1. Activate your account
Activate your Criptan account and keep it safe.
Last updated
Activate your Criptan account and keep it safe.
Last updated
The process of utilizing your Criptan account is straightforward and flexible. Here's how it works:
Sandbox Mode Activation: Immediately upon activatingg your Criptan account, you can start using it in . In this mode, you have the freedom to simulate all of Criptan's powerful features without any real funds being involved.
Transition to Live Mode: Once your account is activated, to make genuine operations, you just have to use the live mode endpoints.
New to Criptan? If you haven't yet created your Criptan account, don't worry. Simply complete the before proceeding with test mode or accepting live operations.
Experience the full spectrum of Criptan's capabilities, from testing to live transactions, and watch your business thrive effortlessly.
To begin your journey with Criptan, you'll need to follow these steps:
Registration: Your first step is to sign up with Criptan. You can easily do this by downloading our app from either the Playstore or the Appstore or scan the QR located at , or creating an account through our . Then you have to create an account.
Mobile Verification and KYC: After create an account, you'll need to validate your mobile phone and complete the identity verification process, known as KYC.
If you are representing a business entity, after successfully creating your account, it's important to comply with anti-money laundering and counter-terrorism financing regulations. To achieve this, please follow these steps:
Fill out the required form:
Submit the necessary documents:
Existence certificate of commercial register (<6 weeks).
Certificate of ownership of all bank accounts that are going to be used (<3 weeks).
Completed attached below.
Completed attached below.
Most recent financial statements – profit and loss account, balance sheets, and/or any other additional information available.
You will receive instructions on where to send these documents via email. Please reply to the onboarding email with the requested documents.
Additionally, depending on the nature of your business or circumstances beyond Criptan's control, additional accreditation documents may be requested. In such cases, Criptan will communicate these requirements to the email address you have provided and guide you through the next steps.
Upon successful review and approval of your documentation, your company account will be activated.
To complete the process, simply fill out and sign the forms, and then submit them by clicking the green box located in the upper right corner labeled "Send."
Once your account is set up, it's crucial to ensure its security. Here are our recommendations:
Keep Confidential Information Secure: Safeguard your password and maintain the confidentiality of your secret API keys on your own servers. Please remember that Criptan employees will never request your keys.
Avoid Password Reuse for Criptan: Employ a password unique to Criptan. If you use the same password on another platform that becomes compromised, an attacker might exploit those pilfered credentials to gain control of your account.
Activate Two-Factor Authentication: When you enable two-factor authentication, you’ll need to provide an additional unique code from your mobile device to complete the login process—either received as a text message or generated through an app like Google Authenticator. This means that even if someone steals your username and password, they won’t be able to log in. To enable this feature, go to your user settings > my profile > verification and security.
Please note that we will provide the mentioned in points 3 and 4 within this message. Ensure that all documents are signed either manually or using a certified digital signature, and they must be in Spanish.
If you require assistance during the registration process or have any other inquiries, please feel free to .
We place paramount importance on your privacy and security. Our details the methods and purposes for the collection, utilization, retention, disclosure, and protection of any personal information you entrust to us.
Regularly Update Your Computer and Browser: We suggest configuring your computer to automatically download and install updates (e.g., or ). This proactive approach helps shield your system from automated attacks and malware.