Skip to main content

Documentation Index

Fetch the complete documentation index at: https://developers.argosidentity.com/llms.txt

Use this file to discover all available pages before exploring further.

1. Document Overview

1.1 Purpose

This document describes the network communication architecture and data security policies for the Restful API provided by ARGOS Identity (no UI; server-to-server communication).

1.2 Target Audience

  • Information security and security review personnel at customer organizations
  • Backend development teams performing API integration
  • Compliance / audit departments

1.3 Scope

  • Communication architecture from the customer server → ARGOS API
  • TLS, authentication, authorization, and payload security
  • Multi-tenant isolation, auditing, and compliance

2. Service Category Introduction

Restful API is one of the four categories offered by ARGOS, providing a Server-to-Server API called directly by the customer’s server without a UI.

2.1 Key Features

  • Standard REST conventions (GET / POST / PATCH / DELETE)
  • JSON-based requests/responses
  • Custom domain with ACM-issued TLS certificate
  • Per-project API Key issuance and validation

2.2 Use Cases

  • Customers operating their own UI who only need to query and manage KYC result data from ARGOS
  • Bulk manipulation of KYC submission data from a back-office or management tool
  • External data integration (migration, synchronization)

2.3 Key Endpoint Examples

MethodPathDescription
GET/SubmissionQuery submissions (pagination supported)
POST/SubmissionCreate a submission (including migration)
PATCH/SubmissionUpdate submission information
DELETE/Submission(Soft) delete a submission
(For the full endpoint specification, refer to the separate API documentation.)

3. Network Communication Flow

3.1 Call Structure

3.2 Communication Stages

StageFromToProtocol
① DNS resolutionCustomer serverAWS Route 53DNS over TLS / Standard DNS
② API callCustomer serverAWS API GatewayHTTPS (TLS 1.2+)
③ Handler invocationAPI GatewayServerless handlerAWS internal (TLS)
④ Data operationsHandlerDynamoDBTLS 1.2+ (AWS SDK + SigV4)
⑤ Response returnHandler → API Gateway → CustomerHTTPS (TLS 1.2+)

4. Communication Protocols and Standards

4.1 Transport Layer

  • TLS 1.2 or higher enforced (API Gateway security policy)
  • AWS Certificate Manager (ACM)-issued certificates used (auto-renewal)
  • ARGOS custom domain (managed via Route 53)

4.2 HTTP Request Format

ItemValue
MethodGET / POST / PATCH / DELETE
Content-Type (request)application/json (default) / text/plain (when encryption option is enabled)
Content-Type (response)Same
EncodingUTF-8

4.3 Required Request Headers

HeaderDescription
x-api-keyUnique API Key issued per project (required)
Content-Typeapplication/json or text/plain
HostCustom domain issued by ARGOS

5. Data Encryption

5.1 In Transit (Required)

  • HTTPS / TLS 1.2+ enforced
  • TLS termination is handled by AWS API Gateway
  • The API Gateway → handler segment also uses AWS internal TLS

5.2 Payload Encryption (Optional, per-project activation)

Customers who want additional protection for sensitive data can enable the following option.
ItemValue
ActivationEnable the Data Encryption project option
AlgorithmAES-256 (symmetric key)
Key derivationBased on the project API Key seed
ScopeBoth request body and response body (bidirectional)
Content-Typetext/plain (Base64-encoded ciphertext)

5.3 At Rest

  • All data is protected by DynamoDB server-side encryption
  • Sensitive identifying fields are additionally encrypted at the application layer using AES-256 + AWS KMS Customer-managed Key
  • Object storage (images) is encrypted using AWS S3 SSE-KMS

6. Authentication and Authorization

6.1 Primary Authentication — API Gateway API Key

All Restful API calls must pass API Key validation at the AWS API Gateway stage before reaching the serverless handler.
ItemValue
Issuance unitPer-project (Project-specific)
Issuance methodIssued by ARGOS when a new project is created
Delivery methodHTTP Header x-api-key
Validating partyAWS API Gateway (validated before the serverless handler is invoked)
Missing or mismatchedImmediately rejected at the API Gateway stage (403 Forbidden)

6.2 Secondary Authentication (Optional) — IP Allowlist

Projects requiring additional security can enable an IP Allowlist.
  • Register allowed IP ranges per project
  • AWS Lambda Authorizer compares the client IP against the allowlist
  • On mismatch, an IAM Deny Policy is returned → rejected by API Gateway
  • If the allowlist is empty, there is no IP restriction (API Key alone is sufficient for authentication)

6.3 API Key Management Recommendations

  • Never expose the API Key to clients (browsers, mobile apps)
  • Store in a server-side secret store (e.g., AWS Secrets Manager)
  • If leakage is suspected, notify ARGOS immediately and request re-issuance

7. Integrity and Tamper Prevention

SegmentMethod
TLS channelTLS 1.2+ built-in integrity (AEAD / HMAC)
Payload (encryption mode)AES-256 + successful decryption → source verification
API Gateway input validationMethod / Path / Header automatic validation
Serverless handlerField format, type, and range validation
Internal callsAWS SigV4 signing

8. Access Control and Isolation

8.1 Network Layer

  • External entry points are limited exclusively to AWS API Gateway (serverless handlers are not directly reachable from outside)
  • API Gateway automatically applies AWS-managed DDoS protection (AWS Shield Standard)

8.2 Environment Separation

  • Live / Test environment APIs are separated (separate API Keys, separate domains, separate data)
  • Data movement between environments is performed only through an explicit migration procedure

8.4 Rate Limiting

  • AWS API Gateway Usage Plan sets per-API-Key call limits
  • Call control via Burst / Quota units
  • Exceeding the limit returns 429 Too Many Requests

9. Compliance

9.1 ARGOS Identity Held Certifications

  • ISO/IEC 27001 — International standard certification for information security management systems

9.2 AWS Infrastructure Certifications (Inherited)

The Restful API infrastructure (AWS API Gateway, Lambda, DynamoDB, Route 53, ACM, CloudFront, etc.) inherits the following certifications:
  • SOC 1 / SOC 2 / SOC 3
  • ISO 27001 / 27017 / 27018
  • PCI-DSS Level 1
  • HIPAA Eligible
  • FedRAMP Moderate

9.3 Data Subject Rights Response

  • Procedures in place to respond to data subject rights requests (access, rectification, erasure, portability) under applicable privacy laws / GDPR
  • The DELETE endpoint permanently deletes personal information in submission data

Appendix A. Glossary

TermDefinition
TLSTransport Layer Security
AES-256256-bit Advanced Encryption Standard
API GatewayAWS-managed API gateway service
API KeyIdentification key for API call authentication (issued per project)
ACMAWS Certificate Manager — TLS certificate management service
Route 53AWS DNS management service
Custom AuthorizerA user-defined authentication function attached to API Gateway
IAM PolicyAWS Identity and Access Management policy
Usage PlanAPI Gateway call limit configuration
Rate LimitMaximum call count per unit time
QuotaTotal allowed calls per day/month
Partition KeyData distribution key in DynamoDB
AEADAuthenticated Encryption with Associated Data
SigV4AWS Signature Version 4

Appendix B. Contact

For technical inquiries regarding this document, please contact ARGOS Identity through the sales or technical support channel.