Authentication & IAM 
for local authorities

Ensuring Compliance with CNIL Guidelines for 'Secure and Robust User Authentication' and 'Transparent Authorization Policies' - in accordance with Regulation 2016/679 of the European Parliament and Council dated April 27, 2016, commonly known as GDPR.

SEE MORE     


CHAT WITH OUR EXPERTS

The challenges of local authorities in IT security


  Conformité

IT security regulations highlight the need to strengthen application passwords. In particular, the CNIL emphasizes ANSSI's recommendations for the use of complex passwords in compliance with GDPR.


 

Coffre-fort  

A regulatory framework defines the implementation of digital vault services. Article 87 of the French Digital Republic Act (LRN) specifies that the vault must ensure data integrity, track performed operations, and guarantee confidentiality by allowing access only to authorized users.

GUIDE ANSSI        


Annuaire Central (IAM)  

Identity and access management is essential for helping organizations meet regulatory requirements. It enforces strict access controls, limits access to sensitive data to authorized individuals only, and reduces the risk of non-compliance. It also enables the implementation of proper segregation of duties (SoD).

187
cyber incidents from January 2022 to June 2023 in local authorities, averaging 10 incidents per month.

28%
of incidents are related to account compromise. 

$230K
the average cost of a cyberattack for an organization today.
$89M
Total amount of fines imposed by the CNIL
CNIL REPORT 2023      

FairTrust - Comprehensive Identity and Access Management Solution

Precisely define 'Who' accesses 'What' and 'When' 

Create and manage user identities and access rights

 

Automate data flows and processes 

Authentication via smartphone (HOTP/TOTP) 

Support for approved physical systems (three-factor principle) 

Automated authentication across all your applications 

Besoin d'informations pour renforcer la sécurité de votre organisation ?

Reliable and robust user authentication

Bénéficiez des programmes de l'état pour renforcer de votre système d'information tout en préservant la satisfaction utilisateur  


Response to National and European Guidelines

   SEE MORE       


Automated Authentication
Quickly handle automated authentication across all your applications, manage robust passwords with an entropy greater than 50, and renew them regularly without user actions. Combine comfort and security.


Strong Authentication - MFA
Support for multiple authentication systems: Smart card, contactless card, FIDO2 key... OTP, TOTP, HOTP... fingerprints, third-party repository OIDC, SAML v2.


Multi-Domain Context
FairTrust SSO manages a single vault for all entities within a group (subsidiaries, partners, GIP...). Sensitive data is stored only once in a centralized security repository, eliminating the risk of desynchronization.

      


User Self-Service
Save time and money by providing your users with a simple and effective self-service solution (password forgetfulness, loss of authentication system), while maintaining the security level of access to the information system.    


Access and usage tracking 
Maintain control of access by gaining visibility into the actions and access of your users across all resources enrolled in the solution.  

Data Encryption
All data is stored in a vault and encrypted using the AES256 GCM algorithm recommended by ANSSI.    

  

Central ID Repository
In addition, FairTrust IAM becomes your centralized directory of individuals. FairTrust IAM automates the creation of users' digital identities from various repositories and feeds your technical LDAP directories.  

Automated Rights Management
FairTrust IAM automates the creation, modification, and deletion of access rights based on auditable management rules. Rights are automatically assigned according to each person's characteristics or role and their position within your organization.    

Report and Traceability

Gain complete, real-time visibility into identity-related activities and obtain valuable insights into resource access, permission changes, unauthorized access attempts, and other events related to identity management. 

These data enable swift identification of potential security issues, detection of suspicious activities, and implementation of appropriate corrective measures. 


Ready to get Start? Leave us a message.

For general purpose

FairTrust
9 Allée du Bois Louët
35235 Rennes
​​ + 33 (0)2 30 96 07 47  

If you want to stay updated on the latest news from FairTrust, sign up to receive our information before anyone else.


You can also schedule a presentation and demonstration of our solutions directly based on your availability.

 

En transmettant mes coordonnées, j’accepte que la société FairTrust collecte mes données afin de traiter ma demande conformément aux dispositions de traitement des données personnelles .

Merci pour votre message

Nos équipes reviendrons vers vous dans les meilleurs délais .
En attendant, nous vous invitons à visiter notre Site web.


We are dedicated to ensuring the success of your projects.


Product Quality
Our solutions are meticulously crafted in adherence to the highest security standards and harness cutting-edge technologies to deliver exceptional performance.

Expertise in Implementation
Our solutions are deployed by our specialized partners within your industry, all of whom are certified in our products, ensuring the success of your project.

FairTrust Journey
We provide continuous support and guidance throughout the use of our solutions to ensure your satisfaction as a user on a daily basis.


OUR PARTNERS

Let's proceed to the next stage.

Did you know you can schedule a direct demonstration of our solutions? Let's set up an appointment and allow us to demonstrate how we can help secure your access.

Schedule a demo