# Getting started

To start using No-code configurations, follow these steps to ensure a smooth setup and deployment:

### Ensure you have the right permissions

Before using No-code configurations, make sure you have the necessary access:

* This feature is **only available for the Administrator role**. (Refer to the [**User roles overview**](https://docs.identomat.com/get-started/user-roles-overview) for more details.)
* If you don’t have the required permissions, contact your system administrator or reach out to our support team for assistance.
* If you are an **Administrator** but the **`+ New configuration`** button is unavailable, your account may be on a **trial plan**. In this case, please contact us to enable full access.

### **Navigate to the configurations section**

* **Log in** to your dashboard and go to **Settings** in the navigation menu. Locate and click on the **Configurations** section.
* Click on **`+ New configuration`** to start building your workflow.
* If this is your first time using the feature, review the interface and available options. You can create **unlimited configurations**—this feature is **free to use on all paid plans**.

### Choose a verification type

Before selecting individual steps, choose the **verification type** for your workflow:

* **KYC (Know Your Customer)** – Designed for verifying individual users. Supports personal identity documents, liveness checks, video calls, and other individual-focused verification steps.
* **KYB (Know Your Business)** – Designed for verifying legal entities and organizations. Enables business document verification and related checks specific to companies and their representatives.

The selected verification type determines which steps are available in the workflow. Determine which steps are essential for your use case.

### **Review available verification steps**

Explore the different steps that can be included in your workflow, such as:

* **ID verification** – Users submit identification documents for validation.
* **Liveness check** – Ensures the user is present and real during verification.
* **Video call** – Conducts live video-based verification sessions.
* **Proof of Address** – Includes verification of proof of address and analysis of other type of documents.

Determine which steps are essential for your use case.

### **Create your first configuration**

* Finalize your flow by **dragging and dropping** or **selecting** the necessary verification steps.&#x20;
* Define key settings to match your verification requirements, such as:
  * **Required document types** (e.g., passport, ID card, driver’s license)
  * **Liveness retry limits** to control the number of user attempts
  * **Redirect URLs** after successful or failed verification
  * **Allowed document countries** to specify accepted regions
* Save your confirm: Once all settings are in place, **save your configuration** to make it available for use.

### **Test before going live**

* Run sample test sessions to validate the workflow's behavior.
* Check for:
  * Proper step execution and flow
  * Accurate verification results
  * Expected redirections and notifications
* Make necessary adjustments based on test results.

### **Deploy and monitor**

* Once your configuration is finalized, deploy it by:
  * **Creating a new session** from the dashboard
  * Using the **Configuration ID** in API requests
  * Sharing the **Public URL** for end-user access
* Continuously monitor verification results and make optimizations as needed.
