# Overview

## Introduction

No-code configurations enable you to create and customize identity verification workflows **without writing a single line of code.** This feature provides a user-friendly interface where you can define steps, set parameters, and automate verification processes to meet your business requirements. Whether you're adjusting verification rules, adding extra security measures, or streamlining user onboarding, no-code configurations give you full control—without the need for development resources.

## **Key benefits**

1. **Ease of use** - A drag-and-drop or form-based interface allows anyone to configure workflows without technical expertise.
2. **Flexibility** – Customize workflows to fit different verification needs, such as KYC, AML screening, document validation or Proof of Address analysis.
3. **Faster deployment** – Make changes in real time without waiting for developers, ensuring quicker adaptation to regulatory or business needs.
4. **Scalability** – Easily modify and expand workflows as your company grows and verification requirements evolve.

## **How It Works**

Setting up a no-code Configuration involves a few straightforward steps:

1. **Access the no-code configurations** – Navigate to the Configurations section in your dashboard and create a new one.
2. **Define workflow steps** – Select from available verification steps such as **ID verification, Liveness, or Video KYC** to build your workflow.
3. **Set parameters** – Configure individual steps and overall workflow rules, such as redirecting users after verification is completed.
4. **Test and deploy** – Preview your workflow, make adjustments, and activate it by creating a new session or using the Configuration ID or Public URL.

## **Use cases**

No-code configurations can be applied in various scenarios, including:

* **Financial services** – Set up automated KYC workflows for new account openings.
* **E-commerce & Marketplaces** – Verify sellers and buyers before allowing transactions.
* **Gig economy & Hiring platforms** – Conduct identity and background verification for freelancers or employees.
* **Cryptocurrency & Fintech** – Implement compliance-driven checks for AML and fraud prevention.
* **Healthcare & Insurance** – Authenticate users before granting access to sensitive medical or policy data.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.identomat.com/no-code-workflows/overview.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
