Indicio Proven Auth allows you to quickly configure single sign-on (SSO) so that your customers or end users can login with portable digital identities instead of usernames and passwords.

By Trevor Butterworth

With Gartner Research predicting a massive shift towards decentralized digital identity and verifiable claims, Indicio has launched a simple, powerful solution for any business or organization to benefit from using Verifiable Credentials — Indicio Proven® Auth.

Proven Auth allows you to quickly configure Single Sign-on (SSO) so that your customers or end users can use a Verifiable Credential to login to applications and websites instead of usernames and passwords. This means:

  • Replacing weak passwords and weak second-factor authentication for better security.
  • No tracking by centralized third-party identity providers.
  • No worries if a federated identity provider goes dark.
  • Reduce steps for authentication in a zero-trust architecture model.
  • Simpler, more secure user experience.
  • Take advantage of the portable digital identity transformation in the European Union (eIDAS, EUDI), the travel sector, and in mobile driver’s licenses.

Unlock the feature-rich technology driving digital transformation

The improved workflow, privacy, and security are enough to justify making the switch — but there’s a lot more feature-rich power to using  Verifiable Credentials for SSO and identity access management.

  1. Get all these features faster and cheaper than conventional identity access management solutions.
  2. Comes with Keycloak for identity access management, but is easily configurable to use other software.
  3. Combine popular protocols  (e.g. OIDC, SAML) with widely-used policy engines (such as Amazon Verifiable Permissions or Abacus) for role- or user-based authorization decisions based on the attributes of a Verifiable Credential.
  4. Unlike conventional identity provision, Proven Auth enables systems to allow access based on credentials they have never seen before provided they trust the source (e.g., government-issued ID).  
  5. Credentials can be quickly configured to handle complex information flows, making it easier to implement least-privilege access for zero trust.
  6. Verifiable Credentials go beyond the limits of passkeys, do not need to be enrolled,  and they are able to hold contextually useful information that can be shared by consent (simplifying compliance).

How Indicio Proven Auth delivers next-gen SSO, privacy, security, and user experience. 

Conventional SSO requires you to use a third-party identity provider to authenticate access to multiple applications and services. While this saves you from entering a password and username for each session with each service, it still means relying on a subscription to a third-party identity provider and cumbersome password rotation, which add additional expense and unnecessary complexity to the user experience.

For example: if an employer issues a Verifiable Credential to an employee, the employer can be certain it’s their employee accessing an application or system rather than simply trust an outside identity provider. The employee doesn’t need to use or rotate passwords, their access into the company’s systems cannot be stolen or phished, and third-party identity providers aren’t able to track employee login behavior.

Seamless SaaS access

Verifiable Credentials use advanced cryptography for instant, seamless authentication. You can be certain of the source of the credential, you can be certain that it is bound to the person or organization it has been issued to, and you can be certain that the data inside has not been altered.

SaaS applications can be quickly configured to accept a Verifiable Credential instead of a third-party identity provider. All you need to do is issue a Verifiable Credential or decide which Verifiable Credential issuers are valid for accessing your system. When logging into an application, Proven Auth checks to see if the credential issuer is valid and provides the destination system with the necessary data about who you are and what you should have access to. Proven Auth doesn’t need to have seen your credential before to do this.

Combine SSO with secure biometric authentication
For critical security access, Verifiable Credentials are a powerful way to implement biometric access, as a liveness check can be accompanied by the presentation of a biometric template bound to a credential and both compared for instantaneous authentication.

Do more for less

Compared with current approaches to managing identity, privacy, and security, Gartner’s Market Report notes that decentralized identity and Verifiable Credentials  represent “magnitudes of improvement in terms of efficiency, cost and assurance.”

To see how Indicio Proven Auth can transform your identity access management and prepare you to take advantage of a decentralized world, why not book a demo and learn how  Indicio is deploying Verifiable Credential solutions across different sectors for seamless trust.

To learn more about Indicio Proven Auth and verifiable credentials, contact us or visit us at indicio.tech/proven-auth/

###

Sign up to our newsletter to stay up to date with the latest from Indicio and the decentralized identity community