Verification Settings
The Verification Settings page allows you to configure various aspects of your identity verification process. This section provides you with the flexibility to tailor multiple verification workflows to your specific needs and compliance requirements.
Configuration Sections
1. Global Configuration
- Webhook URL: Set the endpoint where you'll receive real-time updates about verification processes.
- Webhook Secret Key: A unique key used to validate the authenticity of webhook payloads.
- Client ID: Your unique identifier for API authentication.
- Client Secret: Your secret key for API authentication. Keep this confidential.
- Alerts: Configure notification preferences
- Email Alerts: Add email addresses for verification notifications
- Slack Alerts: Set up Slack webhook URL for channel notifications
- User Notifications: Configure if you want to send user notifications for when a session is approved or rejected after being in review (requires user email)
- Reusable Sessions: Enable reusable sessions if a session has not been finished yet for the same vendor data and workflow ID
For detailed information on how to validate webhooks and implement webhook handlers, please refer to our Webhook Documentation.
2. Workflow Configuration
Didit offers flexible workflow configuration options with Web App workflows. You can choose from 4 workflow types and customize them with additional features.
Workflow Types
- KYC: Start with ID verification and add additional security layers
- Adaptive Age Verification: Verify user age through facial analysis with optional ID verification fallback
- Biometric Authentication: Re-verify returning users who have previously completed verification
- Address Verification: Verify user's residential address with optional additional verifications
For each workflow type, you can add relevant features to create a tailored verification experience. You can read more about the available workflows in the Workflows section.
3. Feature Configuration Options
When you select a specific workflow, you can configure the individual features it contains. Below are the available customization options for each feature:
Feature | Configuration Options |
---|---|
ID Verification | • Countries: Manage countries and documents accepted • Ongoing ID Monitoring: Automatically monitor document validity and expiration • Capture Method: Choose between live capture or file upload options • Age Restrictions: Decline sessions for users under a certain age • QR/Barcode Validation: Action when codes are invalid or missing • Expiration Date: Action when expiration date is invalid or missing • MRZ Validation: Action when MRZ is invalid or missing • Inconsistent Data: Action when document data is inconsistent • Invalid Validation: Action when document validation fails • Possible Duplicated User: Action when a document is similar to another approved user |
NFC | • Inconsistent Data: Action when document data differs from NFC chip data • Allow Skip NFC: Whether users can skip the NFC verification step • Chip Not Verified: Action when chip integrity verification fails |
IP Analysis | • Doc-IP Mismatch: Action when document country doesn't match user's IP location • Tor/VPN Detection: Action when privacy tools are detected |
Liveness | • Liveness Method: Choose between 3D Action & Flash, 3D Flash, or Passive • Liveness Score: Set thresholds for approval, review, and rejection • Possible Duplicated User: Action when face is similar to another approved user |
Face Match | • Face Match Score: Set thresholds for approval, review, and rejection |
Age Estimation | • Age Estimation Range: Set thresholds for approval, review, and rejection |
AML | • Enable Ongoing Monitoring: Enable/disable continuous monitoring of approved users • AML Score: Set risk score thresholds for different verification statuses |
Proof of Address | • Documents and Expiry Dates: Configure acceptable documents and validity periods • Integrity Detection: Action when document quality or file integrity is poor • Repeated Failures: Action after multiple failed verification attempts |
Face Search | • Similarity Percentage: Set the threshold for determining matches |
Phone Verification | • Verification Method: Configure SMS or call verification options • Retry Limits: Set maximum verification attempts |
Saving Your Settings
After configuring your workflows and their features, click the "Save changes" button at the bottom right of the page to apply your new configuration.
Changes to your verification settings may affect ongoing and future verifications. Consider the impact on your users before making significant changes.
Best Practices
-
Workflow Selection: Choose the most appropriate workflow type for your specific business needs, considering factors like security requirements, user experience, and regulatory compliance.
-
Feature Customization: Tailor each feature's settings to balance security and user convenience based on your risk tolerance and user base.
-
Regular Reviews: Periodically review and update your settings to ensure they align with your current business needs and compliance requirements.
-
Test After Changes: After making changes, perform test verifications to ensure everything works as expected.
-
Security First: Regularly rotate your
Client Secret
andShared Secret Key
as part of your security best practices.
For common use cases and recommended workflow configurations, refer to our Workflows documentation.
By carefully configuring these workflows and their features, you can create verification processes that balance security, compliance, and user experience, tailored to your specific needs.