Greater flexibility and control in management and signing documents
From your computer, phone or tablet
Use your digital certificates easily from any device or operating system, wherever you are and whenever you want.
Download the app for Windows and manage your digital certificates easily and quickly
Viafirma Fortress Identity robust authentication. Certifies the user’s identity through multiple layers of authentication in Viafirma Fortress
Assign the use of the digital certificate directly to another user with the possibility of restricting:
Cloud signature or centralized signature is a highly secure authentication solution that improves signature usability.
As the name implies, it is characterized by the way the digital certificate is stored on a secure server (HSM), and the user accesses it whenever he needs to sign a document digitally, after robust authentication of his identity.
Robust identification requires at least two identification procedures that can be:
This ensures that the certificate is never in the hands of the owner, but to use it whenever is needed. Authenticating without installing any certificate or software on the device from which the process is carried out.
The fact that our certificate isn’t installed on any device it only increases its security.
If the certificate is on a device where passwords are usually stored it is relatively easy for someone else with access to the device and sign for us. However, in order to use the cloud signature at least two authentication factors are required.
Through pre-registration, the physical identity is linked to the digital identity (enrolment), which allows to issue a personal certificate on a secure cloud server (HSM) that will be invoked when it is necessary to use it.
To be considered robust authentication at least two authentication factors are required:
Something the user ”knows” (password).
Something the user may ”possess” (key card, SMS Token, OTP Token).
Something the user ”makes or is” (signature, voice-over, fingerprint, iris or any other biometric factors).
THE CENTRALIZED SIGNATURE SUITABLE FOR ANY NEED
Any application can include authentication and electronic signature features when using the services that the system offers, thus excluding applications from any technical problems and complexities it may occur when using digital certificates.
Digital transformation is becoming more important due to advance technologies that allow a scenario where companies can optimize their processes and improve the user experience by digitizing many of their processes. The centralized signature, or cloud signature, is a clear example of this.
Read More >
We analyze one of the latests trends in authentication, the cloud signature. We are going to demonstrate the use of our product for authentication procedures between companies or administrations and we will also explain its main advantages.
In a time when cyber-attacks continue to increase, passwords are no longer the only security measure to prevent unwanted access. In addition, users are increasingly giving greater amount of sensitive information over the Internet. To achieve this security, two factor authentication is the best option. We explain how it works and what advantages it has over simple passwords.
Read more >
QUESTIONS | PRODUCT DEMONSTRATION | MORE INFORMATION
Pick the best day and time and one of our professionals will contact you
how can we help?
Tell us about your signature processes and we will provide you with the best solution that suits your needs