Account Recovery Link Action

🎯 Purpose

Serves as the central routing mechanism that directs users from various account recovery links to the appropriate recovery system, providing flexibility for both default REL-ID recovery and custom enterprise solutions.


🏗️ Recovery Link Architecture

The Account Recovery Link Action system acts as a configurable gateway that can route users to different recovery implementations based on organizational needs and system configuration.


🔄 Recovery Link Sources

📍 Recovery Link Locations

Account recovery links are strategically placed throughout the authentication system:

  • Pre-login Recovery: "Don't have access to the mobile app" and "Forgot Password" links
  • Partial-login Recovery: "Don't have access to the mobile app", "Can't access Email", "Can't access SMS" links
  • Custom Integration Points: Enterprise-specific recovery entry points

⚙️ Configuration and Routing

🔧 System Configuration

The recovery link destination is controlled through system configuration:

  • Configuration Location: System administration settings
  • Default Behavior: Routes to REL-ID Browser-based Account Recovery IDV module
  • Custom Configuration: Can be changed to route to customer's existing IDV system
  • Flexibility: Supports both out-of-the-box and custom recovery solutions

📊 Routing Options

ConfigurationDestinationUse Case
Default REL-IDBrowser-based Account Recovery IDV (AR-IDV)Standard REL-ID recovery process
Custom EnterpriseCustomer's existing IDV systemEnterprise integration with existing systems
Hybrid ApproachMixed routing based on recovery typeDifferent recovery methods for different scenarios

🔄 Default Recovery Flow

🎯 REL-ID AR-IDV Module

When using the default configuration, recovery links route to the REL-ID Browser-based Account Recovery IDV module:

🛡️ Default Process Benefits

  • Integrated Security: Seamless integration with REL-ID security model
  • Consistent Experience: Uniform recovery experience across all scenarios
  • Comprehensive IDV: Multiple identity verification methods available
  • Audit Integration: Complete logging within REL-ID system

🏢 Enterprise Custom Integration

🔧 Custom IDV System Integration

Enterprises can configure recovery links to route to their existing identity verification systems:

📊 Enterprise Integration Benefits

BenefitDescriptionValue
Existing InfrastructureLeverages current IDV investmentsCost efficiency
Consistent BrandingMaintains enterprise user experienceBrand consistency
Compliance IntegrationWorks with existing compliance systemsRegulatory alignment
Custom WorkflowsSupports specific business processesOperational alignment

🔗 Integration Architecture

🛠️ Technical Integration Points

  • URL Configuration: Simple URL redirect configuration
  • Parameter Passing: Context information passed to custom systems
  • Return Integration: Secure return path back to REL-ID system
  • State Management: Authentication state preserved across systems

📊 Integration Parameters

Information passed to custom IDV systems:

  • User Identifier: REL-ID username or user ID
  • Recovery Context: Type of recovery being attempted
  • Authentication State: Current authentication progress
  • Session Token: Secure session identifier
  • Return URL: Secure return path to REL-ID system

🎯 Configuration Management

⚙️ Configuration Process

  1. System Access: Administrator accesses system configuration
  2. URL Configuration: Set custom IDV system URL
  3. Parameter Setup: Configure information sharing parameters
  4. Return Path: Establish secure return integration
  5. Testing: Validate configuration in test environment
  6. Deployment: Activate configuration in production

🔒 Security Considerations

  • Secure Communication: All integrations use encrypted channels
  • Parameter Validation: Information passed is properly validated
  • Return Security: Return path includes security token validation
  • Audit Trail: All routing decisions logged for security monitoring

🔄 Recovery Flow Variations

📊 Flow Comparison

AspectREL-ID DefaultCustom Enterprise
IDV MethodsREL-ID standard methodsEnterprise-specific methods
User ExperienceREL-ID interfaceEnterprise-branded interface
IntegrationFully integratedHybrid integration
CustomizationStandard optionsFull customization
MaintenanceREL-ID managedEnterprise managed

⚠️ Important Implementation Notes

🔧 Configuration Requirements

  • URL Validation: Custom URLs must be properly validated and secure
  • Return Integration: Secure return path must be properly implemented
  • Parameter Security: Information sharing must follow security protocols
  • Testing Requirements: Thorough testing required before production deployment

🛡️ Security Requirements

  • HTTPS Mandatory: All custom integrations must use secure protocols
  • Token Validation: Return paths must include proper token validation
  • Audit Logging: All recovery routing must be properly logged
  • Access Control: Custom systems must implement proper access controls