Replace SMS one-time-password. Make a selfie the second factor.
Step up sensitive flows with a sub-2-second face match against the enrolled portrait. Phishing-resistant. SIM-swap-proof. $0.10 per authentication. 500 verifications free every month.
The second factor is the user's face, matched 1:1 against the portrait
they enrolled at sign-up. Liveness blocks the print / replay / mask /
Generative Adversarial Network (GAN) attack on the same frame. Sub-2-second
verdict on entry-level Android. $0.10 per authentication. 500 verifications
free every month.
How it works
From sign-up to verified user in four steps.
Step 01
Create the workflow
Pick the checks you want — ID, liveness, face match, sanctions, address, age, phone, email, custom questions. Drag them into a flow in the dashboard, or post the same flow to our API. Branch on conditions, run A/B tests, no code required.
Step 02
Integrate
Embed natively with our Web, iOS, Android, React Native, or Flutter SDK. Redirect to a hosted page. Or just send your user a link — by email, SMS, WhatsApp, anywhere. Pick what fits your stack.
Step 03
User goes through the flow
Didit hosts the camera, the lighting cues, the mobile hand-off, and accessibility. While the user is in the flow, we score 200+ fraud signals in real time and verify every field against authoritative data sources. Result in under two seconds.
Step 04
You receive the results
Real-time signed webhooks keep your database in sync the moment a user is approved, declined, or sent to review. Poll the API on demand. Or open the console to inspect every session, every signal, and manage cases your way.
Drop-in for SMS OTP · Bound to the user, not a code
Six capabilities. $0.10 per auth.
One adaptive workflow, one signed verdict, same callback shape as your existing OAuth flow. No carrier dependency, no SS7 surface, no SIM-swap exposure.
Open a Sessions API call, redirect the user to the hosted UI, capture one passive frame. Liveness + Face Match 1:1 + the signed webhook return inside the same two seconds. No app install, no SDK, no carrier path.
Hosted UI on a unique session URL — no app required.
02 · Face Match 1:1
Match the live selfie to the enrolled portrait.
The portrait captured during the user's original KYC session is the template. Every subsequent authentication compares the new selfie to it and returns a similarity_score (0-1). Tune the auto-approve threshold per workflow. $0.05 per standalone Face Match call; $0.10 when bundled with Liveness.
Bound to the user, not a code.Tune threshold per workflow
03 · Defeats the SMS attack surface
SIM swap. OTP phishing. Smishing. SS7. All blocked.
The four attacks the United States Federal Bureau of Investigation (FBI) and United Kingdom National Cyber Security Centre (NCSC) warn about for SMS one-time-password — SIM swap, OTP phishing, smishing kits, carrier interception — all defeat SMS. None of them work against a live selfie matched to the enrolled portrait. The FIDO Alliance lists on-device face as phishing-resistant.
FIDO Alliance lists face-on-device as phishing-resistant.
04 · Step up where it matters
Trigger only on the surfaces that warrant it.
Login from a new device, transfer above your risk threshold, password / settings change, account recovery. Pair with Device + IP Analysis so a re-auth on a brand-new device + brand-new Internet Protocol (IP) automatically steps up. Same flow, smarter triggers.
Adaptive — only when risk warrants it.~2s per check
05 · One signed payload
Drop-in replacement for your existing OTP callback.
The webhook delivers status, similarity_score, method, and the X-Signature-V2 header for Hash-based Message Authentication Code (HMAC) SHA-256 verification. Same callback shape, same redirect pattern. Most teams swap SMS for face in a weekend.
Drop-in replacement for your existing OTP callback.
06 · Cheaper than SMS
$0.10 per auth, no carrier fees, no minimums.
United States Tier-1 SMS one-time-password costs between $0.05 and $0.30 per send depending on carrier — and you pay even when the user never receives the code. Didit's biometric authentication is a flat $0.10 with 500 verifications free every month. No carrier dependency, no per-country tariff, no contract minimums.
Use only when you own the capture pipeline. Browser flows = hosted session.docs →
Agent-ready integration
Replace SMS OTP in one prompt.
Paste into Claude Code, Cursor, Codex, Devin, Aider, or Replit Agent. Fill in your stack. The agent provisions Didit, builds the biometric authentication workflow, swaps your existing OTP callback, and ships in a weekend.
didit-integration-prompt.md
You are integrating Didit's Biometric 2FA into <my_stack>. Replace SMS one-time-password (OTP) on sensitive flows — login from a new device, large-value transfer, settings change, account recovery — with a sub-2-second face match against the user's enrolled portrait. Cheaper than SMS. Phishing-resistant. SIM-swap-proof.
1. Enrol the user's portrait ONCE at sign-up via the standard Know Your Customer (KYC) session.
2. On every sensitive action, open a Biometric Authentication session that runs Passive Liveness + Face Match 1:1 against the stored portrait. Verdict in sub-2-seconds.
Pricing (public):
- Biometric Authentication: $0.10 per authentication (Sessions API)
- Standalone Face Match 1:1: $0.05 per match (server-to-server)
- First 500 verifications free every month, forever
PRE-REQUISITES
- Production API key from https://business.didit.me (sandbox key in 60s, no card).
- Webhook endpoint with Hash-based Message Authentication Code (HMAC) SHA-256 verification using the X-Signature-V2 header.
- The user has previously enrolled — either via a full KYC session (recommended; the portrait is stored automatically and never leaves Didit) or via a portrait you supply on each re-auth.
- A workflow_id from the Workflow Builder. The workflow MUST contain LIVENESS, and the session must be opened with workflow_type = "biometric_authentication" (or use a workflow that has FACE_MATCH and pass a portrait_image at session creation).
STEP 1 — Enrolment (one-time, at user sign-up)
Run a standard KYC session at sign-up. Didit stores the portrait (the face captured during the liveness step) as the user's enrolled template, bound to vendor_data.
POST https://verification.didit.me/v3/session/
Body:
{
"workflow_id": "<your KYC workflow>",
"vendor_data": "<your user id>"
}
No additional code — once the user passes KYC, their enrolled portrait is ready for every future re-auth.
STEP 2 — Re-authentication (on every sensitive action)
POST https://verification.didit.me/v3/session/
Headers:
x-api-key: <your api key>
Content-Type: application/json
Body:
{
"workflow_id": "<your biometric_authentication workflow>",
"workflow_type": "biometric_authentication",
"vendor_data": "<the same user id used at enrolment>",
"callback": "https://<your-app>/2fa/callback",
"metadata": {
"reason": "<login_new_device | high_value_txn | settings_change | account_recovery>",
"amount": "<optional, for large-value transfers>"
},
"portrait_image": "<base64 JPEG of the user's enrolment selfie, ≤ 1 MB — REQUIRED when the workflow has FACE_MATCH active; OMIT for liveness-only mode>"
}
Response: 201 Created with the hosted session_url. Redirect the user to it. The hosted UI:
- Opens the front camera
- Captures one passive frame
- Runs Liveness + Face Match 1:1 against the user's enrolled portrait
- Returns the verdict in sub-2-seconds
STEP 3 — Read the signed verdict on the webhook
Body (excerpted for a passing re-auth):
{
"session_id": "<uuid>",
"vendor_data": "<your user id>",
"status": "Approved",
"liveness": { "status": "Approved", "method": "PASSIVE", "score": 96 },
"face": {
"status": "Approved",
"similarity_score": 0.96
}
}
Verify X-Signature-V2 BEFORE trusting the body — HMAC SHA-256 of the raw bytes with your webhook secret.
Session status enum (exact case): Approved | Declined | In Review | Resubmitted | Expired | Not Finished | Kyc Expired | Abandoned.
Branch your application:
Approved → execute the action (sign in, release the transfer, save settings).
Declined → block the action, re-prompt with a higher-friction recovery path (support contact / KYC re-do).
In Review → hold; route to your operations queue.
Not Finished → user abandoned the capture; safe to re-prompt or fall back.
STEP 4 — Alternate path (server-to-server, when you already have the selfie)
If you already captured the selfie locally (native mobile SDK, in-app camera):
POST https://verification.didit.me/v3/face-match/
Headers:
x-api-key: <your api key>
Body (multipart/form-data):
image_a <the live selfie>
image_b <the enrolled portrait>
Response: similarity_score (0-1), status (Approved | Declined | In Review).
Use the standalone path only when you trust your client-side capture pipeline. For browser flows or any surface where the SDK is not embedded, always prefer the hosted session — Didit's liveness check is harder to defeat than a raw camera grab.
WEBHOOK EVENT NAMES
- Sessions: status changes flow through the standard session webhook.
- Always verify X-Signature-V2 on every payload.
CONSTRAINTS
- Base URL for /v3/* endpoints is verification.didit.me (NOT apx.didit.me).
- Feature enum is UPPERCASE: LIVENESS, FACE_MATCH, ID_VERIFICATION, AML, IP_ANALYSIS, AGE_ESTIMATION.
- Method enum is UPPERCASE: PASSIVE, FLASHING, ACTIVE_3D.
- Auth header is x-api-key (lowercase, hyphenated).
- Webhook signature header is X-Signature-V2 (NOT X-Signature).
- Status casing matches exactly: Approved, Declined, In Review, Expired, Not Finished, Resubmitted, Kyc Expired, Abandoned.
- The biometric template is irreversible (a one-way hash) and stored on Didit's infrastructure. You never receive the raw template. Standard data-subject-deletion rules apply.
PRO TIPS
- Pair Biometric 2FA with Device & IP Analysis (bundled into the 200+ fraud-signal stack). A re-auth that originates from a brand-new device + a brand-new IP should always step up to face.
- For the strongest possible surface, swap method PASSIVE for ACTIVE_3D — a short motion challenge — on transfers above your operational risk threshold.
Read the docs:
- https://docs.didit.me/core-technology/biometric-auth/overview
- https://docs.didit.me/sessions-api/create-session
- https://docs.didit.me/integration/webhooks
Start free at https://business.didit.me — sandbox key in 60 seconds, 500 verifications free every month, no credit card.
Open a new country in one click. We do the hard work.
We open the local subsidiaries, secure the licenses, run the penetration tests, earn the certifications, and align with every new regulation. To ship verifications in a new country, flip a toggle. 220+ countries live, audited and pen-tested every quarter — the only identity provider an EU member-state government has formally called safer than in-person verification.
Per authentication, flat. SMS OTP varies $0.05 to $0.30 in the US.
<0s
End-to-end re-auth on entry-level Android — capture to signed webhook.
0
Carrier dependencies, SIM-swap surface, or SS7 attack vectors.
0
Free verifications every month, forever.
Three tiers, one price list
Start free. Pay per usage. Scale to Enterprise.
500 free verifications every month, forever. Pay-as-you-go for production. Custom contracts, data residency, and SLAs (Service Level Agreements) on Enterprise.
Free
Free
$0 / month. No credit card required.
Free KYC bundle (ID Verification + Passive Liveness + Face Match + Device & IP Analysis) — 500 / month, every month
Blocklisted Users
Duplicate Detection
200+ fraud signals on every session
Reusable KYC across the Didit network
Case Management Platform
Workflow Builder
Public docs, sandbox, SDKs, MCP (Model Context Protocol) server