Onset Procedures

Welcome to the comprehensive guide for acquainting yourself with Instant Cash REST APIs. This instruction will walk you through the essential steps for a smooth integration process.

Phase 1: Introduction to IC REST APIs (Sandbox Environment).

In Phase 1, you will become familiar with Instant Cash REST APIs in a controlled Sandbox environment. Follow these key steps:

Step 1. Overview of Instant Cash Sandbox:

  1. IC API Sandbox (readme.io)

Step 2. Obtain Sandbox Credentials and populate API Headers:

  1. Getting Your API keys (readme.io)

Step 3. Use pre-defined Sandbox values (dummy data): API testing guide (readme.io)

Step 4. Create Transactions:

  1. Send Money (readme.io)
  2. Recipes (readme.io)

Step 5. Receive Transactions:

  1. Receive Money
  2. Recipes (readme.io)
  3. Response Fields of Receive Endpoints

Step 5. Transition to UAT Testing

Phase 2: Introduction to IC REST APIs (UAT Environment).

In Phase 2, you will continue your exploration of Instant Cash REST APIs in the User Acceptance Testing (UAT) environment. Key steps include:

Step 1. Request user creation

Step 2. Add Subscription Key to API header: Getting Your API keys

Step 3. Create Transactions:

  1. Send Money (readme.io)
  2. Recipes (readme.io)

Step 4. Receive Transactions:

  1. Receive Money
  2. Recipes (readme.io)
  3. Response Fields of Receive Endpoints

Step 5. Provide feedback:

Your feedback is invaluable. Please take a moment to provide feedback and suggestions for improvement.

Important Notice for Sandbox Environment Users

Sandbox Environment is open for all users who want to experience Instant Cash REST APIs. It is designed strictly for testing purposes. We strongly advise against sending real data to the Sandbox, as it is not designed to handle sensitive or personal information. It is the API user's responsibility to protect their data by ensuring that no real information is transmitted to non-production environments. Failure to comply with this guideline may expose your data to risks. Please exercise due diligence and use this environment strictly within its designated boundaries to protect your information.