- User-configured rules that determine acceptable onboarding behavior
- ProfiledRisk intelligence that learns from historical fraud patterns and behavior models
- allowed — user onboarding can continue normally
- blocked — onboarding must not proceed
- pending — additional verification or analyst intervention required
When to Use This Use Case
Use the Onboarding category when:- A new account is created (signup)
- User profile data is updated during onboarding (tier upgrade, identity submission)
- A risk-relevant interaction is triggered before account approval
- Device or KYC changes occur prior to access to financial capabilities
- User signs up for the first time
- KYC document submitted
- Mobile or email verified
- First device and IP captured
Expected Event Inputs
A clear understanding of identity, device, and environment reduces false approvals and improves fraud blocking.Required Signal Groups
| Category | Example Fields | Purpose |
|---|---|---|
| User identity | name, email, dob, phone | Validate existence and completeness |
| KYC attributes | id type/number, issuing country | Confirm regulatory compliance |
| Behavioral context | registration_time, tier | Identify rushed or unusual onboarding |
| Device & network | device_id, OS, IP address | Detect bots, multi-accounting, and takeover attempts |
| Location | user-provided address | Match against risk geography context |
Decisioning Logic
Evaluation of onboarding events combines:1. Your Rules
Examples of such rules are:- Require additional checks for high-risk identity types or mismatched details
- Prevent onboarding from VPN/proxy ranges
- Force step-up verification for incomplete or suspicious KYC
2. ProfiledRisk Intelligence
Signals such as:- Email/phone age and uniqueness score
- Device—profile sharing
- IP trust level and geolocation
- Behavior velocity patterns from similar profiles
- Early indicators of synthetic or bot-generated accounts
Case Management
Cases may be generated during onboarding when:- Submitted identity attributes conflict or appear fraudulent
- Device behavior aligns with known attack patterns
- Data is insufficient for reliable risk classification
- Customer rules explicitly require approval workflows (e.g., high-tier enrollment)
Example Onboarding Rules
Objective Flow Rule Concept Returned Status Reduce bot signups Device seen across multiple unrelated profiles blocked Validate KYC compliance Missing ID details for regulated tiers pending Detect synthetic profiles Identity fields mismatch with country data model blocked Control registration risk Signups from high-risk IP geolocations pending These rules can be expanded and tuned continuously as fraud patterns evolve.Summary
ProfiledRisk enhances onboarding by:- Preventing fraudulent actors before they gain access
- Reducing regulatory and operational exposure early in the lifecycle
- Enabling step-up checks only when needed
- Giving visibility into device, IP, and identity signal quality

