How Lynk Verification Works
A practical verification flow for platforms, contractors, and trust-sensitive in-person interactions.
Try the Live Demo →Choose your role
Platform/Marketplace Flow
Embed Lynk into vendor onboarding and dispatch rules.
Connect Lynk API
Set policy rules and callback endpoints for your platform.
Invite Providers
Contractors complete verification during onboarding.
Check Status at Dispatch
Only verified providers can accept protected jobs.
Log Every Decision
Allow/deny actions are recorded for compliance and trust.
Technical integration
API Integration
Direct server-to-server verification checks with policy control.
Best for custom platforms, partner apps, and internal tooling.
Flow breakdown
Register your app
Create client credentials and approved redirect URIs using developer registration.
Trust Lynk issuer + JWKS
Load discovery metadata and verify signatures with JWKS for token validation.
Read verification claims
Use ID token or UserInfo claims like verification_status and lynk_verified in your policy.
Enforce runtime decisions
Allow, deny, or hold flows based on verified/pending/requires_input in real time.
Key endpoints
POST /api/oauth/developer-registerGET /.well-known/openid-configurationGET /.well-known/jwks.jsonGET|POST /api/oauth/userinfoUse the discovery document at /.well-known/openid-configuration as the source of truth for endpoint and claim support.
What this is and is not
- This is a live trust-status verification workflow designed for real-time checks.
- This can be combined with provider-based onboarding checks and runtime policy decisions.
- This is not a blanket replacement for jurisdiction-specific government ID requirements.
Ready to launch your flow?
Start in sandbox, move to production, and scale by verification volume.