About the Login.gov sandbox
Login.gov provides an open sandbox environment to create and test integrations between Login.gov and your applications. Note that the Login.gov Sandbox environment is a free service with an availability target of M-F, 8a-5p ET. While it is typically online within that window, there are occasional hiccups that should resolve quickly on their own. The environment may at times be available outside of this window, but it is not guaranteed and may become unavailable with no advance notice.
In the sandbox environment, our Portal is where you can manage your test applications. It is important to note that your Login.gov production account and your Login.gov sandbox account are two separate accounts.
Getting access to the Login.gov sandbox
Login.gov does not manage user accounts in the sandbox.
If you are an agency partner with a .gov or .mil account:
You can create an account in the sandbox environment on your own.
If you are a government contractor:
Ask your agency partner to help you gain access. Login.gov will not create an account or add you to a team; your partner must do this for you.
If you are with a government entity that is not a federal agency (a state or municipality) and do not have an email ending in .gov or .mil
Please submit a support ticket through the Partner Support Help Desk to get access to the Portal.
Using the sandbox
- Visit the Partner Portal at portal.int.identitysandbox.gov.
- Select the “Sign in” button in the upper-right corner to sign in or create a new account with the test Login.gov IdP in the sandbox environment hosted at idp.int.identitysandbox.gov. Please note that this is separate from your Login.gov production account.
- Once you are logged into your sandbox account, create a new team by selecting the “Continue” button under “Create your first team.” (If you have previously created a team you will select the “Create a new team” button.)
- If necessary, add users to that team by clicking the “Add users” button. This is the opportunity to add contractors or anyone without a .gov or a .mil
- After creating your team, select the Apps tab. This page is where you will find all of the test applications you and your team create.
- Select the “Create a new test app” button and fill out the form to register a new application with the Login.gov IdP in the test sandbox environment.
- Start testing!
- If you need to troubleshoot an issue that is not covered in the developer documentation, please submit a support ticket through the Partner Support Help Desk. We can also add you to our partner support Slack channel and the Login.gov team will help you along the way.
- When you’re ready to go to production, please follow our production deployment instructions. We’ll manage your application’s promotion to production. The move to production may take up to two weeks.
If you lost access to a sandbox team
Login.gov does not manage user accounts. If you have lost access to a team:
- Request someone on your team who still has access to re-add you.
- If there is no one left with access, contact the partner agency’s Login.gov Point of Contact and request that they re-add you to the team.
- If they are unable to re-add you, request that they open up a ticket through the Partner Support Help Desk explaining the situation and confirming that you need access. They must include either the issuer or the link to the application configuration.
Creating a public certificate
You can use the following OpenSSL command to generate a 2048-bit PEM-encoded public certificate for your application (with a 1-year validity period):
openssl req -nodes -x509 -days 365 -newkey rsa:2048 -keyout private.pem -out public.crt
Make sure you’re using the corresponding private key in your application to sign and/or validate requests and responses to/from Login.gov.
Load Testing
Our sandbox environment is smaller than our production environment and it is shared by many of our partners. It has not been configured for load testing. For these reasons, our recommendation is to mock out the Login.gov portion of your load tests. We thoroughly load test our infrastructure and can provide data on our capabilities upon request.
Automated Testing
Login.gov cannot provide specific recommendations for automated testing. This is especially true for applications using identity verification, because we are frequently making updates to the code and the flow is likely to change and could unexpectedly break your tests.
If you are looking for recommendations for automated testing, we do not have any specific advice. There are many different frameworks and automated testing suites available to choose from, and our partners usually pick based on their own unique needs. Regardless of which suite you choose, it should be noted that you cannot bypass the MFA portion of the flow. It is intentionally designed this way for security purposes and another reason why we recommend stubbing out our flow.
While Login.gov partner support channels have provided some support for automated testing in the past, as of 09/20/2023, will no longer be able to provide assistance in this area.
Testing identity proofing
The Login.gov sandbox test environment is configured to pass most information that is entered during the proofing flow. This allows the proofing flow to be tested without the need to enter personally identifiable information (PII). There are special values that can be entered to simulate error states while testing in the Login.gov sandbox environment. Never enter PII in the sandbox environment.
Document upload
Login.gov prompts users to upload the front and back of their documents during proofing through a few different methods. In the sandbox environment, any image file that is uploaded will pass.
Data testing
⚠️ Only the YAML file in the back
upload box is used on submission. For that reason, it’s good practice to upload the same yaml file in all three upload boxes to avoid confusion when testing.
A YAML file can be uploaded instead of a State ID image to trigger different behaviors. You will upload the same YAML file for the front and back of the State ID, and also the selfie (if that field appears). Different YAML files can be used to simulate the reading of certain attributes from the State ID or selfie. Here is an example YAML file that does that:
document:
first_name: Susan
last_name: Smith
middle_name: Q
address1: 1 Microsoft Way
address2: Apt 3
city: Bayside
state: NY
zipcode: '11364'
dob: '1938-10-06'
phone: +1 314-555-1212
state_id_number: '123456789'
state_id_type: drivers_license
state_id_jurisdiction: 'NY'
state_id_expiration: '2030-01-01'
state_id_issued: '2020-01-01'
issuing_country_code: 'US'
A YAML file can also be used to simulate an error reading or validating the document. Here are a couple of simple example YAML files:
image_metrics:
back:
HorizontalResolution: 100
failed_alerts:
- name: Document Classification
result: Attention
Here is an example YAML file that contains the full structure with annotations for expected values:
doc_auth_result: Passed # values: Passed, Failed, Attention, Unknown
image_metrics:
back:
HorizontalResolution: 300 # values: 0-600
VerticalResolution: 450 # values: 0-600
GlareMetric: 77 # values: 0-100
SharpnessMetric: 88 # values: 0-100
front:
HorizontalResolution: 450
VerticalResolution: 450
GlareMetric: 100
SharpnessMetric: 99
failed_alerts:
- name: 1D Control Number Valid # See list of valid names below
result: Failed # values: Passed, Failed, Attention, Caution
- name: 2D Barcode Content
result: Attention
passed_alerts:
- name: Visible Pattern
result: Passed
portrait_match_results:
FaceMatchResult: Pass # returns the portrait match result - values: Pass, Fail
FaceErrorMessage: 'Successful. Liveness: Live' # returns the liveness result - values: 'Successful. Liveness: Live', 'Liveness: NotLive', 'Liveness: PoorQuality'
There are not any required values from the above example file, you only need to include the values you are changing. The only exception is that alerts must be passed with both a name
and a result
as seen above. Anything not included will be given reasonable defaults for testing purposes.
Alert names with attention or failed values show under failed_alerts
. Only passed values show under passed_alerts
. The list of currently handled alert names for failed_alerts
and passed_alerts
are:
- name: 1D Control Number Valid
- name: 2D Barcode Content
- name: 2D Barcode Read
- name: Birth Date Crosscheck
- name: Birth Date Valid
- name: Control Number Crosscheck
- name: Document Classification
- name: Document Crosscheck Aggregation
- name: Document Expired
- name: Document Number Crosscheck
- name: Expiration Date Crosscheck
- name: Expiration Date Valid
- name: Full Name Crosscheck
- name: Issue Date Crosscheck
- name: Issue Date Valid
- name: Layout Valid
- name: Near-Infrared Response
- name: Physical Document Presence
- name: Sex Crosscheck
- name: Visible Color Response
- name: Visible Pattern
- name: Visible Photo Characteristics
NOTES:
- There are configurations of the above yaml file that cannot happen in real vendor responses. It is possible there will be unexpected outcomes in those cases.
Personal information verification
Login.gov collects and verifies personal information during the proofing process. The Login.gov sandbox environment only accepts social security numbers starting with “900” and “666” as valid to prevent users from accidentally entering real personal information. These prefixes are used because they are not valid according to the Social Security Administration.
To simulate a failure, enter a social security number that does not start with “900” or “666”, such as “123-45-6789”.
You can simulate failure to contact a proofing vendor by entering a social security number of “000-00-0000”. See “proofing vendor errors” for more ways to simulate vendor errors.
Proofing vendor errors
To simulate issues with proofing vendor responses, create a YAML file that includes a specific first_name
field, as specified below. Save the example YAML file below and edit the first_name
field to give the result you want.
first_name | Result |
---|---|
Bad | unverified user |
Fail | failed to contact vendor |
Parse | parse error in vendor response |
Time | vendor timeout |
To simulate failure to verify a zipcode, enter 00000
for the user’s zipcode.
See also: Individual state MVA errors
Sample YAML file:
document:
first_name: Parse
last_name: Smith
middle_name: Q
address1: 1 Microsoft Way
address2: Apt 3
city: Bayside
state: WA
zipcode: '99237'
dob: '1938-10-06'
phone: +1 206-555-1212
state_id_number: '123456789'
state_id_type: drivers_license
state_id_jurisdiction: 'WA'
state_id_expiration: '2030-01-01'
state_id_issued: '2020-01-01'
issuing_country_code: 'US'
Issuing source verification for ID documents
Login.gov collects the document number of a drivers license or state ID card automatically during the proofing process. This document is checked against issuing source data, along with user information, such as address.
To simulate a verification failure, submit 00000000
as the state_id_number
and any jurisdiction where issuing source verification is enabled for state_id_jurisdiction
.
Individual state MVA errors
To simulate an individual state yielding an error when asked to verify a drivers license, use mvatimeout
for state_id_number
and WA
for state_id_jurisdiction
. You can use any jurisdiction where issuing source verification is enabled for state_id_jurisdiction
, for example WA
.
Sample YAML file:
document:
first_name: Susan
last_name: Smith
middle_name: Q
address1: 1 Microsoft Way
address2: Apt 3
city: Bayside
state: NY
zipcode: '11364'
dob: '1938-10-06'
phone: +1 314-555-1212
state_id_number: "mvatimeout"
state_id_type: "drivers_license"
state_id_jurisdiction: "WA"
state_id_expiration: '2030-01-01'
state_id_issued: '2020-01-01'
issuing_country_code: 'US'
Phone number verification
Login.gov collects a phone number during the proofing process. In the production environment, Login.gov checks that this phone number is associated with the applicant. The following phone numbers simulate specific events:
703-555-5555
- simulates a phone number that couldn’t be verified as belonging to the user703-555-5888
- simulates a timeout during verification703-555-5999
- simulates a phone number that couldn’t be contacted
Use any other phone number for typical testing purposes.
Edit this page