Verify Identity
Reuse Identity
The financial identity that moves and grows with you.
Get a Portabl ID
Dive in deeper to understand ID verification & security with Portabl.
We're building the future of identity.
Verifiable Credentials
VCs are a standards-based format for businesses to attest to user information and securely verify it without needing to recollect it. We’re using VCs to simplify a spectrum of verificsations spanning from age and address proofs to full KYC and ACH validation.
Standards-first
Developed in conjunction with organizations like the Worldwide Web Consortium (W3C), verifiable credentials can represent all of the same information that a physical credential represents with the added benefits of secure, digital signatures and provenance-preserving metadata that make them more secure, tamper-proof, and flexible than traditional verification methods.
Instant
Credential verification happens in milliseconds using messaging and authentication standards built on best-in-class security measures including OIDC and OAuth2.0.
Composable
Verifiable claims can be collected, shared, and verified in flexible combinations to meet your assurance requirements
Unphishable
Just like our authentication methods, Verifiable Credential are strictly permissioned and only accessible by the intended recipient during an authenticated session
Data-minimizing
Verifiable Credentials are not all-or-nothing. Individual data points can be shared to satisfy lower-assurance use cases. Alternative, zero-knowledge and predicate proofs can be used to satisfy requirements like age or residency without sharing the explicit data.
High Fidelity
The VC model presents all the relevant information, metadata, evidence, and risk information you need in a single bundle so you can get to decisioning up to 98% faster than traditional verifications
Issue
Aggregate
Share
Verify
Simple to implement via API, SDK, and hosted flow
We've abstracted away low level configuration by focusing on the data, sources, and business rules needed to fulfill robust verification as simply as possible
Layer “roots of trust”
Validate identity attributes from multiple sources in a single interaction to corroborate information to meet your risk needs.