Build powerful identity tools into your applications

Combine Self APIs into workflows to streamline user management and security

100%
Biometric authentication
200x
Cheaper than legacy ID verification
No
Centralised Data about Users

Workflows

Identification

Gate everything your team or users do using privacy preserving biometrics they control. Know exactly who your user is, trust their credentials and signatures and allow instant onboarding and PoS processes.

Authentication

Build critical identity checks into everyday workflows, meet regulatory requirements and secure day-to-day operations.

Digital Signatures

Quickly build digital signatures into your apps or workflows to turn your interactions into commitments. From signing PDFs to booking a hotel or accepting a shift as a part time worker every commitment can be secured with a biometrically gated digital signature.

Built for developers

SDK Examples
Mobile SDKs allowing you to build secure and user-friendly applications for Android and iOS and server-side SDKs designed for robust backend integrations.
Documentation
Clear, well-documented APIs and SDKs for popular languages/frameworks, and plenty of examples, to significantly reduce development time and effort.
Sandbox
Our Sandbox mimics production, including APIs and authentication flows to ensure your testing reflects a real world use case. Develop integrations without concerns about production stability or conflicts, innovate and release on shorter cycles.

" The Internet was built without a way to know who and what you are connecting to. This limits what we can do with it and exposes us to growing dangers. If we do nothing, we will face rapidly proliferating episodes of theft and deception which will cumulatively erode public trust in the Internet. "

Kim Cameron
Architect of Identity, Microsoft Corporation

Blog

The Age of Paradoxical Security
Why, after decades of security innovation, does the volume and cost of digital fraud appear to accelerate?
The Future of Trust
In his paper, Kim Cameron called for an identity layer for the internet. Self has spent six years researching and developing a solution to that challenge. Here, we look at what that is.
Two Decades of Neglecting the Digital Identity Crisis
Kim Cameron's work was foundational, but a lot has happened in the intervening 20 years. Now not only do we need to implement his rules, we have to solve the problems caused by doing nothing for 2 decades.

FAQ

What is an identity and authentication network, and why do I need it?
It's a system that helps verify who your users are (identity) and control what they can access (authentication and authorisation). It saves development time, improves security, and can help you meet compliance requirements.
How do I integrate Self into my application?
Follow the links to try now, or head to our documentation to be taken through the process of integration. It's simple and quick with plenty of examples and code snippets to help guide you.
How does Self handle security?
- End-to-end encrypted communication between devices uses Message Layer Security (MLS) end-to-end encrypted communication between devices.
- W3C Verifiable Credentials (VCs) allow users to securely assert and demonstrate claims about themselves and others.
- Self is underpinned by a robust, tamper-evident and W3C Distributed Identifiers (DIDs) compliant Public Key Infrastructure (PKI) allowing for realtime management of keys and their revocations.
- Self Leverages a number of insudtry standard and accredited ciphers, signature schemes and cryptographic functions, such as Ed25519 (FIPS 186-5), SHA3 (FIPS 202), AES 256 (FIPS 197) and Curve25519.
- All actions are authenticated via signature, with real time key revocation to ensure you are always making up to date decisions.
- Keys are held securely in an on-device encrypted wallet. Usage of keys are gated via biometric checks.
Can I manage and customise user data?
Yes. You can store user profiles, roles, and custom fields with the user's permission. But Self is designed to protect you and users by replacing Personally Identifiable Information (PII) like names and emails with a non-correlatable SelfID, with the PII distributed to the user to store in their phone. It means your dataset is safer and outside of regulation.
How does multi-factor authentication (MFA) work?
Self is already a biometric MFA solution, so you don't need to integrate or pay for external methods like TOTP, SMS or push.
What languages and frameworks are supported?
Self supports:
Backend: Golang, Java,
Mobile: iOS, Android

Quickstarts, examples including app examples for mobile and SDKs are provided for each.
Can I customise the login and sign-up experience?
Yes. We allow you to use your own UI and UX in all but a couple of screens. You can also use and customise UI elements we release as Open Source components.
What happens if the network goes down?
Self is highly available and deployed to global infrastructure, it has been designed to be resilient and reliable. You can also implement fallback strategies based on your needs.