Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
@adyen/kyc-components
Advanced tools
Adyen Kyc-components provides the required forms/elements/dropins to build up an onboarding flow based on a legalentity.
Adyen Kyc-components provides the required forms/elements/dropins to build up an onboarding flow based on a legalentity.
Including the sdk
import AdyenKyc from '@adyen/kyc-components';
<link href="/kycexternalapi/static/sdk/1.0.0/adyen-kyc-components.css" rel="stylesheet"/>
<script src="/kycexternalapi/static/sdk/1.0.0/adyen-kyc-components.js" type="text/javascript" ></script>
Initializing the sdk
const kyc = new AdyenKyc({
countryCode: 'US',
clientKey: '',
environment: 'https://kyc-test.adyen.com/kyc' OR 'https://kyc-live.adyen.com/kyc'
});
Including form Components
const form = kyc.create('personalDetails',{
onChange: val => { console.log(val) }
});
form.mount('#container');
Configurations based on a country are underway, each form component will be capable of take in a country as prop based on which it will be rendered. If no country is provided the country value provided at initialization step will be used to configure.
AdyenKyc(config: Config)
Config
Key | Default | Description |
---|---|---|
locale | en-US | the locale country code |
country | US | the resident country code |
clientKey | the client key to contact the KYC external API where the configuration API lives. In order for the SDK to work, your webpage needs to configure a clientKey that can be used by the SDK. The procedure for obtaining a clientKey for KYC Components are the same as for our other Web components. The details are listed on docs.adyen.com | |
environment | the domain where the KYC external api can be contacted. |
AdyenKyc.create(dropinComponentName: ComponentName, options: Options)
ComponentName
Possible values are:
Value | Description |
---|---|
'taskList' recommended | Let the SDK list the tasks that require completion. The navigation between each task will be handled internally. The rendering of drop-ins and navigation will be decided automatically. |
'individualDropin' | KYC details for a natural person |
'companyDropin' | KYC details for an organization |
'payoutAccount' | KYC details for a transfer intstrument |
Options
Option | Required | Type | Remarks |
---|---|---|---|
isReview | Optional | boolean | Change all forms to be in review mode, essentially starting (and ending) every flow with a summary screen, with buttons changed to confirm and review. |
legalEntityResponse | Required | Legal Entity object that is returned from the Legal Entities API | this now contains extended properties, see legal-entity.ts for more details |
capabilities | Required | array | List of capabilities that are being requested, e.g. ['PSP_PAYOUT'] |
readOnly | Rrequired | boolean | to set form to read only mode |
country | Optional | string | overrides resident country set in the Config that initialises the AdyenKyc |
showInlineErrors | Optional | boolean | show errors inline or only above form |
onChange | Optional | (state) => void | method that passes on the entire state when changes to the state of the forms have changed. state in the case of the Individual form will be of type IndividualSchema. |
onSubmit | Optional | (state) => void | method that passed on the entire state after submitted data has been handled by the backend (successfully received a 200 response). i.e. User clicks form submit -> API handler promise fired -> promise resolves successfully -> fires onSubmit |
handleGetLegalEntity | Required | (legalEntityId: string) => Promise<LegalEntity> | method for getting a Legal Entity using the legalEntities API. |
handleCreateLegalEntity | Required | (data: LegalEntity) => Promise<LegalEntity> | method for creating a legal entity using the legalEntities API. |
handleUpdateLegalEntity | Required | (data: LegalEntity, legalEntityId: string) => Promise<LegalEntity> | method for updating a legal entity using the legalEntities API. |
handleCreateIdDocument | Required | (data: Document) => Promise<Document> | method for creating a document using the documents API. |
handleUpdateIdDocument | Required | (data: Document, , documentId: string) => Promise<Document> | method for updating a document using the documents API. |
To complete the setup of the Adyen SDK the following additional configurations are needed on your server. These configurations are listed below.
In order for the SDK to reach out to the Adyen servers for configuration requests and assets, additional Content Security Policy need to be configured. On top of your existing configration the following domains need to be added:
Environment | CSP Section | Value |
---|---|---|
Test | connect-src | https://kyc-test.adyen.com |
Test | font-src | https://kyc-test.adyen.com |
Test | img-src | https://kyc-test.adyen.com |
Live | connect-src | https://kyc-live.adyen.com |
Live | font-src | https://kyc-live.adyen.com |
Live | img-src | https://kyc-live.adyen.com |
FAQs
`adyen-kyc-components` provides the required pieces to build an onboarding flow based on a legal entity. To onboard and verify users, you need to create a user interface (UI) to collect user data. To speed up building your integration, Adyen offers onboar
The npm package @adyen/kyc-components receives a total of 0 weekly downloads. As such, @adyen/kyc-components popularity was classified as not popular.
We found that @adyen/kyc-components demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 0 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.