Subscription Plans
The ID Data platform is available in multiple configurations
to address your specific business needs.
Plan comparison
Environment
Enterprise-grade security and privacy measures
Production environment
Non-production environment
Multi-geographic zone deployment
Optional
Optional
Optional
Admin Console
Admin management
Admin activity report
Single sign-on
Role-based access control
Access to admin APIs
Access to log APIs
Integrations
API library
Gateway
Common third-party integrations (e.g., AuthO, Ping Identity, OneTrust, ForgeRock, SailPoint, HYPR)
Workflow Management
Custom branding
Decision engine rules management
Workflow visualization
Add or remove verification steps
Customer URLs
Optional
Optional
Optional
Number of workflows
2
5
Unlimited
Number of subtenants
1
3
Unlimited
Identity Data Source and Risk Signal Library
GovID checks (passport, driver’s license, other local IDs)
GovID checks (DMV)
Biometric checks (selfie authentication with liveness)
PII checks (authoritative database)
PII checks (phone ownership)
Know-your-business checks (with risk)
Knowledge checks (dynamic KBA)
Community affiliation and professional license checks (military affiliation)
Community affiliation and professional license checks (law enforcement affiliation)
Device and network risk checks (new user)
Device and network risk checks (existing users)
Communication risk checks (phone: SIM swap)
Communication risk checks (phone: line status)
Communication risk checks (phone: line deactivation)
Communication risk checks (email)
Background risk checks (watchlist)
Background risk checks (criminal)
Phone possession checks (SMS: one-time code)
Phone possession checks (SMS: one-time link)
Phone possession checks (Voice: one-time code)
Email possession checks (one-time code)
Email possession checks (one-time link)
Identity Data Source Management
Change input attributes
Automated fallback to a backup authoritative identity data or risk signal source (if available)
Select preferred authoritative or risk signal source
Optional
Optional
Optional
Reporting
Transaction search report
Transaction detail report
Workflow report
Emailed reports
Fraud report
Fraud management report (advanced toolkit)
Custom reports
Optional
Optional
Optional
Onboarding
QuickStart onboarding service (up to 15 hours; needs to be used within 30 days)
JumpStart onboarding service (up to 25 hours; needs to be used within 60 days)
Enterprise onboarding service (up to 40 hours; needs to be used within 90 days)
Custom onboarding and implementation service
Optional
Optional
Optional
Support
Standard support (8×5, email and Web portal only)
Advanced support (8×7, phone, email, and Web portal)
Optional
Optional
Optional
Premium support (24x7x365; phone, email, and Web portal; enhanced initial response times)
Optional
Optional
Optional
Customer Success
Annual customer business review
Semi-annual customer business review
Quarterly customer business reviews
Customer advisory board membership
By invitational only
Cloud Infrastructure Maintenance
Infrastructure monitoring and performance tuning
Applying software updates and security patches
Infrastructure resiliency (both data and data center)
Identity Threat Expert Access
Access to identity threat and risk mitigation expert team (up to 12 hours per year)
Access to identity threat and risk mitigation expert team as professional services engagement
Optional
Optional
Optional