System Integration & All Dev Environment Set-Up FAQ

The current Help Center does not include Developer guides. We have a Developer guide for all products: ID check, an all-in-one identity verification solution, and Verify, an individual module API with a specific purpose to enhance your business.

Click here to see the Developer guide.

 

  1. How can we receive eKYC progress information on our server?

    ARGOS provides eKYC progress updates to clients via Webhooks at key stages.
    Follow these steps to configure Webhooks:
    Go to Settings > General > Access Management. Enter the Webhook URL where you wish to receive and save the information.
    Please refer to this guide for detailed instructions on Webhook setup and usage.

  2. How can we match eKYC results with our internal user data?

    ARGOS eKYC system uses userId to match results with your internal database:
    Webhook & Get/Submission: Extract the userId from the eKYC results and match it with your internal database.

    Liveform: Include userId in the Query string when invoking the Liveform.
    API: Include userId in the Options data for your API request.

    Developer guides for these methods can be found here.

  3. How can we back up the data?

    You can use Get/Submission and Get/Image API to fetch any of ID check submission data. 

  4. Is there a maximum API call request number for a day? 

    ARGOS API supports a maximum of 100,000 requests per 24-hour period (1 day) per project.
    This limit is fixed to 1 API-Key per project and applies individually to each project.

  5. How does ARGOS handle data encryption?

    ARGOS ensures the secure encryption of text and image data within its services:
    Text Data: Personal information stored on the server is encrypted using AES-256. Additional encryption is applied on the client side using a SecretKey. Even ARGOS Identity internal administrators cannot access plaintext data stored in the database.

    Image Data: Submitted images are protected with AES-256 encryption upon being saved to the server. Encryption is handled securely using AWS S3 and KMS.

    Please refer to this guide for detailed instructions on encryption 

 

Was this article helpful?
2 out of 2 found this helpful
Can't find what you're looking for?
Submit a request