Easy and Seamless Integration

Forget about passwords, complex tokens, or never-ending integrations. We provide everything you need to integrate our solution into your product quickly, securely, and without hassle.

Frictionless Security,
Smooth Integration

API/OpenID First Architecture / SAML B-FY Compatibility. B-FY offers a well-documented API and OpenID interface that allows companies to rapidly integrate our authentication technology into their platforms—whether mobile apps or physical access points.

No Extra Hardware Needed. B-FY leverages the biometric capabilities of mobile devices, eliminating the need to invest in specialized readers or additional hardware. Users authenticate with their smartphones, simplifying deployment.

Omnichannel Compatibility. The B-FY solution works across multiple platforms and channels, ensuring seamless integration into websites, mobile apps, and even physical environments.

Fast Deployment and Scalability. Whether you're a startup or an enterprise, B-FY's architecture allows for fast deployment and scalability to millions of users—without disrupting existing workflows.

Developer integration

Developer-first

Ship passwordless faster

APIs built for speed Use straightforward endpoints and lightweight SDKs to integrate secure authentication in days, not months.

  • REST / OpenID Interoperable and widely supported.
  • Event hooks React to auth lifecycle events.
  • Sandbox Test flows securely before launch.
  • Detailed logs Trace every auth event for audits.

DEVELOPER RESOURCES

Everything you need to integrate B-FY into your system

TECHNICAL INTEGRATION DETAILS

Check out our technical guides with step-by-step instructions for integrating B-FY into your backend, frontend, or mobile systems.

View technical documentation

CONCEPTUAL INTEGRATION OVERVIEW

Understand how B-FY's architecture works and how it fits your products or services from a functional perspective.

View conceptual documentation
Need Help?

A robust and proven tech stack

B‑FY is easy to integrate: With B-FY, you’ll have an authentication platform built on cutting-edge infrastructure, open protocols, and best-in-class security practices. Our service meets the most stringent regulatory requirements for privacy and data protection and can be integrated into your applications in just a few days through a fast and secure process based on high-security architectures and standards.

OpenID Certification

An open identity protocol based on OAuth 2.0. It enables your applications to trust the authentication performed by B-FY to verify real user identities.

Amazon Web Services

Secure, scalable, and highly available cloud infrastructure. We run our services on AWS to ensure stability and performance.

GDPR – Regulatory Compliance

We fully comply with the General Data Protection Regulation. User privacy is protected by design.

FAQs

Frequently Asked Questions

Can I integrate the B-FY library into my hybrid application?

If your hybrid app can use native libraries, then B-FY can be integrated without any issues.

How can I download the library?

You can download our library from the NEXUS repository.

How do I configure my client with my library?

The specific configuration parameters are provided by B-FY and are attributes of the client's dedicated REALM. These include: CLIENT_ID, CLIENT_SECRET, REDIRECT_URI, and LICENSE_CODE.

How do I configure my client with B-FY?

Just like with the library, the configuration parameters are provided by B-FY and correspond to your client's dedicated REALM. These are: CLIENT_ID, CLIENT_SECRET, REDIRECT_URI, and LICENSE_CODE.

Can I launch authorized requests to perform simple actions?

Yes, we've developed an API that allows you to perform operations using a temporary token, simplifying tasks the client may want to carry out with B-FY—whether in a corporate back office or another internal tool.

Why do we recommend using a short-lived JWT?

For security reasons, we recommend generating a new JWT for each request, with a lifespan of 30–60 seconds. This helps prevent unauthorized use of the token for unintended activities.