ID Authentication

Overview

MOSIP offers identity verification services which enables the usage of identity in various contexts. On successful issue of the ID, identity verification services become available for the resident. Online identity verification is enabled through MOSIP's ID Authentication (IDA) module. As MOSIP is a foundational ID system, different services (both government and private) may rely on the foundational ID system to validate the identity of a resident rather than implementing multiple authentication systems. A typical authentication flow is illustrated below:

Authentication types

Yes/No Authentication

MOSIP offers a yes/no API which can be used for verification of attributes supplied using along with authentication factors. The API verfies the identifier and the provided demographic attributes and also validates other authentication factors such as the OTP or biometrics and responds with a yes or a no. A successful verification of the data results in a yes. This kind of API can be typically used to support verification of a limited set of demographic data of the person or for a simple presence verification when biometrics are used.

KYC Authentication

MOSIP additionally offers a KYC API which can be used to get an authorized set of attributes of the resident in the response of the API. This API is intended for usage by authorized relying parties to perform KYC requests. The authentication includes an identifier along with authentication factors such as OTP and biometrics. The information returned is governed by a policy. Different relying parties can be provided with different KYC data based on their needs. The policy helps implement selective disclosure as part of the KYC data. The data thus returned is digitally signed by the server and can be used by the relying party with confidence.

Multifactor authentication

The authentication APIs support multiple factors. These can be:

  • Biometric: Finger, face, iris

  • Demographic: Name, date of birth, age, gender etc.

  • OTP: One Time Password Based on the level of assurance needed for the transaction, the relying party can decide which factors are sufficient for identity verification.

Biometric authentication is performed using third party matchers that perform 1:1 matches on a given modality. Each biometric modality is treated as an independent factor in authentication.

VID

All authentications in MOSIP essentially perform 1:1 matches. This essentially requires the authentication call to specify an identifier of the person and the authentication factors to perform the match on the individual referred to by the identifier. MOSIP supports usage of muliple identifiers for a person. This promotes anonymity and also acts as a deterrent to profiling the individual. The individual can be identified in the authentication transaction by the UIN or other alias identifiers/ VIDs. When a VID is used there are additional checks to see if the VID has not expired or has not been revoked. The expiry of the VID is governed by the policy chosen at the time of creation of the VID.

For understanding VIDs and their characteristics, read more about VID.

Tokenization

In one off usage contexts identity verification can be anonymous. In cases where identity verification is linked to transactions the need identity assurance, there is a need to tie the user identity of the user to the transaction. This is achieved by way of providing such relying parties with a "sticky" token identifier that can be used as a reference ID for the individual in their system. The authentication APIs return a token when the authentication is successful. Based on the type of relying party and their policy, the token is either random or sticky. The expected usage is for the relying party to remember the token returned by the authentication API for referring to their customer and for audit / redressal purposes.

Learn more about the Token ID.

Relying parties and policies

The authentication APIs are consumed by relying parties. They provide services to end user after successfully verifying the identity of their customer. The relying parties can be using the services to perform simple age checks or domicile checks. They could also be open bank accounts and performing KYC process on their customer. Depending on the needs of the relying parties, MOSIP partner management provides features to onboard, authorize and approve policies for access to the authentication services for relying parties. A relying party can request and get access to API keys through the partner management system. These API keys are associated with the policy applicable to the relying party for their use case. A relying party can have multiple policies approved as well as have multiple API keys allocated. This allows them to securely manage access to the authentication services from multiple applications and geographies.

Read more about policies and the partner management workflows.

MOSIP has a provision for specifying the user consent associated with an authentication transaction. This can be stored for audit purposes and the authentication flow can be extended to verify the consent if needed.

Hotlisting

MOSIP has a provision to help protect the misuse of an identity. Any report of a lost identity or detection of fraudulent activity by a fraud, the module can require the temporary suspension of authentication activites on a user. This is enabled by the hotlisting feature. The authentication service checks if the identifier used is hotlisted and if so, the authentication process is aborted and fails. The hotlisting service can be used by helpdesk and fraud solutions to list and delist the identifiers that need to be blocked temporarily.

Last updated