KYC Configuration

šŸ›‚ KYC Endpoint Configuration

🧾 Overview

The KYC (Know Your Customer) endpoint configuration enables REL-ID’s IdvWebServer to call an enterprise-hosted API for validating scanned identity document data. This is typically done after selfie verification and before storing identity data (Opt-In).

The KYC API acts as a validation layer to ensure that the identity details match those in the enterprise's internal systems.


āš™ļø Configuration Steps

To enable or configure the KYC endpoint, follow these steps in the GM Portal.

āœ… Enable KYC

  1. Login to the GM Portal
  2. Navigate to Module Config Management
  3. Select the module: IDV Web Server
  4. Search for config key: kyc.enable
  5. Set value to:
true
  1. Click Restart to apply changes
šŸ”

Setting this to false will disable KYC check. The KYC step will be skipped entirely.


šŸ”— Configure KYC API URL

  1. In Module Config Management, select the module: IDV Server
  2. Search for config key: kyc.service.api.config
  3. Set the full KYC endpoint URL and any required request headers or payload structure.
  4. Click Restart

Example KYC API settings:

{
  "method": "POST",
  "url": "https://enterprise.com/api/validateKYC",
  "headers": [
    {
      "headerName": "Authorization",
      "headerValue": "Bearer __ACCESS_TOKEN_PLACEHOLDER__"
    },
    {
      "headerName": "Content-Type",
      "headerValue": "application/json"
    }
  ],
  "requestBody": {
    "name": "${name}",
    "dob": "${dob}",
    "documentNumber": "${doc_no}"
  }
}

šŸ› ļø Replace ${...} with macros supported by REL-ID to inject scanned data fields.


šŸ” Dynamic Access Token

If Authorization header uses Bearer __ACCESS_TOKEN_PLACEHOLDER__, then you must also configure the accessTokenEndpoint like below:

"accessTokenEndpoint": {
  "url": "https://enterprise.com/token",
  "method": "POST",
  "headers": [
    {
      "name": "Content-Type",
      "value": "application/x-www-form-urlencoded"
    }
  ],
  "postParameters": [
    {
      "name": "client_id",
      "value": "your_client_id"
    },
    {
      "name": "client_secret",
      "value": "your_client_secret"
    },
    {
      "name": "grant_type",
      "value": "client_credentials"
    }
  ]
}

REL-ID will dynamically fetch the access token and use it when calling the KYC API.


šŸ” When Is This API Called?

  • After selfie verification is complete (Step 3)
  • Before presenting the Opt-In screen
  • Only if kyc.enable is true

🧪 Expected Response

The enterprise KYC endpoint should return a success/failure indication. The exact format depends on enterprise implementation, but ideally:

{
  "kycStatus": "SUCCESS",
  "referenceId": "KYC123456789"
}

REL-ID can store the KYC result and optionally use referenceId in reporting or callbacks.


🚫 Disable KYC (Optional)

To turn off KYC checks entirely:

  1. In GM Portal → Module Config Management
  2. Module: IDV Web Server
  3. Set kyc.enable = false
  4. Click Restart

āœ… Completion

Once configured, IdvWebServer will call your KYC API during identity verification, allowing real-time validation of user identity data before enrollment completion.