Digital Trust Reimagined: How Verifiable Credentials and Face Check Help Stop Fraud and Streamline Security

September 11, 2025
|
Duration:
5
min READ

Threats Are Becoming More Insidious

This sixth installment is the final piece of our Microsoft Entra Identity series.

In May 2025, multiple news outlets reported on an alarming new tactic: North Korean operatives successfully posed as remote developers at U.S. tech companies, using AI-generated avatars, deep fake interview techniques, and stolen credentials to infiltrate corporate systems and siphon data back to the regime. These bad actors exploited weak identity verification and remote onboarding processes –gaps many organizations still overlook.[1][2]

Real-time credential validation and associating the credential with the right Identity has become a challenge for many organizations with untrusted users. Online transactions rely on various stored credentials but sometimes lack the biometric validation at the time of an access verification event, opening the door to helpdesk spoofing, employment fraud, and more.

This is not a hypothetical scenario. It’s happening now. And it underscores just how vulnerable our identity infrastructure remains in a remote-first, cloud-connected world.

Verifiable Credentials + Face Check = Modern Identity Defense

Microsoft Entra Verified ID provides a standards-based, decentralized identity platform that allows trusted organizations to issue, verify, and manage Verifiable Credentials (VCs) –  cryptographically signed, tamper-evident, and privacy-respecting digital identity proofs.

With Face Check, organizations can require a live selfie match against the image embedded in a VC, creating a critical real-time safeguard against impersonation, deep fakes, and synthetic identities.

Use Case #1: Securing Privileged Access to High-Value Systems

Granting consultant or third-party contractors access to sensitive systems, like source code or financial records, requires more than just an NDA and good intentions.

With Microsoft Entra Verified ID:

  1. A contractor presents two credentials: one proving employment status and another showing active certification.
  2. Both credentials are verified before issuing a time-limited, scoped access credential.
  3. Access automatically expires when employment ends or certification lapse.

This delivers granular, just-in-time access control, supports Zero Trust security models, and eliminates manual access reviews bottlenecks.

Use Case #2: Help Desk Automation & Self-Service Recovery

Account lockouts are costly, averaging $50 per support call. Yet most don’t require human assistance.

With Microsoft Entra Verified ID:

  • Users present their credential and pass a Face Check for instant access restoration.
  • No help desk ticket, no wait time, no security compromise – access is restored instantly, securely, and without human intervention.

Result: Lower costs, faster resolution, and happier end-users.

Use Case #3: Managing Student, Applicant, and Alumni Identity Lifecycles

Universities manage tens of thousands of identity records - students, applicants, and alumni, resulting in operational complexity.

With Microsoft Entra Verified ID:

  • Applicants receive digital credentials with automatic expiration or upgrade after enrollment.
  • Applicants no longer need temporary accounts that must be revoked later; their credentials can expire or be upgraded based on enrollment status. New students enjoy instant access to services and records.
  • Alumni retain secure access without relying on outdated portals or lengthy verification processes.

Students and alumni appreciate the speed and simplicity, while universities benefit from lower IT overhead, reduction in fraud, and improved regulatory compliance.

Synthetic Identities Demand Real Defenses

The North Korean scam exposed in Wired was a wake-up call: static identity checks, PDFs, and webcam interviews are no match for modern deception technology.

With Verifiable Credentials and Face Check:

  • VCs verify that identity attributes come from trusted sources.
  • Face Check ensures the person presenting the VC is the rightful owner.

Together, these tools help organizations reduce fraud, cut onboarding risk, automate access decisions, and ensure compliance in an increasingly hostile threat landscape.

Closing the Remote Identity Gap with IDProof+

Even with Microsoft Entra Verified ID, there’s still a challenge: How do you issue a VC to someone you’ve never seen in person?

Remote onboarding has replaced in-office document checks, creating an opening for bad actors

That’s why MajorKey developed IDProof+ – a rapidly deployable identity verification solution that integrates Microsoft Entra Verified ID, Face Check and authID’s Proof technology to establish high-assurance identity verification, transforming your identity systems into a strategic line of defense.

How does IDProof+ work?

  1. AI scans and verifies government-issued photo IDs for authenticity.
  2. Remote selfie analysis checks for liveness, likeness, and detects AI-generated deep fakes or image manipulation.
  3. Once verified, a credential is issued that supports real-time face verification  at any interview, login, or whenever suspicious activity is detected.

This enables continuous, high-assurance identity validation – without meeting the individual in person.

The Bottom Line

Whether you're securing privileged access, enabling self-service recovery, or modernizing large-scale identity management, MajorKey’s IDProof+,  Microsoft Entra Verified ID, and authID provide a proven defense against fraud and identity-based threats.

Take Action Now – Build Continuous Trust

Strong identity assurance isn’t just a security measure — it’s the foundation for confident collaboration in a digital, remote-first world. With continuous, verifiable identity checks, you can be certain you know who’s on the other side of every interaction.

  • Stop impersonators before they log in.
  • Safeguard sensitive resources with confidence.
  • Deliver a better, secure identity experience for every user.

Trust is no longer static. It must be verifiable. Start building true digital trust today. Contact MajorKey to see IDProof+ in action – and give your organization the confidence to move faster, work smarter, and stay secure.

 Want to catch up on the rest of our Microsoft Entra Identity series?

  1. Why Identity is the New Perimeter: Rethinking Security in a Cloud-First World
  2. Microsoft Entra ID Governance: What’s New and Why it Matters
  3. The Business Case for Lifecycle Workflows in Microsoft Entra ID
  4. 5 Common Access Review Pitfalls (and How to Fix Them)
  5. From VPNs to Identity-Driven Access: The Microsoft Entra Global Secure Access Advantage

[1]Tech companies have a big remote worker problem: North Korean operatives - POLITICO

[2]Office of Public Affairs | Justice Department Announces Coordinated, Nationwide Actions to Combat North Korean Remote Information Technology Workers’ Illicit Revenue Generation Schemes | United States Department of Justice

Authors

Francisco Ureña

Principal Architect
linkedin logo
Connect on LinkedIn

Recent Blogs

Blog

Decentralized Identity Explained: A Practical Q&A for 2026

Decentralized Identity Explained: A Practical Q&A for 2026

Explore the key concepts, benefits, challenges, and emerging trends shaping decentralized identity in 2026 and beyond.

Blog

IGA and Change Management: A Guide to Successful Engagements

IGA and Change Management: A Guide to Successful Engagements

When effective change management is integrated with IGA implementations from the start, organizations reduce resistance, increase alignment, and ensure new identity processes take root in a sustainable, scalable way.

Blog

Outcome‑Driven IAM: Why Identity Programs Win on Results, Not Tools

Outcome‑Driven IAM: Why Identity Programs Win on Results, Not Tools

Why IAM programs fail despite strong tools, and how outcome‑driven IAM delivers measurable risk reduction, audit readiness, and business value.

Blog

Breaking Down Identity Silos: Why Fragmented Systems Create Risk and Complexity

Breaking Down Identity Silos: Why Fragmented Systems Create Risk and Complexity

Learn about the challenges created by identity silos, the trade-offs between consolidation and governance, and how organizations can determine the most effective path forward.

Blog

Identity Proofing 101: A Practical Guide for Modern Organizations

Identity Proofing 101: A Practical Guide for Modern Organizations

Discover why identity proofing is a foundational security control for modern organizations.

Blog

Preparing your Organization for AI-Driven Identity Threats

Preparing your Organization for AI-Driven Identity Threats

Learn how AI‑driven identity threats are evolving and why governing AI agents as managed, privileged identities is key to secure, responsible AI adoption.

Blog

KPIs for App Onboarding: What to Measure and Why It Matters

KPIs for App Onboarding: What to Measure and Why It Matters

The most useful KPIs for app onboarding include percent of applications onboarded, time‑to‑onboard, and realized business value or ROI. These metrics give stakeholders clear visibility into progress and help keep the onboarding program accountable and predictable.

Blog

Have You Solved Your IAM Problem?

Have You Solved Your IAM Problem?

Struggling to make sense of your IAM ecosystem? Discover how to overcome tool overload, achieve continuous reliability, and align identity management with business outcomes. Learn practical strategies for visibility, observability, intelligence, and action—plus insights on AI’s impact in modern IAM.

Blog

Modernizing Identity Governance: Enabling Agility and Compliance Across the Enterprise

Modernizing Identity Governance: Enabling Agility and Compliance Across the Enterprise

Leverage automated onboarding, AI-driven access reviews, and just-in-time least-privilege controls to transform identity governance into a driver of security, compliance, and agility.

Blog

Mastering Certificate Renewal: How Automation Bridges PKI and Privileged Access

Mastering Certificate Renewal: How Automation Bridges PKI and Privileged Access

Prepare for 47-day TLS lifespans: automate discovery, ownership, renewal (with new keys), and evidence—integrated with PAM/IAM change control.

Blog

Accelerating Privileged Access Security: Practical Steps for PAM Automation Success

Accelerating Privileged Access Security: Practical Steps for PAM Automation Success

Learn how to identify quick PAM automations—discovery, rotation, session isolation—then scale JIT/ZSP for audit-ready, resilient privileged access programs.

Blog

Rethinking Application Onboarding: A Value-Based Approach for Real Business Impact (2025 Navigate Session Recap)

Rethinking Application Onboarding: A Value-Based Approach for Real Business Impact

Discover how MajorKey Technologies is transforming identity programs with a value-based approach to application onboarding. Learn why traditional methods fail and explore our KPI-driven strategies to unlock ROI and business speed.

Blog

Identity Assurance Made Simple: Remote Hiring, Third-Party Access, and Call Center Protection

Identity Assurance Made Simple: Remote Hiring, Third-Party Access, and Call Center Protection

Discover how IDProof+ prevents identity fraud with biometric checks, global document verification, and Zero Trust access. Protect your workforce and sensitive data today.

Blog

Securing Modern Identities: How Microsoft Entra ID Governance Transforms Access Management

Securing Modern Identities: How Microsoft Entra ID Governance Transforms Access Management

In part 2 of our Transitioning Beyond MIM Revisited series, we explore Microsoft's rapidly evolving capabilities and their impact on organizations navigating the shift from MIM.

Blog

Navigating AI Adoption: Identity Security Considerations for Microsoft Copilot

Navigating AI Adoption: Identity Security Considerations for Microsoft Copilot

Discover how organizations can securely adopt AI tools like Microsoft Copilot by addressing identity security challenges. Learn about common risks, best practices, and a structured assessment approach to ensure responsible AI integration and compliance.

Blog

From Deepfakes to Fraudulent Employees: Securing Remote Work

From Deepfakes to Fraudulent Employees: Securing Remote Work

Discover how deepfake fraud and fake employees are reshaping remote work risks—and why identity assurance is critical. IDProof+, integrated with Microsoft Entra Verified ID, helps organizations prevent interview fraud, secure remote hiring, and protect against insider threats.

Workforce Identity
Customer Identity
Advisory
No items found.