Skip to main content

Overview

The UAE KYC Toolkit integrates into your existing channels (web and mobile) through a secure, token-based flow. This page explains the main building blocks so you know where UAE KYC fits in your architecture before diving into the details. For a step‑by‑step sequence diagram, see the Communication Flow.

Key Components

Main actors

ComponentRole
Client ApplicationYour web or mobile front‑end where users start KYC journeys
Client Backend ServerAuthenticates requests and calls UAE KYC APIs
Client Proxy / GatewayOptional reverse proxy/WAF layer that enforces access policies (for example, iRules) and forwards traffic to UAE KYC
Secure ChannelMPLS / VPN / whitelisted IP ensuring traffic stays on approved paths
UAE KYC (ICP Server)UAE KYC platform that hosts SDKs, runs checks, and stores results

High-level integration flow

  1. Initiate a journey
    • Your backend calls the Create Journey API.
    • UAE KYC returns a short‑lived journey token.
  2. Launch the SDK
    • Your web or mobile app initializes the UAE KYC SDK using the journey token.
    • The SDK connects securely to UAE KYC using the configured FQDN and network path.
  3. Complete verification & fetch results
For the detailed sequence (including callbacks and status updates), follow the Communication Flow.

Security at a glance

  • Network: All traffic runs over your approved secure channel (MPLS, VPN, or IP whitelisting).
  • Transport: HTTPS with SSL termination within your environment or proxy.
  • Tokens: Short‑lived journey tokens help prevent replay and limit exposure.
  • Proxy / Gateway: Optional reverse proxy adds an extra control layer between your systems and UAE KYC.
  • WAF / gateway policies: Clients typically enforce hostname and path rules (for example, iRules) at the edge to ensure UAE KYC traffic stays on the approved route.
For full security details, see Security Specifications.