Digital Trust Reimagined: How Verifiable Credentials and Face Check Help Stop Fraud and Streamline Security

Threats Are Becoming More Insidious

This sixth installment is the final piece of our Microsoft Entra Identity series.

In May 2025, multiple news outlets reported on an alarming new tactic: North Korean operatives successfully posed as remote developers at U.S. tech companies, using AI-generated avatars, deep fake interview techniques, and stolen credentials to infiltrate corporate systems and siphon data back to the regime. These bad actors exploited weak identity verification and remote onboarding processes –gaps many organizations still overlook.[1][2]

Real-time credential validation and associating the credential with the right Identity has become a challenge for many organizations with untrusted users. Online transactions rely on various stored credentials but sometimes lack the biometric validation at the time of an access verification event, opening the door to helpdesk spoofing, employment fraud, and more.

This is not a hypothetical scenario. It’s happening now. And it underscores just how vulnerable our identity infrastructure remains in a remote-first, cloud-connected world.

Verifiable Credentials + Face Check = Modern Identity Defense

Microsoft Entra Verified ID provides a standards-based, decentralized identity platform that allows trusted organizations to issue, verify, and manage Verifiable Credentials (VCs) –  cryptographically signed, tamper-evident, and privacy-respecting digital identity proofs.

With Face Check, organizations can require a live selfie match against the image embedded in a VC, creating a critical real-time safeguard against impersonation, deep fakes, and synthetic identities.

Use Case #1: Securing Privileged Access to High-Value Systems

Granting consultant or third-party contractors access to sensitive systems, like source code or financial records, requires more than just an NDA and good intentions.

With Microsoft Entra Verified ID:

  1. A contractor presents two credentials: one proving employment status and another showing active certification.
  2. Both credentials are verified before issuing a time-limited, scoped access credential.
  3. Access automatically expires when employment ends or certification lapse.

This delivers granular, just-in-time access control, supports Zero Trust security models, and eliminates manual access reviews bottlenecks.

Use Case #2: Help Desk Automation & Self-Service Recovery

Account lockouts are costly, averaging $50 per support call. Yet most don’t require human assistance.

With Microsoft Entra Verified ID:

  • Users present their credential and pass a Face Check for instant access restoration
  • No help desk ticket, no wait time, no security compromise – access is restored instantly, securely, and without human intervention.

Result: Lower costs, faster resolution, and happier end-users.

Use Case #3: Managing Student, Applicant, and Alumni Identity Lifecycles

Universities manage tens of thousands of identity records - students, applicants, and alumni, resulting in operational complexity.

With Microsoft Entra Verified ID:

  • Applicants receive digital credentials with automatic expiration or upgrade after enrollment.
  • Applicants no longer need temporary accounts that must be revoked later; their credentials can expire or be upgraded based on enrollment status. New students enjoy instant access to services and records.
  • Alumni retain secure access without relying on outdated portals or lengthy verification processes.

Students and alumni appreciate the speed and simplicity, while universities benefit from lower IT overhead, reduction in fraud, and improved regulatory compliance.

Synthetic Identities Demand Real Defenses

The North Korean scam exposed in Wired was a wake-up call: static identity checks, PDFs, and webcam interviews are no match for modern deception technology.

With Verifiable Credentials and Face Check:

  • VCs verify that identity attributes come from trusted sources.
  • Face Check ensures the person presenting the VC is the rightful owner.

Together, these tools help organizations reduce fraud, cut onboarding risk, automate access decisions, and ensure compliance in an increasingly hostile threat landscape.

Closing the Remote Identity Gap with IDProof+

Even with Microsoft Entra Verified ID, there’s still a challenge: How do you issue a VC to someone you’ve never seen in person?

Remote onboarding has replaced in-office document checks, creating an opening for bad actors

That’s why MajorKey developed IDProof+ – a rapidly deployable identity verification solution that integrates Microsoft Entra Verified ID, Face Check and authID’s Proof technology to establish high-assurance identity verification, transforming your identity systems into a strategic line of defense.

How does IDProof+ work?

  1. AI scans and verifies government-issued photo IDs for authenticity.
  2. Remote selfie analysis checks for liveness, likeness, and detects AI-generated deep fakes or image manipulation.
  3. Once verified, a credential is issued that supports real-time face verification  at any interview, login, or whenever suspicious activity is detected.

This enables continuous, high-assurance identity validation – without meeting the individual in person.

The Bottom Line

Whether you're securing privileged access, enabling self-service recovery, or modernizing large-scale identity management, MajorKey’s IDProof+,  Microsoft Entra Verified ID, and authID provide a proven defense against fraud and identity-based threats.

Take Action Now – Build Continuous Trust

Strong identity assurance isn’t just a security measure — it’s the foundation for confident collaboration in a digital, remote-first world. With continuous, verifiable identity checks, you can be certain you know who’s on the other side of every interaction.

  • Stop impersonators before they log in.
  • Safeguard sensitive resources with confidence.
  • Deliver a better, secure identity experience for every user.

Trust is no longer static. It must be verifiable. Start building true digital trust today. Contact MajorKey to see IDProof+ in action – and give your organization the confidence to move faster, work smarter, and stay secure.

 Want to catch up on the rest of our Microsoft Entra Identity series?

  1. Why Identity is the New Perimeter: Rethinking Security in a Cloud-First World
  2. Microsoft Entra ID Governance: What’s New and Why it Matters
  3. The Business Case for Lifecycle Workflows in Microsoft Entra ID
  4. 5 Common Access Review Pitfalls (and How to Fix Them)
  5. From VPNs to Identity-Driven Access: The Microsoft Entra Global Secure Access Advantage

[1]Tech companies have a big remote worker problem: North Korean operatives - POLITICO

[2]Office of Public Affairs | Justice Department Announces Coordinated, Nationwide Actions to Combat North Korean Remote Information Technology Workers’ Illicit Revenue Generation Schemes | United States Department of Justice

No items found.
Machine Identities: Uncovering the Hidden Risks in your Environment​
Maximizing Value, Showcasing Success, and Future-Proofing Your Identity Program​
How to Demonstrate Success and Grow the ROI of CIAM Programs​
Modernizing GRC: How to Mitigate Risk in Hybrid Cloud Environments​
All Access is Privileged – Taking a PAM-First Approach Towards your Identity Security Program​

About the author

Francisco Ureña

Principal Architect

Based out of the New York Metro/Northeast Region, Frank has 25+ years in the IT industry. Frank provides strategic architecture and consulting to organizations looking to improve security and achieve Zero Trust in their environments. His extensive experience in identity and access management, governance, compliance, and risk management allow him to  understand a client’s business needs and how to properly implement the right technology to solve specific identity challenges.

Resource

Improving security posture through Identity Threat Detection & Remediation
The Convergence of App Governance and Identity Security
Dynamic Cloud Privileged Access Management
Bringing an Identity Security focus to SDLC Governance
Identity Threat Detection & Remediation