Authentication & Security

  • Apps: Your registered applications within the Dojah platform.
  • Public Keys: Shared keys used to verify requests or data from Dojah.
  • Private Keys: Confidential keys used to securely authenticate your API requests.
  • Sandbox: A testing environment for running API calls without affecting live data.
  • Live (Production): Your real environment where actual user and business data is processed.
  • Webhook: A callback mechanism that notifies your server in real-time when certain events happen.

Identity & Verification

  • EasyOnboard: Dojah’s full-stack user onboarding suite combining eKYC, document, and biometric verification.
  • eKYC: Electronic Know-Your-Customer verification using digital data or uploaded documents.
  • Document Verification: Checks the validity of national ID cards, passports, and driver’s licenses.
  • Face Match: Compares the user’s selfie against the image on a government-issued document.
  • Liveness Detection: Verifies if a real human is present using anti-spoofing checks.
  • Government Lookup: Validates IDs like NIN, BVN, Voter ID, and Passport from authoritative sources.

Business Verification

  • Business Verification: The process of validating business identities using official databases or documents.
  • CAC Lookup: Fetches company details from Nigeria’s Corporate Affairs Commission (CAC).
  • TIN Verification: Confirms a business’s Tax Identification Number (TIN) from FIRS records.
  • Global Business Check: Search and validate international business records.
  • eKYB Upload: Allows companies to upload registration documents for verification against government databases.

Fraud Intelligence

  • EasyDetect: Dojah’s fraud detection platform that analyzes behavioral, transactional, and device signals.
  • AML Screening: Checks for matches on global watchlists, sanctions lists, and PEPs (Politically Exposed Persons).
  • Credit Check: Assesses a user’s credit history, behavioral score, and loan performance.
  • Phone Check: Screens phone numbers for line status, reputation, and carrier insights.
  • Email Check: Assesses email validity, domain reputation, and usage signals.
  • IP Screening: Identifies risky or anonymized IPs based on geolocation and proxy status.
  • User Screening: Runs fraud signals against behavioral history, usage velocity, and blacklist databases.
  • Custom Lists: Internal blacklists or whitelists uploaded by your team to flag known entities.

Platform Mechanics

  • Flow Link: A shareable URL that directs users into a verification or onboarding flow.
  • Ingest URL: The endpoint where you send real-time or batch events for analysis.
  • Reference ID: A unique identifier for each verification attempt, used for tracking and auditing.
  • Confidence Score: A numeric indication (usually 0–1 or 0–100%) of how confident the system is about a match or decision.
  • Case: A flagged verification or transaction event that requires human review in the dashboard.
  • Velocity: A risk signal based on how frequently a user, phone, device, or IP appears across the system in a short time.