Overview
No-code configurations allow you to create and customize identity verification workflows without writing any code. Use the intuitive interface to define steps that align with your business needs.
Introduction
No-code configurations enable you to create and customize identity verification workflows without writing a single line of code. This feature provides a user-friendly interface where you can define steps, set parameters, and automate verification processes to meet your business requirements. Whether you're adjusting verification rules, adding extra security measures, or streamlining user onboarding, no-code configurations give you full control—without the need for development resources.
Key benefits
Easy of use - A drag-and-drop or form-based interface allows anyone to configure workflows without technical expertise.
Flexibility – Customize workflows to fit different verification needs, such as KYC, AML screening, document validation or Proof of address analysis.
Faster deployment – Make changes in real time without waiting for developers, ensuring quicker adaptation to regulatory or business needs.
Scalability – Easily modify and expand workflows as your company grows and verification requirements evolve.
How It Works
Setting up a No-Code Configuration involves a few straightforward steps:
Access the No-code configurations – Navigate to the Configurations section in your dashboard and create new one.
Define workflow steps – Select from available verification steps such as ID verification, Liveness, or Video KYC to build your workflow.
Set parameters – Configure individual steps and overall workflow rules, such as redirecting users after verification is completed.
Test and deploy – Preview your workflow, make adjustments, and activate it by creating a new session or using the Configuration ID or Public URL.
Use cases
No-code configurations can be applied in various scenarios, including:
Financial services – Set up automated KYC workflows for new account openings.
E-commerce & Marketplaces – Verify sellers and buyers before allowing transactions.
Gig economy & Hiring platforms – Conduct identity and background verification for freelancers or employees.
Cryptocurrency & Fintech – Implement compliance-driven checks for AML and fraud prevention.
Healthcare & Insurance – Authenticate users before granting access to sensitive medical or policy data.
Last updated
Was this helpful?