Persona
Configurable identity infrastructure
Status
Not set
Live
Live
Chains
No items found.
Category
Security
Compliance
Analytics
Privacy
Category
Channel Partner
Partner Type
No items found.
Integrations
ACE
Product Type
ACE
Industry
No items found.
Security
Compliance
Analytics
Privacy
Year
2025
Collaboration
Social
Announcements
Channel Partnership Details
November 3, 2025
Chainlink Automated Compliance Engine (ACE) partner ecosystem officially launched featuring 20+ leading compliance providers, frameworks, & regulators powering the next generation of onchain compliance
Read more
ACE
About
Persona

212What’s a Rich Text element?

The rich text element allows you to create and format headings, paragraphs, blockquotes, images, and video all in one place instead of having to add and format them individually. Just double-click and easily create content.

Static and dynamic content editing

A rich text element can be used with static or dynamic content. For static content, just drop it into any page and begin editing. For dynamic content, add a rich text field to any collection and then connect a rich text test link to that field in the settings panel. Voila!

How to customize formatting for each rich text

Headings, paragraphs, blockquotes, figures, images, and figure captions can all be styled after a class is added to the rich text element using the "When inside of" nested selector system.

Persona provides a powerful, secure platform to help organizations collect, verify, store, and analyze the identity of any individual in the world. A frontend, conversion-optimized user interface makes it easy to start verifying identities in minutes.

With Persona, you configure a template to specify which verifications an individual needs to complete through the frontend flow. As individuals progress through the template, they submit the required information to be verified, such as a government ID, and create a verification. Each time an individual attempts to complete the set of verifications specified by a template, they create an inquiry, which contains the information collected from the submitted verifications, the results of those verifications, and passively-collected contextual data like IP address that can be used to identify suspicious activity. Once an individual completes an inquiry, you can use the verified information to run an additional report such as a global watchlist or sanctions check on the individual.

Does this information seem accurate?
If not you can request a change.
Want to discuss an integration?

To discuss an integration, reach out to an expert.

No items found.
ACE
Security
Compliance
Analytics
Privacy