iProov Remote Onboarding Solution
iProov Remote Onboarding simplifies secure citizen identity verification using face, fingerprint, and/or palm biometrics captured directly via a smartphone or web application. Palm and fingerprint modalities are optional add-ons that can be used individually or in combination with face biometrics.
Features
- Certified to UK Digital Identity and Attributes Trust Framework.
- Automated identity verification with ID + face, fingerprint, or palms.
- Smartphone NFC verification of ICAO 9303 documents.
- Presentation Attack Detection (PAD) and Injection Attack Detection (IAD).
- WCAG 2.2 AA conformant and GDPR compliant.
- Red-team tested to national security standards by Five Eyes government.
- Active threat management and continuous cloud-based threat updates.
- Web, Mobile Web, Native Mobile SDKs or no-code app.
- Biometric and Device-based Multi-Factor Authentication.
- Verifiable credential issuance (W3C or ISO/IEC 18013-5 mDL format).
Benefits
- Remotely verify citizens and reduce administrative burden and human error.
- Deliver accessible e-services with WCAG2.2AA conformance and active bias mitigation.
- Provide secure, seamless access to e-services on web and mobile.
- Boost account security with ongoing device and biometric-based authentication.
- Mitigate fraud with advanced attack detection and active threat management.
- Rapidly respond to attacks with ongoing monitoring and incident response.
- Ensure resilience with internal and external red teaming.
- Industry-leading face verification in-production completion rates of <98%.
- Meet GDPR and DIATF compliance.
- Mitigate evolving threats with automated cloud-based threat updates.
Pricing
£0.07 to £2.00 a transaction
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 0 9 8 2 0 0 5 2 9 9 4 1 1 1
Contact
iProov Limited
Matthew Pearch
Telephone: +44 20 7993 2379
Email: contact@iproov.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
- eKYC
- IDV
- VPN access
- Authentication
- Identity Management & Access Management
- Document capture processes - contactless or optical
- Multi-stage Identity Verification processes
- Border Control processes
- Fraud & Risk Management systems - Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
-
Remote Onboarding with Face Biometrics requires devices with a user-facing camera that meets the system requirements.
Fingerprint and Palm Biometrics require devices with a rear-facing camera that meets the system requirements. - System requirements
-
- IOS SDK: iOS 12.0 and above
- IOS SDK: Xcode 14.1 and above
- Android SDK: Android Studio
- Android SDK: minSdkVersion API Level 21 (Android5 Lollipop) and above
- API 31+ for compilation target, build tools, Android compatibility libraries
- Android SDK: AndroidX
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response times are agreed within the chosen service package
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- See the iProov pricing document for details on the support level packages and their pricing
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Each customer gets assigned an onboarding manager who guides the customer through the iProov Customer Onboarding Plan which includes activities such as setup and configuration, access to our SDK and API documentation, and a dedicated portal. In addition, iProov delivers remote and onsite training as required, development support, implementation certification and pre-and post-go-live support.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- This is covered as part of the Data Processing Agreement (DPA) that is agreed at the start of the contract.
- End-of-contract process
- At the end of the contract the verification service ceases. There is no legacy data or handover required, making switch-out painless for the Government customer.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Mobile devices can either use the native app/SDK, or the mobile browser implementation. Desktops all use the browser. The native app generally performs more strongly, in-production results are iOS >98% and Web >95%.
Please note that only native applications have access to a mobile device’s NFC capabilities for document onboarding. - Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
-
IProov Remote Onboarding Solution is delivered via SDKs for iOS, Android and Web, with a customisable interface for the end user.
(See https://github.com/iProov/android#-configuration-options, https://github.com/iProov/ios#-configuration-options, and https://github.com/iProov/web#customisation).
The business user has access to an online portal to manage their service and view results, reports, and performance. - Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- IProov has carried out testing of compatibility with voice over tools (native for iOS and 3rd party apps for Android and devices using browsers).
- API
- Yes
- What users can and can't do using the API
-
Included:
Authorised administrators have the ability to create/enrol, verify and delete users through their lifecycle.
Select appropriate risk profiles for enrolments and verifications.
Validate transaction results.
Limitation would be:
Authorised administrators are not able to define new risk profiles as this would be deemed a security risk. - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
The iProov SDKs are embedded within the service providers application and offer significant user experience customisation options details of which can be found at:
iOS: https://github.com/iProov/ios#-configuration-options
Android: https://github.com/iProov/android#-configuration-options
Web: https://github.com/iProov/web#customisation
Scaling
- Independence of resources
- IProov has active capacity management to ensure that provisioned capacity exceeds the forecast system load by a safety margin. Rapid provisioning to meet short-term load peaks is available. High peak capacity testing has been performed in the context of existing Government and private sector projects.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
IPortal is iProov's customer engagement portal: It is a secure platform giving our customers and partners a single point of access to carry out crucial purposes including; service metrics, user administration, automated service provisioning, integration, reporting, access to dashboards and raising support tickets.
Service metrics will comprise performance-related metrics such as:
- number of verifications in the period;
- number of successful verifications in the period. - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- No user data is collected that would require export. There are options for imagery/system of record integration for appropriately defined criteria.
- Data export formats
- Other
- Other data export formats
- No export appropriate
- Data import formats
- Other
- Other data import formats
- To be agreed between the parties.
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
There is a documented remedy and liability process which is detailed in the service credit and performance appendix in the contract.
Bronze: 99.5%,
Silver: 99.9%,
Gold: 99.95%,
Pro Platinum 99.95%.
All service availability levels are measured over a 12-month period. - Approach to resilience
- Availability is engineered by multiple layers of redundancy both within datacentre and across multiple locations running active/active. Further details are available upon request.
- Outage reporting
- Email alerts of outages are sent to nominated contacts within the Service Provider's organisation and service availability is included within the API.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Other
- Other user authentication
- Service Provider users authenticate using the iProov service by 2FA, two-way TLS, VPN and username or password can be used to access relevant parts of the service as authorised or required.
- Access restrictions in management interfaces and support channels
- Access to management interfaces and support channels is limited to authorised users nominated by the service provider.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Certification Europe (UKAS)
- ISO/IEC 27001 accreditation date
- 20/03/2024
- What the ISO/IEC 27001 doesn’t cover
- Out of scope items are loading bays and outsourced development
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 11/07/2023
- CSA STAR certification level
- Level 2: CSA STAR Attestation
- What the CSA STAR doesn’t cover
- All 17 CSA STAR CCM domains (v4) were covered during certification.
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISO/IEC 30107-3:2017 and ISO/IEC 19795-1:2006 compliant
- NIST 800-63B compliant as reviewed by National Physical Laboratory (NPL).
- Biometric verification ETSI EN319 411-1 and ETSI EN319 411-2
- SOC 2 Type II
- ISO 9001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
IProov in its entirety, including all products, is certified to ISO/IEC 27001(2013). Internal and external auditing is carried out on a regular basis with external audits taking place twice annually.
A member of the Senior Leadership Team (SLT) has specific responsibility for security and reporting is carried out through the SLT to the CEO and board.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Change management baselines are established via version control and via asset records. Where a change is requested or made the base line is evaluated and updated as needed alongside a record of the change. IProov's change management process requires approvals from relevant stakeholders before assets are changed or updated. IProov's risk management process is integrated with its change management procedure which includes all internal and external assets.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- IProov maintains high standards of vulnerability management. As part of our CSA STAR (certified CCM V4) compliance, we update detection tools and vulnerability detection processes regularly, ensuring robust security operations. We adhere to timescales defined in our SOC 2,eIDAS,IRAP AND ISO27001 certifications, and comply with NIS 2 guidelines. We conduct daily vulnerability scans using Nessus and Snyk, with performance reviews performed at least every 90 days. We utilise Crowdstrike for real-time malware detection on endpoints. Our response time for vulnerabilities range from 24 hours for critical issues to 90 days for low risk concerns.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Potential compromises are identified through both automated alerting and manual log review. Suspected or identified compromise response follows ISO27002:2014 section 16.1 which will result in immediate 24x7 initiation of an incident response team if required.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Incident processes and procedures exist for common events. Customers may report incidents by email, raising a P1 ticket of voice. Incident response and reporting follows ISO27002:2016 section 16.1
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
- Wellbeing
Fighting climate change
iProov's commitment to a corporate environmental framework is evidenced through the specialised component of our Carbon Reduction Plan inline with PPN 06/21 this is published on the website and updated regularly. iProov is committed to achieving Net Zero emissions by 2050.Equal opportunity
Since the inception of iProov, we have dedicated ourselves to being an equal-opportunity employer. We have built an accessible workspace close to transportation to assist those who are disabled and created an environment that promotes accessible technology and facilities for those who are neurodiverse. As of 2022, we have committed to focusing on employees' wellbeing by providing mental health resources, growth, and learning opportunities and implementing training to continue to build an inclusive culture. We have focused on accessibility by creating guidelines and support with accessing adjustments, whether those are neurodiversity or physical adjustments. We have clear support mechanisms in place to ensure all employees have equal opportunities. We pride ourselves in having a wide range of employment and training opportunities, providing current and future talent within industries with known skill shortages or high growth. This range starts with Computer Vision Research Engineers to Threat Intelligence Analysts to Software Engineers and Product Managers, giving variety to the diverse skills that we have. By doing this, we are actively tackling inequality in employment, skills, and pay in the workforce, not only by providing opportunities but the ability to grow and develop. We utilise our apprenticeship levy funding across the company to provide all employees with opportunities to gain recognised qualifications to advance their careers. We have invested in a learning platform that gives all employees the opportunity to develop new skills and build expertise in areas that they excel in or in new areas (if this is what they choose to do). Alongside this, we have actively benchmarked all roles within the company to ensure pay fairness for all, regardless of gender.Wellbeing
We have an established Diversity, Inclusion, and Belonging committee and one of our main focuses for 2024 is how we promote mental wellbeing at work and healthy work-life balance. We are doing this via several initiatives such as measuring workload quarterly via engagement surveys, putting in place guidance on mental wellbeing at work, and bringing in external expert speakers on wellness. Our goal is to ensure all employees have access to proper mental health support by giving them on demand care and resources to allow them to put their wellbeing first. We acknowledge that DEI is an area that we will continue to grow into, but we are proud of the impacts we have made and will continue to make.
Pricing
- Price
- £0.07 to £2.00 a transaction
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Free trial services include 250 transactions, available for 4 weeks.