Step 2: Determine IDV Method

🎯 Purpose

Analyzes the user's profile and system configuration to determine which Identity Verification (IDV) methods are available and presents appropriate options to the user for identity confirmation.


🔍 IDV Method Analysis Process

📊 Method Availability Assessment

The system evaluates each configured IDV method against the user's current situation and profile to determine what verification options are available.


📋 Available IDV Methods

1️⃣ Access Code Validation

  • Description: Validates user identity through OTP codes sent to registered channels
  • Availability Conditions:
    • ✅ Step 1 was skipped (user successfully completed 1st factor authentication)
    • ✅ Access code channel is available (email or SMS registered)

2️⃣ Mobile Push Verification

  • Description: Verifies identity through REL-ID mobile app push notification response
  • Availability Conditions:
    • ✅ User has an active registered REL-ID device
    • ✅ System is configured to always require password as 1st factor
    • ✅ User was unable to successfully validate password as 1st factor

3️⃣ Security Q&A

  • Description: Uses security questions and answers for identity verification
  • Availability Conditions:
    • ✅ User has successfully set up Security Questions & Answers

4️⃣ Server-Side Biometric Authentication

  • Description: Authenticates using server-stored biometric templates
  • Availability Conditions:
    • ✅ User has server-side biometric template stored on profile

5️⃣ Web IDV

  • Description: Complete web-based identity verification using document verification
  • Availability Conditions:
    • ✅ KYC API is properly configured
    • ✅ Document comparison capability available
    • ✅ User data on file for comparison

🔧 System Configuration Impact

⚙️ Administrator Control

System configuration determines which IDV methods are available for use:

  • Configuration Location: allowed.idv.methods in Auth Server configuration
  • Method Enable/Disable: Each IDV method can be individually enabled or disabled
  • Deployment Flexibility: Organizations can customize available methods

📊 Configuration Examples


🎯 Method Selection Logic

🤖 Automatic Selection Process


📱 User Selection Interface

When multiple methods are available, users see a selection screen:


📊 Method Selection Scenarios

🎯 Single Method Available

ScenarioAvailable MethodUser Experience
Mobile OnlyMobile Push VerificationAutomatic selection, proceed directly
Q&A OnlySecurity QuestionsAutomatic selection, proceed directly
Document OnlyWeb IDVAutomatic selection, proceed directly

🎯 Multiple Methods Available

ScenarioAvailable MethodsUser Experience
Full OptionsPush + Q&A + WebIDVUser choice presented
StandardPush + Q&AUser choice presented
BackupQ&A + WebIDVUser choice presented

🎯 No Methods Available

  • Error Display: Clear error message explaining situation
  • Support Contact: Contact information for customer support
  • Alternative Options: Guidance for alternative assistance
  • Administrative Escalation: Clear path for administrative assistance

🖥️ Error Handling

🚨 No Available Methods


🔍 Method Availability Examples

📊 User Profile Scenarios

User ProfileAvailable MethodsReasoning
REL-ID Mobile + Q&APush Verification, Security Q&ABoth prerequisites met
Web-Only + Q&ASecurity Q&A onlyNo mobile device registered
Full ProfileAll enabled methodsAll prerequisites satisfied
Minimal ProfileAccess Code onlyLimited profile information

⚠️ Important Selection Notes

🔧 Prerequisites Critical

  • Method availability depends entirely on user profile completeness
  • System configuration can disable methods regardless of user profile
  • Multiple verification methods provide user flexibility and system resilience
  • Administrative oversight ensures appropriate security levels

🎯 User Experience Considerations

  • Clear Method Descriptions: Each option clearly explained
  • Security Information: Users understand security level of each method
  • Progress Indication: Users know their position in recovery process
  • Support Integration: Clear escalation path when methods unavailable