Overview
UIP is designed to integrate seamlessly with your existing authentication and signing infrastructure. This guide presents proven integration patterns to help you choose the right approach for your specific use case.Hybrid Authentication
Add UIP as enhanced security alongside existing email/password systems
Step-Up Authentication
Start with basic auth, require UIP for sensitive operations
Multi-Factor Authentication
Use UIP as a second factor for high-security scenarios
Progressive Enhancement
Offer UIP as the primary option with traditional fallback
Pattern 1: Hybrid Authentication
Use Case: You have a B2C application and want to add UIP as enhanced security while keeping email/password as the primary authentication and recovery method.Why B2C Needs Email/Password as Primary
Without email/password fallback, you’ll face:- Massive support overhead dealing with locked-out users
- Subscription cancellation issues (legal requirement to allow this)
- User frustration and churn
- Inability to recover accounts for legitimate users
When to Use This Pattern
B2C applications with subscription management
Users need guaranteed account recovery options
Want to offer enhanced security without forcing adoption
Need to support users who lose devices or credentials
Regulatory or compliance requirements for multi-factor security
Architecture Overview
User Database Schema
User Database Schema
Your user records store both traditional and UIP credentials:User Record:
user_id- Primary keyemail- Email addresspassword_hash- Hashed password (existing)uip_id- UIP identity reference (new, nullable)uip_enabled- Boolean flag for UIP statuscreated_at- Account creation timestampuip_linked_at- When UIP was linked
Authentication Flow States
Authentication Flow States
State 1: Legacy User (email/password only)
- User logs in with email and password
- After successful login, show prompt to link UIP
- User remains functional without UIP
- User logs in with email and password first
- System requires UIP biometric verification as second step
- Both factors must succeed for access
- User chooses to use UIP as primary authentication
- Email/password retained as recovery method
- Faster login experience with biometric-first flow
Implementation Workflow
Initial Login (Email/Password)
User enters email and password as usual. Your system validates credentials against existing database.Success: Proceed to Step 2
Failure: Show error and allow retry
Check UIP Status
After password verification, check if user has linked UIP:If
uip_enabled = false:- Grant access immediately
- Show optional prompt: “Enable UIP for enhanced security”
- Link to UIP setup flow
uip_enabled = true:- Do NOT grant access yet
- Proceed to Step 3 for biometric verification
Request UIP Verification
Call the Identify API to request biometric authentication:API Call:
- Include user’s
uip_idin request - Specify device type (mobile or desktop)
- Provide webhook URL for receiving result
- Request minimal fields (only need verification confirmation)
- Mobile: App redirect URL
- Desktop: QR code for scanning
Display UIP Prompt
Show appropriate UI based on device type:Mobile Flow:
- Display “Open UIP App” button
- Show loading state: “Waiting for biometric verification…”
- Display QR code prominently
- Show instructions: “Scan with UIP app to complete login”
- Add loading indicator
Receive Webhook Confirmation
UIP sends authentication result to your webhook endpoint.On Success:
- Verify webhook signature
- Extract
session_idandstatus - Grant user access to application
- Update frontend to show logged-in state
- Show error message
- Allow user to retry UIP verification
- Optionally provide support contact
UIP Linking Flow
For users who don’t have UIP enabled, provide an opt-in flow:Present UIP Benefits
After user logs in with email/password, show benefits:
- “Enable biometric login for enhanced security”
- “No more passwords—use your fingerprint or face”
- “Same security as government ID verification”
Initiate UIP Setup
User clicks “Enable UIP” button. Call the Identify API to start the linking process.Show QR code or app redirect depending on device type.
User Completes UIP Setup
User opens UIP app and completes one-time verification:
- Scans government ID
- Takes biometric selfie
- Confirms identity
User Experience Considerations
Keep UIP Optional
NEVER force UIP adoption. B2C users need the freedom to manage their accounts with email/password alone, especially for critical actions like subscription cancellation.
Clear Recovery Path
Always provide obvious “Use email/password instead” options. When users lose UIP access, they need immediate recovery without contacting support.
Subscription Management
Ensure users can cancel subscriptions, update payment methods, and manage billing with email/password alone. Legal requirements in many jurisdictions mandate easy cancellation.
Transparent About Keys
If promoting UIP, be honest about recovery key requirements. Many B2C users will ignore this step, so email/password fallback is essential.
Critical: Account Recovery Reality
UIP Recovery Keys: B2C Challenge
UIP Recovery Keys: B2C Challenge
UIP uses two recovery keys for account restoration. In B2C contexts:What will happen:
- 60-80% of users won’t save their recovery keys properly
- Users will screenshot keys and lose them when upgrading phones
- Users will save keys in Notes app that doesn’t sync
- Users won’t understand the importance until it’s too late
- Immediate account access without recovery key hunt
- Subscription cancellation always possible (legal requirement)
- Reduces support tickets by 90%+
- User can disable lost UIP and re-enable on new device
Support Scenarios You'll Face
Support Scenarios You'll Face
Real support tickets you’ll receive if UIP is the only option:
- “I got a new phone and can’t log in to cancel my subscription”
- “I deleted the UIP app by accident, now I’m locked out”
- “My phone was stolen and I need to update my credit card”
- “I never saved those keys you mentioned, can you help?”
- “My mom needs to manage my account but I’m in the hospital”
Security Benefits
Phishing Protection
Phishing Protection
Even if an attacker steals the user’s email and password, they cannot complete authentication without the user’s biometric verification on their registered device.
Account Takeover Prevention
Account Takeover Prevention
Credential stuffing and brute force attacks are ineffective because the second factor (biometric) cannot be remotely compromised.
Audit Trail
Audit Trail
Every UIP authentication includes government-verified identity, precise timestamp, and device information—creating a complete audit trail.
Compliance Ready
Compliance Ready
Meets requirements for multi-factor authentication in regulated industries like finance, healthcare, and government services.
Pattern 2: Step-Up Authentication
Use Case: Allow basic login with email/password for low-risk operations, but require UIP verification when users attempt sensitive actions like large transfers, account changes, or data exports.When to Use This Pattern
Balance security with user convenience
Different risk levels for different operations
Compliance requirements for high-value transactions
Reduce friction for routine, low-risk activities
How It Works
Standard Login
User logs in with email/password for basic account access. Grant access to low-risk features immediately.
Trigger Point
When user attempts sensitive operation (wire transfer, account settings change, data export), intercept the action.
Request Step-Up
Call the Identify API to request biometric verification before allowing the sensitive action.
Example Trigger Points
Financial
Wire transfers, cryptocurrency withdrawals, large purchases, payment method changes
Account Changes
Email change, password reset, phone number update, security settings modification
Data Access
Export personal data, download records, delete account, access sensitive documents
Benefits
Reduced Friction
Reduced Friction
Users don’t face biometric verification on every login—only when necessary for high-risk operations.
Risk-Based Security
Risk-Based Security
Apply appropriate security based on the sensitivity of the action, not a one-size-fits-all approach.
Regulatory Compliance
Regulatory Compliance
Meet requirements for transaction verification without over-securing low-risk activities.
Pattern 3: Multi-Factor Authentication (MFA)
Use Case: Use UIP as the second factor in a traditional multi-factor authentication flow, replacing SMS codes or authenticator apps with government-verified biometric authentication.When to Use This Pattern
High-security applications (banking, healthcare, government)
Replacing SMS-based 2FA with more secure alternative
Need legally defensible proof of user identity
Compliance with regulations requiring strong MFA
How UIP Improves Traditional MFA
Stronger Than SMS
SMS codes can be intercepted, phished, or SIM-swapped. UIP biometrics cannot be stolen remotely.
Better Than TOTP Apps
Time-based codes can be phished or stolen if device is compromised. UIP requires live biometric presence.
Government Verification
Unlike generic authenticator apps, UIP provides proof of government-verified identity.
Audit Trail Included
Every authentication includes cryptographic proof, timestamp, and identity verification—no additional logging needed.
Implementation
Replace SMS/TOTP verification step with UIP call. User authenticates with username/password, then completes second factor via UIP biometric scan instead of entering a code.Pattern 4: Progressive Enhancement
Use Case: Offer UIP as the primary, recommended authentication method while maintaining traditional email/password as a fallback. Best for B2B, enterprise, or high-security applications—not recommended for general B2C.When to Use This Pattern
B2B applications with professional users
Enterprise internal tools with IT support available
High-security contexts where users understand credential management
Users are incentivized to protect their accounts (financial, professional)
Why This Works for B2B, Not B2C
B2B: Professional User Behavior
B2B: Professional User Behavior
B2B users typically:
- Have IT support to help with account recovery
- Understand importance of backup credentials
- Work from managed devices with backup systems
- Face consequences for losing access (can’t do their job)
- Are trained on security best practices
B2C: Different Reality
B2C: Different Reality
B2C users typically:
- Have no IT support—only your customer service
- Don’t save recovery keys or understand their importance
- Upgrade phones frequently and lose credentials
- Need to cancel subscriptions on a whim (legal requirement)
- Expect “forgot password” to solve everything
User Flow (B2B Context)
Primary: UIP First
Default signup and login options prominently feature UIP. Make it the easiest, most visible path.
Fallback Available
Provide “Use email/password instead” link for users who need traditional authentication.
Recovery Key Education
For B2B users choosing UIP, emphasize saving recovery keys to corporate password manager or secure storage.
Benefits (B2B/Enterprise)
Maximum Security
Maximum Security
Professional users get strongest authentication by default, with IT support available for edge cases.
Better User Experience
Better User Experience
B2B users who use UIP daily benefit from fastest authentication—no passwords to remember or type.
Reduced IT Costs
Reduced IT Costs
Fewer password reset tickets for users who adopt UIP, as biometric is harder to “forget.”
Choosing the Right Pattern
By Application Type
- B2C Applications
- B2B / Enterprise
Recommended: Pattern 1 (Hybrid) or Pattern 2 (Step-Up)
Pattern 1: Hybrid Auth
Email/password primary + UIP enhancementUse when:
- You have subscriptions or purchases
- Users need guaranteed account access
- Recovery key management is unreliable
Pattern 2: Step-Up Auth
Basic login + UIP for sensitive actionsUse when:
- Most actions are low-risk
- Only financial/sensitive operations need extra security
- Want to balance convenience and protection
Quick Decision Matrix
| Your Context | Recommended Pattern | Why |
|---|---|---|
| B2C app with subscriptions | Pattern 1: Hybrid | Users need guaranteed access to cancel/manage |
| B2C app with sensitive actions | Pattern 2: Step-Up | Security only when necessary, minimal friction |
| B2B replacing SMS codes | Pattern 3: MFA | Stronger than SMS, same flow, better UX |
| Enterprise internal tools | Pattern 4: Progressive | IT support + trained users = UIP-first works |
| Banking/Financial (any) | Pattern 3: MFA | Compliance + audit trail + legal defensibility |