Geelab Docs
Deployment

Deployment Guide

Integration guides for all platforms

Platform Selection

Integration Process

Obtain Credentials

Create a verification scenario in the Geelab Console to obtain your captcha_id and captcha_key.

Please keep your captcha_key secure and do not expose it in client-side code.

Client-Side Integration

Load the SDK on the frontend and initialize the captcha. Choose the appropriate integration method based on your platform:

  • Web: Import SDK via CDN or npm
  • iOS: Import XCFramework
  • Android: Import AAR file

Server-Side Verification

Call the verification API on the backend to confirm the result. This is a required security step.

Important: Client-side verification is only the first step. Secondary verification must be performed on the server side!

Testing

Verify the complete process in a test environment to ensure:

  • Captcha displays correctly
  • Users can complete verification
  • Server-side verification passes

Go Live

Deploy to production environment and monitor verification data.

Architecture Overview

sequenceDiagram
    participant User as User Browser/App
    participant SDK as Geelab SDK
    participant Frontend as Your Frontend
    participant Backend as Your Backend
    participant API as Geelab API

    User->>SDK: 1. Load verification
    SDK->>User: 2. Display verification interface
    User->>SDK: 3. Complete verification
    SDK->>Frontend: 4. Return verification result
    Frontend->>Backend: 5. Submit form + verification result
    Backend->>API: 6. Secondary verification
    API->>Backend: 7. Return verification result
    Backend->>Frontend: 8. Process business logic

The complete verification process includes two steps: client-side verification and server-side secondary verification.

Security Recommendations

Security rules that must be followed:

  • ✅ Always perform secondary verification on the server side, do not rely solely on client-side results
  • ✅ Keep captcha_key secure, do not expose it in client-side code
  • ✅ Use HTTPS to transmit verification data
  • ✅ Implement request rate limiting and exception monitoring
  • ✅ Handle verification API exceptions to avoid blocking business processes

For detailed security best practices, please refer to the Server Integration documentation.

Next Steps

  • Check Quick Start to learn about basic integration
  • Read API Reference for detailed configuration
  • Check FAQ to resolve integration issues