Using the IC

Create Internet Identity

The Internet Identity is your key to the Internet Computer. Learn how you can create one in 2 minutes.

IC Academy » Internet Identity » Create Internet Identity

How to use Internet Identity

Discover how you can create and use Internet Identity Anchors with our step-by-step guide

The following covers how you can create your Internet Identity. To learn more about Internet Identity, see What is Internet Identity and How Internet Identity works

Preparations for creating an Internet Identity

Internet Identity is compatible with the following authentication devices:

Fingerprint Sensor

Such as the fingerprint sensor on a smartphone or laptop

Face ID System

Such as the face ID system used on a smartphone

Portable HSM

Hardware Security Modules, such as YubiKey or Ledger wallet

Make sure that one of these authentication methods is enabled on your device, for example by inserting your YubiKey or Ledger.

Create an Internet Identity in 3 easy steps

Here’s an overview of the three steps to create your Internet Identity. We’ll have a detailed look at each step in the explanations below.

Step-by-step instructions for creating an Internet Identity

Let’s walk through the process of creating an Internet Identity.

#1 – Go to the Internet Identity Page

Visit the Internet Identity Page and click on Create an Internet Identity Anchor.

#2 – Enter a name for the authentication method

Select a name for the authentication method of your choice. For example the name of your device or your device type, such as iPhone, Samsung, Laptop, YubiKey, etc. After you have selected a name, click on Create.

#3 – Create the Identity Anchor by using your device as authentication method

The interface will now show you the available options you can use as authentication method. This depends on the device you are using and whether or not you have inserted your Ledger/YubiKey.

As a best practice, it is recommended to use at least one dedicated authentication method per Identity Anchor. Later on, you can add another dedicated security key.

If you are using multiple authentication methods, be sure to store one of the keys in a safe place as a recovery mechanism.

#4 – Authenticate your device

Internet Identity will now construct a new Identity Anchor. Once this is done, type in the characters you see to confirm the new device.

#5 – Click Confirm

Click on Confirm to create your Identity Anchor. Please note: until you perform this action, your Identity Anchor is not created.

#6 – Record your Identity Anchor

Once you have added and authenticated your device, a new Internet Anchor will be created for you. Your Internet Anchor is represented by a unique combination of numbers. Be sure to write it down and store it in different places to avoid losing it. If you wish to authenticate on a different computer or smartphone, you have to reenter your Internet Anchor.

Store your Internet Anchor in a safe place. If you are logged out and have forgotten your Identity Anchor, you will no longer be able to authenticate yourself – unless you have set up account recovery.

Add a recovery mechanism

It is recommended to add a recovery mechanism to your Identity Anchor. Let’s have a look at how this works

Option A – Generate Seed Phrase

By clicking on Seed Phrase, you can generate a cryptographically-secure phrase to recover your Identity Anchor.

Make sure to keep your seed phrase secret and store it safely. Anyone in control of the phrase will be able to take full control of your Identity Anchor.

The Identity Anchor is the first string in your seed phrase. This number is needed to initiate the recovery process.

Make sure to copy your seed phrase and click on Copy and Continue. Otherwise, your phrase will not be registered by the system.

Option B – Add dedicated security key

Another option to add a recovery mechanism is to use a dedicated security key. You must use a different key than the one you are using to authenticate to Internet Identity.

Make sure to store your security key safely. Anyone in control of the key will be able to take full control of your Identity Anchor.

To initiate the recovery, you will have to provide the Identity Anchor.

On the next screen, you can see an overview of the added devices and recovery mechanisms. Here, you can add or remove devices as well as recovery mechanisms.

That is it! You have now successfully created an Internet Identity and added a recovery mechanism to it.

Internet Computer Wallets

Explore the different options you have to store and stake your ICP and to participate in the governance of the Internet Computer. Learn more about IC wallets.

Explore wallets

What is the ICP token?

Internet Computer Protocol tokens (ICP tokens) are the native utility token of the Internet Computer. ICP can be used for governance, converted to cycles, or locked up.

Learn more about the ICP token