Verify Identity
Reuse Identity
The financial identity that moves and grows with you.
Get a Portabl ID
Dive in deeper to understand ID verification & security with Portabl.
We're building the future of identity.
Non-document verification
Access both bank-based and mobile network-based verifications covering >10,000 financial institutions and over 230M individuals.
High assurance without the documents
Increase trust and safety without relying on photos by tapping into bank-grade KYC or verified PII and risk signals from mobile networks
Credentials, not forms — reusable by default
Both verification types are retrieved and packed as verifiable credentials after the first verification, making sharing as simple as auth and consent.
Stackable
All types of verifications are packaged into a composable, interoperable formats. This means you can request combinations of bank and telco verification with document verification or PEP/Sanctions in a single to meet your verification needs.
Data minimizing & privacy preserving
Verification is not not all or nothing. While bank and mobile network data is robust, consume only the data you need without forcing your applicant to overshare information.
How it works
Get started - Search our list of supported institutions or enter your telephone number and DOB.
Simple verification - If the flow requires bank verification, we'll establish a secure OAuth2.0 connection with the selected institution. If the flow requires phone number, we'll capture that and DOB to see if we recognize the user.
Instant retrieval - Portabl will instantly retrieve the available ID data associated with the underlying source.
Submit! - The retrieved data is wrapped as a credential and selectively disclosed to meet the relying party configuration.
High assurance aggregation, flexible disclosure
Bank and mobile network endpoints retrieve and bind robust identity and risk information to authenticated users in seconds, but how much you consume is left to your use case — get the benefits of high assurance for even the simplest verification or proof. For example, you can use the bank endpoint to prove just age.
No-login, no-redirect reusability
As with other types of verifications, we bind verified information to the user, account, and underlying cryptographic keys, making future verifications easy as a passkey auth and consent to share.
Protected by strong authentication
Our non-document endpoints rely on strict security standards including the OAuth2.0 standards used throughout the open banking industry.