Visual intelligence icon

Coming soon: Visual intelligence

Deliver a frictionless experience for access control in the physical world. Integrate facial recognition, computer vision and image capture technologies to deliver advanced authentication and authorization into your access control management solutions and applications.

Full end-user control:

Empower your customers to share what, how and with whom, and for what purpose the data is shared for.

Enrich the knowledge graph:

Your customer consents to the information shared, enriching the knowledge graph with high quality, verified information

Need more information?

One platform

Access products via our front-end tooling or integrate directly into your existing environment administration console

A low code/no code administration and configuration console to help you manage and leverage value from your complex identity relationships. The administration console delivers services to facilitate graph population, data enrichment and granular authorization controls. administration console

Do you want to learn more?

Talk to an identity expert.
Juan Bojaca
Trusted Onboarding and Verification

Proofing and Verification (KYC)

Integrate proofing and verification services with verified attributes, facial matching and biometrics, liveness checks and NFC id document scanning.

Knowledge Based Access Control (KBAC)

Knowledge Based Access Control (KBAC)

Leverage the power of the knowledge graph to perform Dynamic Authorization - interrogating the continuously changing context, allowing for more advanced authorization use cases.

Digital wallet

Digital Wallet

A whitelabeled wallet built to the NIST & EU (eIDAS 2.0) framework, delivering privacy and consent management, verified data sharing and contextual security components.


Unlocking the value of identity with AI

In this webinar, we welcome Lasse Andresen and special guest Scott McNealy, Co-founder of Sun Microsystems to share their thoughts on what we could learn if we applied machine learning and artificial

Read more


Connected Dots: Graph Data for Digital Identity

In this webinar, we go through how graph technology can be applied in a digital identity context and the business value it can deliver.

Read more

The Evolving Role of Identity - So what's next?

We've come a long way in creating trust relationships online but possibly one of the biggest shifts to how digital identity is managed lays directly ahead.

Read more

Come build with us!

Open Source is the driving force for innovation. Together we can solve emerging data and identity concerns for both humans and the exploding world of things and non-person entities.

IndyKite sees the opportunity to build the next generation of digital identity. Our developer-friendly identity framework, based on the relationship graph, supports existing authorization and authentication for humans and non-human identities, while turning the relationships between data into meaningful and actionable insights.