Use Cases
HomeIntegrityControlManagement CenterSolutions
  • Get Started
  • Integrity | Access
    • Auth. methods
      • LDAP (Username/Password)
      • LDAP (Username/Password) + OTP (SMTP)
      • LDAP (Username/Password) + OTP (SMS)
      • Swedish BankID
      • Microsoft Entra ID (SAMLSPBroker)
      • Foregin eID (SAMLSPBroker)
    • Auth. methods (SAML)
      • One-Time Password (OATH)
      • Inera IdP (SITHS) (SAMLSPBroker)
      • ID-porten (Norway) (SAML IdP with OIDC RP)
      • Multiple SAML IdP's configured
        • Multiple JSON files
    • Auth. methods (OIDC)
      • Static values (OIDC) - Test only
      • Swedish BankID (OIDC)
      • UID/PWD (OIDC)
    • Auth. methods (MISC)
      • Selector filtering
      • AuthZ control
      • External links and Cancel location
    • Add a Federation or SAML SP
  • Integrity | Portal
    • Portal
  • Integrity | Enrollment
    • Software token (OATH)
    • Best practice configuration
  • Integrity | Radius
    • UID/OATH token
    • UID/Password/OATH token
    • UID/Password/SMTP
  • Integrity | API
    • Swedish Siths eID
    • Oath Token
  • Control | Applications
    • Password Reset
    • Password Reset for Entra ID
    • Password Reset for Google Workspace
  • OPERATION
    • Rolling upgrade - cluster
  • TROUBLESHOOTING
    • Wrong relaystate
  • Misc
    • Address configuration externally
    • ADFS
      • Protect Fortified ID apps
      • Install and configure Fortified ID ADFS adapter for Siths eID
      • Install and configure Fortified ID ADFS adapter for Oath
    • AWS
      • Protect AWS Cognito with eID MFA
      • Protect AWS IAM Identity Center with eID MFA
    • Customization
      • Overlay - WEB
      • Overlay - Portal
      • Overlay - Password Reset
      • Overlay - Enrollment
      • Logout page
    • Dependency-Track - protect with eID MFA and SSO
    • Digitala Nationella Prov (DNP) / Skolfederation
      • Active Directory Federation Services (ADFS) with BankID as step-up-method
      • Active Directory / LDAP with BankID as step-up-method
      • Entra ID (Azure AD) with BankID as step-up-method
      • Google with BankID as step-up-method
      • Generate eduPersonPrincipalName (eppn) and store in Google
      • Generate eduPersonPrincipalName (eppn) and store in Entra ID
      • Common configuration
    • Encrypt configuration secrets
    • Microsoft Entra
      • Protect Entra ID (Azure AD) with eID MFA
      • Entra External - Support for eID (SAML)
      • Entra External - Support for eID (OIDC)
    • Expressions
    • Google
      • Common configuration for Google Workspace - Directory API
      • Common configuration for Google Workspace - authentication for Fortified ID products
      • Delegated administration for Google Workspace - teacher updates student guardians
      • Delegated administration for Google Workspace - teacher updates student password
      • Protect Google Workspace with eID MFA
    • HTTPS
    • Protect sensitive data, such as social security numbers, through obfuscation
    • Reverse proxy
      • Install Apache Web Server on Windows
      • Add SSL certificate and enable https
      • Add a Fortified ID virtual host
    • Set AuthnContextClassRef
    • Wiki.js - OpenID Connect (OIDC)
Powered by GitBook
On this page
  • Scenario
  • Prerequisite
  • Install and prepare configuration
  • Test the configuration
  • Adjust configuration for production
  • Some info about bankid_trust.jks
  1. Integrity | Access
  2. Auth. methods

Swedish BankID

PreviousLDAP (Username/Password) + OTP (SMS)NextMicrosoft Entra ID (SAMLSPBroker)

Last updated 1 month ago

Scenario

In this scenario, we will append the default installation with Swedish BankID.

Authentication will be done with Swedish BankID test environment. (how to use this in a BankID Production environment will be explained in the bottom of this use case).

Prerequisite

  • This use case assumes that you have good knowledge of the product in question.

  • Fortified ID Access installed and configured with the default configuration

  • The server is able to reach the BankIDs backend server APIs (internet access)

  • A Swedish BankID test account created either on a computer or mobile device. See the following link to setup a test BankID account for yourself:

Install and prepare configuration

  1. Download

  2. Add files and folders from ZIP-file to the config-folder, ex: C:\Program Files\FortifiedID\mgmt-center\data\customer\access

  3. Append you globals with the following parameters and adjust them according to you needs

{
  "bid_ssl_keystore_path": "${system.customer_home}/resources/FPTestcert5_20240610.p12",
  "bid_ssl_keystore_password": "qwerty123",
  "bid_ssl_key_alias": "1",
  "bid_ssl_key_password": "qwerty123",
  "bid_ssl_truststore_path": "${system.customer_home}/resources/bankid_trust.jks",
  "bid_ssl_truststore_password": "password",
  "bid_mode": "test"
}
  1. Append the translations file with the following translation

{
    "bidomd_label": "BankID"
}
  1. Append the selector with at reference to the new authenticator by appending this block to the default selector

{
    "id": "6",
    "target": "bidomd",
    "label": "bidomd_label"
}
  1. Restart the Access service

Test the configuration

  1. The selector should now be displayed, including the new option for "BankID".

  2. Select "BankID" and authenticate by scanning the QR-code or selecting "Log in using BankID on this device".

  3. You should now be redirected to the selected application or the Fortified ID test application.

  4. Note: Authentication with production BankIDs will fail, if not configuration is adjusted.

Adjust configuration for production

This use case can also be used with Swedish BankID production environment with some minor changes. You need to change a parameter in the web configuration and change the client certificate to authenticate to BankID production.

  1. Add your BankID p12 keystore as a resource to the Fortified ID Access server

  2. Replace the value of the global parameter bid_mode with production

{
  "bid_mode": "production"
}
  1. Replace the global parameter bid_ssl_keystore_path, bid_ssl_keystore_password and bid_ssl_key_password to refer to your uploaded keystore, ex:

{
  "bid_ssl_keystore_path": "${system.customer_home}/resources/YOUR KEYSTORE FILE.p12",
  "bid_ssl_keystore_password": "YOUR KEYSTORE PASSWORD",
  "bid_ssl_key_password": "YOUR KEYSTORE PASSWORD",
}
  1. Restart the Access service

Some info about bankid_trust.jks

The bankid_trust.jks contains the public keys for both the test and production environment to create HTTPS communication to BankID environment. Since both keys are present no action is needed.

Browse to a site protected by the Access server. Optionally the default login url might be used.

https://www.bankid.com/utvecklare/test/skaffa-testbankid/test-bankid-get
this file
https://localhost:8443/access/authn/samllogin