HomeProductsAuthentication
Global Digital Identity

Authenticate people, not passwords

Passwordless, phishing-resistant authentication linked to a verified passport-anchored identity. Every login proves the person — not that someone knows a code. Works across 179 countries, on any platform.

For: CISO · CTO · IAM / PAM teams · Platforms requiring strong customer authentication (SCA)

Request Demo Integration Guide
What passwords prove vs. what IdentiGate proves
Password Proves someone knows a secret
OTP / SMS Proves someone has a SIM card
Authenticator app Proves someone has a device
IdentiGate Proves the actual person
Why IdentiGate Authentication
🔑

Passwordless by default

No passwords to store, rotate, reset, or steal. Authentication is cryptographic — linked to a verified identity and confirmed by the user's PIN on their device.

🛡️

Phishing & SIM-swap resistant

Private keys never leave the device Secure Enclave. No code to intercept, no SMS to redirect, no link to click. Social engineering fails because there's nothing to hand over.

🌍

Works in 179 countries

Same authentication method for every user, regardless of nationality. No need to integrate multiple regional eID providers. One API, global reach.

Universal token: auth + signing

One identity, one integration, two capabilities. The same verified credential that authenticates your user can also sign documents. No separate signing solution needed.

📋

PSD2 & eIDAS ready

Multi-factor authentication by design: possession (device) + knowledge (PIN) + inherence (biometrics at setup). Meets Strong Customer Authentication (SCA) requirements.

📊

Non-repudiation built in

Every authentication creates a cryptographic proof linking the action to the verified person. In a dispute, you can prove who logged in, when, and from which device.

How authentication works

Your user logs in. We prove who they are.

After one-time identity creation (90 seconds), every authentication takes seconds. Your user never leaves your platform.

1

User chooses IdentiGate

On your login page, the user selects IdentiGate as their authentication method and enters their identifier (e.g. personal code or email).

2

Notification on device

The IdentiGate app on the user's phone receives a push notification with the authentication request. The user sees which service is asking and what action is being confirmed.

3

User confirms with PIN

The user enters their PIN1 (for login) or PIN2 (for transactions/signing). The split-key is activated — both halves combine to create a cryptographic authentication proof.

4

Authenticated ✓

Your platform receives cryptographic proof that this specific verified person authenticated. The user is redirected to your service. The whole process takes seconds.

Two PINs, two purposes: PIN1 for authentication (logging in). PIN2 for signing and confirming high-value actions. Same identity, different authorization levels.
What your platform receives

Verified attributes — not raw personal data

When a user authenticates, your platform can request specific verified attributes. You choose what you need — nothing more.

Attribute Description Example
identity_verifiedCryptographic proof that the person is verifiedtrue
passport_countryCountry that issued the passportTR (Turkey)
given_nameFirst name(s) from passportMehmet
family_nameSurname from passportYılmaz
birthdateDate of birth1985-04-12
age_over_18Whether the user is over 18 (zero-knowledge)true
certificate_idUnique cryptographic certificate referenceIG-X509-...

Your platform requests only the attributes it needs. No raw passport images. No biometric data. Compliance-friendly by design — you receive only what your use case requires.

What makes this different

86% of breaches involve stolen credentials. Eliminate the credential.

🛡️

Resistant to every common attack

Passwords can be guessed, phished, or breached. OTPs can be intercepted via SIM-swap. Authenticator apps can be cloned. IdentiGate authentication requires the physical device with the user's private key in Secure Enclave — activated by their PIN. There is no secret to steal, no code to intercept, no link to click.

PhishingBlocked ✓
SIM-swapBlocked ✓
Credential stuffingBlocked ✓
Man-in-the-middleBlocked ✓
Social engineeringBlocked ✓
Insider impersonationBlocked ✓
🔐

Multi-factor by architecture, not by add-on

Most platforms bolt MFA onto password-based systems. IdentiGate is multi-factor from the ground up — every authentication inherently combines three factors. No separate MFA app. No SMS fallback. No "skip for now" option.

📱
Possession
User's physical device with Secure Enclave
🔢
Knowledge
User's personal PIN (never stored anywhere)
👤
Inherence
Biometric verification at identity creation
For your platform

Simple REST API. One call to authenticate.

No PKI expertise needed. No token infrastructure to build. You call our API, the user confirms on their device, you get proof.

Integrate in days

REST API with sandbox. Authenticate, verify attributes, receive cryptographic proof. Standard HTTP — works with any stack.

💰

Transaction-based pricing

Pay per authentication. No setup fees, no license costs, no minimum volumes. Transparent, predictable billing that scales with you.

🔄

Auth + signing in one

Same integration, same user credential. Authenticate with PIN1, sign documents with PIN2. No separate signing solution or provider needed.

Compliance

Meets the requirements that matter

eIDAS
Electronic identification
PSD2 SCA
Strong Customer Authentication
GDPR
Compliant by architecture
KYC / AML
Verified identity for onboarding
Get started

Resources for your team

Stop authenticating codes. Start authenticating people.

20-minute demo: see passwordless authentication and signing — live, from a real device, in real time.

Request Demo All Products