Capital One Auth Tree Node

With Capital One’s ID Proofing API, ForgeRock customers can obtain a source of verified identity attributes from a trusted financial services company that verifies tens of millions of customers every year. Capital One leverages verification tools such as Government ID, mobile network operator checks and credit reporting sources based on your specific identity screening needs.

Project Readme

CapitalOneIdProofing

With Capital One’s Identity Proofing API, ForgeRock customers can obtain a source of verified identity attributes from a trusted financial services company that verifies tens of millions of customers every year. Capital One leverages verification tools such as Government ID, mobile network operator checks and credit reporting sources based on your specific identity screening needs.

The set of authentication nodes is compatible with ForgeRock's Identity Platform 5.5 and above.

Installation

The code in this repository has binary dependencies that live in the ForgeRock maven repository. Maven can be configured to authenticate to this repository by following the following ForgeRock Knowledge Base Article.

Within the root directory of this repository, run the mvn clean package command to generate capitalOneIdProofing-x.x.x-SNAPSHOT.jar in the ./target directory. (NOTE: the .jar does NOT begin with origial-)

Copy the .jar file from the ./target directory into the .../webapps/openam/WEB-INF/lib directory where your AM instance is deployed. Restart the web container to pick up the new nodes. The nodes will then appear in the authentication trees components palette.

Authentication Tree Setup

Nodes

  • Capital One Id Proofing Attribute Collector renders the entry form to collect required information for ID Proofing
  • Capital One Id Proofing kicks off process to Capital One Identity Proofing API and waits for response
  • Capital One Id Proofing Result Parser takes response from API and parses fields for Provision Dynamic Account
  • Provision Dynamic Account performs action of creating account for user within ForgeRock

Configuration

Most of the configuration values for the ID Proofing Node will be found in your app on the DevExchange Portal; the Process variables will be provided to you by your Capital One contact.

Capital One ID Proofing Node

Capital One Id Proofing Node

See below for sample of final authentication tree setup

Sample Authentication Tree

Sample Authentication Tree

Usage

Either set the Organization Authentication Configuration within Authentication->Settings, or force trigger the ID Proofing process by appending &service=AUTHENTICATION_TREE_NAME to your OpenAM login URL. Doing so brings forward the Attribute Collector form for the user. Attribute Collector Form

After filling out the form, the user will be directed complete the ID Proofing steps, following prompts given to them on both the webview and from their mobile device.

Webview

Confirm Send Text Follow Text Link

Mobile

Confirm Send Text Follow Text Link

Webview

Confirm Send Text

Once the user sees the confirmation page above, they will be redirected back to the Identity Platform

Legal

The sample code described herein is provided on an "as is" basis, without warranty of any kind, to the fullest extent permitted by law. ForgeRock does not warrant or guarantee the individual success developers may have in implementing the sample code on their development platforms or in production configurations.

ForgeRock does not warrant, guarantee or make any representations regarding the use, results of use, accuracy, timeliness or completeness of any data or information relating to the sample code. ForgeRock disclaims all warranties, expressed or implied, and in particular, disclaims all warranties of merchantability, and warranties related to the code, or any service or software related thereto.

ForgeRock shall not be liable for any direct, indirect or consequential damages or costs of any type arising out of any action taken by you or others related to the sample code.

Project Information
Partner
ForgeRock
6.0, 6.5
2019-04-04
openam
authentication
authTreeNode
Frank.Gasparovic
here
here