❓❔ Find answers to your questions here!
How do we upgrade our integration from V1 flows (VOI, Normal, Simple Flows V1) to V2 flows (VOI, Normal Flow V2)?
Update your 'Create transaction request' with the correct flow types. The available types are NORMAL2 and VOI2. Otherwise, the integrations are almost the same, but we recommend updating the following field names: licence_number -> id_number passport_number -> document_number If "document_type" is “Passport", then use "document_number" as the primary ID number. For all other documents, except passport, use id_number as the primary ID number. All other API fields are the same across V1 and V2 flow integrations.
What happens to “in-progress transactions” triggered by the former integration with NORMAL flow V1?
To retrieve those tx results: if "flow_type": "NORMAL" of V1 flows, you must apply the old parsing logic.
You can check the “flow_type" field in the get transaction API response to decide if you will parse the transaction in V1 format or V2 format. NORMAL, VOI, SIMPLE -> Need to parse in V1 format. NORMAL2, VOI2 -> Need to parse in V2 format. For more details about recommended fields to use in your integration, please refer to the section Recommended Fields to Use in Integrations.
How do we integrate IDKIT into our Mobile APP?
Integrating into a web app is as simple as specifying a URL and redirecting customers to the web app. For integrating within a mobile app, there are a few options you can choose - Please refer to the IDKit Integration with a Mobile App section.
Do you have any libraries or SDKs available?
We currently do not provide SDKs or libraries.
Are there any authentication specs to abide by when using webhooks?
Although not mandatory, authentication can be added to your webhooks! To do so, inside the POST Transaction API body, you have to set the following children values under their complete parent: auth_header_name: "Authorization", auth_header_value: "Basic <INSERT ACCESS TOKEN HERE>".
Which output details do I run Data provider checks against?
Are you planning to connect to a Data provider check outside the IDKIT platform? Run the Data provider check against user_details, not the extracted data from the JSON output.
When does an incomplete transaction expire?
Once a transaction is created, it will expire after 48 hours by default. Do you need to extend the expiry time? Contact us via Live Chat or submit a support ticket via the IDKit portal! We would happily extend your expiry time to a maximum of 7 days. 😊
What mobile devices and browsers do the IDKIT mobile flows support?
The ID Verification Flows work on Safari for Apple iPhones and Chrome for Android phones. Please take note! For users that have set their default mobile browser to another mobile browser that is not their device's standard, when opening the ID Verification Flow, they will be prompted to copy and paste the link into their device's standard browser.
Can I get my verification result in a report?
Of course, you can! After completing the verification process, the result can be downloaded as a PDF report. There are two ways to get the report, from the developer portal and by making an API call. You can refer to this section for further steps.
I need some images and videos from the user's verification. Can I get those?
You can! By simply making an API call through `Get the Transaction`, you can acquire all captured images from the user's ID and also captured videos from the user's face match verification. Check out this section to get a better understanding.
Does the use of a different ID affect the outcome of the transaction?
Transaction results will vary according to the ID used. This will also affect the fields in the address details. Please refer to the ID Field Examples to learn various examples of transaction results using different IDs and Address Field Examples for various ID issuer countries.
Is there an overview of supported 2FA authenticators?
Yes, there are various 2FA methods to enhance account security.
Yes, there are various 2FA methods to enhance account security.
One popular method is TOTP (Time-based One-Time Passwords), which generates unique numeric passwords using the current time. These passwords can be accessed offline through authenticator apps like Authy and Google Authenticator. TOTP is particularly noted for its high usability and strong security features.
Other methods include SMS, voice, email, and push notifications.