Built on open standards, including OpenID Connect and OAuth 2.0, Kenni provides a drop-in solution to add specification compliant and secure authorization and authentication capabilities to your application. Kenni offers an additional layer of security and convenience through passkeys, enabling users to authenticate seamlessly and securely across various devices and applications.
Get startedExperience the power of secure and reliable authentication with Kenni. Join us in empowering Icelanders with trusted access to the digital world, securely and seamlessly.
Key Features
- Open Standards Compliance: We adhere to industry-standard protocols such as OpenID Connect and OAuth 2.0, ensuring compatibility and interoperability with a wide range of applications and platforms.
- Passkey Support: Integrating passkey support into our authentication system offers numerous benefits to your end-users, chief among them being the elimination of the need to remember passwords. Passkeys provide a convenient alternative, allowing users to authenticate themselves securely without the burden of memorizing complex passwords. This not only streamlines the login process but also enhances security by reducing the likelihood of password-related vulnerabilities, such as reuse, exposure or phishing attacks.
- Verified Icelandic National: Kenni utilizes both the electronic id and app authorization mechanisms provided by Auðkenni to ensure that the user accessing your services or applications is a verified Icelandic national.
- Secure Access Control: Utilizing access tokens with scopes provided by Kenni offers a secure and granular approach to accessing protected resources. Developers can allow for the issuing of access tokens with specific scopes that define the level of access granted to their application.
- User-Friendly Experience: We prioritize user experience, offering intuitive interfaces and streamlined processes for authentication and authorization, ensuring a seamless and hassle-free experience for your users.
How it works
- Registration: Developers can use our self-service developer portal to register their client applications, customizing the integration to fit their application's requirements.
- Integration: After registering, developers can seamlessly integrate authentication using either OpenID Connect (OIDC) or OAuth 2.0. For OIDC integration, developers would initiate the authentication flow by redirecting users to our authorization endpoint. Upon successful authentication, our identity provider returns an ID token containing user information, verifying their identity securely. OAuth 2.0 integration involves the client application obtaining an access token from our authorization server, enabling it to access protected resources on behalf of the user.
- Authentication: Once verified, users can securely authenticate themselves using their Icelandic identity credentials, and will then be prompted to add a passkey. Adding passkeys is an optional step that can be skipped in the authorization flow.
- Authorization: Kenni enables authorized access to the registered applications based on requested identity claims and permissions, ensuring controlled and secure data sharing.
- Continuous Support: We provide ongoing support and maintenance to ensure the reliability and security of our authentication service, keeping users protected and empowered.
Benefits
- Security: Our service employs industry-standard security protocols and mechanisms, safeguarding user identities and data against unauthorized access and breaches.
- Convenience: With seamless authentication and authorization processes, users can access your applications with ease, without compromising security or privacy.
- Trustworthiness: As a trusted service provider for Icelandic nationals, we prioritize the security and integrity of user identities, fostering trust and confidence within the Icelandic community.
- Compatibility: Our service is designed to integrate seamlessly with a wide range of applications and platforms, ensuring flexibility and convenience for users across various digital environments.
- Compliance: We adhere to relevant data protection regulations and standards, ensuring compliance with legal requirements and safeguarding user rights and privacy.