Skip to main content
System operation functions manage core operational settings for ID check projects. You can operate safe and efficient identity authentication services through submission control system, privacy display settings, administrator settings, reviewer settings, IP whitelist management, etc.
System operation settings

System Operation Settings Page


Submission Control System

You can prepare for emergency situations through the submission control system.
Submission control system settings

Submission Control System Settings

Submission control system settings

Submission Control System Suspended Status

StatusDescription
Normal OperationAll eKYC processes are operating normally.
Emergency StopeKYC submissions are stopped. (eKYC submissions via Liveform, submissions via Post/submission)
Emergency Stop PrecautionsChanging to emergency stop status immediately stops all eKYC submissions. This includes not only submissions via Liveform but also submissions via API. New submissions cannot be received until the stop status is released.

Privacy Display Settings

You can configure whether to display personal information in the dashboard.
Privacy display settings

Privacy Display Settings

When the privacy display function is activated, the following information is displayed with blur processing in the dashboard:
  • ID Image: Submitted ID images are blurred.
  • ID Number: ID numbers are masked.
  • Document Number: Document numbers are masked.
Database StoragePrivacy display settings only control display on the dashboard screen. Actual information stored in the database is not deleted and can be queried via API.
Privacy Protection UsageWhen there are multiple administrators with dashboard access permissions, you can activate the privacy display function to hide sensitive information on the screen. This helps comply with privacy protection laws and strengthen internal security.

Administrator Settings

You can manage access permissions by project.
Administrator settings

Administrator Settings

You can register and manage administrators who can access the project through administrator settings. Key Functions:
  • Add Administrator: Register the email of an administrator to grant project access permissions.
  • Remove Administrator: Remove access permissions of registered administrators.
  • View Login Records: Click on an administrator account to view login records for that account.
Administrator Permission ManagementCurrently, only addition/removal of project access permissions is available. Detailed permission management functions will be added in the future.
Administrator SecurityOnly trusted accounts should be registered as administrator emails. If an administrator account is compromised, all project data can be accessed, so caution is required.

Reviewer Settings

You can configure who will review submissions that require manual review.
Reviewer settings

Reviewer Settings

You can register and manage reviewers who can review project submissions through reviewer settings. Key Functions:
  • ARGOS Professional Reviewer: ARGOS reviewers directly review.
    (Reviews submissions for pending items within a maximum of 24 hours. For faster review processing, please contact sales.)
  • Client API: The customer becomes the review entity and reviews directly.
    You can directly modify kycStatus for pending items in the dashboard, and use the Review API for faster processing.
Review is needed when the submission score falls below the ARGOS Score threshold value, resulting in a pending item.
Reviewer Usage If customers want to review all items directly, you can set the ARGOS score to 99.
How to Adjust ARGOS Score View

IP Whitelist Management (IPv4)

You can restrict dashboard viewing and API access to only specified IP addresses.
IP whitelist management

IP Whitelist Management

When the IP whitelist function is activated, the following access is only possible from registered IPv4 addresses:
  • Dashboard Access: Dashboard login is only possible from registered IPs.
  • API Access: API calls are only possible from registered IPs.
Configuration Method:
  1. Activate the IP whitelist function.
  2. Enter IPv4 addresses to allow. (One per line)
  3. Click the save button to apply settings.
IP Address Input Example:
52.12.34.56
52.12.34.57
203.0.113.0/24
IP Whitelist Precautions
  • When IP whitelist is activated, both dashboard and API cannot be accessed from unregistered IPs.
  • All server IPs that will call the API must be added to the whitelist:
    • Production servers
    • Staging servers
    • CI/CD pipeline IPs (if applicable)
    • Test administrator/developer IPs
  • If IP addresses change, the whitelist must be updated immediately.
IP Whitelist UsageSetting up an IP whitelist can block unauthorized access from outside and strengthen security. It is recommended to set this up when handling sensitive data including customer information.
CIDR Notation SupportIP whitelist supports not only single IP addresses but also CIDR notation (e.g., 203.0.113.0/24). This allows you to allow specific IP ranges at once, making management easier.