TECHNICAL INTEGRATION DETAILS
Check out our technical guides with step-by-step instructions for integrating B-FY into your backend, frontend, or mobile systems.
View technical documentationForget about passwords, complex tokens, or never-ending integrations. We provide everything you need to integrate our solution into your product quickly, securely, and without hassle.
API/OpenID First Architecture / SAML B-FY Compatibility. B-FY offers a well-documented API and OpenID interface that allows companies to rapidly integrate our authentication technology into their platforms—whether mobile apps or physical access points.
No Extra Hardware Needed. B-FY leverages the biometric capabilities of mobile devices, eliminating the need to invest in specialized readers or additional hardware. Users authenticate with their smartphones, simplifying deployment.
Omnichannel Compatibility. The B-FY solution works across multiple platforms and channels, ensuring seamless integration into websites, mobile apps, and even physical environments.
Fast Deployment and Scalability. Whether you're a startup or an enterprise, B-FY's architecture allows for fast deployment and scalability to millions of users—without disrupting existing workflows.
Developer-first
APIs built for speed Use straightforward endpoints and lightweight SDKs to integrate secure authentication in days, not months.
DEVELOPER RESOURCES
Check out our technical guides with step-by-step instructions for integrating B-FY into your backend, frontend, or mobile systems.
View technical documentationUnderstand how B-FY's architecture works and how it fits your products or services from a functional perspective.
View conceptual documentationB‑FY is easy to integrate: With B-FY, you’ll have an authentication platform built on cutting-edge infrastructure, open protocols, and best-in-class security practices. Our service meets the most stringent regulatory requirements for privacy and data protection and can be integrated into your applications in just a few days through a fast and secure process based on high-security architectures and standards.
An open identity protocol based on OAuth 2.0. It enables your applications to trust the authentication performed by B-FY to verify real user identities.
Secure, scalable, and highly available cloud infrastructure. We run our services on AWS to ensure stability and performance.
We fully comply with the General Data Protection Regulation. User privacy is protected by design.
FAQs
If your hybrid app can use native libraries, then B-FY can be integrated without any issues.
You can download our library from the NEXUS repository.
The specific configuration parameters are provided by B-FY and are attributes of the client's dedicated REALM. These include: CLIENT_ID, CLIENT_SECRET, REDIRECT_URI, and LICENSE_CODE.
Just like with the library, the configuration parameters are provided by B-FY and correspond to your client's dedicated REALM. These are: CLIENT_ID, CLIENT_SECRET, REDIRECT_URI, and LICENSE_CODE.
Yes, we've developed an API that allows you to perform operations using a temporary token, simplifying tasks the client may want to carry out with B-FY—whether in a corporate back office or another internal tool.
For security reasons, we recommend generating a new JWT for each request, with a lifespan of 30–60 seconds. This helps prevent unauthorized use of the token for unintended activities.