Introduction

How Does Guardient Work?

It’s simple:

  1. You send a request from your backend to our API with details about the user trying to access your service.

  2. We analyze the request, checking things like email, IP, and phone number against our up-to-date threat databases.

  3. You get a trust score and reasons, so you can decide to allow, flag, or block the user—based on your own rules.

No client-side scripts required, no cookies—just a quick server-to-server check that helps you stop bad actors before they cause damage.

Let's Start!

1

Create your first project

Visit our new project link to create your new project. If you are not logged in already, you will be requested to. If everything goes well you will be redirected to our dashboard page.

Guardient's Dashboard Page
2

Get your API key

To access Guardient's API, you must authenticate using API keys. Each project has a unique API key. To locate your project's API key, navigate to the settings page on the left side of your dashboard

After that, you will see a field containing your API key. To view it, just click on it. You will need this API key later on.

How to get your api key.
3

Integrating guardient

To integrate Guardient into your service or website, please visit our integration page or scroll down and click the "Next" button to continue.

4

Do a test run (optional)

To expedite the process, you can manually verify users via our dashboard. Navigate to the "Check User" page and enter the email, IP address, and phone number.

Manually checking a user

Last updated

Was this helpful?