Glossary
Entity
An entity equals a verification flow. It refers to a verification system (KYB or KYC) designed to create a project's verification ecosystem according to its needs.
Members
A member refers to an individual who belongs to or is part of that particular entity. Members often have certain rights, privileges, and responsibilities within the organization or application.
Role
A role refers to the function, position, or responsibility that a person or entity has in a particular situation or organization. It defines the tasks, duties, and expectations associated with that position. The current roles in the manager are : owner; admin; compliance officer.
Authentication code
An authentication code is a security measure used to verify the identity of a user or device. It is typically a unique code or password that is required to access a system or complete a transaction. To connect to an organization your code is sent to you by e-mail.
Verification flow
This is the verification process for your application. It includes verification steps such as liveness, ID document, proof of address. It defines the verification process that your users will perform.
Sandbox
A sandbox is a testing environment where developers can experiment and try out different features of our application without affecting the actual production environment.
KYB
KYB, or Know Your Business, is a process used to verify the identity and legitimacy of a business or organization. It involves collecting information and documentation to ensure compliance with regulations and mitigate risks.
KYC
KYC, or Know Your Customer, is a process used to verify the identity and legitimacy of a customer or user. It involves collecting information and documentation to ensure compliance with regulations and mitigate risks.
UBO
UBO stands for Ultimate Beneficial Owner. The Ultimate Beneficial Owner refers to the individual who ultimately owns or controls a company or organization. It is important to identify the UBO as part of the Know Your Business (KYB) process to ensure compliance with regulations and mitigate risks.
Awaiting user action
It refers to a status or condition where a certain action or document needs to be submitted or provided in order to proceed with a process or request. It indicates that something is missing or incomplete, and the user is required to take further action to fulfil the requirement.
Pending verification
Pending verification refers to a status or condition where a certain action or document needs to be verified before proceeding with a process or request. It indicates that the verification process is still ongoing and the user is required to wait for confirmation or completion of the verification.
Risk control
Risk control is the process of identifying, assessing, and managing potential risks within an organization or application to minimize the likelihood and impact of negative events or outcomes. It involves implementing strategies, policies, and procedures to mitigate risks and ensure compliance with regulations.
Sessions
The user sessions are created from applications and refers to the verification process to be carried out by the user. These verification steps are defined in the application's verification flow.A session is never definitively validated. Documents that are uploaded may become obsolete over time or expire.
Liveness
It refers to a feature or process that verifies the presence and authenticity of a user in real-time. It ensures that the user is physically present and actively engaged during a transaction or interaction within our application.
ID document
An ID document, also known as an identification document, is a form of official identification that is used to verify the identity of a user. It typically includes personal information such as the user's name, photograph, date of birth, and unique identification number. Examples of ID documents include passports, driver's licenses, and national identity cards.
Proof of address
Proof of address is a document or evidence that confirms a user's residential address.
AML (anti money laundering)
It refers to the set of regulations and processes in place to prevent and detect illegal activities related to money laundering. It involves measures to verify the identity of users, monitor transactions, and report suspicious activities to the appropriate authorities.
Duplicate
A step from the verification flow linked to the ID document that ensure that an user is not enrolled twice using facial recognition. If this option is enabled, users will not be able to perform multiple sessions. The second session submitted by the user will be permanently blocked.
Logs
Logs are records or entries that capture information about applications and organization.
Owner
An owner is the individual or entity that has ultimate control and authority over an organization or application.
Admin
An admin can add and remove users, as well as manage their roles within applications.
Compliance officer
A compliance officer within the manager is the person in charge of AML sessions and, if appointed, of taking decisions on them.