Going Live and Deployment Considerations
Transitioning from Sandbox to UAT
Once you have completed your development using the IC API Sandbox, your next step is to transition into our UAT environment where you will test your application with scenarios similar to what you will encounter when you go live.
To transition to the UAT environment you will need your UAT credentials which will be provided to you by Instant Cash Operations Team ([email protected]) once you are ready.
Transitioning from UAT to Production
Before going live with your IC API integration, it's essential to thoroughly test your implementation using the API's sandbox environment. Once you have completed testing and are satisfied with your integration, you can transition to the production environment.
API Checklists
Once the UAT is done, you need to fill the API checklists shared by Instant Cash Operations Team ([email protected]) according to your integration type. IC will review them and thereby will be signed-off by both parties.
Once the checklists are signed off by both parties, you must obtain a new set of API credentials for the production environment from Instant Cash Operations Team ([email protected]) and update your application accordingly.
Security Best Practices
Ensuring the security of your IC API integration is critical. Follow these best practices to help protect the data of your users and maintain the integrity of your application:
- Store API credentials and subscription keys securely, such as using environment variables or a secure credential storage service.
- Implement proper input validation and sanitization to prevent security vulnerabilities, such as SQL injection or cross-site scripting (XSS) attacks.
- Use HTTPS for all API requests and communications between your application and the Instant Cash API to protect data in transit.
- Stay up-to-date with security patches and updates for your development environment and any third-party libraries or tools you are using.
- Regularly review and update your application's security measures to address new threats and vulnerabilities.
Updated over 1 year ago