In a digital world, trust isn't given; it's built. For businesses, building that trust means verifying that users, partners, and employees are who they say they are. But traditional verification processes are often a tangled mess of manual checks, multiple vendors, and disjointed workflows. They're slow, expensive, and a nightmare to integrate.
At verification.services.do, we believe in a better way. We call it Trust As Code.
Our mission is to give you the power to Verify Anything, Instantly through a single, elegant API. This post will pull back the curtain and show you the complete lifecycle of a verification request—from the moment you hit our API to the second you receive a final, consolidated report.
Everything at verification.services.do starts with a developer-friendly API call. Instead of navigating complex portals or managing multiple vendor contracts, you can initiate a comprehensive background or identity check with just a few lines of code.
Let's say you need to perform a standard identity verification (KYC/AML) check for a new user signing up for your fintech platform. Here’s all it takes:
import { Client } from '@do-sdk/client';
// Initialize the .do client with your API key
const aido = new Client({ apiKey: 'YOUR_API_KEY' });
// Run an identity verification workflow
const verification = await aido.services.verification.run({
type: 'identity',
provider: 'veriff',
person: {
firstName: 'Jane',
lastName: 'Doe',
email: 'jane.doe@example.com'
},
callbackUrl: 'https://yourapp.com/webhooks/verification_status'
});
console.log('Verification initiated:', verification.id);
// Expected output: Verification initiated: ver_123abc456def789
Let's break down this simple request:
This single API call is the starting pistol for a powerful, automated workflow.
Once your request hits our servers, our intelligent orchestration engine takes over. This isn't just a simple proxy to another service. Our AI agents manage the entire complex process from start to finish.
Request Analysis & Workflow Selection: The agent first parses your request. It understands that an identity verification requires specific steps, such as document collection (like a driver's license or passport) and database lookups (for AML watchlists).
Intelligent Data Collection: If more information is needed from the end-user, our system can trigger a secure, white-labeled flow to collect necessary documents or consent, minimizing friction and keeping your brand front-and-center.
Provider Interaction: The agent then communicates with the chosen data provider(s) via their respective APIs. It handles the nuances of each provider's protocol, authenticates securely, and submits the necessary data for the check. For more complex checks, like employment history, our agents can query multiple data sources to cross-reference information.
This agentic approach means you integrate once with our clean API, and we handle the messy, ever-changing landscape of global data verification providers for you.
Data providers rarely return information in a standardized format. One might return a "pass" status, while another provides a detailed JSON with risk scores. Trying to normalize this data yourself from multiple sources is a significant engineering challenge.
Our platform does this heavy lifting for you.
As our AI agents receive data back from providers, they consolidate it into a single, standardized report.
You don't get a raw data dump; you get a clear, actionable answer.
Verifications aren't always instant. A KYC API check might take a few minutes, while an education verification could take a day. Our asynchronous, webhook-based architecture is built for this reality.
Once the report is consolidated and finalized, our system sends a secure payload to the callbackUrl you provided in your initial API call.
This payload is lightweight and contains everything you need to take action:
This event-driven model allows your application to react in real-time to completed verifications without the need for constant polling, making your system more efficient and scalable.
Underpinning this entire lifecycle is a fanatical commitment to security and compliance. We understand that we are handling sensitive personal data, and protecting it is our highest priority.
Our "Trust As Code" philosophy means that security isn't an afterthought; it's a fundamental, non-negotiable component of every API call and every workflow we execute.
The journey from a single API call to a final verification report showcases the power of an API-first, orchestrated approach. By abstracting away the complexity of data collection, provider management, and data normalization, verification.services.do empowers you to build trust into your applications faster and more reliably than ever before.
Ready to stop wrestling with verification workflows and start writing code? Explore our documentation and get your API key today at verification.services.do.