OpenID Connect (OIDC)
OpenID Connect (OIDC)
OpenID Connect (OIDC)
0
framework. It allows third-party applications to verify the identity of the
end-user and to obtain basic user profile information. OIDC uses JSON
web tokens (JWTs), which you can obtain using flows conforming to the
OAuth 2.0 specifications
Learn more
Configure Applications with OIDC Discovery
Force Reauthentication in OIDC
Applications in Auth0
Single Sign-On
User Profiles
Authenticate
ADD LOGIN
Login
Single Sign-On
Passwordless
PROVISION USERS
Identity Providers
Database Connections
Enterprise Connections
Protocols
SAML
OpenID Connect Protocol
OAuth 2.0 Authorization Framework
Web Services Federation Protocol
Lightweight Directory Access Protocol
System for Cross-domain Identity Management (SCIM)
Connection Settings Best Practices
1. Docs
2. Authenticate
3. Protocols
4. OpenID Connect Protocol
==
GPG45 Profile: The level of confidence that has been chosen by your Organisation. This
profile stipulates the combination of documents required to obtain a pass and the TrustID
Guestlink guides the user to submit the correct ones.
OpenID Connect (OIDC) is an identity layer built on top of the OAuth 2.0
framework. It allows third-party applications to verify the identity of the
end-user and to obtain basic user profile information. OIDC uses JSON
web tokens (JWTs), which you can obtain using flows conforming to the
OAuth 2.0 specifications
==
Good Practice Guide 45 (GPG 45) and its role in supporting digital
identity check standards
In the UK, the number of synthetic (or made up) and stolen identities being used
to commit identity fraud is increasing every year. Imposters, fraudsters, and
criminal groups commit identity fraud for a range of different reasons, including
to attempt to gain access to services or benefits to which they’re not entitled,
steal personal, medical or financial information from others, enable organised
crime or to avoid being detected by the police and other authorities.
GPG 45 was therefore created to protect you when checking the identity of your
employees, customers or someone acting on behalf of a business and help you
to only allow access to services to those people who can prove who they are to
the required confidence level. It creates the framework for consistent identity
checking which is focused on outcomes rather than specific technologies and
greatly improves protection against identity fraud.
This consistent and measured way to check identities means that fewer
organisations and services could be targeted by identity fraud. It also means it’s
easier to trust and reuse an identity that’s been checked by someone else.
By carrying out different parts of the identity checking process, the identity
provider can build the necessary confidence that an identity is accurate
There is a score for each part of the identity checking process. These scores are
transferred into an identity profile which then tie into 4 different levels of
confidence – low, medium, high and very high.
Each confidence level tells you how well your organisation or service is
protected against identity risks as well as helping other organisations and
services to understand your identity checking process.
A risk assessment can help you to decide which level you need and those
services at higher risk of fraud related crime should aim to get a higher level of
confidence.
Easy integration with other platforms, websites or Apps thanks to our API.
Create seamless onboarding journeys with our onboarding widget.
Any size of organisation can easily integrate TrustID identity checks into
their own onboarding journey. With comprehensive documentation, you
can quickly and confidently verify the identity of the people you work with –
staff, customers, students – within your own platform.
https://developer.trustid.co.uk/documentation/
The TrustID Cloud provides a rich Application Programming Interface (API) for integrating
your business workflow with identity document-related services.
Workflows¶
This documentation is based on the four main workflows that are used. Your development
process should follow one of these workflows:
Using the API to Submit Applications and Receive Results - here your back end system
uses the API to submit a complete application. TrustID processes the application and
sends a webhook, saying the result is complete. Your back end system performs
authentication with the TrustID server, then receives the results and interprets these.
Using the API to Receive Results - here no data is uploaded from your back end system;
it just uses the API to receive notifications when results are ready, and then to download
them.
Using the API to Create Queued Applications and Receive Results - here your users use
the TrustID web client and/or mobile app to upload documents and images. Your back
end system creates each application, setting custom/flexible field data. The use of this
custom data is the reason for using queued applications.
Using the API to Create Guest Links and Receive Results - here your back end system
specifies custom/flexible field data for an application and triggers creation of a link that
allows a “guest” (a user without an account) to populate the application.
This documentation describes the two main ways to interface with the TrustID Cloud:
Using the TrustID RAW API - allows your business application to interface directly with
the TrustID Cloud via its HTTP/JSON service interface model which works
independently of any programming language or environment. Note that the raw API
does not provide any helper functions or code implementations; it is up to the integrator
to use the HTTP/JSON-based protocol to interface with the TrustID Cloud.
Using the TrustID Javascript API - allows your business application to interface
directly with the TrustID Cloud via the Javascript programming environment. For more
details see .
For example, you could directly extend your web-based business software or cloud
system to communicate with the TrustID Cloud to upload document data, verify document-
related information, manage multiple uploads at the same time or access archived
information.
While the Raw API is the underlying and more fundamental programming model and is
independent of your environment and programming language, the Javascript API is built
on top of the Raw API in order to make it easy to interface with the TrustID Cloud if your
programming model is based on Javascript.
The Javascript API can be used in browser-based websites and web applications
based on React, AngularJS or other frameworks.
It can also be used on the server via its node.js version. Finally, it is also available
on mobile platforms through its React Native support.
https://www.trustid.co.uk/why-choose-idvt-from-trustid-certified-idsp/guide-whitepapers/
==