OneID

OneID lets people prove who they are without uploading a passport or taking a selfie. Instead, it uses their bank or other digital data sources, institutions they already trust, to confirm their identity securely, in seconds.

When I joined as the sole designer, the product was one year old and one method deep. Over three years, I helped turn it from a single verification flow into a flexible identity platform, one that 800,000 people a week now use to prove personal details such as name, date of birth or address.

Impact:

+47% user completion rate | +15% user adoption | -91 sec to complete

Company

OneID®

Role

UX/UI Designer

Service

UX/UI

Timeline

Jan 2022

Understanding the problem

Identity verification is a moment of high stakes and low trust. You're being asked to hand over sensitive personal data to a service you may have just discovered. The bar for confidence is high, and the tolerance for friction is almost zero.

At OneID, that tension sat at the centre of everything. We had three groups of people with overlapping but often conflicting needs, and designing for one without the others created problems fast.

End users

Wanted speed and simplicity.

but not at the cost of feeling exposed. They'd heard enough data breach headlines to be wary. Even when the friction was low, trust wasn't automatic.

Customers

Needed flexibility.

Edge cases that felt marginal: joint accounts, non-UK users, long age checks for e-commerce, were actually blocking real adoption. One unsupported scenario could cost a contract.

OneID

Needed a product that could grow.

The first-time experience was strong, but the cost model didn't scale, and the architecture made it hard to move fast.

User testing insight

The challenge wasn't just UX. It was understanding where these tensions overlapped and designing a product that could hold all three, without pretending the trade-offs didn't exist.

Framing the approach

The research made one thing clear: we couldn't fix everything at once without breaking what was already working.

Completion rates were suffering at specific, identifiable points in the journey, not everywhere. That meant we had headroom to improve before making bigger structural bets. So we split the work into three phases, each one building on the last:

Approach

1

Stabilise and improve the existing bank-based journey — fix what's causing drop-off now

2

Expand coverage: address the edge cases that were blocking customers from committing

3

Redesign the economics: make the product sustainable at scale.

This wasn't just a sensible project plan. It was a way of protecting the team: giving engineering fast wins without betting on architectural decisions we hadn't validated yet.

Optimising what exists

These usability and visual changes focused on reducing cognitive load at the most sensitive points of the journey, particularly where users were asked to connect their bank.

  1. From embedded to controlled environments


Before

OneID was embedded directly inside customers' websites. That meant our design was at the mercy of their layouts, their responsiveness, their accessibility decisions. A product asking people to do something sensitive was behaving like a widget.


After

Moving the verification journey into a modal or new tab, configurable by the customer, gave us back control. It meant we could guarantee a consistent, accessible experience regardless of where OneID was deployed.

It also unlocked something we hadn't expected: new distribution channels. A standalone URL made it possible for customers to trigger verification via email, or generate QR codes for in-person scenarios, such as age checks at self-service kiosks, for example. A small structural change, with a long tail of consequences.

  1. Reducing cognitive load


Before

The original first screen read like an onboarding guide. Dense copy, multiple explanations, a lot of words before any action. In a normal product, that might just be friction. In an identity verification flow — where users are already slightly on edge, it felt like something to be wary of.


After

We stripped it back. One clear message: what's being verified, and why it's safe. No more than the user needed to take the next step with confidence.

From embedded to controlled environments

  1. Findability and bank access


Before

Desktop users were dropping off at a rate 21% higher than mobile. The reason was simple: getting to your bank on a laptop means navigating to a website, entering credentials, possibly waiting for a two-factor code. It's effortful enough to break the moment.


After

The fix was a QR code letting users hand off to their phone, where their bank app is already installed and a face scan is all it takes. A small shift in interaction model with a meaningful impact on completion.

Bank Findability

  1. Designing for recovery and learning


Before

When something went wrong, OneID showed one message: Something went wrong. No context, no next step, no way forward.

Errors in identity verification don't just create friction, they create doubt. If the product can't explain what happened, users assume the worst: that they did something wrong, or that their data is somehow at risk.


After

I mapped every error state we could recognise, wrote plain-language explanations for each, and built recovery paths where we could. For example, letting someone retry with a different bank if their first choice wasn't supported. Turning dead ends into decision points.

Error Handling

A new design system

Re-evaluating product fit

The first phase delivered real gains (approx. +27% completion at this stage). But it also exposed something we'd been working around: bank verification alone couldn't serve everyone.

Users without digital bank accounts. Joint account holders. People outside the UK. E-commerce scenarios where speed was everything and a banking journey was too slow. These were whole groups of customers we couldn't reach.

We began adding alternative verification methods alongside the bank journey: document scanning at first, then a growing set of identity providers for different regulatory contexts.

Expanding coverage

Linear fallback

At a first stage, document scanning could be configured by customers either as a main method, or as a fallback when bank verification failed.

What it enabled:

  • Users without digital bank accounts

  • Joint bank account holders

  • International users

  • An alternative for openbanking errors

New limitations emerged:

  • Use cases (e.g. employment pre-screening) require document scans for regulatory reasons, but also wanted bank verification for additional checks like AML.

  • Age verification for e commerce didn't want a fallback system, but multiple options for users to choose from.

As we added options, new tensions emerged. Employment pre-screening needed both document scans and bank verification, not one or the other. Age verification for e-commerce didn't want a fallback; it wanted user choice. We weren't just expanding coverage anymore. We were being asked to compose verification flows from multiple parts.

Orchestration and system thinking

This was the moment that changed how I thought about the product.

Until now, OneID sold named products - ID Check, ID Assure, Age Check, Age Assure - each a fixed solution for a specific use case. It was a model that made sense early on, but it was starting to break. Customers had needs that didn't map cleanly to any single product. New use cases kept arriving. And every addition created another thing to maintain, position, and explain.

We made a deliberate decision to stop selling products and start selling one thing: customer verification. A single solution that customers could configure based on what they actually needed: the data scope (e.g. address, age, identity), the compliance requirements they were working to, and the methods available to meet them.

Under the hood, this meant restructuring OneID around an orchestration layer. Verification methods became modular components that could be combined per context. But from a customer's perspective, the shift was simpler: instead of choosing between products, they were shaping one.

It was a trade-off worth naming. Orchestration introduced real backend complexity and significant upfront engineering. But it was the only model that could scale, because no fixed product catalogue would ever keep pace with how compliance requirements actually evolve.


Cost, reuse, and business model

By this point, OneID was processing around 800,000 verifications a week - 300 times the volume when I joined. At that scale, even small inefficiencies compound fast.

The cost model had a structural problem: every verification had a per-check cost, including for returning users. Someone signing documents in DocuSign three times a month was being verified from scratch each time. Meanwhile, competitors with app-based models were building loyalty out of reuse: a clunkier first experience that got faster and cheaper with every return visit.

The "we don't store anything" principle had been central to OneID's identity. It was also becoming a constraint.

Reuse couldn't be just a UX improvement. It required a genuine shift in what OneID was willing to hold on behalf of its users, and how it protected that responsibility.

We introduced OneID Accounts: a way for users to save their verified results and unlock them again with a passkey, with end-to-end encryption ensuring only they could access their data. The result was a 2/3 reduction in cost per check for returning users.

As the product grew, cost and scale became much harder to ignore. By this point, weekly journeys had increased 300×, reaching around 800k per week, so even small inefficiencies in the model started to matter.

OneID delivered a great first-time experience, but every verification had a per-check cost. As users began returning more frequently, we were effectively paying again for something we had already verified. Meanwhile, competitors with app-based models accepted a clunkier first run, but benefited from near-instant, low-cost reuse after that.

That was the shift for me. Reuse couldn’t just be a UX improvement. We moved away from the “we don’t store anything” mindset and introduced OneID Accounts: a secure reuse, allowing users to save verified results and skip repeated checks, with encryption ensuring only they could unlock their data via a passkey.

It wasn’t only about speed. At this scale, reuse changed the economics of OneID.

Cost-per-check was reduced by 2/3 for returning users.

Impact

Measurable Outcomes

+47%

+47%

Increase in success rate

+15%

+15%

User adoption

(for key client)

-91sec

-91sec

Time to complete

(for returning users)

Next steps

Reuse was the first step in building a relationship to maintain. But it surfaced a gap: users had no visibility into their own verified identity. They couldn't see which organisations had checked them, manage their data, or delete their account without contacting OneID directly.

I'm currently designing MyOneID — a user-facing portal that gives people genuine control over their identity data. Not just GDPR compliance as a backend function, but transparency as a product feature.

If orchestration made OneID more powerful for businesses, MyOneID is what makes it trustworthy for the people at the centre of it.

Identity verification, done right, shouldn't feel like something that happens to you. It should feel like something you're in control of.

Get in touch

Email

a.galvao@outlook.com

Linkedin

linkedin.com/in/amanda-galv/

© 2026 London