Addis Ababa
--:--:--

National ID (Fayda) Portal

"Processing Millions of Requests: A National OIDC Implementation."

Technical StackNext.jsJava (Spring Boot)KeycloakOIDC/PKCE

The Challenge: Officer Biometric Interference

During high-volume registration, field officers often physically assist residents with biometric scanners. This physical proximity caused the system to accidentally capture the officer's biometrics instead of the resident's. This resulted in 'dirty data,' leading to immediate deduplication failures and compromising the integrity of the national ID database.

The Architecture: Match-on-Device API

I integrated a secure biometric interface system to enhance security during data capture. This involved developing an automated comparison system that cross-references incoming biometric scans against the logged-in officer's profile (using local Derby DB templates) to prevent unauthorized access. This stricter validation protocol also enhanced biometric quality by requiring officers to perform multiple trials until optimal capture standards were met.

Implementation Detail: @Transactional Service Layer

To prevent orphaned or fragmented secure records, I utilized a @Transactional Java Service layer. This ensured atomic biometric updates, guaranteeing that if any part of the multi-modal biometric registration failed, the entire transaction would roll back safely, keeping the DB strictly consistent.

PKCE OIDC Handshake Sequence

Fayda Portal(Client)
Keycloak(IdP)
Awaiting Request...
Live Sequence Simulation