2: The Future of Digital Identity: The verified ID workflow and issuance

The Multi-Tenant Architecture: Enterprise-Grade Identity at Scale

As organizations scale their identity infrastructure, they encounter a new challenge: how do you manage identity verification across multiple business units, subsidiaries, or service offerings while maintaining security and compliance? The answer lies in multi-tenant architecture—a sophisticated approach to identity management that enterprises are increasingly adopting.

Understanding Multi-Tenant Verified ID Systems

In a multi-tenant Verified ID system, different tenants (separate organizational domains) can operate independently while sharing a common identity infrastructure. Each tenant can issue its own credentials, enforce its own policies, and manage its own users—but they can all verify credentials issued by other tenants.

Consider this real-world scenario: Your organization has an HR department that needs to verify employee identity, and a separate Face Check service in another tenant that performs biometric verification. Both operate as independent services, but they need to work together seamlessly. Here’s how it works:

The Multi-Tenant Credential Flow with Biometric Verification

Biometric Verification with Face Check

Face Check represents the evolution of identity verification. Instead of relying on static credentials, it adds a liveness component: the user must prove they are physically present and that their live appearance matches the photo in their credential.

Here’s how it works in the context of a multi-tenant system:

  1. Credential Possession: User proves they have a valid credential (issued by Tenant 2) by presenting it through Microsoft Authenticator
  2. Live Verification: User takes a selfie using the Authenticator app, which performs a liveness check to ensure it’s a live person, not a photo or video
  3. Biometric Matching: The Face Check service compares the selfie against the photo embedded in the credential
  4. Confidence Scoring: Returns a confidence score (e.g., «86% match confidence») that the verifier can use to make a trust decision

Enterprise Advantage: By separating Face Check into its own service/tenant, organizations can implement different confidence thresholds for different use cases. High-security scenarios might require 90%+ confidence, while lower-risk scenarios might accept 70%.

Security at the Multi-Tenant Level

Multi-tenant architectures introduce unique security considerations that Verified ID addresses elegantly:

  • Cryptographic Verification: Each credential is signed by its issuer. Verifiers can confirm authenticity without contacting the issuer, using only the issuer’s public key
  • Revocation Checking: Tenants maintain revocation registries; verifiers can check if a credential has been revoked
  • Selective Disclosure: Users share only the claims needed for verification, not the entire credential
  • Zero Trust: Verifiers don’t need to trust intermediaries—cryptography ensures authenticity

This architecture is particularly valuable for organizations operating in regulated industries like finance, healthcare, and government, where audit trails, data minimization, and compliance are non-negotiable.

Verified ID on Azure Marketplace

Organizations looking to implement Verified ID solutions can now access Fortytwo’s expertise directly through the Azure Marketplace. This offering provides:

Pre-Built Components
Reference architectures for common use cases

Rapid Deployment
Ready-to-use infrastructure as code

Consulting Support
Expert guidance on implementation and integration

Azure Native Integration
Seamless connection with existing Azure service

Verified ID by Fortytwo: Implementation
Verified ID by Fortytwo: Implementation

Coming up next in this series

Understanding the architecture of Verified ID is one thing; seeing how it transforms real business processes is another. In the next part of this series, we’ll explore concrete use cases and the tangible benefits organizations achieve when implementing this technology.

We’re talking real numbers: reducing onboarding time by 85%, cutting identity verification costs dramatically, enabling zero-trust partner access without the credential management overhead, and finally solving the «forgot password» problem that costs enterprises millions annually. From streamlining employee onboarding to enabling secure partner ecosystems, from meeting GDPR and eIDAS compliance to creating tamper-proof educational credentials—we’ll show you the ROI with actual metrics: time saved, costs reduced, security incidents prevented, and compliance requirements met. If you need to build a business case for decentralized identity or wondering «where do I even start?», this post will give you the practical roadmap and the numbers that matter to leadership.

Skroll til toppen