Getting Started With Face Authentication

Overview of face authentication and how it can be used.


Face authentication can provide an added level of security for organizations, applications, or even higher-level sections of application. For example, you could grant access to specific functionality within your application using face authentication. This would ensure the person requesting access has a valid, registered Incode Identity.

📘

An Incode Identity is generated for every user who registers using the Incode onboarding process. Onboarding generates a unique identity for that user based on their biometric data. This Incode Identity can be used for further authentication, ensuring a secure and personalized experience.

Thorough understanding of Incode Identities is a prerequisite for face authentication.

How the face authentication process works

You can implement Incode face authentication by using either the Web or Mobile SDKs to enable a face recognition UI that asks the user for a selfie. This selfie image is then used for comparison using 1:N or 1:1 strategies.

The basic face authentication steps are:

  1. Initialize the Incode SDK.
  2. Run the method.
  3. Based on the face capture, check to see if the user has a registered Incode Identity.
  4. If yes, validate the authentication using the omni/authentication/verify endpoint of the Incode Omni API
  5. In your application back end, check whether Incode verified the authentication, and grant or deny access to the user.

The following diagram can help you visualize these steps.


What’s Next

Learn how to integrate Face Authentication using the Web or Mobile SDKs