What are Risk Signals ?
Risk Signals are supplementary services designed to enhance the functionality of standard workflows by providing additional layers of verification and security. These signals help verify user information, assess potential risks, and ensure compliance with regulatory requirements. Examples include address validation, device risk assessment, global identity checks, and various forms of data verification, such as email, phone, or government database checks.
However, the Risk Signals are treated like capabilities and are triggered automatically when the necessary information is available. While Risk Signals do not have strict dependencies, they rely on specific input Credentials depending on the context:
- DATA Credentials typically provide sufficient input for most risk signals.
- SELFIE Credentials are required when the signal involves biometric verification.
- In some workflows, input is derived from extraction capabilities, which are triggered by ID or DOCUMENT Credentials.
The way these signals are applied ultimately depends on the workflow configuration, which defines how Credentials are used and how signals interact with other capabilities.
The Risk Signal services include:
For an overview of how Jumio handles PASSED, WARNING, and REJECTED across all capabilities, see How Jumio Handles Results.