Skip to content

Checks

Endpoints for interacting with EyeDP checks

Get case checks

Returns all the checks performed on a case.

Endpoint/api/cases/{caseId}/checks
MethodGET

Response

json

[
    {
        "id": 206,
        "createTs": "2025-08-20T15:51:17.303",
        "checkName": "financial-vulnerability",
        "documentIds": []
    },
    {
        "id": 205,
        "createTs": "2025-08-20T15:51:17.243",
        "checkName": "kyc",
        "documentIds": []
    },
    {
        "id": 204,
        "createTs": "2025-08-20T15:49:41.987",
        "checkName": "content-validation",
        "documentIds": []
    }
]

Details

FieldDescription
IdId of the check used to get the check results
CreateTsTimestamp of the check
Check nameName of the check
documentIdsIf a check is on any of the case documents they will show up here

Check: Tamper detection

Returns tamper detection check results for a document. This check is triggered as soon as a document is uploaded to EyeDP.

Endpoint/api/cases/{caseId}/checks/{checkId}
MethodGET

Response

json

{
    "id": 1234,
    "checkName": "tamper-detection",
    "checkLabel": "Tamper Detection",
    "checkDescription": "Tamper analysis on a provided document.",
    "createTs": "2026-01-26T11:13:05.8",
    "tamperDetectionResponse": {
        "riskRating": "High",
        "riskRatingLabel": "Pdf processed by editor",
        "riskRatingDescription": "Document was processed using editing software",
        "results": [
            {
                "title": "Declared document language is English (United Kingdom)",
                "description": "The creator of this document declared English (United Kingdom) as the language of the document's content."
            },
            {
                "title": "Saved in Microsoft Word",
                "description": "The document was processed and saved in Microsoft Word - document tool from Microsoft."
            },
            {
                "title": "No difference between creation and modification date",
                "description": "The creation and modification dates in this document's metadata are the same, suggesting no updates were made after the file was first created."
            }
        ]
    }
}

The tamper detection response contains an overall risk rating with details stored in the results section. The following table describes the fields in more depth.

FieldDescription
Risk RatingThis is the overall risk rating of the check. It is determined by your risk configuration set in the EyeDP portal. It can be the following values: Low, Medium, High or Informational
Risk LabelThe label given to the risk
Risk DescriptionA brief high level explaination of the risk

A full list of the possible risk labels can be found in the EyeDP portal config page.

Results

Tamper detection runs a lot of different check on the document. The results section give more details on the findings.

FieldDescription
TitleShort title of the tamper check
DescriptionDetailed description with more information of the tamper check

Check: Content validation

This type of check runs a set of rules against the contents of uploaded documents and the case itself. This check is triggered as soon as a document is uploaded to EyeDP.

The rules enabled in your setup can be accessed through the Portal: https://portal.eyedp.com

Endpoint/api/cases/{caseId}/checks/{checkId}
MethodGET

Response

If any of the rules fail the endpoint will return the rules with the status as 'Failed':

json

{
    "id": 230,
    "createTs": "2025-08-22T13:45:25.01",
    "contentValidationResponse": {
        "rules": [
            {
                "status": "Failed",
                "name": "Name",
                "riskRating":"High",
                "description": "Checks document name against Case name",
                "documentIds": [
                    960
                ]
            },
            {
                "status": "Failed",
                "name": "Date of Birth",
                "riskRating":"High",
                "description": "Checks the document date of birth against Case date of birth",
                "documentIds": [
                    960
                ]
            }
        ]
    }
}

Passed rules will return a status of 'Passed':

json
{
    "id": 230,
    "createTs": "2025-08-22T13:45:25.01",
    "contentValidationResponse": {
        "rules": [
            {
                "status": "Passed",
                "name": "Joint account",
                "description": "The platform will flag an alert if the document is in joint names",
                "documentIds": [
                    960
                ]
            }
        ]
    }
}

Details

The rules of the check contains the following fields

FieldDescription
StatusStatus can be one of 3 options: Pending, Passed or Failed. Pending only appears while the rule is executing. Generally this is very quick so you probably won't see it. You're most likely to see it as either Passed or Failed which are the results of the rule.
NameShort name of the rule
RiskRatingThe risk rating according to your risk configuration. Possible values are: Low, Medium or High
DescriptionLonger more detailed description of the rule
DocumentIdsThe documents involved in the rule. Rules that compare document contents like a Name against the case will only show a single Id. If the rule is looking at trends across documents all the document ids will be included.

Check: KYC

Returns KYC check results for a case.

Case requirements

PropertyNotes
DobDOB is required to run eKYC (all three, DOBDay, DOBMonth, DOBYear)
FullnameFullname will work if supplied, the check separates into first & last name splitting on space
GivenNames & SurnameIf Fullname isn't supplied a minimum of GivenNames has to be supplied
CaseTypeHas to be Individual

This check is only triggered through executing workflows. Please see the workflows page.

Endpoint/api/cases/{caseId}/checks/{checkId}
MethodGET

Response

json

{
    "id": 241,
    "createTs": "2025-08-22T15:40:21.55",
    "kycResponse": {
        "decision": "Refer",
        "rules": [
            {
                "ruleId": "7603",
                "ruleName": "V_EId_2PSNAx",
                "ruleScore": 0,
                "ruleText": "2+ Primary or Secondary Name and Address (DoB agnostic)"
            }
        ]
    }
}

Check: Financial vulnerability

Returns Financial Vulnerability check results for a case.

Case requirements

PropertyNotes
DobDOB is required to run FinVul (all three, DOBDay, DOBMonth, DOBYear)
FullnameFullname will work if supplied, the check separates into first & last name splitting on space
GivenNames & SurnameIf Fullname isn't supplied a minimum of GivenNames has to be supplied
CaseTypeHas to be Individual

This check is only triggered through executing workflows. Please see the workflows page.

Endpoint/api/cases/{caseId}/checks/{checkId}
MethodGET

Response

json

{
    "id": 242,
    "createTs": "2025-08-22T15:40:22.69",
    "finvulResponse": {
        "decision": "Fail",
        "rules": [
            {
                "ruleId": "C6506",
                "ruleName": "V_PI_CCJ_5000",
                "ruleScore": 0,
                "ruleText": "One or more active CCJs with a total value over £5000 found"
            }
        ]
    }
}

Check: Bank account verification

Returns Bank account verification check results for a case.

This check is triggered as soon as a document is uploaded to EyeDP.

Endpoint/api/cases/{caseId}/checks/{checkId}
MethodGET

Response

json

{
    "id": 223,
    "createTs": "2025-08-22T13:45:24.37",
    "bavResponse": {
        "decision": "Pass",
        "rules": [
            {
                "ruleId": "CNS1004",
                "ruleName": "BAV_Acc_Age_0_30_Days",
                "ruleScore": 0,
                "ruleText": "Data has been found to indicate that the account was opened in the last 30 days"
            }
        ]
    }
}

Check: AML

The AML check searches the case against watchlist, sanctions, politically exposed people and adverse media datasets.

The check includes the Name, DOB and Country of the case in the search.

The check is synchronous and can be executed through the AML workflow

Request options

Options can be provided when executing the workflow.

NameDescription
enableOngoingMonitoringBoolean to enable on going monitoring (ongoing screening) of the case against the AML dataset

ExternalReference parameter

The request includes an optional parameter called ExternalReference. This can be used to store your own internal identifier or reference number against the check.

If included, this value will act as an idempotency key. If a check exists against the same case with the same ExternalReference, the result from the previous run will be returned instead of a new check being performed.

Example

json
// Workflow request example with AML options

{
    "caseId":"123",
    "workFlowName":"aml",
    "options":{
        "enableOngoingMonitoring":"true"
    },
    "externalReference":"123456789"
}

AML workflow execution response

Here is an example of a response for the AML workflow where an individual match was found with a PEP, Sanction, Enforcement and Adverse Media entry:

(Check the Swagger definition for the full schema: https://api-sandbox.eyedp.com/swagger)

json
// RESPONSE from /api/workflows/execute (200)
{
    "checkId": 2006, 
    "amlResponse": {
        "matches": [ 
            {
                "riskId": 3228,
                "riskRating": "High",
                "isOverridden": false,
                "entityId": "WX0012050221",
                "type": "Individual",
                "name": "Maria Elena Santos", 
                "status": "Alive",
                "datesOfBirth": [
                    "1965-03-15"
                ],
                "placesOfBirth": [
                    "Place 1",
                    "Place 2"
                ],
                "nationalities": [
                    "Natioinality 1",
                    "Natioinality 2",
                ],
                "citizenships": [
                    "Citizenship 1",
                    "Citizenship 2"
                ],
                "relationships": [
                    {
                        "group": "Associations",
                        "type": "Friend",
                        "entityId": 1253678,
                        "dateModified": "2001-01-01T01:01:01+00:00",
                        "entityName": "Name of associate",
                        "ownershipPercentage": 0.0,
                        "segments": "Enforcement,PEP,Sanction"
                    },
                    {
                        "group": "Family",
                        "type": "Ex-Wife",
                        "entityId": 23456789,
                        "dateModified": "2001-01-01T01:01:01+00:00",
                        "entityName": "Family name",
                        "ownershipPercentage": 0.0,
                        "segments": "PEP,Sanction"
                    },
                    {
                        "group": "Companies",
                        "type": "Affiliated Company",
                        "entityId": 34567890,
                        "dateModified": "2001-01-01T01:01:01+00:00",
                        "entityName": "Company name",
                        "ownershipPercentage": 0.0,
                        "segments": "Sanction"
                    },
                ],
                "addresses": [ 
                    {
                        "value": "BR",
                        "type": "Current"
                    }
                ],
                "watchlistEntries": [ 
                    {
                        "key": 1, 
                        "type": "Pep",
                        "source": "Government Records",
                        "dateModified": "2001-01-01T01:01:01+00:00",
                        "subCategories": [
                            "Executive Branch",
                            "Finance"
                        ]
                    },
                    {
                        "key": 2,
                        "type": "Sanctions",
                        "source": "Market authority",
                        "dateModified": "2001-01-01T01:01:01+00:00",
                        "subCategories": [
                            "Sanction List"
                        ]
                    },
                    {
                        "key": 3,
                        "type": "AdverseMedia",
                        "dateModified": "2001-01-01T01:01:01+00:00",
                        "subCategories": [
                            "Money Laundering"
                        ]
                    },
                    {
                        "key": 4,
                        "type": "Enforcements",
                        "source": "Country or origin",
                        "dateModified": "2001-01-01T01:01:01+00:00",
                        "subCategories": [
                            "War Crimes"
                        ]
                    },
                ],
                "watchlistEntriesInfo": { 
                    "sanctions": [
                        {
                            "key": 5,
                            "source": "Ministry of country XYZ",
                            "dateModified": "2022-03-01T01:44:03+00:00",
                            "subCategories": [
                                "Sanction List"
                            ],
                            "country": "Country"
                        }
                    ],
                    "peps": [
                        {
                        "key": 6, 
                        "source": "Government Records",
                        "dateModified": "2023-06-15T10:30:00+00:00",
                        "subCategories": [
                            "Executive Branch",
                            "Finance"
                        ],
                        "country": "BR",
                        "status": "Inactive",
                        "isPrimary": true,
                        "governingInstitution": "Ministry of Finance",
                        "governingRole": "Minister",
                        "effectiveDate": "2010-01-15",
                        "effectiveDateType": "Appointed",
                        "expirationDate": "2014-12-31",
                        "expirationDateType": "Official"
                        }
                    ],
                    "adverseMedias": [
                        {
                            "key": 7,
                            "dateModified": "2001-01-01T01:01:01+00:00",
                            "subCategories": [
                                "Money Laundering"
                            ],
                            "description": "Incident"
                        }
                    ],
                    "sourceItems": [
                        {
                            "key": 8,
                            "sourceURI": "https:// example",
                            "dateModified": "2022-01-01T01:01:01+00:00"
                        }
                    ],
                    "enforcements": [
                        {
                            "key": 9,
                            "country": "International",
                            "source": "International Criminal Court",
                            "subCategories": [
                                "War Crimes"
                            ],
                            "dateModified": "2001-01-01T01:01:01+00:00",
                        }
                    ]
                },
                "comments": "comment text will be here",
                "matchConfidenceScore": 100,
                "aliases": [
                    {
                        "category": "None",
                        "type": "AKA",
                        "scriptType": "Basic Latin",
                        "firstName": "abc",
                        "lastName": "abc",
                        "middleName": "abc",
                        "fullName": "abc"
                    },
                ],
                "gender": "Female"
            }
        ]
    }
}

Sandbox environment

When integrating with the sandbox envrionment, the following cases will produce the following results:

NameDOBCountryResult Type
Maria Elena Santos1965-03-15BRSingle PEP
Viktor Mikhailovich Petrov1972-08-22RUSingle Sanctions
John Michael Patterson1980-11-05GBSingle Adverse Media
Ahmed Hassan Al-Masri1968-05-30EG2 PEPs + 1 Sanctions
Carlos Eduardo Mendez1975-02-14VE1 Sanctions + 3 Adverse Media
Li Wei Zhang1963-07-18CN2 Sanctions
Nikolai Ivanov1970-04-12BY2 separate matches
• 1 PEP
• 1 Sanctions
Isabella Rodriguez1978-09-25MX2 separate matches
• 1 Adverse Media
• 2 PEPs + 1 Sanctions
Omar Al-Rahman1969-12-03SY2 separate matches
• 1 Sanctions + 3 Adverse Media
• 2 Sanctions

Create cases that contain these names (the names can be partial) and DOBs and perform the workflow execution.