Set up a Verification Profile
In order to start verifying users, your project must have a verification profile which defines the requirements your users must fulfill during the verification process.
Navigate to Data Profiles
Data profiles can be found inside of the top level organization menu.
Create a Verification Profile
Click Create Profile to open a dialogue window.
Add base data verification requirements
Navigate to the data groups tab to define the base requirements your users must fulfill during the verification process.
Here you can add data groups.
Each added group combines a set of required datapoints and allowed sources.
Property | Description |
---|---|
Required Datapoints | Datapoints that must be proved during user verification. |
Allowed Sources | Allowed options to prove datapoints from the group during user verification. |
Data Correlation: all datapoints within the same data group must be proved by the same source from user submitted data.
Add advanced data verification requirements
Business Rules define additional constraints on top of your base verification requirements.
Business Rule | Description |
---|---|
Document Country | Reject user verfication if an ID document comes from specific set of countries. |
Document Expiration | Reject user verfication if an ID document expires within X days. |
Credential Expiration | Reject user verfication if a credential expires within X days. |
Person Age (soon) | Reject user verfication if user's age is below a certain threshold. |
Risk Profile (soon) | Reject user verfication if user's risk profile is below a certain threshold. |
Here you can set constraints to meet advanced data verification requirements, as well unset it.
Integration Guides
Practical, step-by-step instructions for implementing key functionalities.
Verify Users
Cover a range of verification cases from "not a bot" to full KYC/AML using our integrated sources, risk signals, and reusable ID credentials
Issue Credentials
Issue reusable ID credentials to your users to simplify known user re-verification, build secure data sharing capabilities, and protect against ATOs and fraud.
AuthenticationSoon
Leverage OIDC + OID4VP protocols to make authentication following verification a breeze.