DutyClaims Docs
Core Workflows

Use the workflow family map before you jump into individual operations.

The API reference is precise at the route level. This page is the missing middle layer: which workflow families exist today, which ones most teams implement first, and where the truthful production boundary still stops.

Partner setup and operational readiness

Use this path when you are onboarding the partner tenant itself before any client, claim, or notification work begins.

  1. Read partner organization state and capabilities first so your integration only attempts routes your tenant can actually use.
  2. Register webhook endpoints before you rely on asynchronous lifecycle updates.
  3. Use sandbox webhook tests to prove your signature verification and event ingestion path before production registration.

Client onboarding and authority state

Most broker and platform integrations should make the client relationship explicit before they try to create claims or issue notifications.

  1. Create or link the canonical client record.
  2. Read authority state before assuming delegation, invite acceptance, or POA shortcuts already exist.
  3. Use invites, delegations, and POA assertions as explicit relationship state, not as hidden side effects.

Claim creation, documents, and status reads

This is the main production path for most integrations that submit work into DutyClaims and then need a durable status surface.

  1. Optional: score normalized entries first if you need pre-claim analysis.
  2. Create the claim once the client relationship is valid.
  3. Use claim status and document routes to observe the lifecycle instead of repurposing email notifications as your source of truth.

Scans, financing, litigation, and reporting

These workflows sit downstream of partner onboarding and claims, and some remain intentionally gated by provider readiness or capability flags.

  1. Use entries and portfolio scans for durable import analysis and scan lifecycles.
  2. Use financing and litigation routes only after the claim and authority state are already truthful.
  3. Treat blocked diligence and counterparty families honestly until provider-backed activation exists for your environment.

Standard claim intake and observation path

This is the safest default integration order for most partner teams: prove tenant readiness, create the client relationship, create the claim once authority is truthful, then observe status through reads and webhooks.

StepRoutePurposeWhat to check next
1GET /v1/partner-organizations/{partnerOrgId}Read tenant state, environment, and the partner record you are about to act as.Confirm sandbox versus production and that the partner org itself is the one you expect.
2POST /v1/webhooks/endpointsRegister the listener before you depend on asynchronous status changes.Store the signing secret and run a synthetic sandbox test before live traffic.
3POST /v1/clientsCreate or link the canonical partner client that later claims, offers, and notifications depend on.Persist the returned client identifier instead of keying later requests off ad hoc importer strings.
4GET /v1/clients/{clientId}/authorityRead delegation, POA, and current authority posture before assuming the relationship is actionable.If authority is not truthful yet, fix that state before submitting the claim.
5POST /v1/claimsCreate the claim once the client relationship and importer identity are ready.Use an idempotency key so a network retry does not create a duplicate claim.
6GET /v1/claims/statusRead the list-style status surface while webhooks carry the asynchronous lifecycle edge.Use `/v1/webhook-deliveries` when the webhook path and the status path disagree.

Diligence batch compatibility path

Teams migrating from the earlier diligence-first surface should use this sequence when the partner workflow still revolves around bulk submission, job polling, report reads, and controlled resumption.

StepRoutePurposeWhat to check next
1POST /v1/diligence/submitSubmit the diligence portfolio with the current compatibility contract.Record the returned job identifier immediately; later reads depend on it.
2GET /v1/diligence/status/{jobId}Poll the durable job status rather than inferring progress from queue timing.Use the status payload to decide whether to read the report, dataset, or resume path next.
3GET /v1/diligence/report/{jobId}Read the report contract, including typed review detail such as `rf8Review`.Treat report output as the public source of truth for diligence outcomes.
4GET /v1/diligence/dataset/{jobId}Fetch the dataset view when the downstream system needs the detailed rows, not just the summary report.Keep dataset consumers pinned to the same contract version as the report readers.
5POST /v1/diligence/jobs/{jobId}/resumeResume only when the job is partial or failed and the operator workflow actually calls for it.Treat resume as an explicit operational action, not as automatic blind retry behavior.

RF8 documentation boundary

RF8 uses a split documentation model on purpose. Public developer docs describe the contract-visible diligence result, while internal docs keep the operator-only source and review workflow.

  • Public developer docs: what rf8Review means in diligence report responses and how integrations should interpret the typed outcomes.
  • Internal operator docs: source credentials, readiness gates, analyst override, manual evidence capture, and rollout or rollback behavior.

How integrations should use RF8

  1. Generate or fetch the diligence report through the normal report route.
  2. Read the typed rf8Review object instead of inferring RF8 from prose only.
  3. Use RF8 as diligence state, not as a trigger to call a second hidden RF8 endpoint.
  4. If your workflow needs deeper source-level behavior than the report exposes, that is a product or platform-boundary question, not a missing snippet in the current docs.
Production

Partner Orgs

Partner organizations, capabilities, webhook endpoints, and managed credentials.

8 documented operations

Plus 4 more routes in the live reference.

Production

Clients & Authority

Canonical client records, authority state, delegations, invitations, and POA assertions.

11 documented operations

Plus 7 more routes in the live reference.

Production

Claims

Claim scoring, claim creation, status reads, and claim document delivery.

9 documented operations

Plus 5 more routes in the live reference.

Production

Notifications

Partner-triggered notifications, delivery analytics, and client notification history.

3 documented operations

Production

Reporting

Partner dashboards, revenue ledgers, and export surfaces.

4 documented operations

Production

Entries & Scans

Entry ingest, batch normalization, and portfolio scan lifecycle endpoints.

7 documented operations

Plus 3 more routes in the live reference.

Production

Litigation

Enrollment, readiness, package delivery, and docket status reads.

9 documented operations

Plus 5 more routes in the live reference.

Production

Reference

Official HTS-backed search, countries, and health metadata.

3 documented operations

Sandbox Only

Authentication

Managed credentials everywhere, plus sandbox-only OAuth client credentials for partner testing.

1 documented operations

Production

Counterparty

Counterparty profiles, diligence cases, provider runs, monitoring enrollment, evidence, and partner-safe reports with truthful deployment-readiness guardrails.

13 documented operations

Plus 9 more routes in the live reference.