Sber

How we built a scalable microservice architecture for secure identity verification

enterpriseCases.sber.content.coverImageAlt

For a large financial institution, we developed an enterprise-grade identity verification and authentication system capable of handling millions of sessions per day — with high security standards, stable availability, and full auditability. The platform combines modern microservices, encrypted communication, and intelligent load balancing to enable real-time identity verification across web and mobile platforms.

Challenge

A large financial institution needed a new authentication layer that:

  • Reliably processes millions of identity verification requests daily
  • Is secure, scalable, and fault-tolerant
  • Supports comprehensive logging and compliance-oriented audit requirements
  • Can be integrated into a containerized infrastructure
  • Seamlessly integrates with existing identity providers

In short: a modern, modular platform for critical security processes.

Our Approach

1 — Microservice-Based Architecture

We developed independent services for:

  • identity validation
  • session and token management
  • document and ID verification
  • event and audit logging

Communication between services occurs asynchronously via message queues.

2 — Containerization & Orchestration

All services were implemented using Docker and operated in Kubernetes:

  • automatic horizontal scaling
  • high fault tolerance (self-healing)
  • rolling deployments without downtime

3 — Security & Compliance

The system was developed with security standards aligned with regulated financial environments:

  • encrypted service-to-service communication
  • multi-factor validation mechanisms
  • adaptive throttling mechanisms
  • full audit traceability

4 — Integration & Extensibility

The platform was designed to flexibly integrate into:

  • existing identity providers
  • internal banking systems
  • mobile and web apps

Results

  • Millions of identity verification sessions processed per day
  • Significantly reduced downtime through containerized architecture and orchestration
  • Full auditability for internal compliance processes
  • Seamless integration with external and internal identity providers
  • Stable performance under high load

Note: Client details, data types, and system scope have been partially anonymized due to confidentiality, regulatory, and data protection requirements. System performance and characteristics depend on deployment context and configuration.

Tech Stack

Backend: Java 17 · Spring

Database: Oracle

Infrastructure: Docker · Kubernetes

Messaging: asynchronous queues

Duration: 18 months

Team: 5 engineers

Why It Matters

The architecture developed in this project sets standards for modern security-critical systems. The same principles — modularity, security, scalability, and clear responsibilities — now flow into our startup and enterprise projects, where reliability and data protection are crucial from the start.

Case Studies