Registers a new connect user or pulls the latest on an existing one.
Content-Type: application/json
API-KEY: <your-api-key>
{
"reference_id": "string", // A reference ID for the user.
}
{
"status": "success",
"unique_id": "string", // The unique ID of the business connect user [autogenerated]
"invite_id": "string", // The invite ID associated with the user.
"invite_url": "string", // The URL for the invite.
"connection_verified": true // Indicates if the connection is verified.
}
{
"status": "failure",
"failure_code": "string", // The code representing the type of failure.
"failure_reason": "string" // A description of the failure reason.
}
Checks the connection status and pulls down data request for registered user.
Content-Type: application/json
API-KEY: <your-api-key>
{
"reference_id": "string",
// or
"unique_id": "string"
}
{
"status": "success",
"unique_id": "string",
"has_connection": true, // Indicates if the user has a connection.
"data_request_response": "string" // The response data for the data request.
}
DOES_NOT_EXIST
on an unregistered user
{
"status": "failure",
"failure_code": "string", // The code representing the type of failure.
"failure_reason": "string" // A description of the failure reason.
}
Checks for updates on the connection status of business connect users.
Content-Type: application/json
API-KEY: <your-api-key>
{
"last_refresh_timestamp_s": "integer" // The timestamp of the last refresh in seconds.
}
{
"status": "success",
"connections_to_update": ["string"], // A list of user names whose connections need to be updated.
"timestamp_s": "integer" // The current timestamp in seconds.
}
{
"status": "failure",
"failure_code": "string", // The code representing the type of failure.
"failure_reason": "string" // A description of the failure reason.
}
Webhooks allow you to receive real-time HTTP notifications of changes to user verification status. When an event occurs, a POST request is sent to the webhook URL you have configured.
Each webhook is called from the configured url with the corrosponding even appended onto the path. For now all payloads are the same but future version may give customers optional control fo their keys to facilitate end to end encryption.
/connection_verified
- successful verification of a user/connection_deleted
- user deleted their verification or account/deverification
- called upon user deverification by VerifyYou for fraudContent-Type: application/json
X-Hub-Signature-256: sha256=<hmac-signature>
// HMAC signature for verifying the payload.{
"payload": { // The payload recieved in the webhook.
"event": "string", // Event code - see above (sans /)
"unique_id": "string",
"reference_id": "string",
}
}
The request will try up to 3 times at exponential dropoff or until recieving a 200
return code.
To verify the webhook signature, compare the hashed payload with the enclosed signature using your shared secret. Here's an example of that process in python:
import hashlib
import hmac
import base64
def verify_signature(payload, secret, signature):
computed_signature = hmac.new(
secret.encode('utf-8'),
payload.encode('utf-8'),
hashlib.sha256
).hexdigest()
return hmac.compare_digest(computed_signature, signature)
Coming soon. For now send Axel the url and he'll send you a secret