Agency Self Service Demo
+This demonstration showcases how an agency might implement secure identity + verification and account management using ID.me's digital identity network integrated using OIDC and + ASP.NET.
+In this demo, we simulate the use of ID.me for both Authentication Assurance Level + 2 (AAL2) and Identity Assurance Level 2 (IAL2):
+-
+
- AAL2 Authentication: High confidence that the user + controls an authenticator bound to the subscriber's account. It requires either multi-factor + authentication or two single-factor authenticators. +
- IAL2 Verification: High confidence in the asserted + identity’s validity. Involves rigorous identity proofing processes like government-issued ID and + biometric comparison. +
Note: While this demo doesn't perform actual verifications, these measures ensure a high + level of security and identity assurance for accessing sensitive information or performing critical + transactions.
+You are not authenticated
- - - - + +Authenticate
+You are authenticated
+ +Received payload from ID.me:
+Claim Type | +Claim Value | +
---|---|
@claim.Type | +@claim.Value | +
+ +
+ID.me is a digital identity network that helps people prove their identity online, similar to + a physical ID card but for the internet.
+-
+
- Secure identity verification to access sensitive information and perform important + transactions +
- Portability across government agencies and private sector services +
- Compliance with federal identity, credential, and access management (ICAM) standards + +
- Protection of personal information through encryption and secure data practices +
+ +
+ID.me follows guidelines set by the National Institute of Standards and Technology (NIST) for + identity verification, specifically adhering to Identity Assurance Level 2 (IAL2) as defined + in NIST Special Publication 800-63A. IAL2 provides high confidence in the asserted + identity's validity. Key aspects of IAL2 include:
+-
+
- Remote or in-person identity proofing +
- Verification of government-issued photo ID +
- Confirmation that identifying information is valid and current +
- Verification of physical or biometric characteristics to the applicant's physical + presence +
The ID.me verification process typically involves the following steps:
+-
+
- Create an ID.me account or sign in to an existing one. +
- Set up multi-factor authentication for added security. + +
- Upload images of your government-issued photo ID (e.g., driver's license or passport). + +
- Take a selfie for biometric verification, ensuring it matches the photo on your ID. +
- Provide additional information for verification checks, such as SSN. + +
Note: This demo is for simulation purposes only. Please use fictitious data + for verification.
++ +
+If you tried verifying your identity using Self-Service and weren't successful, you may have + the option to finish verifying on a video call with a Video Chat Agent. Video Chat Agents, + or Trusted Referees, are trained identity specialists employed by ID.me to verify your + identity.
+The video chat verification process typically involves:
+-
+
- Preparing necessary documents (e.g., government-issued ID, proof of address). +
- Joining the video call at the scheduled time. +
- Answering questions and showing your documents to the Trusted Referee. +
- Completing any additional steps as guided by the Trusted Referee. +
This option ensures that even if the automated online process doesn't work for you, you still + have a way to verify your identity and access the services you need.
+ID.me supports over 200+ languages for our video chat verification option, ensuring equity of + access.
++ +
+This application integrates with ID.me using OpenID Connect (OIDC), a secure authentication + protocol built on top of OAuth 2.0.
+-
+
- When you click the "Sign in with ID.me" button, the application initiates an OIDC flow. + +
- You're redirected to ID.me to authenticate and verify your identity. +
- After successful verification, ID.me sends an authorization code back to this + application. +
- The application exchanges this code for ID tokens and access tokens. +
- These tokens contain claims about your identity, which the application can use to grant + access to protected resources. +
Important Security Note: In production, tokens would be sent as JWEs (JSON + Web Encryption) to protect sensitive identity information. This adds an extra layer of + protection.
+