Centralized key custody and robust identity authentication.
100% eIDAS signature in the cloud

Some reasons to choose viafirma fortress

Universal

Any device, any operating system. Anywhere. For any country. Intuitive.

Lowest CTO

Save time, costs and resources needed for other signing procedures.

Security

Adapted to the most demanding regulatory framework in the world (eIDAS-UE) in terms of security and advanced digital signature. With access to the certificate through robust double factor authentication, whereby only the owner of the certificate can access and sign with it.

Independent

Whatever technology you use. Compatibility with your company's ebusiness solutions and easy integration.

References

FAQs

What is the signature in the cloud or centralized signature?

The electronic signature in the cloud or centralized signature is a solution of authentication very safe and it improves the usability of the signature. As its name implies, it is characterized by the fact that the digital certificate is logged in a secure server (HSM), and the user accesses it when he wants to sign a document digitally, previous strong authentication of the identity. Strong identification requires at least two identification procedures that can be: something that "knows the user" (password), something that "has the user" (password card, token sms, otp token), something that "does or is the user "(signature, locution, footprint, iris and other biometric factors). Thus the certificate is never in the hands of the owner of it, but it accesses it when it requires authentication without having to install any certificate or software in the device from which the processing is done.

Is the signature in the cloud secure?

The fact that the certificate is not physically installed on any device increases the security of it. If the certificate on a device where passwords are usually saved, it is relatively easy for another person with access to that device to be able to sign for us. However, to use the signature in the cloud, it is needed as we indicated two factors of authentication at least.

How do I generate a certificate in the cloud?

Through the previous registration, the physical and digital identity (enrollment) is linked, allowing the issuance of a personal certificate in a secure cloud server (HSM) that will be invoked when necessary.

What is strong authentication?

Strong identification requires at least two identification procedures that can be: something that "knows the user" (password), something that "has the user" (key card, token sms, otp token), something that "does or is the user "(signature, locution, footprint, iris and other biometric factors).

Documentation

Contact us

Viavansi map
*
*
*
*
>