Authenticator Plugin
The Authenticator plugin is the main interface for eSignet, which provides methods to authenticate the end-user with control of the supported authentication factors and a method to fetch consented user information from the Identity system.
The two main functionalities of the authenticator interface, KYC Auth and KYC Exchange, are depicted in the below diagram

For eSignet Authentication Interface refer to the Link
Who should implement the Authenticator plugin interface?
The authenticator plugin is implemented by any organization - public or private, that wishes to integrate its identity system with eSignet to enable digital identity usage
An Identity system can be as simple as a table in a database or an Excel file storing user identity data or it can be a complex Identity System.
How to implement this plugin?
Any organization intending to integrate eSignet with an identity system of its choice must make necessary customizations to the authenticator plugin. These modifications ensure that the plugin can seamlessly interface with the target identity system and support its specific authentication and verification workflows. This approach enables eSignet to integrate efficiently with a wide range of identity systems. Please keep reading for further details.
In the eSignet architecture, the Authenticator acts as the bridge between eSignet and the Identity Registry. All protocol-related responsibilities are handled entirely within eSignet, while all identity-related logic is implemented within the Authenticator interface. This separation ensures a clean, modular design and clear ownership of responsibilities.
eSignet responsibilities
OAuth / OIDC / FAPI specification adherence
Consent handling
Token issuance
Authenticator responsibilities
Authenticate user
Fetch verified user attributes (KYC)
Return data to eSignet in agreed structure
Before You Implement
Consider the authentication scenario and the type of identity system you are using. For example, Lets assume your identity system supports only OTP based login.
Sample Pseudocode: Authenticator Implementation
Note:
OTP and password are the only supported auth factors in this scenario
For unsupported factors, return an error.
Token generation and signing depend on your implementation strategy.
Certificates must be managed securely (SoftHSM or custom keystore).
Important:
Reference implementations of the Authenticator Plugin for MOCK ID and MOSIP ID are available. Please see the details below.
Please refer to how our mock-plugin implements the eSignet Authenticator plugin to integrate eSignet with the mock identity system.
Also, look at the MOSIP plugin reference implementation enabling the eSignet integration with the MOSIP identity system.
Last updated
Was this helpful?