Identity Proofing with Okta

Keep your data safe and accessible
Okta

Every day organizations work with numerous applications and companies, giving them the necessary access to their data. Creating accounts, sharing files, app authorizations and many more actions create a potential fraud risk. Controlling and limiting access to our data becomes a challenge, which escalates with our business growth. How to keep the data safe and at the same time, accessible to the right parties?

 

Learn about the Identity Proofing with Okta.

What is identity proofing?

At its essence, identity proofing is an approach for verifying the identity of individuals accessing an application. It uses various methods including knowledge-based user attributes, wallet-based factors, ID verification, and national identity systems.

The authentication process should not compromise the user experience of the application.

mfa-factors-okta

How can we adapt it in real life?

According to the National Institute of Standards and Technology (NIST) from the US, there are three general factors we can verify when confirming the Identity:

Resolution

Effective identity resolution uses the smallest set of data possible to confirm that an individual is who they claim to be. The most common example are so called knowledge-based verification (KBV) methods, like a user’s mother’s maiden name, first high school, or father’s middle name etc.

Validation

Organizations can determine the authenticity provided by a user in a three-step process. The first is to collect the most appropriate identity evidence, such as a passport or driver’s license, facial recognition or fingerprint scans. The second step confirms the evidence is genuine and authentic; and the last step confirms the data contained on the identity evidence is valid, current, and related to a real person.

Verification

Identity verification is the last component of identity proofing and helps the companies to confirm and connect between a user’s claimed identity and their existence using the evidence they present.

A common practice is to request an ID document and compare it with the previously provided documents in the existing databases, like fraud registry, government records etc.

Our solution to Identity Proofing?

The process of identity proofing is critical to help organizations protect both their users and themselves from existing security threats. For instance, by incorporating an added layer of authentication at every login, organizations can prevent unwanted individuals to access their resources.

 

To do this effectively, companies can use tools like the Okta Identity Engine or Okta’s Customer Identity & Access platform (CIAM).

Okta Access Gateway

OKTA IDENTITY ENGINE

The Okta Identity Engine provides a set of customizable building blocks for every identity experience, such as pre-defined authentication, authorization, and registration flows. Organizations can then create dynamic, context-based user journeys and adapt identity experiences accordingly.

CIAM PLATFORM

With Okta’s ID-proofing integrations, users can verify their identity with the customer’s chosen method, informing downstream access and information systems and potentially triggering access approvals. Identity verification can include document-based proofs like drivers’ licenses, or knowledge-based proofs like invitations to “name the first street you lived on”; optionally, mobile users can be required to photograph themselves to furnish further proof of identity.

Once users have been checked and approved, the Okta Identity Cloud solutions are used to identify and authanticate the users.

 

Avalon by Devoteam is a trusted partner and provider of Okta’s solutions.

Contact us to start your journey in a secure and accessible cloud environment: