Document Verification

Getting Started

To get started with an integration you’ll need to do the following.

  • Sign up for an developer account.
  • Register your organization.
  • Select which groups you would like to enable for verification.
  • Choose your platform to review the recommended integration options.
  • Place our ‘Verify with’ button on your site to begin testing authentication and verification.
  • Contact to generate test credentials.
  • Once verification is complete at, the partner sends a request to’s API to retrieve user attributes.

By default, your application will be set up for OAuth. Upon registration, you will immediately have access to the application details page which will list the client_id and client_secret for your OAuth client.

Leveraging the IDP SAML service will vary depending on the product that is used to implement the federation relationship. Currently, we do not support creating SAML SP profiles automatically through the portal, please contact for assistance in the process.

Client-Side (Implicit) Flow

If you are building an app that does not have a server component, you’ll notice that it’s impossible to complete step three above to receive your access_token without also having to ship your client secret. You should never ship your client secret onto devices you don’t control. Then how do you get an access_token? Well the smart folks in charge of the OAuth 2.0 spec anticipated this problem and created the Implicit Authentication Flow.

Step 1. Direct users to the authorization endpoint

The only difference from the server-side flow is that the response_type is token.

The endpoint to be used for your app is available at the bottom of the app details page.


Authorization Endpoint

HTTP Request Method



Name Required Description


The client identifier received during app registration. It is automatically generated and located in your application dashboard.



Where the user gets redirected after an authorizing an app. Set by the developer within the application dashboard.






A parameter that defines the group affiliation you are requesting permission to access.

Possible values:
  • document
Note: Your account must first be set up with policies to enable these scopes to be accepted.

Contact if you are receiving errors regarding an invalid scope.


Step 2. Receive the access token

Once the user has authenticated and authorized your app, we’ll redirect them to your redirect_uri with the access_token in the url fragment.

Redirect URI with access token

Simply grab the access_token off of the URL fragment and you’re good to go. If the user chooses not to grant access to your app, you will receive an error response. See error examples here.