Guides
Deep-dives on each part of the Certyo API. Read top to bottom or jump to what you need.
Authentication
How the X-API-Key header works, key rotation, and what to do if a key is compromised.
ReadRecord Ingestion
Request shape, required vs optional fields, idempotency keys, and bulk ingestion for high-volume workloads.
ReadVerification
The three verification modes (by record, by payload, by snapshot) and what a successful verification mathematically proves.
ReadStatus & Polling
The record lifecycle (Ingested → Batched → Anchored), polling best practices, and retry logic for failed anchoring.
Read