Skip to main content
purple hex pattern

Meet customer and compliance requirements

Financial regulations — like Know Your Customer (KYC), Anti-Money Laundering (AML), and Open Banking laws — demand high-assurance identity verification. Your customers demand flexible, digital service on their schedule. Entrust’s ID proofing solution provides both, supporting over 6,000 government-issued identification documents from 196+ countries, alongside presenter verification and liveness detection options.

These capabilities not only ensure compliance but also help organizations mitigate risks associated with identity fraud and financial crimes. With our Entrust Identity portfolio, businesses can stay ahead of evolving regulatory requirements while offering a seamless, user-friendly onboarding experience. The ability to verify identities across a vast array of global documents enhances trust and security, ensuring that organizations can confidently meet the needs of regulators and customers alike.

man looking at mobile phone

How does identity proofing work?

STEP 1

User takes a photo of their identification

As part of your digital application process, customers use their mobile device to photograph themselves and one of the 6,000 government-issued identification documents from 196+ countries.

mobile phone image with id card in window

STEP 2

User takes a selfie

As part of your digital application process, customers use their mobile device to photograph themselves and one of 6,000 government-issued identification documents from 196+ countries.

mobile phone image with woman's face in window

STEP 3

User's identity is verified

Within seconds, users are approved, denied, or issued a challenge based on policies and rules you establish.

mobile phone image with person info in window

ID Proofing Features

Our ID proofing capability automatically supports 6,000 government-issued documents from 196+ countries, including passports, visas and driver's licenses. Integrations with Interpol and other watch-list organizations, plus advanced technologies, such as facial match verification, make it ideal for high-assurance use cases.

mobile phone icon

Secure Mobile Verification

Customers can use their mobile phone to perform secure self-service identity verification.

purple and gray clouds icon

Integrated Authentication

ID proofing integrates with our complete portfolio of cloud-based identity access management solutions.

mobile fingerprint icon

Mobile SDK

Our mobile SDK makes it easy to integrate our identity proofing solution into your existing mobile websites and apps.

radar icon

Liveness Test Option

A liveness test is available, offering multi-layered security for higher risk transactions and customer profiles.

desktop with checkmark icon

Device Reputation

Our service establishes trust with the device first, then the user, ensuring valid credentials aren't compromised.

laptop with phone icon

Adaptive Authentication

Our adaptive authentication solution provides behind-the-scenes security so it's transparent to your end-users.

Frequently Asked Questions

What is identity proofing?

Identity proofing is the process of verifying that an individual’s claimed identity is accurate and legitimate. This typically involves validating personal information and documents, such as government-issued IDs, against trusted sources to ensure that the individual is who they say they are.

By leveraging advanced verification techniques and secure data sources, ID proofing helps organizations establish trusted identities, enabling secure access to services and resources.

Why is identity proofing important?

ID proofing is crucial for organizations aiming to safeguard against fraud, unauthorized access, and identity theft. By ensuring that only verified individuals gain access to sensitive systems and data, it plays a vital role in maintaining data security and protecting against fraudulent activities.

Moreover, robust identity proofing processes help organizations comply with regulatory requirements, such as those related to data protection and privacy, by ensuring that identities are accurately verified before access is granted. This not only protects the organization but also fosters trust with customers and stakeholders that their personal information is in safe hands.

Identity Portfolio

IAM

Identity Enterprise


Discover Identity Enterprise and learn how Entrust’s identity access management solutions can protect your organization from cyber risk.
IAM

Identity Essentials


Explore Identity Essentials and how its multi-factor authentication software can protect your enterprise.

Get Entrust Identity as a Service Free for 60 Days

Explore the Identity as a Service platform that give you access to best-in-class MFA, SSO, adaptive risk-based authentication, and much more.