The following authentication systems define the essential standards for user identity verification across all services hosted within the Sjukom infrastructure. These systems are designed to ensure secure access, protect user credentials, and enforce proper authorization protocols, maintaining the confidentiality and integrity of common digital services.
Federation providers enable secure authentication and seamless access to multiple systems by verifying identities through trusted external or internal identity providers. These mechanisms ensure strong access control, reduce the need for multiple credentials, and enhance security while maintaining the integrity and confidentiality of common digital services.
-Entity Audience:
-Entity Role
-Supported Authentication Methods:
-Supported Protocols:
-Level of Assurance (LoA):
-