Webinar

Connected Dots: Graph Data for Digital Identity

In this webinar, we go through how graph technology can be applied in a digital identity context and the business value it can deliver. Hosted by Sutton Maxwell and the IndyKite team and including a demo of how it can used to facilitate power of attorney.

Subscribe Icon

Keep updated

Don’t miss a beat from your favourite identity geeks 🤓

Trusted Onboarding and Verification

Proofing and Verification (KYC)

Integrate proofing and verification services with verified attributes, facial matching and biometrics, liveness checks and NFC id document scanning.

Trusted Authentication

Strong Authentication

Perform strong authentication with 3rd party authentication services (including biometric) services to enrich the user authentication journey and flow. 

Knowledge Based Access Control (KBAC)

Knowledge Based Access Control (KBAC)

Leverage the power of the knowledge graph to perform Dynamic Authorization - interrogating the continuously changing context, allowing for more advanced authorization use cases.