Testing in Sandbox
Test values and options for Identity Verification
Identity Verification is not available by default in the Sandbox environment. To obtain Sandbox access, request full Production access for Identity Verification, which will automatically grant Sandbox access, or contact Sales. To obtain Sandbox access for Identity Verification if you are already using another Plaid product, you can also contact your account manager or submit an access request ticket.
Sandbox users for Identity Verification
Primary test user (Leslie Knope)
In Sandbox mode, Identity Verification accepts the fixed set of inputs below in order to result in successful Data Source and Document Verification checks.
Form Field | Test Value |
---|---|
Mobile number | +1 234-567-8909 |
First name | Leslie |
Last name | Knope |
Verification code | 11111 |
Address | 123 Main St. |
City | Pawnee |
State | Indiana |
ZIP code | 46001 |
Month | January |
Day | 18 |
Year | 1975 |
SSN | 123-45-6789 |
Data Source-only test user (Ben Wyatt)
The test user below will pass Data Source checks in Sandbox, but will fail Document Verification checks.
Form Field | Test Value |
---|---|
Mobile number | +1 666-777-8888 |
First name | Ben |
Last name | Wyatt |
Verification code | 11111 |
Address | 620 Worster Ave Apt 101 |
City | Sherman Oaks |
State | California |
ZIP code | 91423 |
Month | Any |
Day | Any |
Year | 1974 |
SSN | 111-22-3333 |
Identity verification behavior in Sandbox
Data Source checks
Data Source checks in Sandbox will be compared against the information above. To simulate different test cases and results, you can adjust your Data Source input at the attribute level (e.g. an incorrect birthdate), and set up different Identity Rules to simulate different verification results.
Document checks
Documents uploaded in Sandbox will always be interpreted as genuine (not fake) documents reflecting the name and date of birth matching the Leslie Knope test user. Document check will pass if the data provided in the Data Source check matches this name and date of birth, and will fail otherwise.
Users have three attempts to pass the Document check, so the status will not be updated in the Dashboard to failed
until you have provided mismatching data three times.
Selfie checks
Selfie checks will not be run in Sandbox mode, even if they are enabled in your template.
AML Screening
In Sandbox, Monitor screens against a real-world dataset, so the Sandbox user will not return any screening hits. For more information, including example data you can use to trigger screening hits, see Testing Monitor.
Risk Check
The risk check is fully functional in Sandbox. It’s common to trigger high risk scores when testing. For more information and advice, see Risk rules for testing.
Auto-fill
Auto-fill behavior is fully functional in Sandbox.
Financial Account Matching
Financial Account Matching is fully functional in Sandbox. If you want to change the Identity data that is being compared to the Identity Verification session, see how to create Sandbox test data.
Risk rules for testing
Many common testing behaviors (e.g. attempting to enter the Identity Verification flow repeatedly on the same device using different credentials) may be flagged as risky behavior and cause your verification attempt to fail. For testing purposes, you can temporarily set the Acceptable Risk Level for any checks you are failing (typically Network Risk and Device Risk) to High, under the Rulesets -> Risk Rules section of the template editor. Make sure to set the Acceptable Risk Level back to your desired setting before launching in Production.
If you want to force a check to fail in Sandbox, an easy way to do this is to set Acceptable Risk Level for the Network Risk and Device Risk fields to Low. Checks will begin failing after your first few attempts.
Triggering specific test outcomes
Using the rules above, it is easy to create the outcome of passing both Data Source checks and Document checks, or of failing both checks. If you need to simulate specific combinations of pass / fail (passing one check but not the other), you can use the guides below.
Data Source check passes, Document Verification check fails
The simplest option to achieve this outcome is to use the Ben Wyatt test user.
If you would like to use the Leslie Knope test user:
- Set up your template to always be enabled for Data Source checks and Document Checks.
- Set up your template to not require a match or partial match on name or date of birth.
- Enter Leslie Knope's correct test data for the address, SSN, and phone number fields.
- Enter incorrect data for the name and date of birth fields.
If you would like this test to also trigger a Monitor hit, you can use the name and date of birth of a sanctioned individual. For examples, see Monitor test data.
Data Source check fails, Document Verification check passes
- Set up your template to be enabled for Data Source checks, with Document checks as a fallback.
- Set up your template to require a match for address, SSN, and phone number fields.
- Enter Leslie Knope's correct test data for the name and date of birth fields.
- Enter incorrect data for the address, SSN, and phone number fields.
Testing Financial Account Matching
- Create a template with Financial Account Matching enabled.
- Call
/link/token/create
withidentity_verification
in theproducts
array. Make sure to save theclient_user_id
you are using with this call, as you will need it later. - Launch Link and complete the Identity Verification session, entering Leslie Knope's correct test data.
- See the Sandbox custom user repo for instructions on configuring custom Sandbox users and create a custom user using the Financial Account Matching custom user data from that repo.
- Call
/link/token/create
withidentity
(orassets
, for underwriting use cases) in theproducts
array and the sameclient_user_id
as was used in the first step, and launch a Link session. - Use the custom user you created above to log in to Link, then call
/item/public_token/exchange
to exchange the public token for an access token. - Call
/identity/get
or/identity/match
(or/asset_report/create
, if usingassets
instead ofidentity
) on the access token. - Check the Identity Verification session in the Dashboard. You should see the linked account and a successful match in the Financial Account Matching section.