Digital Identity

Easily verify and protect identities

Prevents phishing attacks, pharming and identity theft with a system of multi-factor authentication, biometrics, and credential management of both internal and external users.

Prevents phishing attacks, pharming and identity theft with a system of multi-factor authentication, biometrics, and credential management of both internal and external users.

Group (13) (1)
  • Validates identity remotely with active and passive proof of life and anti-spoofing filters
  • Optimizes technical and human resource allocation and cost
  • Supports inclusion by increasing user conversion in remote areas
  • Decreases users-side transaction costs
Authentication Management 1

Authentication Management

Protect your client’s information with a robust authentication strategy for remote access to applications, services, and transactions.

Benefits

bullet
Manages user identity.
bullet
Allows incorporation of multiple authentication factors.
bullet
Flexible, simple and customizable on-premise and SaaS integration.
bullet
Centralizes user, password, and tracking policies
bullet
It integrates with iOS and Android mobile applications through our app or with the SDKs available in native, hybrid, and web languages
bullet
Save costs of password and identity management through self-service with the User Portal.
bullet
Integration through standards like OIDC, SAML, and RADIUS, in addition to REST web services.
bullet
Flexible, secure, and easy-to-manage authentication through access profiles.
bullet
Security in knowing your customers through verified identity by VU Identity Link.
bullet
Simplified access, no password needed.

Default methods allow you to

bullet
Create, validate, block, unblock, and delete users.
bullet
Enable, disable and remove types of authentication factors.
bullet
Validate credentials.
bullet
Modify and assign user's passwords.
bullet
Add Access Control Service groups.
bullet
Enable one time passwords.
bullet
Report the status of a user.

differences

bullet
User portal: enables self-management for password change or recovery and multiple authentication factors configuration.
bullet
Administrator portal: allows the integration of external and internal users and the connection with Active Directory (AD) to synchronize directly with the Authentication Management database. In addition, it maps AD groups with roles within the solution in order to manage access to applications. It also facilitates the assignment of more than one role to the user as well as role-based application access control (RBAC).
bullet
Single Sign-On (SAML/OIDC) - MFA: provides the ability to manage SSO directly from the administrator portal and to configure different authentication factors for different AD groups through RADIUS.
bullet
Reports & logs: incorporates end-points and APIs to make data available and display them in external reports. It also has a set of predefined reports to help the administrator with actions such as rejected passwords and blocked users, among others.
bullet
Access Profiles: Allow for flexible, secure, and easy-to-manage authentication. They are a summary of authentication and access policies, both role-based (RBAC) and attribute-based (ABAC). They can be associated with both applications and roles using fraud prevention rules, incorporating the VU Fraud Analysis.
bullet
User Data: Optionally allows storing personal user information, contact data, and custom fields.
bullet
Verified Identity: Security in knowing your customers through verified identity by VU Identity Link.
bullet
Passwordless Access: Simplified access, no password needed using the FIDO 2 standard.
Onboarding Management

Onboarding Management

Validates the user's digital identity to prevent phishing attacks through the analysis of the identity document and biometric recognition: face, voice and fingerprint.
  • Document verification

  • Facial recognition

  • Certified proof of life

  • Voice recognition

  • Fingerprint recognition

  • Authenticates identity remotely, thanks to the reading of the citizen's identity card, passport or any other photo ID card (template-less).
  • Applies configured weightings to detect potential forgeries and reduce fraud.
  • Evaluates facial features through selfie and live proof.
  • Performs searches and matches between facial images with a single image (1:1) and/or a group of multiple facial images (1:N).
  • Recognizes actions such as winks, smiles, or gestures for live proof.
  • Compares selfies with personal documents and evaluates videos in real time to validate the user's identity.
  • Allows the identification of users according to their speech pattern.
  • Interprets speech and translates identified words and phrases into text.
  • Supports integration into multiple technological environments thanks to its cross-platform nature.
  • Supports different fingerprint types: WSQ (standard used by the FBI), ANSI 378 and JPG.

Document verification

  • Authenticates identity remotely, thanks to the reading of the citizen's identity card, passport or any other photo ID card (template-less).
  • Applies configured weightings to detect potential forgeries and reduce fraud.

Facial recognition

  • Evaluates facial features through selfie and live proof.
  • Performs searches and matches between facial images with a single image (1:1) and/or a group of multiple facial images (1:N).

Certified proof of life

  • Recognizes actions such as winks, smiles, or gestures for live proof.
  • Compares selfies with personal documents and evaluates videos in real time to validate the user's identity.

Voice recognition

  • Allows the identification of users according to their speech pattern.
  • Interprets speech and translates identified words and phrases into text.

Fingerprint recognition

  • Supports integration into multiple technological environments thanks to its cross-platform nature.
  • Supports different fingerprint types: WSQ (standard used by the FBI), ANSI 378 and JPG.
Digital Identity

Digital Identity

Digital Identity

Digital Identity
Validate client identities remotely
Provide a wide array of methods to register, generate, and validate multiple authentication factors
Ensure the continuity of your security strategy in the event of the loss, theft, or the inability of the user to use their chosen authentication method
Prevent phishing, pharming, identity theft, and more

Learn more about VU's Digital Identity solution

Frame 3512

Digital Identity management of both internal and external users

VER MÁS
lightbulb 1

A complete and scalable software solution that easily integrates with your system

VER MÁS
agile 1

A simple, flexible, and customizable setup to implement a cloud-based second factor system on any device with internet access

face-recognition 1

Remote identity authentication with a selfie and an identity document scan including data extraction by way of a barcode, MRZ code, or OCR (ID, DNI, and credit card scan)

How does it work?

Remote authentication
Remote identity authentication through voice recognition, fingerprint scanning, or face recognition paired with an identity document scan.

Control
Mitigate risks by controlling access to your organization’s resources.

Double authentication
Transactions approval on devices, by combining a password with a second authentication factor: a token that the user can access via SMS, email, push notification, or a mobile app.

Integration
Integration methods with government entities to enable the proven validation of aspects of citizen identities across different countries.

Digital Identity's Main Features

Would you like to learn more about
Digital Identity?

Please fill out this form, so that we can provide proper advice.