Remote hiring · Contractors · Vendor identity

One API for every country your workforce comes from.

Your SSO knows the session. It does not know the person. When your next hire lives in Manila, Lagos, or Bogotá, document uploads and video interviews are not enough.

A staffing agency sends you 40 developer CVs for a Tuesday start. Four of them sail through video interviews and sign contracts. Three weeks later, a background-check provider flags anomalies on two of them. A fourth has been quietly routing their paycheck to a wallet cluster linked to DPRK operatives. None of this would have been visible without post-hoc investigation.

Chip-anchored verification moves that investigation to before the contract signs. One 90-second passport scan against the NFC chip — the same chip border control uses — proves the person on the other end of the video is the person on the ID. Nation-signed, cryptographically verified, deepfake-proof.
Worldwide
Global coverage · 179 NFC countries
+200%
Growth in DPRK-linked fake-hire attempts 2025
90 sec
From first scan to verified identity
Proof
Cryptographic proof, not personal data

Remote hiring scaled globally. Identity verification didn't.

Between 2020 and 2026, the distributed-workforce model became default — for software, for finance, for compliance, for customer operations. Remote hiring is now a permanent mode of operation, not a crisis response.

Background-check providers adapted. Identity verification vendors did not. Most remote onboarding still ends at document upload plus a video call — the same checks that failed against deepfakes in consumer KYC are now failing against state-sponsored fake applicants.

NIS2, DORA, and NIST SP 800-63 all now require individual-level identity assurance for personnel with access to regulated systems. Document checks alone no longer clear the bar.

130+
Suspected DPRK-linked wallets suspended by one verification provider in 2025–26
ID.me Identity Fraud Landscape Report 2026
$16.6B
Reported internet-crime losses in 2024, with identity-based attacks a leading vector
FBI IC3 Annual Report 2024
80%
Of breaches involve stolen or compromised credentials — including those obtained by fake hires
Verizon Data Breach Investigations Report 2024

Where hiring risk concentrates.

Some organisations have more remote identity surface than others. These are the patterns where a single onboarding failure causes disproportionate damage.

01
💻

Distributed Software Teams

Engineers with access to source code, production, customer data. A single compromised hire is a supply-chain attack waiting to happen. DPRK IT-worker operations show this at scale.

02
📞

Customer Operations & BPO

Contact-centre agents with access to customer records, payment data, account controls. High turnover, high volume, high regulatory exposure under DORA and NIS2.

03
🧾

Contractor & Vendor Networks

Tier-2, Tier-3 suppliers, staffing agencies, outsourced compliance. Their people touch your systems. NIS2 Article 21 makes their identity your liability.

Your HR stack knows who you hired. It doesn't know who showed up.

Modern HR platforms handle contracts, payroll, onboarding workflows, benefits, and compliance tracking. None of them verify, cryptographically, that the person on the video call is the person who signed the contract — or the person who shows up for work on day one.

What Most HR & IAM Stacks Do Today
  • Document upload (passport image, national ID scan)
  • Video interview with hiring manager
  • Background check from a third-party provider
  • SSO account provisioned in your existing IAM — our X.509 certificate consumed via SAML / OIDC / SCIM
  • Contractor agreements signed via legacy e-sign platform
  • Compliance tracking in HRIS dashboards
What IdentiGate Adds
  • NFC chip read from biometric passport (nation-signed)
  • Chip-anchored liveness against real face
  • eIDAS AdES signature on hire & contract
  • Identity reuse across every vendor & platform
  • Audit chain for NIS2 Article 21 documentation
  • Your HR and IAM systems get signed attestation, not personal data

How does IdentiGate compare?

Workforce verification tooling has grown around three categories — HRIS suites, background-check providers, and enterprise IAM platforms. IdentiGate doesn't replace any of them — it adds the layer they were never built to handle: cryptographic proof of physical identity.

Capability HRIS Suite Background Check IdentiGate
Cryptographic identity proofNoNoYes — NFC chip
Defeats deepfake interviewsNoNoYes
Worldwide coverageVariesVariesYes — 179 NFC countries + document route
Reusable across vendors/platformsNoNoYes — Unified Pseudo-ID
eIDAS AdES on contractsPartialNoYes — default
NIS2 Article 21 audit chainNoNoYes — built-in
Personal data returned to your HR/IAM stackFull identity recordFull identity recordSigned attestation only

Keep your HRIS. Keep your background-check provider. Keep your IAM. IdentiGate adds a thin identity-assurance layer on top — triggered at hire, at every regulated access event, and on every audit demand. Not a rip-and-replace; a missing piece.

What stands between you and trustworthy remote hiring at scale.

01

The remote-interview trust problem

A video call proves a person is on a camera. It does not prove which person. Real-time deepfakes — including voice clones — routinely pass HR video screening in 2026. The fix is not a better model. It is a different anchor.

A single NFC passport scan, performed by the candidate on their own device, binds the interview to the passport's cryptographic signature. The signature is generated by the issuing state. No model required.

02

The contractor attribution problem

Your contractor "Maria" is actually a rotating pool of three people sharing one Upwork account. Your vendor submits invoices for 15 engineers but employs 22 people — or seven. These attributions are invisible to your HR stack.

Passport-anchored identity binds the work to the person — not to the login, not to the account, not to the contract. Every login, every commit, every signed deliverable traces back to a cryptographically verified individual.

03

The NIS2 Article 21 proof problem

NIS2 requires that you document identity controls for workforce and supply chain. Traditional audit-trail exports from your HRIS show names, hire dates, and SSO timestamps — none of which prove identity was ever verified at any real bar.

IdentiGate's evidence layer produces cryptographic audit artefacts that regulators can independently verify, without you disclosing personal data. The proof is in the chain, not in the copy of the passport image.

04

The re-verification tax

Your new contractor verifies for Deel. Then for your VPN provider. Then for your SSO. Then for your bank (for expenses). Then for every SaaS tool. Each step collects data, adds friction, creates breach surface, and none of them share state.

One IdentiGate identity, reused across every vendor and platform — without re-collecting passport images. Less friction for your workforce, less liability for you, less attack surface everywhere.

Not just one product. The complete workforce identity stack.

Each capability below solves a specific moment in the workforce lifecycle — from the first remote hire who never sets foot in your office, to the contractor revoked across 40 vendors in seconds. Deployable today, built on our existing products.

Solve Today — deployable on existing products
🛂

Chip-Anchored Hiring Verification

A company recruiter in Tallinn interviews a candidate from Bogotá. A passport chip scan during offer acceptance turns an uncertain remote hire into a cryptographically verified one.

🔐

Ongoing Workforce Authentication

In a Dual Key world, there is no password or code that moves without the employee's actual device and PIN. Every regulated-access event keeps the human in the loop.

🧾

Contractor & Vendor Identity

A company relies on 40+ vendors. NIS2 Article 21 asks who these people are; most companies cannot answer. One passport scan per individual closes the gap.

✍️

Signed Hiring & Contracting

An eIDAS AdES signature, cryptographically bound to verified passport identity, ends the non-compete dispute before it starts. Court-admissible across the EU, ESIGN-recognised in the US.

📋

NIS2-Ready Audit Chain

Every hire, every access grant, every offboarding event — linked into a tamper-evident cryptographic chain. Generated at the moment of the event, not reconstructed at audit time.

🚀

Batch Workforce Operations

Onboard 200 contractors by Friday. Revoke access for 40 departed vendor staff by end-of-day. One API call — each identity still verified individually, each action still cryptographically signed.

Tomorrow's Edge
🔒

Zero-Knowledge Employment Proof

Proof the worker is cleared in a jurisdiction, without revealing which passport. Same applies to clearance levels, age, residency.

✦ Waiting for industry adoption
🤖

AI Agent Workforce Delegation

AI agent books flights, signs contracts on behalf of a human. Who is responsible? Cryptographically traceable to a verified human.

✦ Waiting for industry adoption
🌐

Portable Professional Identity

Employee leaves, joins new company. Verified identity travels with the person. Each new employer consumes attestation, not documents.

✦ Waiting for industry adoption

Two paths from pilot to production.

🔌
Path 01

API Integration

For HR and IT teams who want IdentiGate verification inside their existing HRIS and IAM stack. You keep Workday, Deel, Rippling, BambooHR — we add the chip-anchored verification primitive at hire and at every NIS2-sensitive access event. Direct integration into your IAM layer (Okta, Entra, Ping, Keycloak) — IdentiGate becomes the regulated-access step-up tier, triggered on privileged operations, audit events, and high-sensitivity workflows.

Your IT/security team integrates via REST API; your IAM consumes our X.509 certificate via SAML, OIDC, or SCIM. Integration timeline is typically weeks, not quarters. Scales from SMB rollouts to regulated enterprises with NIS2, DORA, or NIST SP 800-63 obligations.

  • REST API with SAML/OIDC/SCIM consumption
  • Plugs into Workday, Deel, Rippling, Okta, Entra, Ping, Keycloak
  • NIS2 / DORA audit reporting built-in, cryptographic evidence layer
  • Transaction-based pricing that scales with hiring volume
Pricing
See product page
Authentication
+ integration fee scoped per engagement
✍️
Path 02

Signing Portal

For teams without an HR platform, for pilot deployments, and for remote employees who sign from anywhere. Your employee scans their passport, creates a verified digital identity, and signs their offer letter, contractor agreement, or NDA in the portal — from any country worldwide (179 NFC + document route). The signature is an eIDAS Advanced Electronic Signature, court-ready across jurisdictions, anchored to a passport-verified person (not just an email address).

Zero engineering work on your side. Start within the same afternoon. Especially useful for remote hiring across USA, EU, Asia, Africa — where most e-signature tools produce only Simple Electronic Signatures (SES) that offer weak dispute-resolution weight.

  • Every signer is a passport-verified person — not just an email address
  • eIDAS AdES signatures from day one · court-ready worldwide
  • Team management, delegation, audit trail · available as standalone product
Free / teams
See product page
Signing Portal
Standalone — no integration needed

For full pricing details, see product pages: Identity Verification, Authentication, AdES Signing, Signing Portal. Integration fees are scoped per engagement — we quote after a short discovery call.

Verify a candidate live. In 90 seconds.

20 minutes. A real passport scan on a real phone. See exactly how IdentiGate fits into your HR or IAM stack — and what changes on the day you hire someone you've never met in person.

Security researchers: disclose vulnerabilities responsibly at security@identigate.com