Overview
Understand what VertexY does, how the platform is structured, and where each API fits.
What VertexY is
VertexY is a fraud decisioning platform for payment, account, and order workflows.
You use it in three complementary ways:
- Real-time assessment
Call
POST /risk-engine/assessbefore a sensitive action to get a score and decision. - Event ingestion
Push behavioural and payment lifecycle events to
POST /events/ingestso VertexY can build history and graph context. - Outcome feedback
Send final outcomes to
POST /risk-engine/feedbackso the system improves over time.
Core platform objects
- Company Your VertexY tenant.
- User Your authenticated VertexY user.
- Plan The commercial package that controls features and limits.
- Subscription Your company’s current billing state.
- Assessment A single risk decision for one transaction.
- Event
A signed historical signal sent to
/events/ingest. - Review A manual investigation case tied to an assessment.
- Threat intel subscription Your outbound webhook subscription for threat notifications.
Recommended integration model
For most clients, the best rollout path is:
- Register your company and store your secrets.
- Subscribe to a plan.
- Add
POST /risk-engine/assessat the transaction decision point. - Start ingesting all supported event types.
- Feed confirmed outcomes back into VertexY.
- Enable analyst workflows such as reviews, graph explorer, and audit logs if your plan includes them.
Endpoint families
Authentication and setup
POST /auth/register-company-adminPOST /auth/loginPOST /auth/refreshPOST /auth/logoutPOST /auth/webhook-secret/regeneratePOST /auth/webhook-secret/status
Billing and subscriptions
GET /subscriptions/meGET /subscriptions/me/usage
Billing checkout and plan management are handled through the frontend billing experience rather than direct end-user backend API calls.
Risk engine
POST /risk-engine/assessPOST /risk-engine/feedbackGET /risk-engine/evaluationsGET /risk-engine/evaluations/:idGET /risk-engine/analytics/*GET /risk-engine/policyPUT /risk-engine/policy
Event ingestion
POST /events/ingest
Investigator workflows
GET /graph/explore/:idGET /reviewsPOST /reviewsPATCH /reviews/statusGET /audit-logs
Threat intelligence
POST /threat-intel/subscriptionsGET /threat-intel/subscriptionsDELETE /threat-intel/subscriptions/:subscriptionId
Authentication model
VertexY uses two authentication modes:
- Bearer JWT Used by most endpoints.
- HMAC signature
Used by
POST /events/ingest.
Read Authentication and Webhook Signature Verification before building your integration.
Plans, limits, and feature gates
Not every endpoint is available on every plan.
Typical gated capabilities include:
- event explorer
- graph explorer
- reviews
- audit logs
- threat intelligence
Usage is also limited by plan, especially for the fraud_events_ingested metric.
Decision model at a glance
Every assessment returns:
riskScore: numeric score from 0 to 100action: the action your application should applyrecommendedAction: the engine’s direct recommendationriskLevel: severity bandreasonCodes: machine-readable explanation list
Read Risk Scores Explained for the scoring model.
What VertexY does not do for you
VertexY makes risk decisions and provides tooling around them, but your system still owns:
- payment authorization
- final business workflow execution
- customer notifications
- dispute operations in your gateway
- secure storage of your own secrets and customer data
Good production practices
- Keep refresh tokens server-side, not in public browser storage.
- Sign every
/events/ingestrequest. - Use unique
idempotencyKeyvalues for ingest and feedback. - Store
assessmentIdfor every decision. - Send feedback as soon as the final outcome is known.
- Ingest all supported event types, not only successful payments.