Skip to main content
Didit Raises $2M and Joins Y Combinator (W26)
Didit
B2B Reusable KYC

Share a verified identity with your partners.
Server-to-server.

Verify a user or a business once. Share the result with a partner — they onboard the same person instantly. No second flow, no second selfie. Works for KYC and KYB. Built for Banking-as-a-Service, multi-brand groups, embedded finance, and marketplaces with sub-platforms.

Backed by
Y Combinator

Built for partner ecosystems

Verify once.
Onboard across every partner.

Your user verifies once in your app. Your partner — your BaaS sponsor, your sister brand, your downstream marketplace — needs the same record. Send them a one-time share token. They redeem it and pull in the full verification. The user never sees a second flow.

How it works

From your app to your partner in four steps.

  1. Step 01

    Pick a verified session

    Choose any finished verification — approved, declined, or under review — and ask Didit for a share token. The token expires in one hour by default; you can stretch it from one minute up to a full day.

  2. Step 02

    Send the token to your partner

    Hand the token to your partner over your own backend — a webhook, a queue, a REST call. The token only works for the partner you named when you minted it. Nobody else can redeem it.

  3. Step 03

    Your partner imports the record

    Your partner redeems the token and picks how to onboard the user — trust your decision and approve instantly, or pull the data in raw and let their compliance team make the call.

  4. Step 04

    The full session lands in their app

    Didit clones the whole record — documents, selfie, face match, AML, registry data, UBOs — into your partner's workspace. Same shape as a fresh verification, with a clean audit trail back to the original.

Built for BaaS · embedded finance · multi-brand groups

One verification. Every partner platform.

Mint a token. Send it. Import it. Pick the onboarding speed. Six moving parts cover every shape of partner ecosystem — same call for KYC and KYB.
01 · Mint a share token

Generate a one-time token for your partner.

Pick a finished verification and ask Didit for a token scoped to one partner. Default lifetime is one hour; you can stretch it from one minute up to a full day. The token only works for the partner you named — nobody else can ever redeem it.
Share Session API
02 · Import the session

Your partner pulls in the full record.

Your partner redeems the token and Didit clones the whole verification into their workspace — fresh session, same data, full audit trail back to the original. They tag it with their own internal user ID and pick the workflow it lands in.
Import Shared Session API
03 · Trust or re-review

Onboard instantly, or re-check in compliance.

Trust your decision and let your partner approve the user the moment the token lands. Or hand them the data raw and let their compliance team make the call. Toggle per partner — same call, two onboarding speeds.
Reusable KYC guide
04 · KYC + KYB · both modes

Share a person or a whole business.

Same call works for both shapes. Share a verified person and your partner gets the document, the selfie, the match, and every AML hit. Share a verified business and they get the registry record, every Ultimate Beneficial Owner, every officer KYC, every document, every screening.
Business Verification (KYB)
05 · Partner-ecosystem fit

Built for the businesses where one verification serves many.

Banking-as-a-Service sponsors. Multi-brand groups — neobank plus broker, on-ramp plus exchange. Embedded finance running through partner banks. Marketplaces with regional sub-platforms. White-label resellers. Lender networks. Anywhere one user — or one business — gets onboarded once and serves many.
Workflow Orchestrator
06 · Compliance by design

Audit-grade by default.

Didit only mints tokens for finished verifications — no half-captured flows leak across partners. The same token can never be imported twice. Both sides sign a GDPR data-sharing agreement; Didit ships the technical half.
Security + compliance
Integrate

Two calls. One handoff.

You mint a token on your side. Your partner imports it on theirs. Same contract on both sides — works for KYC and KYB.
POST /v3/session/{id}/share/Service X · Mint
$ curl -X POST https://verification.didit.me/v3/session/$SID/share/ \
  -H "x-api-key: $DIDIT_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{
    "for_application_id": "partner-app-uuid",
    "ttl_in_seconds": 3600
  }'
201Created{ "share_token": "eyJhbGciOi…" }
Hand the token to Service Y over a pre-arranged backend channel.docs →
POST /v3/session/import-shared/Service Y · Import
$ curl -X POST https://verification.didit.me/v3/session/import-shared/ \
  -H "x-api-key: $DIDIT_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{
    "share_token": "eyJhbGciOi…",
    "workflow_id": "wf_partner_kyc",
    "vendor_data": "partner-user-42",
    "trust_review": true
  }'
201Created{ "status": "Approved", "session_kind": "user" }
Set trust_review: false to land the session in In Review.docs →
Agent-ready integration

Ship partner KYC sharing in one prompt.

Paste the block below into Claude Code, Cursor, Codex, Devin, Aider, or Replit Agent. The agent wires up Didit, scaffolds both sides of the handoff, and ships.
didit-integration-prompt.md
# Didit B2B Reusable KYC — partner-to-partner KYC sharing

You are integrating Didit's B2B Reusable Know Your Customer (KYC) into <my_stack>. The recipe is server-to-server: one Didit application (Service X) mints a short-lived JSON Web Token (JWT) share token for a finished session; a partner Didit application (Service Y) imports the token and Didit clones the full verified session into Service Y. Works for both KYC and Know Your Business (KYB) sessions.

Built for Banking-as-a-Service (BaaS) sponsor banks, multi-brand financial groups, embedded finance through partner banks, marketplaces with regional or vertical sub-platforms, on-ramp + exchange ecosystems, white-label resellers, and B2B KYB consortia where the same legal entity onboards once and serves many. Every URL, header, and enum value below is canonical — do not paraphrase or "improve" them.

## 1. Provision both applications
- Sign up: https://business.didit.me (no credit card required).
- Or provision programmatically: POST https://apx.didit.me/auth/v2/programmatic/register/
- Create TWO applications in your Didit organisation. One acts as Service X (mints share tokens), the other as Service Y (imports them). In production these will usually live in different organisations — one per partner.
- Each application has its own `x-api-key`. Service X uses its own key to mint; Service Y uses its own key to import.

## 2. Service X — mint a share token

Service X picks a finished session it owns and posts to the share endpoint:

  POST https://verification.didit.me/v3/session/{sessionId}/share/
  Headers:
    x-api-key: <Service X api key>
    Content-Type: application/json
  Body:
    {
      "for_application_id": "<partner-application-uuid>",
      "ttl_in_seconds": 3600
    }

Bounds on `ttl_in_seconds`: min 60, max 86400, default 3600.

Requirements:
  - The session must be in a FINISHED status: "Approved", "Declined", or "In Review".
  - The API key must hold the `write:sessions` privilege.
  - `for_application_id` must be a real Didit application uuid — usually the partner's app.

Response: 201 Created with the JWT in the `share_token` field plus `for_application_id` and `session_kind` ("user" or "business" — Didit detects this from the source session and embeds it in the token):

  {
    "share_token": "eyJhbGciOiJIUzI1NiJ9...",
    "for_application_id": "partner-app-uuid",
    "session_kind": "user"
  }

## 3. Transmit the token to Service Y

Service X transmits the `share_token` to Service Y over a pre-arranged backend channel — REST, message queue, signed webhook, anything you control. The token is scoped to Service Y's application and useless to any other application.

## 4. Service Y — import the shared session

Service Y posts the token to the import endpoint:

  POST https://verification.didit.me/v3/session/import-shared/
  Headers:
    x-api-key: <Service Y api key>
    Content-Type: application/json
  Body:
    {
      "share_token": "<jwt from step 2>",
      "workflow_id": "<Service Y's own workflow id>",
      "vendor_data": "<Service Y's internal user id>",
      "trust_review": true
    }

`trust_review`:
  - `true`  → the imported session preserves the original status ("Approved" / "Declined" / "In Review"). Service Y onboards the user instantly. Use when Service Y fully trusts Service X's decision (sister brand, regulated partner with a signed data-sharing agreement).
  - `false` → the imported session lands in "In Review" so Service Y's compliance team makes its own call. Safe default for new partner relationships.

Response: 201 Created with a brand-new session in Service Y's application:

  {
    "session_id": "<new uuid>",
    "session_number": <int>,
    "session_kind": "user" | "business",
    "status": "Approved" | "In Review" | "Declined",
    "shared_from_session": "<original session uuid in Service X>",
    "vendor_data": "<Service Y's internal user id>",
    "id_verifications": [...],
    "liveness_checks": [...],
    "face_matches": [...],
    "aml_screenings": [...],
    "database_validations": [...],
    "proof_of_address": [...],
    "phone_verifications": [...],
    "email_verifications": [...]
  }

For a `session_kind: "business"` token Didit clones the KYB shape instead. KYB session statuses are UPPER_SNAKE_CASE (not Title Case like KYC):

  {
    "session_id": "<new uuid>",
    "session_kind": "business",
    "status": "APPROVED",
    "shared_from_session": "<original business session uuid>",
    "vendor_data": "<Service Y's internal business id>",
    "registry_checks": [...],
    "key_people_checks": [...],
    "document_verifications": [...],
    "aml_screenings": [...],
    "questionnaires": [...]
  }

A new User or Business entity is auto-created in Service Y if one with the supplied `vendor_data` doesn't already exist.

## 5. Idempotency, expiration, errors

| Status | Reason |
|--------|--------|
| 401 | Share token invalid or past `exp` — request a new one. |
| 403 | Token not intended for your application, OR session already imported into your app. |
| 404 | Original session no longer exists. |
| 404 | `workflow_id` not found in your application. |

The duplicate-import check is enforced against the (share_token, partner application) pair.

## 6. Webhooks (optional, only when Service Y wants async updates)

Service Y can register a webhook destination once via:

  POST https://verification.didit.me/v3/webhook/destinations/
  Body: url, subscribed_events: ["status.updated"]

Every webhook delivery carries an `X-Signature-V2` header you MUST verify before trusting the payload. HMAC-SHA256 verification MUST run against the raw body bytes (the raw payload as Didit sent it) BEFORE any JSON parsing — re-serialising the parsed body changes whitespace and key order, which invalidates the signature.

Algorithm:
  1. sortKeys(payload) recursively
  2. shortenFloats (truncate trailing zeros after the decimal point)
  3. JSON.stringify the result
  4. HMAC-SHA256 with the secret_shared_key
  5. Hex-encode, compare to the X-Signature-V2 header.

## 7. Hard rules — do not change
- Base URL for /v3/* endpoints is verification.didit.me (NOT apx.didit.me).
- Auth header is x-api-key (lowercase, hyphenated).
- Webhook signature header is X-Signature-V2 (NOT X-Signature).
- Status casing matches exactly: "Approved", "Declined", "In Review", "Not Finished" (Title Case With Spaces — KYC convention).
- session_kind is lowercase: "user" or "business".
- The share API is BUSINESS-to-BUSINESS sharing. Service X and Service Y are responsible for the data-sharing legal basis under General Data Protection Regulation (GDPR), UK GDPR, and any cross-border transfer rules. Didit ships the technical capability; you ship the data-sharing agreement.

## 8. Pricing reference (public)
- Service X already paid for the original verification (full KYC bundle is $0.30 or KYB session starts at $2.00; see didit.me/pricing).
- Service Y pays nothing on the import side — `POST /v3/session/import-shared/` is included with every plan.
- 500 free verifications every month on every account (applies to fresh captures, not imports).

## 9. Verify your integration
- Sandbox starts on signup at https://business.didit.me — no separate flag.
- Create two sandbox applications: one as Service X (issuer), the other as Service Y (importer). Use Service X's API key to mint a token for a finished sandbox session, hand the token off, use Service Y's API key to import.
- Switch to live: flip each application's environment toggle in console.

When in doubt:
- https://docs.didit.me/sessions-api/share-session/overview
- https://docs.didit.me/sessions-api/share-session/share
- https://docs.didit.me/sessions-api/share-session/import
- https://docs.didit.me/core-technology/reusable-kyc/share-kyc-via-api
Need more context? See the full module docs.docs.didit.me →
Compliant by design

Open a new country in one click. We do the hard work.

We open the local subsidiaries, secure the licenses, run the penetration tests, earn the certifications, and align with every new regulation. To ship verifications in a new country, flip a toggle. 220+ countries live, audited and pen-tested every quarter — the only identity provider an EU member-state government has formally called safer than in-person verification.
Read the security & compliance dossier
EU financial sandbox
Tesoro · SEPBLAC · BdE
ISO/IEC 27001
Information security · 2026
SOC 2 · Type I
AICPA · 2026
iBeta Level 1 PAD
NIST / NIAP · 2026
GDPR
EU 2016/679
DORA
EU 2022/2554
MiCA
EU 2023/1114
AMLD6 · eIDAS 2.0
EU-aligned by design

Proof numbers

Proof numbers
  • 60s–24h
    Set the token lifetime anywhere from one minute to a full day.
  • KYC + KYB
    Share a person or a whole business — same call, both shapes.
  • $0.00
    Your partner pays nothing to import the verification you share.
  • 0
    Free verifications every month on every account.
Three tiers, one price list

Start free. Pay per usage. Scale to Enterprise.

500 free verifications every month, forever. Pay-as-you-go for production. Custom contracts, data residency, and SLAs (Service Level Agreements) on Enterprise.
Free

Free

$0 / month. No credit card required.

  • Free KYC bundle (ID Verification + Passive Liveness + Face Match + Device & IP Analysis) — 500 / month, every month
  • Blocklisted Users
  • Duplicate Detection
  • 200+ fraud signals on every session
  • Reusable KYC across the Didit network
  • Case Management Platform
  • Workflow Builder
  • Public docs, sandbox, SDKs, MCP (Model Context Protocol) server
  • Community support
Most popular
Pay per usage

Usage Based

Pay only for what you use. 25+ modules. Public per-module pricing, no monthly minimum fee.

  • Full KYC at $0.33 (ID + Biometric + IP / Device)
  • 10,000+ AML datasets — sanctions, PEPs, adverse media
  • 1,000+ government data sources for Database Validation
  • Transaction Monitoring at $0.02 per transaction
  • Live KYB at $2.00 per business
  • Wallet Screening at $0.15 per check
  • Whitelabel verification flow — your brand, our infrastructure
Enterprise

Enterprise

Custom MSA & SLA. For large volumes and regulated programs.

  • Annual contracts
  • Custom MSA, DPA, and SLA
  • Dedicated Slack and WhatsApp channel
  • Manual reviewers on demand
  • Reseller and white-label terms
  • Exclusive features and partner integrations
  • Named CSM, security review, compliance support

Start free → pay only when a check runs → unlock Enterprise for a custom contract, SLA, or data residency.

FAQ

Common questions

Infrastructure for identity and fraud.

One API for KYC, KYB, Transaction Monitoring, and Wallet Screening. Integrate in 5 minutes.

Ask an AI to summarise this page