Configuration: Allowed IDV Methods

šŸŽÆ Purpose

Defines which Identity Verification (IDV) methods are available during account recovery flows. These methods help verify user identity when they cannot access their normal authentication factors.


šŸ“ Configuration Location

  • Module: Auth Server
  • Configuration Name: allowed.idv.methods
  • Access Path: Module Config Management → Auth Server → allowed.idv.methods

šŸ“Š Available IDV Methods Configuration

IDV MethodTypeDefault ValueDescription
accessCodeValidationbooleantrueOTP verification via email/SMS
mobilePushVerificationbooleantrueMobile app push notification verification
securityQAbooleantrueSecurity questions and answers
serverSideBiometricAuthenticationbooleanfalseServer-stored biometric verification
webIdvbooleanfalseWeb-based identity verification flow

šŸ”§ IDV Method Details

šŸ“§ accessCodeValidation

  • Function: Validates user identity through OTP codes sent to registered channels
  • Channels: Email address or SMS (mobile number)
  • Process: System sends code → User enters code → Identity verified
  • Prerequisites: User must have registered email or mobile number
  • Use Case: User cannot access mobile app but has email/SMS access
  • Security Level: Medium (based on channel control)

Availability Conditions:

  • āœ… Step 1 was skipped (user successfully did 1st factor authentication)
  • āœ… Access code channel is available (email or SMS registered)
  • āœ… Communication channel is functional

šŸ“± mobilePushVerification

  • Function: Verifies identity through REL-ID mobile app push notification
  • Process: System sends push → User approves on mobile → Identity verified
  • Prerequisites: Active registered REL-ID device
  • Use Case: User forgot password but has mobile app access
  • Security Level: High (device-based verification)

Availability Conditions:

  • āœ… User has active registered REL-ID device
  • āœ… System requires password as 1st factor (alwaysAskForPassword = true)
  • āœ… User failed password validation (didn't reach mobile-push-as-2nd-factor step)

ā“ securityQA

  • Function: Uses security questions and answers for identity verification
  • Process: System presents questions → User provides answers → Responses validated
  • Prerequisites: User must have set up security questions during registration
  • Use Case: User cannot access mobile devices or communication channels
  • Security Level: Medium (knowledge-based authentication)

Availability Conditions:

  • āœ… User has successfully configured Security Questions & Answers
  • āœ… Questions and answers are stored in user profile
  • āœ… System has multiple questions available for verification

šŸ¤– serverSideBiometricAuthentication

  • Function: Authenticates using server-stored biometric templates
  • Process: User provides biometric sample → Server compares against stored template
  • Prerequisites: User must have biometric template stored on server
  • Use Case: High-security environments with biometric enrollment
  • Security Level: Very High (biometric verification)

Availability Conditions:

  • āœ… User has server-side biometric template stored in profile
  • āœ… Biometric verification system is operational
  • āœ… User has device capable of biometric capture

🌐 webIdv

  • Function: Full web-based identity verification using document verification
  • Process: User provides identity documents → System verifies through KYC API
  • Prerequisites: KYC API configured and operational
  • Use Case: Complete identity re-verification for high-value accounts
  • Security Level: Very High (document-based verification)

Availability Conditions:

  • āœ… KYC API is properly configured
  • āœ… Document comparison capability available
  • āœ… User data on file for comparison
  • āœ… REL-ID IDV Web Server is operational

šŸ“‹ IDV Method Selection Logic

šŸ¤– Automatic Selection Process

  1. Condition Check: System evaluates each enabled IDV method against user profile
  2. Available Methods: Creates list of methods where conditions are met
  3. Single Method: If only one method available, automatically selected
  4. Multiple Methods: User presented with choice of available methods
  5. No Methods: Error page displayed directing to customer support

šŸ‘¤ User Experience Flow


šŸŽÆ Configuration Scenarios

šŸ”’ High Security Enterprise


šŸ“± Mobile-Centric Setup


🌐 Web-Only Environment


āš ļø Configuration Considerations

🚨 Risk Assessment

ScenarioRisk LevelRecommendation
All Methods Disabled⭐⭐⭐⭐⭐ CriticalUsers cannot recover accounts
Single Method Only⭐⭐⭐⭐ HighLimited recovery options if method fails
Access Code Only⭐⭐⭐ MediumVulnerable to communication channel attacks
Multiple Methods⭐⭐ LowBalanced security and usability

šŸ”§ Best Practices

  • Enable Multiple Methods: Provide users with recovery alternatives
  • Match Security Policies: Align IDV methods with organizational security requirements
  • Test Prerequisites: Ensure supporting systems (KYC, biometric) are operational
  • User Communication: Inform users about available recovery methods
  • Regular Review: Periodically assess IDV method effectiveness and usage

šŸ”— Configuration Management Best Practices

šŸ“‹ Configuration Change Process

  1. Planning: Assess impact of configuration changes on user experience
  2. Testing: Validate changes in non-production environment
  3. Communication: Notify users of changes that affect their authentication options
  4. Implementation: Apply changes during maintenance windows when possible
  5. Monitoring: Track authentication success rates after configuration changes
  6. Rollback Plan: Maintain ability to revert changes if issues arise

šŸ›”ļø Security Considerations

  • Factor Diversity: Enable multiple authentication and IDV methods for resilience
  • Risk Assessment: Balance security requirements with user experience
  • Compliance: Ensure configurations meet regulatory and policy requirements
  • Documentation: Maintain records of configuration changes and rationale

šŸ“Š Monitoring and Analytics

  • Usage Metrics: Track which factors and IDV methods are most commonly used
  • Success Rates: Monitor authentication and recovery success rates
  • User Feedback: Collect input on authentication experience and difficulties
  • System Performance: Ensure configuration choices don't impact system performance

šŸ”— Quick Reference

šŸŽ›ļø Configuration Summary Table

Configuration AreaKey ParametersPrimary Impact
Authentication FactorsrememberMe, smsOtp, emailOtp, alwaysAskForPasswordUser login experience
Registration FactorsrememberMe, smsOtp, emailOtp, password, securityQAUser activation options
IDV MethodsaccessCodeValidation, mobilePushVerification, securityQA, serverSideBiometricAuthentication, webIdvAccount recovery capabilities

šŸ› ļø Common Configuration Commands

  • Access Path: Gateway Management Console → Module Config Management → Auth Server
  • Apply Changes: Always click "Restart Services" after configuration updates
  • Validation: Test authentication flows after making configuration changes