Dojah Inc logo
Get Started

Dojah Identity & Fraud Glossary

Ayomide Oso

This glossary explains Dojah’s identity verification, fraud detection, onboarding, compliance, and infrastructure capabilities in educational depth. Each entry includes structured FAQs to support product, compliance, sales, engineering, and operational teams.

A

Address Verification

Address Verification confirms that a user’s stated residential or business address is valid, deliverable, and consistent with trusted data sources.

FAQs

  • Why is address verification important?

  • It strengthens KYC compliance and reduces onboarding fraud.

  • Is document upload required?

  • Not always. It can be document-supported.

AML Screening (Anti-Money Laundering Screening)

AML Screening is the process of checking individuals or businesses against global sanctions lists, Politically Exposed Persons (PEP) databases, watchlists, law enforcement records, and adverse media sources to detect financial crime risk.

Within Dojah’s ecosystem, AML Screening can be integrated into onboarding (KYC/KYB), re-authentication, and fraud detection workflows. It supports regulatory compliance obligations and risk-based customer due diligence.

AML screening typically evaluates:

  • Sanctions exposure

  • Politically Exposed Person (PEP) status

  • Adverse media mentions

  • Watchlist inclusion

It may generate a risk score, flag potential matches, or escalate to manual review through case management Jurisdictional risk.

FAQs

Is AML screening mandatory?

Yes, for regulated industries such as fintech, banking, lending, remittance, and crypto services.

Does AML screening guarantee someone is not a criminal?

No. It reduces risk exposure by checking known databases but does not replace full investigations.

What happens if a match is found?

The result is flagged for review through AML Case Management. Businesses may request additional documentation or decline onboarding.

Is AML screening done once or continuously?

It can be configured as one-time onboarding screening or ongoing monitoring.

API Calls

API calls are structured requests sent to Dojah’s servers to perform identity checks, fraud analysis, or retrieve verification data. Every API call represents a measurable interaction and is logged for traceability, billing, and monitoring.

FAQs

  • Are API calls real-time?

Most verification endpoints return responses instantly, with webhooks for asynchronous updates.

  • Are failed calls logged?

Yes, including error codes and payload references.

API Keys

API keys are secure credentials assigned to each registered application. They authenticate and authorize access to Dojah services.

FAQs

  • Can API keys be rotated?

Yes, for security hygiene.

Should they be exposed client-side?

No. They must be stored securely server-side

API Logs

API logs provide detailed records of requests and responses including timestamps, status codes, and reference IDs.

FAQs

Why are API logs important?

They support debugging, dispute resolution, and compliance audits.

API Response Codes & Error Handling

Standardized HTTP and platform-specific response codes indicate the outcome of a request (success, validation failure, authentication error, insufficient wallet balance, system downtime).

FAQs

  • How should businesses handle errors?

Implement retry logic and user-friendly fallback messaging.

API Status

API Status reflects the operational health of Dojah services, including uptime and incident reports.

FAQs

Is status monitored publicly?

Yes, via system monitoring dashboards.

API Tokens

Short-lived authentication credentials used for secure session-based interactions.

FAQs

How are tokens different from API keys?

Tokens are temporary; API keys are persistent credentials.

Application (App Creation)

An Application (App) is a registered entity within Dojah’s dashboard. It acts as the unique gateway for accessing APIs, configuring flows, and managing environments. Each app has isolated credentials and settings.

FAQs

Can one business create multiple apps?

Yes, for environment separation or product lines.

Auto Wallet Top-up

A configurable system that automatically replenishes wallet balance once it drops below a threshold, preventing service interruptions.

FAQs

Why is this useful?

It prevents failed verifications due to insufficient balance.

B

Batch Lookup

Batch Lookup enables submission of multiple identity or business verification requests in a single API call, typically for bulk screening or migrations.

FAQs

When is batch preferred over single lookup?

During mass compliance checks or data migrations.

Blacklist / Custom Lists

Custom lists are configurable databases of flagged identifiers (emails, phone numbers, devices, IPs, ID numbers). They power automated fraud blocking or risk scoring.

FAQs

Can lists be updated dynamically?

Yes, via dashboard or API.

Business Data

Structured corporate information including legal name, registration number, status, directors, and tax identifiers retrieved from authoritative sources.

FAQs

Is business data real-time?

It depends on registry integration.

Business ID

Official company registration number issued by a government body.

FAQs

Is Business ID unique?

Yes, within its issuing jurisdiction.

Business Lookup

API-based validation of corporate registration details.

FAQs

Does it confirm active status?

Yes, where registry data supports it.

Business Registration

Verification process confirming a company is legally incorporated.

FAQs

Is beneficial ownership included?

Depending on jurisdiction and configuration.

Business Screening

Compliance and fraud checks performed on companies including AML, sanctions, and watchlists.

FAQs

Is screening one-time or ongoing?

It can be configured as both.

C

Configuration (EasyDetect)

Fraud engine control center where businesses define risk thresholds, automation rules, escalation paths, and scoring logic.

FAQs

Can risk appetite be customized?

Yes, thresholds are configurable.

Credit Check

Assessment of financial trustworthiness using credit bureau data.

FAQs

Is it mandatory for fraud checks?

No, primarily used in lending contexts.

Customer360

Unified dashboard view combining identity verification history, fraud signals, device data, screening results, and past events for a single user.

FAQs

Why is Customer360 valuable?

It provides holistic risk context for decision-making

D

Digital Address Verification

Validation of structured digital address identifiers issued by government or standardized systems.

FAQs

Is this different from regular address verification?

Yes, it validates standardized address IDs.

Document Analysis

AI-powered inspection of uploaded IDs to detect tampering, forgery, formatting anomalies, and metadata inconsistencies.

FAQs

Does it replace manual review?

It reduces manual workload but may escalate edge cases.

Duplicate ID Detection (Detect with Duplicate ID)

Fraud rule that identifies reuse of the same government ID across multiple accounts.

FAQs

Why is this risky?

It may indicate identity theft or account farming

E

EasyAuthentication

Biometric authentication tool used to verify returning users through liveness and facial matching.

FAQs

How is this different from onboarding verification?

It confirms identity for existing users rather than new ones.

EasyDetect

Comprehensive fraud detection engine combining device intelligence, behavioral analytics, velocity checks, AML integration, and rule-based scoring.

FAQs

Is EasyDetect rule-based or AI-based?

It combines configurable rules with intelligent signal analysis.

EasyOnboard

End-to-end onboarding tool integrating ID verification, AML screening, fraud checks, and workflow logic.

FAQs

Can flows be customized?

Yes, verification journeys are configurable.

eKYC (ID Widget)

Hosted identity capture solution for collecting government IDs, selfies, liveness data, and supporting documents.

FAQs

Is coding required?

Minimal integration is required via SDK or link.

Events

System-triggered notifications representing actions such as verification completion or fraud alerts.

FAQs

How are events delivered?

Via webhook or dashboard updates.

G

Geolocation

Location analysis derived from IP or device signals to detect mismatches or suspicious access behavior.

FAQs

Why is geolocation useful?

It identifies impossible travel or regional risk.

Government ID

Official identity document issued by a recognized authority.

FAQs

Are all IDs supported globally?

Support depends on integration scope.

Government Lookup

Direct validation of identity or business records against government databases.

FAQs

Is this real-time?

Yes, where live integrations exist.

L

Liveness Score

Numeric score representing probability that biometric capture originates from a live human rather than spoofed media.

FAQs

Is there a passing threshold?

Businesses configure acceptable thresholds.

Live Environment

Production environment used for real users and billable operations.

FAQs

Is it separate from sandbox?

Yes, completely isolated.

M

Match Score

Similarity score comparing a live selfie with an ID photo.

FAQs

Does high match score guarantee authenticity?

It increases confidence but may still be combined with liveness checks.

Messaging Services

Communication channels (SMS, WhatsApp, email, voice) used for OTPs and notifications.

FAQs

Are delivery reports available?

Yes, via messaging logs.

Messaging Logs

Records of message delivery attempts and statuses.

FAQs

Why are logs important?

For troubleshooting OTP failures.

Case Management (AML)

AML Case Management is a structured workflow system used to review, investigate, and resolve flagged AML alerts. When a screening check produces a potential match or high risk score, a case can be escalated for compliance review.

Cases may include:

  • User identity data

  • Screening match details

  • Risk level classification

  • Reviewer comments

  • Final decision

FAQs

Why is case management necessary?

Regulations require documented review processes when handling potential AML matches.

Can automated decisions replace case review?

For low-risk matches, yes. High-confidence matches typically require manual review.

Are case decisions auditable?

Yes. Every action is logged with timestamps and reviewer identity.

Can cases be reassigned?

Yes, to ensure appropriate escalation or senior compliance review.

R

Re-authentication

Process of verifying an already onboarded user again using biometrics, OTP, or layered checks.

FAQs

When is re-authentication required?

During sensitive actions or risk escalation.

Review Process

Manual compliance review of flagged verifications or fraud alerts.

FAQs

Can reviewers override decisions?

Yes, with audit tracking.

S

Sandbox Environment

Testing environment that mirrors production behavior without impacting real users.

FAQs

Is sandbox billed?

No, it is used for testing.

Single Lookup

Submission of a single verification request per API call.

FAQs

When is single lookup ideal?

For real-time onboarding flows.

P

Proof of Address (House Image Capture Verification)

Proof of Address (Image Capture Verification) is an enhanced address validation method where users submit real-time image evidence of their residence. This may include:

  • Inside compound image

  • Outside gate showing house number

  • Street view showing building structure

  • House frontage with visible street name

Verification combine:

  • Geolocation metadata

  • Utility bill validation

FAQs

Does image metadata matter?

Yes. GPS data and timestamps help validate authenticity.

Is this method compliant?

It supports enhanced due diligence and aligns with local regulatory standards.

Can this replace Utility bill (proof of address)?

It can only supplement it but it can’t replace it.

U

Uploads (Other IDs/Documents)

Feature enabling submission of additional supporting documents such as utility bills, bank statements, or secondary IDs.

FAQs

Why allow additional uploads?

To strengthen verification confidence or meet compliance requirements.

User Screening

Ongoing fraud and compliance monitoring applied to individuals across their lifecycle.

FAQs

Is screening continuous?

It can be configured for ongoing monitoring

Utility Bill

A Utility Bill is a traditional proof-of-address document used to confirm a person’s residential address. It is typically issued by a recognized service provider (electricity, water, waste).

Utility bills are used to:

  • Confirm physical residency

  • Match name to address

  • Support enhanced due diligence

FAQs

How recent must a utility bill be?

Typically within 3 months, depending on regulatory standards.

Does a utility bill confirm ownership of property?

No, it confirms service registration at an address.

Can digital utility bills be accepted?

Yes

V

Verification Analytics

Dashboard metrics tracking approval rates, drop-offs, completion time, and fraud trends.

FAQs

Why is analytics important?

It informs optimization and risk strategy.

Verification Flows

Configurable identity journeys combining ID upload, liveness, AML, and fraud checks.

FAQs

Can flows differ by country?

Yes, flows can be localized.

Verifications

Records of completed or attempted identity checks tied to unique reference IDs.

FAQs

Are verifications immutable?

Yes, for compliance integrity.

Was this helpful?
Glossary
Identity Verification
Fraud Detection
Compliance
Product Training
Developer Docs