Riskless Documentation

Getting Started

Platform Overview

Riskless is a no-code platform that enables you to build sophisticated identity verification and fraud prevention systems without writing any code. Create visual workflows that define your risk logic and deploy them instantly.

Key Features

Visual Flow Builder: Drag-and-drop interface to create verification workflows
Hosted Verification Pages: Ready-to-use pages for collecting user information
Real-time Monitoring: Track verification sessions and flow performance
Custom Branding: Match your company's look and feel

Creating Your First Flow

1

Navigate to Flows

Click on the "Flows" tab in the dashboard navigation.

2

Create a New Flow

Click "Create Flow" and give it a descriptive name like "Bank Account Opening" or "User Onboarding".

3

Add Nodes

Drag nodes from the sidebar to build your verification logic:

  • Input nodes to collect data
  • Data source nodes to verify information
  • Rule nodes to make decisions
  • Action nodes to define outcomes
4

Connect and Configure

Connect nodes by dragging from output to input ports. Click on nodes to configure their settings.

5

Save and Deploy

Click "Save Flow" to deploy your workflow. It's now ready to use!

Testing Your Flows

Before going live, test your flows to ensure they work as expected.

Test Options

Test Mode Execution

Run flows with sample data to see how they behave

Test Links

Generate temporary links to test hosted verification pages

Session Viewer

Review execution logs and see exactly what happened

Hosted Verification Pages

What are Hosted Pages?

Hosted pages are pre-built, customizable web pages that collect user information for verification. Instead of building your own forms, you can redirect users to these secure, branded pages.

Benefits

  • No coding required
  • Mobile responsive
  • Secure & compliant
  • Custom branding

Use Cases

  • KYC for financial services
  • User onboarding
  • Age verification
  • Identity verification

Creating a Page Configuration

Step 1: Navigate to Hosted Pages

Go to the "Hosted Pages" tab in your dashboard.

Step 2: Create Configuration

Click "Create Page Config" to open the configuration modal.

Step 3: Configure Settings

Basic Tab:
  • Name: Internal identifier for your configuration
  • URL Slug: The path for your hosted page (e.g., /verify/kyc)
  • Title & Description: What users see on the page
Fields Tab:
  • Select required fields (marked with *)
  • Add optional fields for additional data
Branding Tab:
  • Upload your logo
  • Choose primary and background colors
Compliance Tab:
  • Add privacy policy and terms URLs
  • Configure consent text

Customizing Your Pages

Branding Options

Visual Customization

Your company logo appears at the top

Primary color for buttons and accents

Content Customization

  • • Page title and description
  • • Success message after completion
  • • Field labels and placeholders
  • • Consent and legal text

Risk & Identity Flows

Using the Flow Builder

The flow builder is a visual interface where you create verification workflows by connecting nodes.

Interface Elements

Node Sidebar: Drag nodes from here to the canvas
Canvas: Build your flow by connecting nodes
Toolbar: Save, test, and manage your flow
Mini Map: Navigate large flows easily

Controls

Drag: Move nodes around the canvas
Connect: Drag from output to input ports
Delete: Select and press Delete key
Zoom: Use mouse wheel or controls

Understanding Nodes

Input Nodes

Receive data from external sources

  • Form Input: Data from hosted verification pages
  • API Input: Data sent via API calls
  • Webhook: Data from external webhooks

Data Source Nodes

Verify and enrich data

  • Email Verification: Validate email addresses
  • Phone Verification: Check phone numbers
  • Identity Check: Verify identity documents
  • Sanctions Check: Screen against watchlists

Rule Nodes

Make decisions based on data

  • Conditional: If/then logic branches
  • Score: Calculate risk scores
  • Threshold: Check if values meet criteria
  • Custom Rule: Complex business logic

Action Nodes

Define what happens next

  • Approve: Mark verification as passed
  • Reject: Mark verification as failed
  • Manual Review: Flag for human review
  • Webhook: Send data to external systems

Creating Rules

Rules define the logic that determines verification outcomes. Create simple or complex rules using our visual interface.

Simple Rules

IF age > 18 AND country = "US" THEN approve

Complex Rules

IF (risk_score > 80 OR sanctions_hit = true) AND (document_verified = false OR address_verified = false) THEN manual_review

Monitoring & Analytics

Dashboard Overview

Monitor your verification performance and identify trends in real-time.

Key Metrics

  • • Total verifications
  • • Approval rate
  • • Average processing time
  • • Active sessions

Flow Performance

  • • Executions per flow
  • • Success/failure rates
  • • Bottleneck identification
  • • Error tracking

User Analytics

  • • Geographic distribution
  • • Device types
  • • Drop-off points
  • • Time-to-complete

Viewing Sessions

Each verification creates a session you can review for debugging and compliance.

Session Information

Timeline View

See each step of the verification process with timestamps

Input/Output Data

Review what data was collected and how it was processed

Decision Trail

Understand why specific decisions were made

Error Details

Debug failed verifications with detailed error logs