To sign in to a government program using, go to the matching tile on Government and follow the steps to connect.

Online Identity Verification

Rapidly Verify Identity Online with Remote Identity Proofing provides seamless online identity verification for government agencies, healthcare, financial services, and ecommerce.

Contact Sales navigate_next

Remotely Verify Identity with a Compliant, Easy-to-Integrate Solution

Verifying an individual’s identity is the first step in establishing that person’s eligibility to receive digital services. Today, it’s a complicated process. Citizens must create a new login with a unique username and password to access each website. This means more passwords, higher vulnerability, and increased risk. securely verifies an individual’s identity in just minutes. Through remote verification of physical IDs, mobile network operator (MNO) data, along with fraud and compliance checks,’s federally-accredited platform is transforming the way citizens access services online.

How it works

Step 1:

The user creates an account, which they’ll use going forward to log in to the website.

Step 2:

The user protects their account from takeover with Multi-Factor Authentication using one of the following options:

  • Enhanced SMS
  • Phone call to landline
  • Authenticator App
  • Security key
  • Code Generator
Step 3:

The user takes a photo of their driver’s license, state ID, or passport to verify their identity.

Step 4:

Data extracted from the document pre-fills form. The user confirms the data and adds their SSN.

Step 5:

A verified credential is created.

Why Organizations Choose for Online Identity Proofing

NIST 800-63-3 Aligned

Meet IAL2/AAL2 identity proofing and authentication standards to comply with federal and state-level requirements.

Interoperable Login

Once a user has verified their identity with, that person will never have to re-verify their identity again across any organization where is integrated.

Easy to Deploy's identity broker makes it easy for organizations to consume multiple third party IDPs and strengthen legacy logins.