The best thing about aadhar verification by fingerprint API is its functionality to allow different organizations like financial institutions as well as banks to instantly authenticate the identity of a customer as required per RBI regulations. With the Supreme Court ruling, private institutions could not use the fingerprint Aadhaar verification APIs earlier, despite the Indian government's latest regulation allowing banks and telecommunications companies to use the API for user verification and authentications. Softcare Infotech thought it was the right time to explain to your developers how to use the documentation received from UIDAI to incorporate Aadhaar authentication into their applications. Terms that have been used frequently in the documentation
What is the Aadhaar platform: The Aadhaar platform is an initiative of the Indian government that enables private companies to use the Aadhaar data stored UIDAI in CIDR databases ﴾Central Identities Data Repository﴿.
The Aadhar platform exports Aadhaar APIs which are open to developers and can be used for authentication and KYC services. Two main entities involved in the use and dissemination of the Aadhar platform are: There are two basic entities that use aadhaar authentication AUAs use it for the basic service cycle for customers, employees as well as beneficiaries; the entities are: Authentication User Agency ﴾AUA﴿ and SubAUA. It is the primary entity that sends the authentication request to enable day‐to‐day business functions. NSDL, banks, & all the other public as well as private organizations.
All basic AUAs ﴾Authentication User Agencies﴿ must need to register with Aadhaar's authentication server in order to carry out basic secure authentication for different services provided to customers. Authentication Service Agency ﴾ASA﴿: ASAs play the role of "enabling brokers" and have a secure connection with CIDR. Its goal is to provide connectivity to UIDAI data centers over a secure private network to transmit authentication requests from multiple AUAs. : The Aadhaar authentication flow describes the flow of requests and responses that occurs during an authentication request using the Aadhaar API.
The phases of Aadhar authentication are described below:
Step 1: The user makes an authentication request via a hardware device that is able to capture the Aadhaar number / biometric information The information captured here is encrypted and can only be decrypted by UIDAI
Step 2: The AUA client application sends this data is securely sent to the AUA servers. AUA servers sign the request
Step 3: AUA collects data along with the additional required field that is sent to the ASA
Step 4: The ASA sends the packet to UIDAI, which the databases from CIDR query to check whether the requested Aadhaar data is valid Date 2021‐09‐30
Step 5: The UIDAI sends a "Yes" or "No" answer or the resident data is sent back to the ASA and then to the AUA server AUA server confirms the data receipt
Step 6: The service provision is offered to the Aadhaar user based on authentication.
© Copyright Softcare Infotech. all rights reserved.