User Journey Template for Integrating with Identiface Version 3.0
This template document provides guidance for creating a new user journey with Identiface, outlining steps to replace conceptual screens and submit in PDF format. It includes key information, authentication modes, face verification process, and more for seamless integration with Identiface version 3.0.
- User Journey Template
- Integrating Identiface
- Identiface Version 3.0
- Authentication Modes
- Face Verification
Download Presentation
Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
E N D
Presentation Transcript
<e.g. Acme Corporation Pte. Ltd.> User Journey Template for Integrating with Identiface version 3.0
Readme This template document will guide you through creating your new user journey with Identiface replace the dotted boxes in the following slides with your conceptual screens, for example: Refer to this link for considerations in designing your user journey. Submit your user journey in a PDF format. Submissions that are not in this format will not be processed. Please key in the relevant fields (shaded blue) in the next slide.
User journey key information App Description Please give a brief summary of what your app does and a link to your app s about page (if any) Use Case Description Please give a description of how Identiface is used (e.g. Identiface is used as a step-up authentication for updating passwords) Type of Use Case e.g. eKYC? App onboarding? Building-entry?
User journey key information Mark X where applicable Example x Identiface method(s) used Face Compare Face Verify SDK(s) to integrate Web Android iOS Authentication methods used to complement Identiface (e.g., SMS OTP/manual video call to verify user identity)
Authentication Modes Multi-Factor Authentication Sequence Remarks / Alternate mode of authentication MFA Name 1FA e.g. Singpass Login 2FA e.g. SMS-OTP e.g. manual video call if user can t perform Identiface e.g. Singpass Face Verification (Identiface) 3FA
1. Before initiating Face Verify Other screens as part of your process flow leading up to Face Verify (e.g. SMS OTP, input fields) Other screens as part of your process flow leading up to Face Verify (e.g. SMS OTP, input fields) Landing page
2. Face Verify Process Successful verification screens or error handling Instructions / Consent Screen Face Verify SDK
3. After a successful face verification Final step where the user has access to the protected resource (e.g. user logged in/created account successfully) Other screens as part of your process flow after Face Verify (e.g. SMS OTP, input fields) Other screens as part of your process flow after Face Verify (e.g. SMS OTP, input fields)
Face Verify + Face Compare Sample NOTE: Face Compare can only be used if it is used in tandem with the Face Verify method. REMOVE SLIDES 10-13 IF NOT USED.
1. Before initiating Face Verify Other screens as part of your process flow leading up to Face Verify (e.g. SMS OTP, input fields) Other screens as part of your process flow leading up to Face Verify (e.g. SMS OTP, input fields) Landing page
2. Face Verify Process Successful verification screens or error handling Instructions / Consent Screen Face Verify SDK
3. Face Compare Process Instructions / Consent Screen Capture selfie Call Face Compare API
4. After a successful face verification Final step where the user has access to the protected resource (e.g. user logged in/created account successfully) Other screens as part of your process flow after Face Compare (e.g. SMS OTP, input fields) Other screens as part of your process flow after Face Compare (e.g. SMS OTP, input fields)
Any other design considerations and justifications
Ensuring a high level of security Ensuring a high level of security Elaborate on measures that mitigate risks where the individual or organisation is impacted in the event that the transaction is exploited (e.g. backend verification processes)