Skip to content
Case studiesPricingSecurityCompareBlog

Europe

Americas

Oceania

Compliance14 min read

Digital Identity in the US: REAL ID, NIST 800-63

US digital identity is evolving fast: REAL ID enforcement, NIST 800-63 digital identity guidelines, state mobile driver's licenses, and the E-SIGN Act.

CheckFile Team
CheckFile Teamยท
Illustration for Digital Identity in the US: REAL ID, NIST 800-63 โ€” Compliance

Summarize this article with

A compliance officer at a mid-size Texas bank opens her inbox on a Monday morning. Three new corporate clients need onboarding this week. Each one requires certified copies of passports or driver's licenses, utility bills, articles of incorporation, operating agreements, and beneficial ownership declarations -- scanned, emailed, manually checked against databases, and filed in a folder that will sit untouched until the next examination. The process takes her team an average of four hours per client. By Thursday, she learns that one driver's license was expired, one utility bill was older than three months, and one beneficial ownership declaration listed an owner who had been added to the OFAC SDN list two days after submission. The week is lost. The risk is real.

This scenario -- repeated thousands of times daily across US financial institutions, law firms, real estate agencies, and insurance companies -- is exactly what the emerging US digital identity framework aims to address. Between the REAL ID Act enforcement, the NIST 800-63 Digital Identity Guidelines, state mobile driver's license (mDL) programs, and the E-SIGN Act foundation, the United States is moving toward a more secure, verifiable, and efficient identity verification ecosystem -- even without a single federal digital identity wallet.

This article is for informational purposes only and does not constitute legal, financial, or regulatory advice.

The US Digital Identity Landscape in 2026

The US approach to digital identity differs fundamentally from the single-wallet model being deployed in Europe. Instead of a top-down federal mandate, the American system is evolving through a combination of federal standards, state-level innovation, and private-sector adoption. The result is a patchwork that is rapidly maturing into a coherent framework.

Key components of the US digital identity ecosystem

Component Authority Status in 2026
REAL ID Act DHS / TSA Full enforcement since May 2025
NIST SP 800-63-4 NIST Revision 4 published; federal agencies adopting
Mobile driver's licenses (mDL) State DMVs, AAMVA 30+ states with active programs
E-SIGN Act / UETA Federal / State Established legal framework for electronic signatures
Digital identity verification APIs Private sector Widely adopted for KYC/CIP compliance
TSA PreCheck digital ID TSA Expanding acceptance of mDLs at airports

Unlike a single regulation that replaces the entire paradigm overnight, the US model builds incrementally. Each component strengthens the overall trust framework while maintaining state-level flexibility.

REAL ID: The Federal Baseline

The REAL ID Act of 2005 -- finally reaching full enforcement in 2025 after multiple extensions -- establishes minimum security standards for state-issued driver's licenses and identification cards. Beginning May 7, 2025, a REAL ID-compliant license (marked with a gold star) is required for boarding domestic flights, entering federal facilities, and accessing nuclear power plants.

What REAL ID means for document verification

REAL ID does not create a digital identity per se, but it standardizes the underlying identity proofing process across all 50 states:

  • Verified source documents: applicants must present proof of identity (US passport, birth certificate), proof of SSN, and two proofs of principal address.
  • Standardized security features: machine-readable zones (MRZ), specific physical security elements, and standardized data formatting.
  • Database verification: states must verify documents against federal databases (SAVE for immigration status, SSOLV for SSN).

For organizations performing KYC due diligence, REAL ID-compliant documents provide a higher baseline of trust compared to pre-REAL ID licenses. However, verification still requires confirming the physical or digital document itself has not been tampered with -- a gap that automated verification fills.

According to DHS estimates, approximately 56% of all state-issued IDs were REAL ID-compliant by mid-2025, with the percentage rising as renewals cycle through the system.

NIST 800-63: The Digital Identity Gold Standard

The NIST Special Publication 800-63 Digital Identity Guidelines are the most influential framework shaping digital identity in the United States. While technically applicable only to federal agencies, NIST 800-63 has become the de facto standard adopted by financial institutions, healthcare organizations, and technology companies nationwide.

The three-volume framework

NIST 800-63 is organized into three volumes, each addressing a distinct aspect of digital identity:

Volume Focus Key concept
800-63A Identity proofing Identity Assurance Levels (IAL 1-3)
800-63B Authentication Authenticator Assurance Levels (AAL 1-3)
800-63C Federation Federation Assurance Levels (FAL 1-3)

Identity Assurance Levels explained

The identity proofing levels are directly relevant to document verification:

  • IAL1: Self-asserted identity. No identity proofing required. Suitable for low-risk transactions.
  • IAL2: Remote or in-person identity proofing. Evidence of identity must be verified against authoritative sources. Most BSA/AML CIP requirements align with this level.
  • IAL3: In-person identity proofing with a trained representative. Physical presence required. Used for high-value transactions and government-issued credentials.

Revision 4 updates (published 2024-2025) include expanded guidance on remote identity proofing using digital documents, biometric comparison, and liveness detection -- directly applicable to API-based document verification workflows.

Impact on financial services

Financial institutions subject to the BSA Customer Identification Program (CIP) rule increasingly map their identity proofing requirements to NIST 800-63 assurance levels. The FFIEC BSA/AML Examination Manual references NIST standards as a recognized framework for evaluating the adequacy of identity verification procedures.

For businesses already navigating the expanding scope of AML compliance, NIST 800-63 provides a structured approach to meeting CIP and CDD requirements with measurably higher assurance.

Explore further

Discover our practical guides and resources to master document compliance.

Explore our guides

Mobile Driver's Licenses: The State-Level Innovation

While the federal government sets standards, states are driving the practical implementation of digital identity through mobile driver's license (mDL) programs. An mDL is a digital version of a physical driver's license stored on a smartphone, based on the ISO/IEC 18013-5 international standard.

The verification flow

A typical mDL interaction follows four steps -- remarkably similar to what a digital identity wallet would provide:

  1. QR code or NFC tap. A relying party (bank, employer, TSA agent, age-restricted retailer) presents a QR code or activates NFC, specifying which data elements are needed.
  2. Authentication. The user authenticates locally -- biometrics, PIN, or device passcode -- to prove possession of the credential.
  3. Data selection. The user reviews exactly which attributes will be shared and grants consent. The mDL supports selective disclosure: if a bar only needs to confirm the customer is over 21, only that boolean attribute is shared -- not the full date of birth, not the address, not the license number.
  4. Cryptographic verification. The signed credential data is transmitted directly to the relying party. The relying party can cryptographically verify its authenticity and integrity in real time -- no phone calls to the DMV, no waiting for database lookups.

This flow replaces the traditional model of photocopying licenses, emailing scans, and manually verifying authenticity -- a process that is slow, error-prone, and fundamentally insecure.

State adoption status

As of early 2026, mDL programs are active or launched in over 30 states, with adoption accelerating:

Status States (examples) Population coverage
Fully launched Arizona, Colorado, Louisiana, Maryland, Utah, Georgia ~65 million
Pilot or limited release California, New York, Texas, Florida, Ohio ~120 million
Legislation passed, implementation pending Illinois, Virginia, Michigan ~45 million
No active program Remaining states ~90 million

The American Association of Motor Vehicle Administrators (AAMVA) coordinates interoperability standards, and TSA has begun accepting mDLs at participating airports -- a major driver of consumer adoption.

What credentials can an mDL carry?

While initially limited to driver's license data, the ISO 18013-5 framework supports additional credential types:

  • Person identification data: name, date of birth, address, photo
  • Age verification: boolean over-18 / over-21 attestations
  • Driving privileges: license class, restrictions, endorsements
  • State-issued attestations: some states exploring voter registration status, professional licenses

For businesses performing KYC due diligence, mDL-based verification offers significantly stronger anti-fraud guarantees than traditional document scanning, with the added benefit of selective disclosure that minimizes unnecessary PII collection.

Security Considerations

The concentration of identity attributes in a mobile application creates both opportunities and risks. A compromised mDL application does not just expose a single document -- it potentially grants access to verified identity data that could be used for account takeover or synthetic identity fraud.

Threat vectors

The principal risks include:

  • Device compromise. Malware or physical theft of the device hosting the mDL.
  • Social engineering. Phishing attacks that trick users into authenticating to malicious relying parties, sharing credentials they did not intend to share.
  • Oversharing through dark patterns. Relying parties designing consent flows that collect more data than necessary -- a concern raised by privacy advocates including the Electronic Frontier Foundation.
  • Implementation inconsistency. Varying security standards across state mDL implementations.

Mitigation strategies

Organizations accepting mDL credentials should implement layered controls: verifying the cryptographic validity of the credential, checking revocation status, implementing anti-replay protections, and logging all verification events for audit purposes. The NIST 800-63B authenticator guidelines provide specific technical requirements for relying parties.

Data Privacy: CCPA, State Laws, and Data Minimization

The US digital identity ecosystem is shaped by a growing patchwork of state data privacy laws that affect how identity data can be collected, stored, and used.

Selective disclosure. The mDL architecture allows users to share only the specific attributes required for a transaction. A car rental company needs to confirm a valid driver's license and minimum age -- not the customer's home address or date of birth. The mDL can share a boolean ("is over 25: yes") without revealing the underlying data. This aligns with the CCPA principle of data minimization and collection limitation.

No central database. Credentials are stored on the user's device, not in a government-operated central repository. This eliminates the single-point-of-failure risk inherent in centralized identity databases.

Consumer rights. Under CCPA and similar state laws (Virginia CDPA, Colorado CPA, Connecticut CTDPA), consumers have rights to know what personal information is collected, request deletion, and opt out of data sales. Organizations must design verification workflows that respect these rights.

State breach notification. All 50 states have data breach notification laws. Organizations storing identity documents must maintain security controls and notify affected individuals if a breach occurs. The FTC Safeguards Rule imposes additional requirements on financial institutions.

For organizations currently processing identity documents, the shift toward cryptographic verification reduces the compliance burden significantly. Instead of storing copies of driver's licenses and utility bills -- with all the associated data protection obligations -- the organization stores only the verification result and a cryptographic proof of the transaction.

The E-SIGN Act and Electronic Transactions

The Electronic Signatures in Global and National Commerce Act (E-SIGN) and the Uniform Electronic Transactions Act (UETA) provide the legal foundation for electronic identity verification in the United States. Enacted in 2000, E-SIGN ensures that electronic signatures and records cannot be denied legal effect solely because they are electronic.

This legal infrastructure enables:

  • Remote identity proofing: customers can verify their identity without physical presence
  • Digital document submission: electronically submitted documents carry the same legal weight as physical copies
  • Automated verification decisions: system-generated verification results are legally valid
  • Electronic record retention: digital audit trails satisfy record-keeping requirements

For financial institutions, the combination of E-SIGN, NIST 800-63, and BSA/AML requirements creates a clear legal and technical framework for fully digital customer onboarding.

How CheckFile Integrates with the US Digital Identity Ecosystem

The transition from traditional document verification to credential-based verification will not happen overnight. For the foreseeable future, businesses will operate in a hybrid environment: some customers presenting mDL credentials or other digitally verifiable documents, others submitting traditional documents (scanned driver's licenses, utility bills, corporate filings).

CheckFile is designed for exactly this hybrid reality. The platform already automates the validation of traditional documents -- checking authenticity, extracting data, cross-referencing against databases, and flagging anomalies. As mDL adoption scales across states and digital identity verification becomes more standardized, CheckFile extends its verification workflows to accept and validate digitally-signed credentials alongside traditional document submissions.

This means a single integration point for compliance teams: whether a customer shares a cryptographically signed credential from their state mDL app or uploads a scanned copy of their driver's license, CheckFile processes both through the same workflow, applies the same compliance rules, and produces a unified audit trail. Our platform currently processes over 180,000 documents per month with a fraud detection rate of 94.8% and an average verification time of 4.2 seconds.

The result is continuity. Organizations do not need to build and maintain two separate verification systems during the transition period. They do not need to retrain compliance teams on entirely new tools. They get a single platform that evolves with the regulatory and technological landscape.

For a comprehensive overview, see our document compliance complete guide.

Frequently Asked Questions

When will mobile driver's licenses be available in my state?

Over 30 states have active or launched mDL programs as of early 2026, with adoption accelerating rapidly. States including Arizona, Colorado, Louisiana, Maryland, Utah, and Georgia have fully launched programs. Major population centers including California, New York, Texas, and Florida are in pilot or limited release phases. Check your state's DMV website or the AAMVA for the latest status. TSA acceptance at airports is expanding, which is driving consumer adoption nationwide.

Will mobile driver's licenses replace physical IDs?

Not in the near term. Mobile driver's licenses are designed to complement physical documents, not replace them. Physical REAL ID-compliant licenses remain the primary accepted document for TSA screening, federal facilities, and most identity verification scenarios. However, as private-sector acceptance grows and more states launch mDL programs, digital credentials will increasingly become the preferred method for identity verification in both online and in-person transactions.

How does digital identity verification affect my existing KYC processes?

Digital identity introduces a new verification channel alongside traditional document submission. Financial institutions subject to BSA/AML CIP requirements will need to update their onboarding workflows to accept digitally-signed credentials, verify their cryptographic signatures, and log the verification events -- all while maintaining existing processes for customers who present traditional documents. Platforms like CheckFile enable both channels through a single integration, with unified audit trails that satisfy regulatory examination requirements.

Are mobile driver's licenses secure against fraud?

mDLs provide significantly stronger anti-fraud guarantees than traditional document verification. Credentials are cryptographically signed by the issuing state DMV and cannot be forged without breaking the underlying cryptographic algorithms. Selective disclosure means relying parties receive only the data elements they need, reducing the attack surface. However, risks remain at the user level (device theft, social engineering) and at the implementation level (varying security standards across states). Organizations should implement defense-in-depth strategies that combine credential verification with additional fraud detection measures, consistent with NIST 800-63 guidelines.

What is NIST 800-63 and why does it matter for my organization?

NIST Special Publication 800-63 is the federal government's Digital Identity Guidelines framework, defining three assurance levels for identity proofing (IAL), authentication (AAL), and federation (FAL). While technically mandatory only for federal agencies, NIST 800-63 has become the de facto standard adopted by financial institutions, healthcare organizations, and technology companies. The FFIEC BSA/AML Examination Manual references NIST standards when evaluating identity verification procedures. Mapping your CIP and CDD processes to NIST assurance levels demonstrates to regulators that your identity verification meets a recognized, measurable standard of rigor.


The US digital identity landscape is evolving from physical documents to cryptographic credentials, from manual verification to real-time automated checks, and from centralized databases to user-controlled mobile credentials. Whether your organization is preparing for expanding mDL acceptance, aligning with NIST 800-63 standards, or optimizing existing KYC workflows, CheckFile provides the document validation infrastructure to handle both traditional and credential-based verification in a single platform. Explore our pricing plans to find the right fit for your compliance needs.

Stay informed

Get our compliance insights and practical guides delivered to your inbox.

Explore further

Discover our practical guides and resources to master document compliance.