Dojah Identity & Fraud Glossary
This glossary explains Dojah’s identity verification, fraud detection, onboarding, compliance, and infrastructure capabilities in educational depth. Each entry includes structured FAQs to support product, compliance, sales, engineering, and operational teams.
A
Address Verification
Address Verification confirms that a user’s stated residential or business address is valid, deliverable, and consistent with trusted data sources.
FAQs
Why is address verification important?
It strengthens KYC compliance and reduces onboarding fraud.
Is document upload required?
Not always. It can be document-supported.
AML Screening (Anti-Money Laundering Screening)
AML Screening is the process of checking individuals or businesses against global sanctions lists, Politically Exposed Persons (PEP) databases, watchlists, law enforcement records, and adverse media sources to detect financial crime risk.
Within Dojah’s ecosystem, AML Screening can be integrated into onboarding (KYC/KYB), re-authentication, and fraud detection workflows. It supports regulatory compliance obligations and risk-based customer due diligence.
AML screening typically evaluates:
Sanctions exposure
Politically Exposed Person (PEP) status
Adverse media mentions
Watchlist inclusion
It may generate a risk score, flag potential matches, or escalate to manual review through case management Jurisdictional risk.
FAQs
Is AML screening mandatory?
Yes, for regulated industries such as fintech, banking, lending, remittance, and crypto services.
Does AML screening guarantee someone is not a criminal?
No. It reduces risk exposure by checking known databases but does not replace full investigations.
What happens if a match is found?
The result is flagged for review through AML Case Management. Businesses may request additional documentation or decline onboarding.
Is AML screening done once or continuously?
It can be configured as one-time onboarding screening or ongoing monitoring.
API Calls
API calls are structured requests sent to Dojah’s servers to perform identity checks, fraud analysis, or retrieve verification data. Every API call represents a measurable interaction and is logged for traceability, billing, and monitoring.
FAQs
Are API calls real-time?
Most verification endpoints return responses instantly, with webhooks for asynchronous updates.
Are failed calls logged?
Yes, including error codes and payload references.
API Keys
API keys are secure credentials assigned to each registered application. They authenticate and authorize access to Dojah services.
FAQs
Can API keys be rotated?
Yes, for security hygiene.
Should they be exposed client-side?
No. They must be stored securely server-side
API Logs
API logs provide detailed records of requests and responses including timestamps, status codes, and reference IDs.
FAQs
Why are API logs important?
They support debugging, dispute resolution, and compliance audits.
API Response Codes & Error Handling
Standardized HTTP and platform-specific response codes indicate the outcome of a request (success, validation failure, authentication error, insufficient wallet balance, system downtime).
FAQs
How should businesses handle errors?
Implement retry logic and user-friendly fallback messaging.
API Status
API Status reflects the operational health of Dojah services, including uptime and incident reports.
FAQs
Is status monitored publicly?
Yes, via system monitoring dashboards.
API Tokens
Short-lived authentication credentials used for secure session-based interactions.
FAQs
How are tokens different from API keys?
Tokens are temporary; API keys are persistent credentials.
Application (App Creation)
An Application (App) is a registered entity within Dojah’s dashboard. It acts as the unique gateway for accessing APIs, configuring flows, and managing environments. Each app has isolated credentials and settings.
FAQs
Can one business create multiple apps?
Yes, for environment separation or product lines.
Auto Wallet Top-up
A configurable system that automatically replenishes wallet balance once it drops below a threshold, preventing service interruptions.
FAQs
Why is this useful?
It prevents failed verifications due to insufficient balance.
B
Batch Lookup
Batch Lookup enables submission of multiple identity or business verification requests in a single API call, typically for bulk screening or migrations.
FAQs
When is batch preferred over single lookup?
During mass compliance checks or data migrations.
Blacklist / Custom Lists
Custom lists are configurable databases of flagged identifiers (emails, phone numbers, devices, IPs, ID numbers). They power automated fraud blocking or risk scoring.
FAQs
Can lists be updated dynamically?
Yes, via dashboard or API.
Business Data
Structured corporate information including legal name, registration number, status, directors, and tax identifiers retrieved from authoritative sources.
FAQs
Is business data real-time?
It depends on registry integration.
Business ID
Official company registration number issued by a government body.
FAQs
Is Business ID unique?
Yes, within its issuing jurisdiction.
Business Lookup
API-based validation of corporate registration details.
FAQs
Does it confirm active status?
Yes, where registry data supports it.
Business Registration
Verification process confirming a company is legally incorporated.
FAQs
Is beneficial ownership included?
Depending on jurisdiction and configuration.
Business Screening
Compliance and fraud checks performed on companies including AML, sanctions, and watchlists.
FAQs
Is screening one-time or ongoing?
It can be configured as both.
C
Configuration (EasyDetect)
Fraud engine control center where businesses define risk thresholds, automation rules, escalation paths, and scoring logic.
FAQs
Can risk appetite be customized?
Yes, thresholds are configurable.
Credit Check
Assessment of financial trustworthiness using credit bureau data.
FAQs
Is it mandatory for fraud checks?
No, primarily used in lending contexts.
Customer360
Unified dashboard view combining identity verification history, fraud signals, device data, screening results, and past events for a single user.
FAQs
Why is Customer360 valuable?
It provides holistic risk context for decision-making
D
Digital Address Verification
Validation of structured digital address identifiers issued by government or standardized systems.
FAQs
Is this different from regular address verification?
Yes, it validates standardized address IDs.
Document Analysis
AI-powered inspection of uploaded IDs to detect tampering, forgery, formatting anomalies, and metadata inconsistencies.
FAQs
Does it replace manual review?
It reduces manual workload but may escalate edge cases.
Duplicate ID Detection (Detect with Duplicate ID)
Fraud rule that identifies reuse of the same government ID across multiple accounts.
FAQs
Why is this risky?
It may indicate identity theft or account farming
E
EasyAuthentication
Biometric authentication tool used to verify returning users through liveness and facial matching.
FAQs
How is this different from onboarding verification?
It confirms identity for existing users rather than new ones.
EasyDetect
Comprehensive fraud detection engine combining device intelligence, behavioral analytics, velocity checks, AML integration, and rule-based scoring.
FAQs
Is EasyDetect rule-based or AI-based?
It combines configurable rules with intelligent signal analysis.
EasyOnboard
End-to-end onboarding tool integrating ID verification, AML screening, fraud checks, and workflow logic.
FAQs
Can flows be customized?
Yes, verification journeys are configurable.
eKYC (ID Widget)
Hosted identity capture solution for collecting government IDs, selfies, liveness data, and supporting documents.
FAQs
Is coding required?
Minimal integration is required via SDK or link.
Events
System-triggered notifications representing actions such as verification completion or fraud alerts.
FAQs
How are events delivered?
Via webhook or dashboard updates.
G
Geolocation
Location analysis derived from IP or device signals to detect mismatches or suspicious access behavior.
FAQs
Why is geolocation useful?
It identifies impossible travel or regional risk.
Government ID
Official identity document issued by a recognized authority.
FAQs
Are all IDs supported globally?
Support depends on integration scope.
Government Lookup
Direct validation of identity or business records against government databases.
FAQs
Is this real-time?
Yes, where live integrations exist.
L
Liveness Score
Numeric score representing probability that biometric capture originates from a live human rather than spoofed media.
FAQs
Is there a passing threshold?
Businesses configure acceptable thresholds.
Live Environment
Production environment used for real users and billable operations.
FAQs
Is it separate from sandbox?
Yes, completely isolated.
M
Match Score
Similarity score comparing a live selfie with an ID photo.
FAQs
Does high match score guarantee authenticity?
It increases confidence but may still be combined with liveness checks.
Messaging Services
Communication channels (SMS, WhatsApp, email, voice) used for OTPs and notifications.
FAQs
Are delivery reports available?
Yes, via messaging logs.
Messaging Logs
Records of message delivery attempts and statuses.
FAQs
Why are logs important?
For troubleshooting OTP failures.
Case Management (AML)
AML Case Management is a structured workflow system used to review, investigate, and resolve flagged AML alerts. When a screening check produces a potential match or high risk score, a case can be escalated for compliance review.
Cases may include:
User identity data
Screening match details
Risk level classification
Reviewer comments
Final decision
FAQs
Why is case management necessary?
Regulations require documented review processes when handling potential AML matches.
Can automated decisions replace case review?
For low-risk matches, yes. High-confidence matches typically require manual review.
Are case decisions auditable?
Yes. Every action is logged with timestamps and reviewer identity.
Can cases be reassigned?
Yes, to ensure appropriate escalation or senior compliance review.
R
Re-authentication
Process of verifying an already onboarded user again using biometrics, OTP, or layered checks.
FAQs
When is re-authentication required?
During sensitive actions or risk escalation.
Review Process
Manual compliance review of flagged verifications or fraud alerts.
FAQs
Can reviewers override decisions?
Yes, with audit tracking.
S
Sandbox Environment
Testing environment that mirrors production behavior without impacting real users.
FAQs
Is sandbox billed?
No, it is used for testing.
Single Lookup
Submission of a single verification request per API call.
FAQs
When is single lookup ideal?
For real-time onboarding flows.
P
Proof of Address (House Image Capture Verification)
Proof of Address (Image Capture Verification) is an enhanced address validation method where users submit real-time image evidence of their residence. This may include:
Inside compound image
Outside gate showing house number
Street view showing building structure
House frontage with visible street name
Verification combine:
Geolocation metadata
Utility bill validation
FAQs
Does image metadata matter?
Yes. GPS data and timestamps help validate authenticity.
Is this method compliant?
It supports enhanced due diligence and aligns with local regulatory standards.
Can this replace Utility bill (proof of address)?
It can only supplement it but it can’t replace it.
U
Uploads (Other IDs/Documents)
Feature enabling submission of additional supporting documents such as utility bills, bank statements, or secondary IDs.
FAQs
Why allow additional uploads?
To strengthen verification confidence or meet compliance requirements.
User Screening
Ongoing fraud and compliance monitoring applied to individuals across their lifecycle.
FAQs
Is screening continuous?
It can be configured for ongoing monitoring
Utility Bill
A Utility Bill is a traditional proof-of-address document used to confirm a person’s residential address. It is typically issued by a recognized service provider (electricity, water, waste).
Utility bills are used to:
Confirm physical residency
Match name to address
Support enhanced due diligence
FAQs
How recent must a utility bill be?
Typically within 3 months, depending on regulatory standards.
Does a utility bill confirm ownership of property?
No, it confirms service registration at an address.
Can digital utility bills be accepted?
Yes
V
Verification Analytics
Dashboard metrics tracking approval rates, drop-offs, completion time, and fraud trends.
FAQs
Why is analytics important?
It informs optimization and risk strategy.
Verification Flows
Configurable identity journeys combining ID upload, liveness, AML, and fraud checks.
FAQs
Can flows differ by country?
Yes, flows can be localized.
Verifications
Records of completed or attempted identity checks tied to unique reference IDs.
FAQs
Are verifications immutable?
Yes, for compliance integrity.
