Step 2: Determine IDV Method
šÆ Purpose
Analyzes the user's profile and system configuration to determine which Identity Verification (IDV) methods are available and presents appropriate options to the user for identity confirmation.
š IDV Method Analysis Process
š Method Availability Assessment
The system evaluates each configured IDV method against the user's current situation and profile to determine what verification options are available.
š Available IDV Methods
1ļøā£ Access Code Validation
- Description: Validates user identity through OTP codes sent to registered channels
- Availability Conditions:
- ā Step 1 was skipped (user successfully completed 1st factor authentication)
- ā Access code channel is available (email or SMS registered)
2ļøā£ Mobile Push Verification
- Description: Verifies identity through REL-ID mobile app push notification response
- Availability Conditions:
- ā User has an active registered REL-ID device
- ā System is configured to always require password as 1st factor
- ā User was unable to successfully validate password as 1st factor
3ļøā£ Security Q&A
- Description: Uses security questions and answers for identity verification
- Availability Conditions:
- ā User has successfully set up Security Questions & Answers
4ļøā£ Server-Side Biometric Authentication
- Description: Authenticates using server-stored biometric templates
- Availability Conditions:
- ā User has server-side biometric template stored on profile
5ļøā£ Web IDV
- Description: Complete web-based identity verification using document verification
- Availability Conditions:
- ā KYC API is properly configured
- ā Document comparison capability available
- ā User data on file for comparison
š§ System Configuration Impact
āļø Administrator Control
System configuration determines which IDV methods are available for use:
- Configuration Location:
allowed.idv.methodsin Auth Server configuration - Method Enable/Disable: Each IDV method can be individually enabled or disabled
- Deployment Flexibility: Organizations can customize available methods
š Configuration Examples
šÆ Method Selection Logic
š¤ Automatic Selection Process
š± User Selection Interface
When multiple methods are available, users see a selection screen:
š Method Selection Scenarios
šÆ Single Method Available
| Scenario | Available Method | User Experience |
|---|---|---|
| Mobile Only | Mobile Push Verification | Automatic selection, proceed directly |
| Q&A Only | Security Questions | Automatic selection, proceed directly |
| Document Only | Web IDV | Automatic selection, proceed directly |
šÆ Multiple Methods Available
| Scenario | Available Methods | User Experience |
|---|---|---|
| Full Options | Push + Q&A + WebIDV | User choice presented |
| Standard | Push + Q&A | User choice presented |
| Backup | Q&A + WebIDV | User choice presented |
šÆ No Methods Available
- Error Display: Clear error message explaining situation
- Support Contact: Contact information for customer support
- Alternative Options: Guidance for alternative assistance
- Administrative Escalation: Clear path for administrative assistance
š„ļø Error Handling
šØ No Available Methods
š Method Availability Examples
š User Profile Scenarios
| User Profile | Available Methods | Reasoning |
|---|---|---|
| REL-ID Mobile + Q&A | Push Verification, Security Q&A | Both prerequisites met |
| Web-Only + Q&A | Security Q&A only | No mobile device registered |
| Full Profile | All enabled methods | All prerequisites satisfied |
| Minimal Profile | Access Code only | Limited profile information |
ā ļø Important Selection Notes
š§ Prerequisites Critical
- Method availability depends entirely on user profile completeness
- System configuration can disable methods regardless of user profile
- Multiple verification methods provide user flexibility and system resilience
- Administrative oversight ensures appropriate security levels
šÆ User Experience Considerations
- Clear Method Descriptions: Each option clearly explained
- Security Information: Users understand security level of each method
- Progress Indication: Users know their position in recovery process
- Support Integration: Clear escalation path when methods unavailable
Updated 4 months ago
