Skip to main content

Documentation Index

Fetch the complete documentation index at: https://documentation.idenfy.com/llms.txt

Use this file to discover all available pages before exploring further.

Location: SettingsKnow Your Customer (KYC)AML & Fraud Prevention This section allows you to configure automated screening processes to detect money laundering, fraud, and high-risk applicants. You can toggle specific checks that occur during the verification process or enable ongoing monitoring for approved users.

Anti-Money Laundering (AML)

Configure how and when your users are screened against Politically Exposed Persons (PEPs), sanctions, and watchlist databases.
  • AML check: Runs a real-time screen during the verification process against global PEP lists, sanctions, and other relevant datasets.
  • Auto AML monitoring: Activates daily ongoing monitoring for users after their identity verification is approved. Alerts you if a user’s status changes.
  • Auto adverse media monitoring: Activates monthly screening for negative news or adverse media coverage associated with your user.
Auto adverse media monitoring only works together with Auto AML monitoring.

Additional Fraud Prevention

These settings enable checks against specific national and international databases to validate the authenticity of your user’s data.
  • Registry centers countries: Select countries (e.g., United Kingdom, Hungary, Lithuania) to enable cross-referencing approved identities against their respective national registries.
  • Criminal background check: Scans for potential criminal history during verification. Currently available for US citizens only.
  • Driver’s license check: Performs a state-specific AAMVA check, verifying driver’s license or ID data against official US DMV databases.
  • LID check: Checks the document against the Lost Invalid Document (LID) registry. Specific to documents issued in Lithuania.
  • IP proxy risk check: Analyzes the user’s IP address immediately after approval to detect high-risk proxies or VPNs that may indicate fraud.

Verification Steps

Add extra layers of security by requiring users to verify their contact or financial information.
  • Verify email: Requires the user to enter a confirmation code sent to their email address.
  • Verify phone: Requires the user to enter a one-time password (OTP) sent via SMS.
  • Verify bank: Prompts the user to log in to their bank account during the flow.
    • Verify bank accounts: Validates the existence of the account.
    • Verify bank balances: Checks current balance data.
    • Verify bank transactions: Retrieves and analyzes transaction history.

Duplicates & Blocklists

Duplicate Detection

Checks your internal database to determine if the user has applied before.
  • Document face duplicate check: Compares the face on the ID document against all past verifications.
  • Selfie face duplicate detection: Compares the live selfie against all past verifications.
  • Personal data duplicates detection: Checks for matching personal information (name, surname, date of birth) after a verification is approved.

Blocklists

Cross-references the applicant against your specific blocklists.
  • Blocklist checks: Enable separate checks for document face, selfie face, and personal data against your blocklist.
  • Blocklist by IP country: Automatically blocks and ends the session if the user’s IP address originates from a restricted country.
  • Blocklist by declared country: Prevents users from proceeding if they select or provide documents from restricted countries.