Key requirements
| Item | Requirement |
|---|---|
| Key regulations | Anti-scalping laws (macro/scalping prohibition) |
| Required verification | Passport/ID + face authentication |
| Security level | High (bot prevention focused) |
| Liveness | Active mode (macro defense) |
| AML | Not required |
| Duplicate prevention | DI-based 1 person 1 ticket limit |
Required settings checklist
Pre-verification (Verified Fan) settings
Complete verification before ticket sales open
| Setting | Recommended value | Rationale |
|---|---|---|
| ID Document (Passport/ID) | ON | Accommodate both domestic and international fans |
| Universal ID support | ON | Support various IDs for international fans |
Strategic value of pre-verificationBy performing ARGOS ID Check during the ‘Verified Fan’ verification stage before ticket sales open, only identity-verified users can enter the booking queue, providing first-line defense against bots. This is the most complete technical implementation of the anti-scalping regulation’s intent to ‘ensure fair booking opportunities’.
Universal ID support
View universal ID support settings for global users
Name similarity check settings (MRZ check)
Project Management > Policy and Authentication > Anti-fraud and Forgery Prevention > ID-based
| Setting | Recommended value | Rationale |
|---|---|---|
| MRZ check | ON | Cross-verify passport MRZ information |
| Name threshold | 85 points | Allow passport name notation differences |
MRZ name similarity comparisonMRZ check compares the similarity between names read from MRZ and names extracted via OCR. For international users, verification often fails due to different passport name order (John Doe vs Doe John). Setting the name threshold to 85 points flexibly allows such notation differences, reducing friction in on-site operations.
Macro defense settings
Project Management > Policy and Authentication > Anti-fraud and Forgery Prevention
| Setting | Recommended value | Rationale |
|---|---|---|
| Selfie liveness | Active mode (High) | Key to blocking macros/bots |
| Streaming capture only | ON | Block pre-recorded videos |
| Proxy & VPN detection | ON | Block macro farm networks |
1 person 1 ticket limit settings
Project Management > Policy and Authentication > Authentication Data
| Setting | Recommended value | Rationale |
|---|---|---|
| Deduplication pipeline | Default method ON | DI-based duplicate detection |
| Duplicate handling | Reject submission on duplicate | Prevent hoarding |
| Duplicate approval prevention period | Set according to event period | Per-event 1 person 1 ticket policy |
Using the DI value generated by ARGOS, the system blocks one real person from hoarding tickets by creating multiple accounts. This neutralizes scalpers’ ‘multi-account volume acquisition’ strategy.
Configure authentication data
View detailed settings
Submission limit settings
Project Management > Policy and Authentication > Authentication Data > Submission Limits
| Setting | Recommended value | Rationale |
|---|---|---|
| Time window | 1 hour | Block repeated attempts in short time |
| Allowed attempts | 3 times | Prevent malicious repeated submissions |
| Limit scope | Email + IPv4 address | Block various bypass attempts |
| Force block period | 24 hours | Prevent retry attempts |
Face authentication (Face Auth) settings
On-site entry solution (Add-on)
| Setting | Recommended value | Rationale |
|---|---|---|
| Face Auth | ON | Your face is your ticket |
| Selfie process | ON | Prerequisite for Face Auth |
Game changer: Your face is your ticketCompare the facial data registered during booking with facial recognition at on-site kiosks for entry. Since the ‘face’ becomes the entry ticket rather than a ticket (QR code), it becomes physically impossible to transfer or sell to others.Previously, preventing scalping required on-site staff to manually compare IDs and faces, taking hours for entry. With ARGOS Face Auth, attendees can pass through gates at walking speed (walk-through), and scalpers have no way to transfer purchased tickets.
Face authentication guide
View Face Auth detailed guide
Recommended settings summary
Webhook integration
Required webhook events| Event | Action |
|---|---|
submission.approved | Grant queue entry permission |
submission.rejected | Deny booking eligibility |
face.auth.matched | Allow on-site entry |
face.auth.failed | Deny entry + request identity verification |
Webhook setup guide
View detailed webhook event settings
Related documentation
KYC process
ARGOS score, country blacklist, and basic settings
Anti-fraud and forgery prevention
Liveness, selfie, MRZ check, Proxy/VPN detection, and security settings
Authentication data
DI generation, deduplication, submission limits, and data management settings
Face Auth guide
On-site face authentication setup and usage