Skip to main content

A fully decentralized digital identity solution

Internet Identity redefines user experiences by removing friction from the authentication journey and enabling data sovereignty.

Start building

Start building on Internet Identity

Harness the full potential of digital identity

100% decentralized

Internet Identity is fully decentralized because apps built on ICP store data entirely on-chain. It's more secure and fault tolerant than digital identity solutions hosted on protocols that rely on centralized cloud providers like Amazon Web Services.

User friendly

Instead of using passwords to sign in to apps, users simply unlock their devices with FaceID, TouchID or passcodes to access their accounts. By unlocking their devices, users authorize the use of a passkey. Passkeys are built on standardized technology, making Internet Identity more convenient than traditional authentication methods.

Enhanced security

Internet Identity removes the need for apps to store passwords in a database. When a user creates an Internet Identity, they're automatically assigned a public and private key pair. The private key is locked in a tamper-proof chip on the user's device, so nobody can retrieve it.

Strict privacy

Every time a user creates an account with an app using Internet Identity, a new key pair is generated and managed for that app. This means users can interact with an app without worrying that it will share their data (like Big Tech's Single Sign-On).

Multichain

Once ICP completes its integration with the Ethereum Virtual Machine, decentralized apps built on the Ethereum protocol will be able to integrate Internet Identity and offer users from both ecosystems a convenient, secure, and private way to log in and share verifiable credentials.

ICP is compatible with the Ethereum Virtual Machine. Developers building decentralized apps on the Ethereum protocol can integrate Internet Identity and offer users from both ecosystems a convenient, secure, and private way to log in and share verifiable credentials.

Easy integration

Internet Identity seamlessly integrates with Web2 and Web3 apps. It deploys canister smart contracts to request authentication and verify user identities.

Integrate Internet Identity

Identity solutions for a new era

Seamless authentication

Seamless authentication

Internet Identity is built on WebAuthN, a global authentication standard and a key part of the FIDO framework. It removes the need for usernames and passwords and replaces them with passkeys: registered devices like smartphones or laptops and hardware wallets such as YubiKey or Ledger. To authenticate their identity, users simply connect with Internet Identity and unlock their device.

Verifiable credentials

Verifiable credentials

Once a user registers for a credential, such as date of birth or nationality, they can reuse it with any apps they choose. To protect a user's privacy, Internet Identity creates a temporary identifier when they share a credential, which prevents issuers and verifiers from tracking their activity across different apps.

COMING SOON

Age verification

Age verification

Know your customer

Know your customer

Proof of humanity

Proof of humanity

Academic transcripts

Academic transcripts

A versatile solution for all providers

Enterprises

Enhance the user experience by simplifying authentication and credential sharing and reduce costs and cyberthreats by removing the need to store passwords.

Developers

Add value when designing apps by integrating cutting-edge authentication and credential verification tools into their tech stack.

Education

Ensure the integrity and accuracy of academic records by issuing digital copies of degrees, qualifications, and certificates

Governments

Provide citizens with a decentralized digital identity solution instead of putting their data in the hands of a private company that may host servers in a different country or jurisdiction.

Internet Identity in action

Helix Markets

Authentication in Helix Markets

Helix Markets is a decentralized exchange offering a unique and innovative trading experience for crypto enthusiasts. It introduces features like native multichain liquidity and decentralized custody.

The Problem

One of Helix's biggest obstacles to adoption was the complexity of the authentication process, a common challenge across the Web3 ecosystem. Users need different wallets to log into different dapps, meaning they have to manage multiple key pairs. This friction deterred traders accustomed to the less secure but more convenient Web2 experience.

The Solution

Internet Identity provides traders with digital identifiers they can use throughout the Internet Computer ecosystem, streamlining the authentication journey on Helix's platform and offering quicker and easier access to their wallets. As anchors are portable (up to eight devices can be added as passkeys), Helix knows its traders wherever they log in, while public key cryptography eliminates the risk and burden of managing password databases.

”Internet Identity allows Helix to deliver a Web2 experience to users of Web3 dapps”

– Gorazd Ocvirk, Co-Founder

Get into ICP

Watch videos on Internet Identity, tech advancements, the Internet Computer, and global ICP events.

Watch new videos every week
Identity and Authentication on the Internet Computer

Interview

Identity and Authentication on the Internet Computer

With Björn Tackmann

FAQs

Find answers to commonly asked questions about Internet Identity.

What's wrong with Web2 authentication?

A website stores usernames and passwords in a database. When a user logs in, their device sends their password to the website which checks it against its records. However, databases are increasingly vulnerable to breaches. And while encrypting passwords offers an additional layer of security, storing them as plaintext is bad practice.

To make matters worse, user-generated passwords are easily hackable. Cybercriminals have a host of tools at their disposal, including spyware, phishing or brute force attacks where algorithms use trial and error to guess the right combination of letters, numbers and symbols.

What's wrong with Web3 authentication

Web3 authentication may seem like progress, but users are still vulnerable because they're limited to a single authentication factor. For instance, keys are typically stored on the device used to install a crypto wallet. If someone steals the device or gains access to it, the user loses control of their wallet.

What is public key cryptography?

Public key cryptography is an encryption technique that uses a pair of keys to encrypt and decrypt messages between two entities. The public key is similar to a username so it can be shared, but the private key needs to be kept secret, like a password.

Internet Identity leverages digital signatures, an application of public key cryptography, for the login process. To start, an app sends an authentication request to the user's device. The device takes the request and creates a digital signature using their private key and a cryptographic algorithm. The app then verifies the signature using the user's public key and approves the request.

What makes Internet Identity secure?

Most modern computing devices contain a TPM (Trusted Platform Module) chip. One of the functions of a TPM chip is storing sensitive information, which in Internet Identity's case is a copy of a user's private key. When Internet Identity prompts the user to unlock their device, either by entering a PIN code or using biometrics such as fingerprint recognition, the TPM chip creates a new digital signature using their private key.

The user's private key is secure because the TPM chip is virtually impenetrable. The chip is built into their device's motherboard, and any attempt to tamper with it can cause irreparable damage.

What makes Internet Identity private?

A username for Web2 authentication generally links to an email address which acts as a unique identifier used by big tech to track a user's activity. In Web3's case, transparency may be one of the founding principles of blockchain technology, but it also means anyone can trace the transactions of an individual wallet address using a block explorer.

Cryptographic pseudonyms are digital identities which protect a user's privacy when online. They have a wide range of use cases, from messaging apps to social media platforms and Web3 dapps. Internet Identity creates a pseudonym every time a user logs in, preventing apps from tracking their activity.

Get familiar with the Internet Computer