
Securing partner identity across the supply chain
Partners are the weak link in enterprise security. Threat actors exploit identity federation to attack the enterprise through partner accounts. Using decentralized identity and verifiable claims, DTX® Partner Identity Cloud is the first solution to securely federate B2B identity and protect data even when partners are compromised.
No passwords. No impersonation. No identity fraud.
Zero passwords
DTX® eliminates all passwords for partner employees by creating biometrically bound lifetime identities to prevent impersonation. There are no more credentials to be compromised.
Secure on/offboarding
DTX® securely onboards and offboards partner employees by using verifiable claims to confirm that an individual is employed by the partner and is the human they say they are.
Incident response
DTX® lets the enterprise block partners or individuals with a single click during a security incident. DTX® also provides a shareable audit trail as a source-of-truth for access.
The user journey
Step 1: Create Digital Address
Each partner employee creates an incorruptible lifetime identity, called a Digital Address. They download the DTX® app to their smartphone and then scan their driver’s license or passport. The app matches the photo to their face and then biometrically binds their Digital Address to them using the FIDO open standard. No one can impersonate the individual, and they can now use their Digital Address to prove their identity online across their lifetime.


Step 2: Prove identity
The partner employee can now use their Digital Address and biometrics instead of a password to log into the applications for which the enterprise has authorized them. Both the partner and the enterprise are safe, because no one can impersonate the partner employee and there are no longer any passwords to be stolen.
Step 3: Protect personal data
In addition to enforcing strong authentication, organizations can expand their use of the DTX® platform to issue data credentials to an individual, such as project authorization, employment verification, or health status. Some of these credentials might contain personal information, so anyone who wants access to that information will need to get the individual’s consent first.


Step 4: Consent to share data
When an organization needs access to an individual’s credential, such as employment verification, it requests it digitally. The individual receives that request as a notification in their DTX® app. Once they approve the request using biometrics, the organization can access just the specific information they need to be able to provide the individual with the appropriate service or access.
Get in touch.
Let us show you how DTX® can help secure your business.