All URIs are relative to https://api.fireblocks.io/v1
Method | HTTP request | Description |
---|---|---|
get_aml_post_screening_policy | GET /screening/aml/post_screening_policy | AML - View Post-Screening Policy |
get_aml_screening_policy | GET /screening/aml/screening_policy | AML - View Screening Policy |
get_post_screening_policy | GET /screening/travel_rule/post_screening_policy | Travel Rule - View Post-Screening Policy |
get_screening_full_details | GET /screening/transaction/{txId} | Provides all the compliance details for the given screened transaction. |
get_screening_policy | GET /screening/travel_rule/screening_policy | Travel Rule - View Screening Policy |
retry_rejected_transaction_bypass_screening_checks | POST /screening/transaction/{txId}/bypass_screening_policy | Calling the "Bypass Screening Policy" API endpoint triggers a new transaction, with the API user as the initiator, bypassing the screening policy check |
update_aml_screening_configuration | PUT /screening/aml/policy_configuration | Update AML Configuration |
update_screening_configuration | PUT /screening/configurations | Tenant - Screening Configuration |
update_travel_rule_config | PUT /screening/travel_rule/policy_configuration | Update Travel Rule Configuration |
ScreeningPolicyResponse get_aml_post_screening_policy()
AML - View Post-Screening Policy
Get the post-screening policy for AML.
from fireblocks.models.screening_policy_response import ScreeningPolicyResponse
from fireblocks.client import Fireblocks
from fireblocks.client_configuration import ClientConfiguration
from fireblocks.exceptions import ApiException
from fireblocks.base_path import BasePath
from pprint import pprint
# load the secret key content from a file
with open('your_secret_key_file_path', 'r') as file:
secret_key_value = file.read()
# build the configuration
configuration = ClientConfiguration(
api_key="your_api_key",
secret_key=secret_key_value,
base_path=BasePath.Sandbox, # or set it directly to a string "https://sandbox-api.fireblocks.io/v1"
)
# Enter a context with an instance of the API client
with Fireblocks(configuration) as fireblocks:
try:
# AML - View Post-Screening Policy
api_response = fireblocks.compliance.get_aml_post_screening_policy().result()
print("The response of ComplianceApi->get_aml_post_screening_policy:\n")
pprint(api_response)
except Exception as e:
print("Exception when calling ComplianceApi->get_aml_post_screening_policy: %s\n" % e)
This endpoint does not need any parameter.
No authorization required
- Content-Type: Not defined
- Accept: application/json
Status code | Description | Response headers |
---|---|---|
200 | Post-screening policy retrieved successfully. | - |
[Back to top] [Back to API list] [Back to Model list] [Back to README]
ScreeningProviderRulesConfigurationResponse get_aml_screening_policy()
AML - View Screening Policy
Get the screening policy for AML.
from fireblocks.models.screening_provider_rules_configuration_response import ScreeningProviderRulesConfigurationResponse
from fireblocks.client import Fireblocks
from fireblocks.client_configuration import ClientConfiguration
from fireblocks.exceptions import ApiException
from fireblocks.base_path import BasePath
from pprint import pprint
# load the secret key content from a file
with open('your_secret_key_file_path', 'r') as file:
secret_key_value = file.read()
# build the configuration
configuration = ClientConfiguration(
api_key="your_api_key",
secret_key=secret_key_value,
base_path=BasePath.Sandbox, # or set it directly to a string "https://sandbox-api.fireblocks.io/v1"
)
# Enter a context with an instance of the API client
with Fireblocks(configuration) as fireblocks:
try:
# AML - View Screening Policy
api_response = fireblocks.compliance.get_aml_screening_policy().result()
print("The response of ComplianceApi->get_aml_screening_policy:\n")
pprint(api_response)
except Exception as e:
print("Exception when calling ComplianceApi->get_aml_screening_policy: %s\n" % e)
This endpoint does not need any parameter.
ScreeningProviderRulesConfigurationResponse
No authorization required
- Content-Type: Not defined
- Accept: application/json
Status code | Description | Response headers |
---|---|---|
200 | Screening policy retrieved successfully. | - |
[Back to top] [Back to API list] [Back to Model list] [Back to README]
ScreeningPolicyResponse get_post_screening_policy()
Travel Rule - View Post-Screening Policy
Get the post-screening policy for Travel Rule.
from fireblocks.models.screening_policy_response import ScreeningPolicyResponse
from fireblocks.client import Fireblocks
from fireblocks.client_configuration import ClientConfiguration
from fireblocks.exceptions import ApiException
from fireblocks.base_path import BasePath
from pprint import pprint
# load the secret key content from a file
with open('your_secret_key_file_path', 'r') as file:
secret_key_value = file.read()
# build the configuration
configuration = ClientConfiguration(
api_key="your_api_key",
secret_key=secret_key_value,
base_path=BasePath.Sandbox, # or set it directly to a string "https://sandbox-api.fireblocks.io/v1"
)
# Enter a context with an instance of the API client
with Fireblocks(configuration) as fireblocks:
try:
# Travel Rule - View Post-Screening Policy
api_response = fireblocks.compliance.get_post_screening_policy().result()
print("The response of ComplianceApi->get_post_screening_policy:\n")
pprint(api_response)
except Exception as e:
print("Exception when calling ComplianceApi->get_post_screening_policy: %s\n" % e)
This endpoint does not need any parameter.
No authorization required
- Content-Type: Not defined
- Accept: application/json
Status code | Description | Response headers |
---|---|---|
200 | Post-screening policy retrieved successfully. | - |
[Back to top] [Back to API list] [Back to Model list] [Back to README]
ComplianceResultFullPayload get_screening_full_details(tx_id)
Provides all the compliance details for the given screened transaction.
Provides all the compliance details for the given screened transaction.
from fireblocks.models.compliance_result_full_payload import ComplianceResultFullPayload
from fireblocks.client import Fireblocks
from fireblocks.client_configuration import ClientConfiguration
from fireblocks.exceptions import ApiException
from fireblocks.base_path import BasePath
from pprint import pprint
# load the secret key content from a file
with open('your_secret_key_file_path', 'r') as file:
secret_key_value = file.read()
# build the configuration
configuration = ClientConfiguration(
api_key="your_api_key",
secret_key=secret_key_value,
base_path=BasePath.Sandbox, # or set it directly to a string "https://sandbox-api.fireblocks.io/v1"
)
# Enter a context with an instance of the API client
with Fireblocks(configuration) as fireblocks:
tx_id = '550e8400-e29b-41d4-a716-446655440000' # str | Fireblocks transaction ID of the screened transaction
try:
# Provides all the compliance details for the given screened transaction.
api_response = fireblocks.compliance.get_screening_full_details(tx_id).result()
print("The response of ComplianceApi->get_screening_full_details:\n")
pprint(api_response)
except Exception as e:
print("Exception when calling ComplianceApi->get_screening_full_details: %s\n" % e)
Name | Type | Description | Notes |
---|---|---|---|
tx_id | str | Fireblocks transaction ID of the screened transaction |
No authorization required
- Content-Type: Not defined
- Accept: application/json
Status code | Description | Response headers |
---|---|---|
200 | A compliance object | * X-Request-ID - |
0 | Error Response | * X-Request-ID - |
[Back to top] [Back to API list] [Back to Model list] [Back to README]
ScreeningProviderRulesConfigurationResponse get_screening_policy()
Travel Rule - View Screening Policy
Get the screening policy for Travel Rule.
from fireblocks.models.screening_provider_rules_configuration_response import ScreeningProviderRulesConfigurationResponse
from fireblocks.client import Fireblocks
from fireblocks.client_configuration import ClientConfiguration
from fireblocks.exceptions import ApiException
from fireblocks.base_path import BasePath
from pprint import pprint
# load the secret key content from a file
with open('your_secret_key_file_path', 'r') as file:
secret_key_value = file.read()
# build the configuration
configuration = ClientConfiguration(
api_key="your_api_key",
secret_key=secret_key_value,
base_path=BasePath.Sandbox, # or set it directly to a string "https://sandbox-api.fireblocks.io/v1"
)
# Enter a context with an instance of the API client
with Fireblocks(configuration) as fireblocks:
try:
# Travel Rule - View Screening Policy
api_response = fireblocks.compliance.get_screening_policy().result()
print("The response of ComplianceApi->get_screening_policy:\n")
pprint(api_response)
except Exception as e:
print("Exception when calling ComplianceApi->get_screening_policy: %s\n" % e)
This endpoint does not need any parameter.
ScreeningProviderRulesConfigurationResponse
No authorization required
- Content-Type: Not defined
- Accept: application/json
Status code | Description | Response headers |
---|---|---|
200 | Screening policy retrieved successfully. | - |
[Back to top] [Back to API list] [Back to Model list] [Back to README]
CreateTransactionResponse retry_rejected_transaction_bypass_screening_checks(tx_id, idempotency_key=idempotency_key)
Calling the "Bypass Screening Policy" API endpoint triggers a new transaction, with the API user as the initiator, bypassing the screening policy check
This endpoint is restricted to Admin API users and is only applicable to outgoing transactions.
from fireblocks.models.create_transaction_response import CreateTransactionResponse
from fireblocks.client import Fireblocks
from fireblocks.client_configuration import ClientConfiguration
from fireblocks.exceptions import ApiException
from fireblocks.base_path import BasePath
from pprint import pprint
# load the secret key content from a file
with open('your_secret_key_file_path', 'r') as file:
secret_key_value = file.read()
# build the configuration
configuration = ClientConfiguration(
api_key="your_api_key",
secret_key=secret_key_value,
base_path=BasePath.Sandbox, # or set it directly to a string "https://sandbox-api.fireblocks.io/v1"
)
# Enter a context with an instance of the API client
with Fireblocks(configuration) as fireblocks:
tx_id = '550e8400-e29b-41d4-a716-446655440000' # str | The transaction id that was rejected by screening checks
idempotency_key = 'idempotency_key_example' # str | A unique identifier for the request. If the request is sent multiple times with the same idempotency key, the server will return the same response as the first request. The idempotency key is valid for 24 hours. (optional)
try:
# Calling the \"Bypass Screening Policy\" API endpoint triggers a new transaction, with the API user as the initiator, bypassing the screening policy check
api_response = fireblocks.compliance.retry_rejected_transaction_bypass_screening_checks(tx_id, idempotency_key=idempotency_key).result()
print("The response of ComplianceApi->retry_rejected_transaction_bypass_screening_checks:\n")
pprint(api_response)
except Exception as e:
print("Exception when calling ComplianceApi->retry_rejected_transaction_bypass_screening_checks: %s\n" % e)
Name | Type | Description | Notes |
---|---|---|---|
tx_id | str | The transaction id that was rejected by screening checks | |
idempotency_key | str | A unique identifier for the request. If the request is sent multiple times with the same idempotency key, the server will return the same response as the first request. The idempotency key is valid for 24 hours. | [optional] |
No authorization required
- Content-Type: Not defined
- Accept: application/json
Status code | Description | Response headers |
---|---|---|
201 | A transaction object | * X-Request-ID - |
0 | Error Response | * X-Request-ID - |
[Back to top] [Back to API list] [Back to Model list] [Back to README]
ScreeningConfigurationsRequest update_aml_screening_configuration(idempotency_key=idempotency_key)
Update AML Configuration
Updates bypass screening, inbound delay, or outbound delay configurations for AML.
from fireblocks.models.screening_configurations_request import ScreeningConfigurationsRequest
from fireblocks.client import Fireblocks
from fireblocks.client_configuration import ClientConfiguration
from fireblocks.exceptions import ApiException
from fireblocks.base_path import BasePath
from pprint import pprint
# load the secret key content from a file
with open('your_secret_key_file_path', 'r') as file:
secret_key_value = file.read()
# build the configuration
configuration = ClientConfiguration(
api_key="your_api_key",
secret_key=secret_key_value,
base_path=BasePath.Sandbox, # or set it directly to a string "https://sandbox-api.fireblocks.io/v1"
)
# Enter a context with an instance of the API client
with Fireblocks(configuration) as fireblocks:
idempotency_key = 'idempotency_key_example' # str | A unique identifier for the request. If the request is sent multiple times with the same idempotency key, the server will return the same response as the first request. The idempotency key is valid for 24 hours. (optional)
try:
# Update AML Configuration
api_response = fireblocks.compliance.update_aml_screening_configuration(idempotency_key=idempotency_key).result()
print("The response of ComplianceApi->update_aml_screening_configuration:\n")
pprint(api_response)
except Exception as e:
print("Exception when calling ComplianceApi->update_aml_screening_configuration: %s\n" % e)
Name | Type | Description | Notes |
---|---|---|---|
idempotency_key | str | A unique identifier for the request. If the request is sent multiple times with the same idempotency key, the server will return the same response as the first request. The idempotency key is valid for 24 hours. | [optional] |
ScreeningConfigurationsRequest
No authorization required
- Content-Type: Not defined
- Accept: application/json
Status code | Description | Response headers |
---|---|---|
200 | Configuration updated successfully. | - |
[Back to top] [Back to API list] [Back to Model list] [Back to README]
ScreeningUpdateConfigurations update_screening_configuration(screening_update_configurations, idempotency_key=idempotency_key)
Tenant - Screening Configuration
Update tenant screening configuration.
from fireblocks.models.screening_update_configurations import ScreeningUpdateConfigurations
from fireblocks.client import Fireblocks
from fireblocks.client_configuration import ClientConfiguration
from fireblocks.exceptions import ApiException
from fireblocks.base_path import BasePath
from pprint import pprint
# load the secret key content from a file
with open('your_secret_key_file_path', 'r') as file:
secret_key_value = file.read()
# build the configuration
configuration = ClientConfiguration(
api_key="your_api_key",
secret_key=secret_key_value,
base_path=BasePath.Sandbox, # or set it directly to a string "https://sandbox-api.fireblocks.io/v1"
)
# Enter a context with an instance of the API client
with Fireblocks(configuration) as fireblocks:
screening_update_configurations = fireblocks.ScreeningUpdateConfigurations() # ScreeningUpdateConfigurations |
idempotency_key = 'idempotency_key_example' # str | A unique identifier for the request. If the request is sent multiple times with the same idempotency key, the server will return the same response as the first request. The idempotency key is valid for 24 hours. (optional)
try:
# Tenant - Screening Configuration
api_response = fireblocks.compliance.update_screening_configuration(screening_update_configurations, idempotency_key=idempotency_key).result()
print("The response of ComplianceApi->update_screening_configuration:\n")
pprint(api_response)
except Exception as e:
print("Exception when calling ComplianceApi->update_screening_configuration: %s\n" % e)
Name | Type | Description | Notes |
---|---|---|---|
screening_update_configurations | ScreeningUpdateConfigurations | ||
idempotency_key | str | A unique identifier for the request. If the request is sent multiple times with the same idempotency key, the server will return the same response as the first request. The idempotency key is valid for 24 hours. | [optional] |
No authorization required
- Content-Type: application/json
- Accept: application/json
Status code | Description | Response headers |
---|---|---|
200 | Tenant Screening configuration updated successfully. | - |
[Back to top] [Back to API list] [Back to Model list] [Back to README]
ScreeningConfigurationsRequest update_travel_rule_config(idempotency_key=idempotency_key)
Update Travel Rule Configuration
Updates bypass screening, inbound delay, or outbound delay configurations for Travel Rule.
from fireblocks.models.screening_configurations_request import ScreeningConfigurationsRequest
from fireblocks.client import Fireblocks
from fireblocks.client_configuration import ClientConfiguration
from fireblocks.exceptions import ApiException
from fireblocks.base_path import BasePath
from pprint import pprint
# load the secret key content from a file
with open('your_secret_key_file_path', 'r') as file:
secret_key_value = file.read()
# build the configuration
configuration = ClientConfiguration(
api_key="your_api_key",
secret_key=secret_key_value,
base_path=BasePath.Sandbox, # or set it directly to a string "https://sandbox-api.fireblocks.io/v1"
)
# Enter a context with an instance of the API client
with Fireblocks(configuration) as fireblocks:
idempotency_key = 'idempotency_key_example' # str | A unique identifier for the request. If the request is sent multiple times with the same idempotency key, the server will return the same response as the first request. The idempotency key is valid for 24 hours. (optional)
try:
# Update Travel Rule Configuration
api_response = fireblocks.compliance.update_travel_rule_config(idempotency_key=idempotency_key).result()
print("The response of ComplianceApi->update_travel_rule_config:\n")
pprint(api_response)
except Exception as e:
print("Exception when calling ComplianceApi->update_travel_rule_config: %s\n" % e)
Name | Type | Description | Notes |
---|---|---|---|
idempotency_key | str | A unique identifier for the request. If the request is sent multiple times with the same idempotency key, the server will return the same response as the first request. The idempotency key is valid for 24 hours. | [optional] |
ScreeningConfigurationsRequest
No authorization required
- Content-Type: Not defined
- Accept: application/json
Status code | Description | Response headers |
---|---|---|
200 | Configuration updated successfully. | - |
[Back to top] [Back to API list] [Back to Model list] [Back to README]