ID-Auth
In the previous section, we discussed the concept of a digital ID. It’s imperative to reiterate that the core attributes of a digital ID are that it is both machine and human-readable, verifiable, and digitally signed to ensure it is tamper-proof.
Verifying the identity of a user (also called authentication) before any transaction is a fundamental function in any economy. It is the key feature that can upgrade any existing ID system to operate as digital public infrastructure. Everyday activities such as opening a bank account, accessing a government service, purchasing a mobile SIM card, etc., require a layer of trust and traceability. Traditionally, verification has been done by producing physical copies of any government-issued document, with acceptance left to the discretion of the individual/entity providing the service. This is a low-trust, time-consuming, and expensive process.
The most powerful application/ addition of any identifier is to use it for electronic authentication across a digital economy by both public and private entities. This can be done by building a digital authentication layer on top of the ID system, enabling people to prove their identities online or offline.
ID authentication is the process by which an ID number or a tokenized version of the ID, combined with one or more authentication factors, is used to verify a citizen's identity. The ID system can be queried to provide a binary (Yes/ No) response to the question: “Are you who you claim to be?”
There are a few key modes of authentication:
Demographic; which verifies a person’s name, address, date of birth, or other information fields
Biometric; which verifies a person’s fingerprints or iris
Face authentication; which verifies a person’s face features
One-time password (OTP); where a single-use password is sent to a registered mobile number or email address
ID Authentication provides an API-based authentication mechanism for entities to validate individuals. In each of the authentication modes described above, the ID number and one piece of information are submitted to the ID authority’s database for verification. The ID authority confirms the accuracy of the details submitted, or the lack thereof.
Additionally, offline local ID authentication can happen if the ID authority offers a digitally signed artefact, such as a JSON/XML document (as a file or in QR code format), containing the foundational/functional ID or ID alias, photo, and any other minimal information required for validation to deliver a service.
Depending on the strength of verification required, two-factor authentication can also be considered. In all these cases, the citizen is assumed to have consented to the verification process.
Authentication should be evaluated across three key dimensions:
Proof: What's the authentication intended to prove? Is it proof of document, proof of identity, proof of presence or proof of existence.

Self and assisted channels
Offline and online modes

Building this authentication layer on ID and opening it to licensed private and public service providers is a huge step towards innovation as well as inclusion. Online, low-cost, and almost instant authentication will power the rise of an entirely new class of applications and strengthen trust in the digital economy.
Probable challenges & workarounds:
Hard Infrastructure, Connectivity, and Coverage: Procurement of any specialized hardware for authentication can become prohibitively expensive at a national scale. This and accessibility constraints, can impede the delivery of services in rural and remote areas.
Offering offline, mobile-first authentication can eliminate the need for smaller-scale verifiers to procure expensive hardware such as smartcard readers or biometric scanners.
Governments can address this by allowing private players to become e-authentication service providers after adequate training and certification. Opting to publish all the hardware standards brings market forces into play, resulting in competitive prices for everyone.
Inclusion & scale: Not all segments of the population can utilise biometrics due to factors such as age or disability. Additionally, not everyone possesses the digital proficiency to own or use a mobile phone. Overlooking these realities risks excluding these vulnerable groups from accessing vital services.
Enabling multimodal (via OTP, QR codes, biometrics and facial recognition) & offline authentication will solve for inclusion at scale, increasing the coverage of services.
Data security & privacy: Concerns about the security of data and possible misuse of the shared information.
It’s on the government to balance innovation while ensuring that no one has uncontrolled access to private data. The concerned government departments can choose to identify authorised service providers after licensing and testing. These should be mandated to maintain logs of data accessed, which can then be scrutinised by the regulators.
The digital ID serves as a key to a broad spectrum of services, encompassing financial inclusion, social protection, and efficient benefits delivery. Seamless, inexpensive user verification can power multiple use cases within the government and beyond. For example,
Authentication for benefits delivery like -
- Government-to-Person (G2P) payments
- Health insurance coverage
- Enrollment in scholarship programs
- Subsidy distribution
Voter registration
Biometric attendance for government officials and schemes beneficiaries
Authentication for data fetches (such as credentials)
Facial recognition authentication for liveness
References:
Last updated
Was this helpful?