Biometric Authentication

Secure accounts, data access, and transactions

Take a step beyond passwords and one-time passcodes to secure customer accounts. It’s as fast and easy as taking a selfie.
Veriff Station view of ID verification statuses
Client logoClient logoClient logoClient logoClient logoClient logo

Led by powerful automation

1s

Real-time response

Using just a selfie, authenticate any user’s identity in one second

100%

Automation

Fully automated facial recognition technology

99.99%

Accuracy

Highly accurate face detection and biometric authentication

99%

First-time match

With Assisted Image Capture included, authenticate users on their first try

How does Veriff’s Biometric Authentication work?

Veriff’s biometric authentication confirms that a returning user is who they claim to be. Our biometric analysis identifies and mitigates fraudulent activities such as account takeover and identity theft.
  1. Ask the user for a quick selfie, and replace legacy KBA and SMS 2FA.
  2. The selfie is compared to a previously verified face and identity, and checked for liveness and realness.
  3. Veriff sends the user back to your platform, and provides you with the authentication decision in about a second.
Biometric authentication flow document selection screen
Biometric authentication flow start screen
Biometric authentication flow end screen

Complete digital & automated UX

Help users access your products and services safely in the real world, while maintaining high security to protect your users and brand while staying compliant.

Replace KBA & Go Passwordless

Unlock doors with confidence

Stop account takeovers

Streamline age-restricted deliveries

Get captured files in realtime

Easy deployment

Enroll once for all authentications

Enroll users with Veriff's Identity Verification service. Trigger biometric authentication for access.

Straightforward integration

Simple API documentation. See full details here.

Omni-channel

Add Veriff’s Biometric Authentication to your flows, bolster security, and take your UX to the next level.
Request
1curl -X POST 2 --url '/v1/sessions/' 3 -H 'Content-Type: application/json' 4 -H 'X-AUTH-CLIENT: API…' 5 -d '{ 6 "verification": { 7 "vendorData": "user uuid", 8 "Timestamp": "2016-05-19T08:30:25.597Z" 9}}''
Response
{ "status": "success", "verification":{ "id":"f04bd…", "url": "https://alchemy.veriff.com/v/eyJ…", "sessionToken": "eyJ…", "baseUrl": "https://alchemy.veriff.com" }}

Interested in Biometric Authentication?

Talk to us

Want to learn more?

Go to blog
Veriff obtains ISO 27001 certification

Blog

Veriff obtains ISO 27001 certification

Veriff has been awarded certification against the ISO/IEC 27001:2013 standard

Caroline Mogford joins Veriff as Chief Marketing Officer

Blog

Caroline Mogford joins Veriff as Chief Marketing Officer

Former marketing leader at Qualtrics joins Veriff’s executive team as CMO to expand strategic marketing initiatives across the globe.

What is AML transaction monitoring?

Blog

What is AML transaction monitoring?

The actual process of monitoring transactions depends on the services your business provides. However, generally speaking, in order to monitor financial transactions, a company will create a rules-based system that’s based on their needs.