Skip to main content
Didit’s Orchestrated Workflows are the most powerful and flexible way to design and deploy comprehensive, multi-step identity verification journeys.
This integration path allows you to leverage the full intelligence of the Didit V2 platform, creating sophisticated verification sequences with our no-code visual builder. You define the logic once in your Business Console, and Didit handles the entire user-facing experience, state management, and conditional steps. Choose this path when you need a complete, end-to-end solution for user onboarding (KYC), age verification, or re-authentication, and you want to launch quickly with minimal development effort while retaining maximum control over the process.

Two Ways to Build Workflows

Didit offers two distinct approaches to creating verification workflows, allowing you to choose the right level of complexity for your needs:

1. Simple Mode: Template-Based Builder

The Simple Mode is perfect for getting started quickly. Select a pre-built template, toggle the features you need on or off, and you’re ready to go.
Best for:
  • Quick setup and deployment
  • Standard verification flows
  • Teams new to identity verification
  • Use cases that fit common patterns
How it works:
  1. Choose a workflow template (KYC, Age Verification, etc.)
  2. Toggle features on/off (Liveness, Face Match, AML, etc.)
  3. Configure basic settings for each feature
  4. Publish and start verifying

2. Advanced Mode: Visual Graph Builder

The Advanced Mode unlocks the full power of Didit’s orchestration engine. Build complex, conditional verification flows using our visual graph editor with drag-and-drop nodes, branches, and custom logic.
Node-based workflow visual graph builder
Best for:
  • Complex, multi-path verification journeys
  • Conditional logic based on user data or verification results
  • Custom business rules and branching
  • Enterprise-grade compliance requirements
Key capabilities:
  • Visual node editor: Drag, drop, and connect nodes on an infinite canvas
  • Smart connections: Drag from a node handle to empty space to instantly create and connect a new node
  • Conditional branches: Route users based on extracted data, verification status, country, document type, or custom rules
  • Action automation: Add tags, set metadata, or route to manual review based on flow outcomes
  • Keyboard shortcuts: Undo (Ctrl/Cmd+Z), Redo (Ctrl/Cmd+Shift+Z), Delete (Delete/Backspace)
  • Zoom and pan: Navigate complex flows with scroll-to-zoom and drag-to-pan

Graph Builder Node Types

Node TypeIcon ColorDescriptionExamples
Feature NodesBlueVerification checks that process user dataID Verification (OCR), Liveness, Face Match, NFC, AML, Phone/Email Verification, Questionnaire, Proof of Address, Database Validation, IP Analysis, Age Estimation
Branch NodesPurpleConditional routing based on data or resultsRoute by country, risk score, document type, age, verification status
Action NodesAmberAutomation triggers that modify session or user dataAdd tag, Remove tag, Set metadata, Add review note
Status NodesGreen/Red/AmberFinal outcomes that end the verification flowApproved, Declined, In Review

Feature Node Categories

User-Interactive Features (can start a workflow):
  • ID Verification (OCR)
  • Liveness Detection
  • Face Match
  • Age Estimation
  • Phone Verification
  • Email Verification
  • Questionnaire
  • Proof of Address
  • NFC / ePassport
Backend-Only Features (run automatically, no user interaction):
  • AML Screening (requires OCR first)
  • Database Validation (requires OCR first)
  • IP Analysis
Note: Backend-only features are marked with a special indicator in the builder and execute automatically without user interaction once their dependencies are met.

Workflow Templates: Your Starting Point

Think of templates not as rigid types, but as smart, pre-configured starting points designed for common use cases. In Simple Mode, these are ready to use. In Advanced Mode, they provide a foundation you can customize extensively.

Available Templates

1. KYC Workflow

The comprehensive solution for onboarding new users and meeting full Know Your Customer (KYC) compliance.
  • Starts with: Core ID Document Verification.
  • Commonly Added Features:
    • [+] Liveness Detection: Ensure the user is physically present and prevent spoofing.
    • [+] Face Match 1:1: Biometrically match the user’s selfie to their ID photo.
    • [+] AML Screening: Check users against global sanctions, PEP, and adverse media lists.
    • [+] NFC Verification: Add a layer of government-grade security by reading e-passport/e-ID chips.
    • [+] Proof of Address (PoA): Verify the user’s residential address.
    • [+] Phone Verification: Validate phone number ownership as an additional factor.
    • [+] Email Verification: Validate email address ownership as an additional factor.
    • [+] Database Validation: Validate against official government and credit databases.
    • [+] Questionnaire: Collect structured attestations and supporting documents via customizable forms.
    • [+] IP Analysis: Analyze location and connection risk.

2. Adaptive Age Verification Workflow

A low-friction, privacy-preserving flow for age-gated services.
  • Starts with: Selfie-based Age Estimation.
  • Key Logic:
    • If the estimated age is clearly above your threshold (e.g., estimated 25+ for an 18+ service), the user passes instantly.
    • If the estimate is below or within a “buffer zone” (e.g., estimated 16-20), you can configure the workflow to automatically trigger a fallback to full ID Verification to confirm the exact date of birth.
  • Commonly Added Features:
    • [+] IP Analysis: Restrict access based on geographic location.

3. Biometric Authentication Workflow

A fast and secure way to re-verify returning users without asking for their documents again.
  • Starts with: A Liveness Detection check to confirm the user is present.
  • Core Logic:
    • The system performs a Face Match between the new live selfie and the trusted biometric template from the user’s initial, approved KYC verification.
    • You must pass the portrait_image (the trusted reference image URL from the initial verification) when creating the session.
  • Commonly Added Features:
    • [+] Phone Verification: Link the address to a verified phone number.
    • [+] Email Verification: Validate email address ownership as an additional factor.
    • [+] IP Analysis: Flag suspicious login attempts from new locations.

4. Address Verification Workflow

A dedicated flow for when Proof of Address (PoA) is the primary requirement.
  • Starts with: The user submitting a Proof of Address document (e.g., utility bill, bank statement).
  • Core Logic: Our AI extracts and validates the name and address from the document.
  • Commonly Added Features:
    • [+] Phone Verification: Link the address to a verified phone number.
    • [+] Email Verification: Validate email address ownership as an additional factor.
    • [+] IP Analysis: Compare the document address to the user’s current geo-location for added assurance.

5. Questionnaire Verification Workflow

A focused flow when your primary goal is to collect structured attestations and supporting documents via customizable forms.
  • Starts with: Questionnaire.
  • Core Logic: The system presents your configured questionnaire (sections, translated content, required fields, uploads).
  • Commonly Added Features:
    • [+] IP Analysis: Add location and connection context to your questionnaire submissions.
Full Customization Each feature within a workflow can be further customized with specific parameters to meet your exact requirements. Explore the settings for each check in the builder.

Simple vs Advanced Mode Comparison

CapabilitySimple ModeAdvanced Mode
Template selection
Toggle features on/off
Basic feature configuration
Visual graph editor
Conditional branching
Action automation (tags, metadata)
Parallel verification paths
Risk-based decisionsLimited✅ Full control
Undo/Redo support
Keyboard shortcuts

Integration Flow

Integrating an Orchestrated Workflow is straightforward. Your server creates a session with Didit, receives a unique URL, and redirects your user to that URL. Didit handles the rest and notifies your server of the results via webhooks.

Common Use Cases

Use CaseRecommended TemplateRecommended ModeSuggested Features
Basic identity verificationKYCSimpleLiveness, Face Match
High-security onboardingKYCAdvancedNFC, Liveness, Face Match, AML, Phone Verification
Age-gated content/servicesAdaptive Age VerificationSimpleID Verification fallback
Returning user authenticationBiometric AuthenticationSimpleIP Analysis
Address verificationProof of AddressSimplePhone Verification
Financial services onboardingKYCAdvancedLiveness, Face Match, Proof of Address, AML, Database Validation
Region-specific complianceKYCAdvancedConditional routing by country, different checks per region
Risk-based verificationKYCAdvancedConditional branches based on risk scores, escalation paths

Getting Started

  1. New to Didit? Start with Simple Mode and a pre-built template
  2. Need customization? Switch to Advanced Mode to add conditional logic
Contact our sales team to discuss custom workflow configurations or to get guidance on the best setup for your specific requirements.