With Capital One’s Identity Proofing API, ForgeRock customers can obtain a source of verified identity attributes from a trusted financial services company that verifies tens of millions of customers every year. Capital One leverages verification tools such as Government ID, mobile network operator checks and credit reporting sources based on your specific identity screening needs.
The set of authentication nodes is compatible with ForgeRock's Identity Platform 5.5 and above.
The code in this repository has binary dependencies that live in the ForgeRock maven repository. Maven can be configured to authenticate to this repository by following the following ForgeRock Knowledge Base Article.
Within the root directory of this repository, run the
mvn clean package command to generate
capitalOneIdProofing-x.x.x-SNAPSHOT.jar in the
./target directory. (NOTE: the
.jar does NOT begin with
.jar file from the
./target directory into the
.../webapps/openam/WEB-INF/lib directory where your AM instance is deployed. Restart the web container to pick up the new nodes. The nodes will then appear in the authentication trees components palette.
Authentication Tree Setup
- Capital One Id Proofing Attribute Collector renders the entry form to collect required information for ID Proofing
- Capital One Id Proofing kicks off process to Capital One Identity Proofing API and waits for response
- Capital One Id Proofing Result Parser takes response from API and parses fields for Provision Dynamic Account
- Provision Dynamic Account performs action of creating account for user within ForgeRock
Most of the configuration values for the ID Proofing Node will be found in your app on the DevExchange Portal; the Process variables will be provided to you by your Capital One contact.
Capital One ID Proofing Node
See below for sample of final authentication tree setup
Sample Authentication Tree
Either set the Organization Authentication Configuration within Authentication->Settings, or force trigger the ID Proofing process by appending
&service=AUTHENTICATION_TREE_NAME to your OpenAM login URL. Doing so brings forward the Attribute Collector form for the user.
After filling out the form, the user will be directed complete the ID Proofing steps, following prompts given to them on both the webview and from their mobile device.
Once the user sees the confirmation page above, they will be redirected back to the Identity Platform
The sample code described herein is provided on an "as is" basis, without warranty of any kind, to the fullest extent permitted by law. ForgeRock does not warrant or guarantee the individual success developers may have in implementing the sample code on their development platforms or in production configurations.
ForgeRock does not warrant, guarantee or make any representations regarding the use, results of use, accuracy, timeliness or completeness of any data or information relating to the sample code. ForgeRock disclaims all warranties, expressed or implied, and in particular, disclaims all warranties of merchantability, and warranties related to the code, or any service or software related thereto.
ForgeRock shall not be liable for any direct, indirect or consequential damages or costs of any type arising out of any action taken by you or others related to the sample code.