Simplify your customers’ operations by allowing them to sign in using their existing credentials, such as social media details. Streamline the work of your or your partner’s employees with Single Sign-On, allowing them to access external services with the user IDs they use in the workplace.

We will help your define and implement a boundary-independent federation service, which includes not only a secure technical implementation across all stakeholders but also a federation policy for operational models and responsibilities regarding service production. A precise policy definition should be a priority from the start. Clear instructions and carefully assigned responsibilities are essential when identity and access management processes are outsourced to another organisation.

The range of available federation technologies is also extensive. Nixu’s experience includes both commercial and open-source federation and cloud service solutions. 

We have also developed custom federation solutions in some projects.

The range of federation standards is also extensive, including, for example, SAML 2.0, WS-Federation, OAuth and OpenID. We will help you select the technology best suited for your needs.

We have also prepared complete federation packages for specific federation needs. These packages can also be expanded for new federation purposes.

Nixu Virtu-IdP

Access the Finnish government’s e-services conveniently and securely with Virtu-IdP.

Nixu Cloud SSO

Utilise cloud and SaaS services conveniently and securely with the Cloud SSO service.

We have implemented federated authentication using the following products:
PingIdentity: PingFederate, PingOne
Microsoft ADFS
Ubisecure SSO
IBM Security Access Manager (TAM)
Oracle Identity Federation
CA SiteMinder
ForgeRock OpenAM / OpenSSO
Sun Access Manager
Jasig CAS
JBoss PicketLink

Digital Identity for B2B and collaboration

Access management and Single Sign-On solutions for smoother day-to-day operations.
Read more

Digital Identity

With Identity and Access Management (IAM) companies can streamline and secure their business, both internally, and externally.
Read more

Collaborator security audit

Evaluating the security level and compliance status of collaborators and 3rd parties.
Read more