How to Choose a System for Remote Customer Identity Verification: 7 Selection Criteria
Read more
Reading time:
Date of publication:
Remote identity verification system is a SaaS service that allows a company to confirm a customer's identity without his physical presence - over the Internet, in real time. The customer goes through the process from his or her phone or computer; the company receives the result, along with evidence to prove his or her identity.![]()
It sounds simple. The problem is that the market for these solutions is not homogeneous, and the differences between vendors are not obvious at the demo stage - they only become apparent after implementation. One system supports three verification methods, another eight. One keeps data in Poland, another in a global cloud. One integrates in a week, with another IT spends three months mapping out edge cases.
This article helps you put together a list of requirements before you start talking to vendors. Seven criteria, specific questions for each.
A customer identity verification system is different - and harder to replace than a typical operational tool - for three specific reasons.
First, it touches sensitive personal data and is subject to regulation - the AML Act, eIDAS, RODO, and often sector requirements (FSA, insurance regulations). A bad choice is not only an operational problem, but a potential regulatory risk.
Second, the result of verification is legal evidence. The identification report may end up in a case file, regulator's audit or legal proceedings. The quality and integrity of this document matter.
Third, the verification system is deeply woven into the customer onboarding process. Changing vendors involves technical reintegration, a change in the user path and, if no one has taken care of the right architecture at implementation, the risk of downtime.
Therefore, choosing a vendor for remote identity verification (for KYC procedures) is a decision worth taking the time to analyze before signing a contract.
Not every verification method gives the same level of assurance about identity. A selfie with a document is different from cryptographically reading an NFC chip from an e-card. Each method has different technical requirements on the client side, different process time and different cost.
Questions for the vendor:
A practical starting point: first determine the required level of assurance for your process - this comes from regulations or your own risk analysis. Only then check whether the system offers methods that meet this level.
For a detailed comparison of methods available on the Polish market, see the article Customer identity verification methods: requirements, instructions and which method to choose.
Compliance Manager has one key question when evaluating any supplier: "Will I be able to defend this choice to the regulator?" The answer does not lie in the supplier's declarations - it lies in the specific documents and data architecture.
Questions for the vendor:
Autenti eID in this area operates in full compliance with eIDAS and RODO - data is processed and stored in Europe. Verification reports are secured with Autenti's qualified electronic seal, which gives them evidentiary power in the event of a dispute or audit.
Example from practice: Grenke Polska, implementing AML-compliant remote leasing onboarding, points out explicitly that remote customer identification "minimizes the company's risks" - precisely because each verification ends with a documented report. It's worth asking the vendor what such a report looks like and whether you can see it before signing the contract.
This criterion is most often overlooked at the selection stage - and most often becomes a problem after implementation.
Vendor lock-in in the context of KYC is that changing a verification vendor or adding a new method requires IT to re-integrate fully. If you've integrated directly with a particular biometrics provider and that provider raises prices, suspends service or drops out of your market - you're stuck or paying for re-integration.
Questions for the provider:
Autenti eID solves this problem through a hub model - integration with a single API gives access to multiple verification providers (Identt, Veridas, Authologic, among others). If one fails, the system can be switched to the next without client-side intervention.
A good system is not just what you see in the admin panel. More important is what the customer sees during verification - and how many of them complete the process.
Companies often buy a system looking only at features and regulatory compliance. They ignore the UX. The result: conversion in the onboarding process drops, customers abandon the application halfway through, support gets "verification doesn't work" notifications.
Questions for the vendor:
One test worth more than an hour demo: ask for a sandbox and do the verification yourself on your phone. Ideally, ask a few outsiders - people who don't know how the system works.
By comparison, BNP Paribas Leasing Solutions, after implementing remote verification, achieved identification completion times of tens of seconds - with requirements reduced to an ID card and a camera. Verification is available 24/7 without an employee on the company's side. Michal Porycki, managing director of TS at BNP Paribas Leasing Solutions, comments: "Automated identity verification solutions speed up the process considerably and increase customer satisfaction."
For its part , MHC Mobility - a company that manages a fleet of more than 13,500 vehicles in the CEE region - has collected 90% positive feedback from customers on its new signing process with identity verification after implementation. That's a number worth demanding from a vendor when evaluating offers: what are the actual completion rate and satisfaction scores with customers similar to your company?
Identity verification is often a critical path in onboarding. A peak-hour outage means lost requests, upset customers and pressure on the operations department.
Questions for the vendor:
99.9% uptime is 8.7 hours of unavailability per year. 99.99% is 52 minutes. In high-volume processes, this is a difference that matters - it's worth translating it into numbers before signing a contract.
The per-verification price that a vendor quotes is often only part of the actual cost. The rest comes out at implementation or at the first invoice.
Questions for the supplier:
When comparing bids, it's a good idea to calculate TCO (total cost of ownership) for 12 and 24 months - including IT integration time, any additional licenses and support cost.
Integration time depends largely on the quality of documentation and availability of support on the vendor's side. A poorly documented API can turn a 2-week integration into a 2-month debugging edge case.
Questions for the vendor:
The criteria are universal, but their importance depends on the industry.
Finance and leasing - AML and FSA regulations are the strictest here. The criterion of regulatory compliance and audit trail is of paramount importance. Often a high level of identity assurance is required, limiting the available methods to e-card, e-banking or qualified signatures.
E-commerce and marketplaces - verification volume is high and customer tolerance for friction in the process is low. UX and completion rate matter most here. Per-verification costs at high volumes strongly affect economics.
HR and remote hiring - processes are less regulated than in finance, but there is growing pressure to verify the identity of candidates hired remotely. Matching methods to different countries is key if the company is recruiting outside Poland.
Hiring and sharing economy - high user turnover and fraud risk. What matters is the speed of the process on the client side and the ability to re-verify without reintegration.
If the volume of verification in your company is still unknown or the onboarding process is just being designed - a pilot before full integration makes sense.
Piloting allows you to verify three things that you can't assess from a demo: actual completion rate on your customers, system behavior with edge cases specific to your process, and real API response times under load.
A good vendor will allow piloting on real data with limited scope. If a vendor refuses to sandbox or pilot before signing an annual contract - that's a signal.
For more on mistakes throughout the KYC process: 5 most common mistakes in the KYC process and how to avoid them.
It is the company that offers the service - it can be an online platform, API integration or an "on site" model. A verification system is the specific software that a customer's identification path goes through. Some providers offer their own biometric engines, some aggregate methods from multiple sources through a single API. When choosing, it's important to understand whether you're buying direct access to a verification method or to an orchestration layer that manages multiple methods.
The cost depends on the methods you choose, the volume of verification and the billing model. A typical model is a per-verification fee (from a few to a few tens of zlotys, depending on the method and provider) plus an optional implementation or subscription fee. IT integration time, possible maintenance and support costs should be added to the total cost.
Not every process requires eIDAS compliance - it depends on the required level of assurance and sector regulations. The obligation stems from specific regulations: the AML Act imposes it on mandatory institutions, EU directives - on financial market entities. However, if your process requires a high level of certainty of identity or legal effect (e.g., signing a contract), eIDAS compliance is a prerequisite.
Not every implementation requires API integration. Some identity verification systems work through an online panel - in such a time-to-market model it is a few hours from service setup, without IT involvement. With integration via API - with good documentation and dedicated support - the time ranges from a few days (proof of concept or MVP) to a few weeks (full integration with backoffice systems and onboarding path). The main variable is the complexity of the technical environment on the client side: the number of systems to connect, the data model, the interface requirements. The verification system itself is rarely the bottleneck.
Vendor lock-in in occurs when a change of verification vendor requires a full technical re-invention - a new API, new tests, new process certifications. It is avoided by choosing a platform that aggregates multiple vendors through a single API. In such an architecture, changing or adding a verification method does not require a new integration - just a configuration change.
In Poland, the key acts are the Anti-Money Laundering and Countering Financing of Terrorism (AML) Act of 2018, the eIDAS Regulation (EU 910/2014), RODO, and sector regulations (EU directives for banks, insurers, investment companies). When arguing internally, it is worth pointing to the specific article imposing the verification obligation and showing that the chosen system meets the requirements for the level of assurance and audit trail.
If you are at the stage of evaluating remote identity verification solutions and want to compare your requirements with what the market offers, arrange a free consultation with an Autenti expert. We'll help you lay out your list of requirements and evaluate your options - regardless of whether you ultimately choose Autenti.
Mateusz Kościelak
Mateusz Kościelak brings over 10 years of experience in B2B Sales & Marketing with the specialization in Enterprise B2B SaaS. A V-Shaped marketer experienced in building lead generation machines using content, SEO & performance marketing with the focus on international expansion.
Visit author's profileMateusz Kościelak
Read more
Marta Klepka
Read more
Mateusz Kościelak
Read more