • Possibility of delegating to third parties
  • Permission Controls
Portada del video de control certificado digital
Play Video
Logotipo Aduanas, cliente de viafirma fortress
Logo Grupo Tragsa

Reasons for choosing Viafirma Fortress


From your computer, phone or tablet.
Use your digital certificates from any device or operating system, wherever and whenever.

Viafirma Fortress Desktop

Download the app for Windows and manage your digital certificates easily and quickly

Authentication Factors

Viafirma Fortress Identity robust authentication. Certifies the user’s identity through multiple layers of authentication in Viafirma Fortress





PIN Number


Delegation of the certificates

Delegate the use of the digital certificate with the option of restricting:

  • Access to specific websites
  • Specific time slots
  •  Specific Applications


100% eIDAS Cloud Signature. Supports the world’s most demanding legal framework (eIDAS-UE) in terms of security and advanced digital signature.


  • Regardless of the technology you are currently using
  • Supports your company's eBusiness solutions
  • Easy integration


Cloud signature or centralized signature is a highly secure authentication solution that improves the usability of the signature.

As the name implies, it is characterized by the way the digital certificate is stored on a secure server (HSM), and the user has access to it whenever he needs to digitally sign a document after going through robust authentication of his identity.

Robust identification requires at least two identification methods that can be:

  • Something “the user knows” (password)
  • Something “the user has” (keycard, token sms, OTP token)
  • Something “the user is or does” (signature, utterance, footprint, iris and other biometric factors).

This ensures that the certificate is never in hands of the owner, instead he can use it whenever he needs to. The user can authenticate without installing any certificate or software on the device.

The fact that our certificate isn’t installed on any device it only increases its security.

If the certificate is located on a device where passwords are saved,  it’s then quite easy for someone to sign for us. However, in order to use the cloud signature, you need at least two authentication factors.

Through pre-registration, the physical identity is linked to the digital identity (enrolment), which allows to issue a personal certificate stored on a secure cloud server (HSM) that will be invoked when neccesary

To be considered robust authentication at least two authentication factors are required:

Something the user ”knows” (password).

Something the user may ”possess” (key card, SMS Token, OTP Token).

Something the user ”makes or is” (signature, voice-over, fingerprint, iris or any other biometric factors).

Illustration Viafirma Fortress API


Easy integration

Any application can include authentication and electronic signature features when using the services that the system offers, thus excluding applications from any technical problems and complexities it may occur when using digital certificates. 

Related articles

Firma Centralizada - Viafirma Fortress

Centralized signature: the best ally for your business

Digital transformation is becoming more important due to advance technologies that allow a scenario where companies can optimize their processes and improve the user experience by digitizing many of their processes. The centralized signature, or cloud signature, is a clear example of this.
Read More >

Firma Digital Cloud

What is the cloud signature and what are its advantages

We analyze one of the latests trends in authentication, the cloud signature. We are going to demonstrate the use of our product for authentication procedures between companies or administrations and we will also explain its main advantages.

Autenticación doble factor

Digital security: two factor authentication

In a time when cyber-attacks continue to increase, passwords are no longer the only security measure to prevent unwanted access. In addition, users are increasingly giving greater amount of sensitive information over the Internet. To achieve this security, two factor authentication is the best option. We explain how it works and what advantages it has over simple passwords.
Read more >



We call you

Pick the best day and time and one of our professionals will contact you

how can we help?

Or if you prefer...

Tell us about your signature processes and we will provide you with the best solution that suits your needs

reserva tu cita