DutyClaims Docs
Production Launch Checklist

Prove the production path before you ask for live traffic.

Launch readiness is mostly operational discipline: correct credential shape, traceable writes, verified webhook delivery, a real golden-path rehearsal, and a rollback packet that support can act on without guesswork.

Use this page when

  • You are about to request production credentials or cut over an existing partner.
  • You need a minimal but truthful go-live bar for engineering, support, and partner ops.
  • You want one checklist that points to the exact docs pages for auth, webhooks, retries, and migration.

Current artifact pin

  • Generated at: Mar 25, 2026, 7:30 PM
  • Contract hash: ae140b8f3b926d06
  • Launch-packet downloads: 6

Keep your launch packet on the same contract hash as the deployment you are validating.

Production checklist

GateVerify withWhat you must proveEvidence to keep
Environment and contract pinGET /v1/partner-organizations/{partnerOrgId}Your integration points at the intended DutyClaims environment and the same contract hash that produced your downloaded OpenAPI, starter files, and examples.Record the target host, contract hash, and the exact generated artifacts the team used during the rehearsal.
Credential and header disciplineGET /v1/partner-organizations/{partnerOrgId}/capabilitiesProduction traffic uses the credential shape the current route family actually publishes. Do not treat sandbox OAuth as proof of a production flow.Keep one successful authenticated read plus the rotation owner and secret-storage location for the live credential.
Traceability and idempotencyPOST /v1/claimsWrite paths send and persist `Idempotency-Key`, `X-Correlation-Id`, and the returned request identifiers so retries and support escalations stay replay-safe.Capture one write log showing the outbound idempotency key plus the response `requestId` and `correlationId`.
Webhook readinessPOST /v1/sandbox/webhooks/testThe receiving service stores the signing secret, verifies the HMAC against the raw body, and routes only after verification succeeds.Keep one successful endpoint registration plus one successful synthetic sandbox delivery and the receiving-service log entry that validated it.
Golden-path rehearsalGET /v1/claims/{claimId}/statusYou have run the actual flow you intend to ship, not just isolated curl calls. For most teams that means client, authority, claim creation, status read, and webhook observation.Record the partner client ID, claim ID, and any webhook delivery identifiers from the rehearsal run.
Support and rollback packetGET /v1/webhook-deliveriesOn-call and partner-support teams know which metadata to include when traffic misbehaves and how to fall back during migration windows.Prepare the escalation template with route, timestamp, request ID, correlation ID, partner org, claim/job ID, and the current cutover owner.

Minimum log fields before production

  • requestId from every non-2xx response and every rehearsal write.
  • correlationId or your outbound X-Correlation-Id.
  • The idempotency key used for any replay-safe write path.
  • Partner org ID plus client, claim, job, or webhook delivery IDs when present.
  • The exact route, method, timestamp, and environment where the event happened.

Support handoff packet

  • One successful request or webhook example from the same build you plan to launch.
  • The current contract hash and the downloaded starter files used during implementation.
  • The webhook endpoint ID, secret prefix, and synthetic test result.
  • The contact who owns credential rotation and the contact who owns rollback decisions.

Dry-run route sequence

StepRouteSuccess signal
1GET /v1/partner-organizations/{partnerOrgId}Partner org and environment match the tenant you intend to launch.
2POST /v1/webhooks/endpointsEndpoint is registered and the signing secret is stored outside source control.
3POST /v1/sandbox/webhooks/testReceiver validates the signature and records the event.
4POST /v1/clientsThe canonical client identifier is created or linked and persisted by your app.
5GET /v1/clients/{clientId}/authorityAuthority state is truthful before any downstream claim or notification work starts.
6POST /v1/claimsA write path succeeds with replay-safe headers and returns stable identifiers.
7GET /v1/claims/{claimId}/statusStatus reads and webhook deliveries agree on the lifecycle change you triggered.

Keep these files in the launch packet

Cutover and rollback discipline

  • Use the migration guide for any legacy diligence or broker-compatibility traffic.
  • Publish a reachable vulnerability-reporting contact and keep security disclosure instructions current before live traffic begins.
  • Do not hide provider-gated or manual-only behavior behind “production-ready” language.
  • If webhook delivery, auth semantics, or compatibility behavior drift, stop the cutover and keep the current compatibility surface truthful.
  • When in doubt, escalate with the exact request IDs instead of paraphrasing the failure.