India processes 2.5 billion authentication transactions monthly through a system that verifies identity locally. When a bank confirms who you are using Aadhaar, verification happens on their own systems—a digitally signed XML file, validated against a public key, entirely within the service provider's infrastructure.
Users download an XML file containing demographic information: name, address, date of birth, photograph, encrypted and signed by UIDAI's private key. Service providers validate the signature using UIDAI's public key. The file proves identity through cryptographic verification at the point of service. UIDAI's Central Identities Data Repository stays out of the transaction. Authentication happens wherever the file exists.
When Aadhaar launched in 2009, roughly 400 million Indians lacked any identification, concentrated in rural areas where internet connectivity came and went. UIDAI initially tried exception handling—service providers were supposed to implement fallback mechanisms when authentication failed. Rural bank branches couldn't process transactions during connectivity gaps. Welfare distribution stalled when authentication servers were unreachable. People were denied basic rights because authentication systems assumed always-on infrastructure that existed mainly in cities.
Offline verification emerged as survival infrastructure. Authentication had to work in areas with intermittent connectivity.
Designing for intermittent connectivity eliminated database dependencies. The same design choice created permanent constraints on data control that compound into regional exclusion patterns.
In November 2022, PhonePe enabled UPI payment setup using Aadhaar-based OTP alone—debit cards became optional. Millions of Indian bank account holders have Aadhaar and bank accounts. Many lack debit cards. Infrastructure built for intermittent connectivity enabled payment systems that work with Aadhaar credentials alone.
By October 2025, India had rolled out biometric UPI payments tied directly to Aadhaar data. Users confirm payments with fingerprint or facial scans matched against Aadhaar records—PIN entry becomes optional. National biometric identity integrated directly into payment authentication, possible because the underlying infrastructure was built to work offline.
Financial onboarding follows the same logic. A customer downloads their Aadhaar XML at home during off-peak hours, saves it, brings it to a bank the next day. The bank's system validates the signature locally even if internet connectivity fails at that moment. The Reserve Bank of India recognizes offline XML as valid full KYC for account opening, loan processing, credit card issuance.
| Metric | Scale |
|---|---|
| Offline e-KYC downloads | 110+ million |
| Digital KYC adoption rate | 85%+ |
| Authentication failure (Andhra Pradesh) | 5% |
| Authentication failure (rural Jharkhand) | 49% |
| UIDAI system downtime (2023) | 54+ hours |
Once an Aadhaar XML file is shared with its password, control over data accessibility is lost. The file works until expiry, regardless of who holds it. Authentication failure rates vary dramatically by region. Manual laborers with worn fingerprints, elderly people with unstable biometric data, poor-quality scanners—these compound into exclusion patterns that offline architecture can't solve. UIDAI acknowledged more than 54 hours of downtime in 2023. Offline verification depends on users downloading files from UIDAI servers first.
Designing for intermittent connectivity shifted the dependency structure. Database lookups gave way to cryptographic verification. Data control became permanent rather than revocable. Verification patterns across India's digital economy now operate on premises about infrastructure availability that differ fundamentally from what most identity systems assume. When automation encounters these authentication flows, it navigates surfaces that behave differently than systems built around real-time database lookups. The infrastructure built for areas with intermittent connectivity now shapes how digital services authenticate users across the world's most populous country.
Things to follow up on...
-
QR code authentication: Aadhaar introduced secure QR codes containing demographics and photographs that work entirely offline without requiring internet for scanning.
-
Estonia's federated approach: Unlike Aadhaar's centralized model, Estonia's X-Road platform uses a federated data exchange layer where citizens control data access through transparent logging.
-
Aadhaar Enabled Payment System: Rural residents conduct banking transactions through Business Correspondents using micro-ATMs with biometric authentication in areas without traditional bank branches.
-
Welfare distribution exclusion: Between 2019-20 and 2024-25, 4.57 crore MGNREGS job cards were deleted across India, with many deletions coinciding with mandatory Aadhaar e-KYC requirements.

