Step 2: Determine IDV Method

šŸŽÆ Purpose

Analyzes the user's profile and system configuration to determine which Identity Verification (IDV) methods are available and presents appropriate options to the user for identity confirmation.


šŸ” IDV Method Analysis Process

šŸ“Š Method Availability Assessment

The system evaluates each configured IDV method against the user's current situation and profile to determine what verification options are available.


šŸ“‹ Available IDV Methods

1ļøāƒ£ Access Code Validation

  • Description: Validates user identity through OTP codes sent to registered channels
  • Availability Conditions:
    • āœ… Step 1 was skipped (user successfully completed 1st factor authentication)
    • āœ… Access code channel is available (email or SMS registered)

2ļøāƒ£ Mobile Push Verification

  • Description: Verifies identity through REL-ID mobile app push notification response
  • Availability Conditions:
    • āœ… User has an active registered REL-ID device
    • āœ… System is configured to always require password as 1st factor
    • āœ… User was unable to successfully validate password as 1st factor

3ļøāƒ£ Security Q&A

  • Description: Uses security questions and answers for identity verification
  • Availability Conditions:
    • āœ… User has successfully set up Security Questions & Answers

4ļøāƒ£ Server-Side Biometric Authentication

  • Description: Authenticates using server-stored biometric templates
  • Availability Conditions:
    • āœ… User has server-side biometric template stored on profile

5ļøāƒ£ Web IDV

  • Description: Complete web-based identity verification using document verification
  • Availability Conditions:
    • āœ… KYC API is properly configured
    • āœ… Document comparison capability available
    • āœ… User data on file for comparison

šŸ”§ System Configuration Impact

āš™ļø Administrator Control

System configuration determines which IDV methods are available for use:

  • Configuration Location: allowed.idv.methods in Auth Server configuration
  • Method Enable/Disable: Each IDV method can be individually enabled or disabled
  • Deployment Flexibility: Organizations can customize available methods

šŸ“Š Configuration Examples


šŸŽÆ Method Selection Logic

šŸ¤– Automatic Selection Process


šŸ“± User Selection Interface

When multiple methods are available, users see a selection screen:


šŸ“Š Method Selection Scenarios

šŸŽÆ Single Method Available

ScenarioAvailable MethodUser Experience
Mobile OnlyMobile Push VerificationAutomatic selection, proceed directly
Q&A OnlySecurity QuestionsAutomatic selection, proceed directly
Document OnlyWeb IDVAutomatic selection, proceed directly

šŸŽÆ Multiple Methods Available

ScenarioAvailable MethodsUser Experience
Full OptionsPush + Q&A + WebIDVUser choice presented
StandardPush + Q&AUser choice presented
BackupQ&A + WebIDVUser choice presented

šŸŽÆ No Methods Available

  • Error Display: Clear error message explaining situation
  • Support Contact: Contact information for customer support
  • Alternative Options: Guidance for alternative assistance
  • Administrative Escalation: Clear path for administrative assistance

šŸ–„ļø Error Handling

🚨 No Available Methods


šŸ” Method Availability Examples

šŸ“Š User Profile Scenarios

User ProfileAvailable MethodsReasoning
REL-ID Mobile + Q&APush Verification, Security Q&ABoth prerequisites met
Web-Only + Q&ASecurity Q&A onlyNo mobile device registered
Full ProfileAll enabled methodsAll prerequisites satisfied
Minimal ProfileAccess Code onlyLimited profile information

āš ļø Important Selection Notes

šŸ”§ Prerequisites Critical

  • Method availability depends entirely on user profile completeness
  • System configuration can disable methods regardless of user profile
  • Multiple verification methods provide user flexibility and system resilience
  • Administrative oversight ensures appropriate security levels

šŸŽÆ User Experience Considerations

  • Clear Method Descriptions: Each option clearly explained
  • Security Information: Users understand security level of each method
  • Progress Indication: Users know their position in recovery process
  • Support Integration: Clear escalation path when methods unavailable