Skip to main content

Documentation Index

Fetch the complete documentation index at: https://developers.argosidentity.com/llms.txt

Use this file to discover all available pages before exploring further.

Hello, this is ARGOS Identity. Here are the new features and improvements we delivered in April.

Device Info tab and Fingerprint option

New Feature The Authentication Enhancement and Forgery Prevention settings have been expanded to three tabs. The Device Verification option that was previously inside the “Additional Authentication & Meta Information” tab has been moved to a dedicated Device Info tab, and the Fingerprint-based Fingerprint option and Device Duplicate Check have been newly added.
Device Info is the first verification performed upon liveform entry. If blocked at the Device Info stage, the user cannot proceed to Turnstile, Proxy & VPN detection, or the KYC process itself.

Fingerprint option (new)

Select the items to block using individual checkboxes. If any item is detected, the user is redirected to the error page (DE-30000).
ItemBlocked target
Virtual machineVirtualized environments such as VMware or Parallels
EmulatorAndroid app players that simulate mobile devices
Malicious botAutomated scripts and browser automation tools
Browser tamperingBrowsers with manipulated or forged API signatures

Device Duplicate Check (new)

Limits the number of times a KYC approval can occur from the same device.
SettingDescription
Allowed count per deviceMaximum number of KYC approvals allowed from the same device (default: 3)
Detection periodTime window for counting duplicates. When ON, specify the number of days (default: 30). When OFF, all past approvals accumulate indefinitely.
Policy on duplicate detectedFail if duplicate (block → DE-40000) or Register and Pass (record and proceed)

New error codes

Error codeTrigger condition
DE-30000One or more Fingerprint option detection items triggered
DE-40000Device Duplicate Check policy is Fail if duplicate and the allowed count is exceeded
The error code and its definition are displayed together on the error page so clients can immediately identify the reason for the block.
For configuration instructions, see the Authentication Enhancement and Forgery Prevention — Device Info guide. For viewing results, see the Device Verification Pre-verification List guide.

Government Data Verification split by ID type

Feature Improvement Government Data Verification - Korea has been split from a single ON/OFF toggle into individual switches per ID type, allowing clients to perform authenticity verification only for the specific ID types they require. If a temporary issue occurs with the verification server, only the affected ID type can be selectively turned off, improving operational flexibility.

Individual control switches

SwitchTarget ID
Resident IDResident registration card
Driver LicenseDriver’s license
PassportPassport
Alien RegistrationAlien registration card / Domestic residence report for foreign nationals of Korean descent / Permanent residence card (3 types combined)
The Alien Registration switch controls alien registration card, domestic residence report for foreign nationals of Korean descent, and permanent residence card simultaneously — all three types at once.
If values required for authenticity verification (name, date of birth, resident registration number, etc.) are missing, the switch is always treated as not applied even when it is ON.

Return URL error code support

Feature Update Error Code (errorCode) has been added as a new dynamic field in the Dashboard Integration Information > Return URL settings. When a user is blocked by pre-verification (Device Info, etc.) or token validation and lands on an error page, they can still return to your service via the Return URL button. The errorCode value is included in the URL query string so your service can identify the reason for the block. Return URL example (error page → return URL):
https://yourapp.com/verification-complete?kycStatus=rejected&errorCode=DE-20000
The full error code mapping is available in the Error Codes and Pages reference.
For configuration instructions, see the Integration Information — Dynamic Fields guide and the Return URL Guide.

Token error code standardization (TK-10000 ~ TK-10004)

Feature Improvement Token-related error pages have been assigned error codes with the TK- prefix, and user-facing messages have been made clearer. Previously only developer codes (e.g., token-missing) were shown, leading to repeated support inquiries. Now the error code and its definition are provided together, making troubleshooting easier.
TypeError codeUser message
Token missingTK-10000”Invalid link”
Token expiredTK-10001”Link expired”
Token already approvedTK-10002”Verification already completed”
Token pendingTK-10003”Review in progress”
Token rejectedTK-10004”Request not approved”
For detailed messages and trigger conditions, see the Error Codes and Pages — Token error pages reference.

Expired ID follow-up action options

Feature Update A new Expired ID option has been added under Anti-fraud & Forgery Prevention > ID and Face-based, letting you choose how ARGOS handles submissions containing an expired ID. Previously expired IDs were always rejected; you can now route them into Retry or Warning.
OptionBehavior
Retry — Request Retry (default)Asks the user to resubmit their ID.
Warning — Proceed After RecordingBypasses both the Step 1 and Step 2 Expired ID conditions, records a Warning, and lets the submission continue through approval. The automatic Step 2 expiry-date reject is replaced with Approved + Warning.

Warning data

Submissions approved in Warning state leave the following Warning data on the dashboard.
User DataRelated Engine
ID CardExpiry validation
User InputExpiry validation

New Custom Policy trigger

A Warning condition has been added to the Custom Policy Trigger list, so you can use expired-ID warnings as a trigger in your custom rules.
See the KYC Process dashboard guide for how to configure the policy.

ID Liveness auto Warning fallback for Upload mode

Feature Update Each ID Liveness pipeline (Screen Replay / Paper Print / Portrait Replacement) with Retry selected now exposes a new sub-checkbox Apply Warning on Upload. When checked, the pipeline’s Retry is converted to Warning only when the user submitted the ID via Upload mode, because Upload-mode users have no way to recapture — this lets the submission continue under Warning instead of being stuck on Retry.
ID liveness settings showing the 'Apply Warning on Upload' checkbox below Retry in each of the Screen Replay, Paper Print, and Portrait Replacement pipelines
  • The checkbox is independent per pipeline.
  • It appears only when Retry is selected, and is hidden when Warning is selected.

Custom Policy exposure

Warning data generated from Upload-mode auto-fallback is exposed in the Custom Policy list.
FieldValue
userDataTypeID_card_uploaded
relatedEngineID Liveness Screen replay
See the KYC Process dashboard guide for policy configuration.

Change account password from the dashboard

New Feature Previously, changing your password required logging out and going through the Forgot password flow. You can now change your password directly from the dashboard’s Account menu > Change password while logged in. The flow branches based on whether OTP is enabled.
ConditionBehavior
OTP not setEnter your current and new password in the modal to change it immediately.
OTP setComplete OTP verification, then set your new password.

Submission search minimum length reduced (3 → 2)

UX Improvement The minimum query length for searching the Submission list has been reduced from 3 characters to 2 characters, so environments using 2-character userId values can now search successfully.

Passive Face Auto Capture

New Feature Auto Capture has been added to passive face capture in the liveform. Once the user aligns their face with the guide, the capture completes automatically without any button press.

Changes

  • The guide message has moved to the top of the screen for better visibility.
  • A new capture type face-passive-auto-capture has been added.
  • Capture standby time is reduced from 2 seconds → 1 second.

Expiry date OCR for Korean Alien Registration Card

Feature Update Expiry date (expiry_date) recognition is now enabled for the Korean Alien Registration Card. The expiry date is extracted automatically and can be used for expiry validation and Custom Policy rules.
The value printed as Period of Sojourn on the card is treated as the ID’s expiry_date.

How it works

OCR references expiry_date and expiry_date0 in priority order, and the extracted value is returned via the GET Submission API in the data.idcard_expireDate field.
PriorityField
1expiry_date
2expiry_date0
Response example
{
  "data": {
    "idcard_expireDate": "2030-12-31"
  }
}
See the GET Result API reference for the full response schema.

English Name (full_name_en) Added to Submission Response

New Feature The full_name_en field (DB: fullNameEn) containing the applicant’s Full Name in English has been added. When KYC is approved, the submitter’s Full Name is converted to English and can be used without additional conversion work in environments where English names need to be passed to external systems (e.g., Korean driver’s licenses and resident registration cards where names are recognized in Hangul).

Processing Policy

ItemDetails
TriggerProcessed once at KYC approval
Conversion methodTransliteration. Not translated. (Example: KIM SAN rather than Kim Mountain)
Original languageIf already in English, filled in full_name_en as-is
Application scopeSubmission API responses (Get Submission, Partial Delete, Projection, etc. — any location where data.full_name is exposed), Webhooks (idcheck-approved, idcheck-updated), Dashboard Submission details
Exclusion scopeFirst Name / Last Name are not provided with English conversion. Not exposed during the Liveform stage and not a target of comparison logic (duplicate checks, etc.).
Dashboard behaviorDisplayed in Submission details and editable by administrators.
Refer to the GET/Submission Response Fields Definition documentation for complete field definitions.

Liveform Streaming — Upload Image Quality Check Option

Feature Update The Image Quality Check toggle has been newly added under Dashboard Authentication Enhancement and Forgery Prevention → Forgery Prevention → Liveform Streaming Capture Only → Allow ID Upload. When IQC failures occur repeatedly due to upload environment conditions, you can toggle OFF to allow users to complete the authentication flow.
Image Quality CheckBehavior
ON (default)Performs FE Image Quality Check on uploaded images. Alert message is displayed if internal quality standards are not met.
OFFSkips FE Image Quality Check on uploaded images and proceeds with subsequent backend processes and existing policies.
Image Quality Check settings
The Image Quality Check toggle is only visible when Liveform Streaming is ON and Allow ID Upload is ON.

startValidUntil — Pre-authentication Validity Period Setting

New Feature The query string option startValidUntil has been added, allowing you to set an expiration time before users access the Liveform link. This is useful when you need to enforce “link entry within a set time period,” such as guardian authentication for minors or separate project flows. It operates independently from the existing “post-authentication validity period.”
{
  "startValidUntil": "2026-04-30T15:00:00Z"
}
ItemDetails
TimezoneAlways interpreted as UTC+0.
Transmission methodMust be included in the encrypted parameter and must be encrypted. Plain text usage is not allowed.
Validation priorityEvaluated before other validations like token ID validation. If start expiration is confirmed, subsequent validations are not performed.
Supported pipelinesID Document, Knowledge-based
Expiration behaviorRedirects to error page /error-page/expired-start-valid-until (error code PV-40018), displaying “The verification link has expired. Please try again with a new link.” to the user.
Refer to the Query String and Token Guide for query string usage and the Error Codes and Pages documentation for error code mapping.

ARGOS continues to improve its identity verification service for stronger security and a better user experience. Thank you for using ARGOS Identity. The ARGOS Identity team