Sandbox and Go-Live Guide

Sandbox testing, required evidence and production activation.

YCMT EU Partner Developer Sandbox and Go-Live Guide

Partner developer integration pack | Version 1.0 | YCMT EU

Partner-safe scope This guide explains how a partner development team should test the YCMT EU integration in sandbox and prepare for production activation. It covers test environments, scenarios, evidence, readiness checks, and go-live steps. It does not describe YCMT internal implementation, internal risk rules, or internal operating systems.
FieldValue
Document60_YCMT_EU_PartnerDev_Sandbox_And_GoLive_Guide_v1_0.docx
AudiencePartner developers, partner QA, partner technical leads, partner release managers
PerimeterYCMT EU only
StatusDraft for partner onboarding use
ConfidentialityPartner-facing under onboarding/NDA controls
Related pack filesGetting Started; API Guide; Flows Guide; Errors, Statuses and Retry Guide; Security and Signing Guide; OpenAPI and Postman Pack

Contents

  • 1. Purpose of sandbox testing
  • 2. Environments and credentials
  • 3. Sandbox data rules
  • 4. Minimum integration test plan
  • 5. Positive test scenarios
  • 6. Negative and recovery scenarios
  • 7. Evidence required for go-live review
  • 8. Production readiness checklist
  • 9. Production activation process
  • 10. Post-go-live monitoring
  • 11. Change management and version notices
  • 12. Appendix: partner test log template

1. Purpose of sandbox testing

Sandbox testing proves that the partner application can integrate safely with the YCMT EU APIs before production credentials are issued or activated. The goal is not only to show that happy-path calls work. The partner must also demonstrate correct handling of failures, retries, status polling, webview returns, token expiry, and customer-safe remediation paths.

Testing objectiveExpected outcome
API connectivityPartner can call the documented sandbox endpoints using issued sandbox credentials.
Customer journeyPartner can complete the end-to-end customer flow from onboarding to transfer status.
ResiliencePartner handles retryable failures, duplicate requests, expired sessions, and validation errors correctly.
SecurityPartner protects tokens, keys, webhook materials, and customer data.
Operational readinessPartner support and release teams know how to trace, escalate, and evidence issues.
Go-live principle Production access is granted only after YCMT confirms that the partner has completed the required sandbox scenarios, implemented the required controls, and provided the requested evidence.

2. Environments and credentials

YCMT separates sandbox and production environments. Credentials, webhooks, signing keys, test customers, and logs must be kept separate.

EnvironmentPurposeData rule
SandboxDevelopment, QA, integration testing, negative scenarios, go-live evidence.Use fictional or YCMT-approved test data only. No real customer data.
ProductionLive customer traffic after go-live approval.Use production credentials only after activation. Production data is live customer data.
Credential or assetSandboxProduction
API base URLProvided during onboarding.Provided after go-live approval.
Partner API credentialSandbox-only credential.Production credential activated after readiness approval.
Webhook endpointSandbox endpoint recommended.Production endpoint must be reachable and monitored.
Quote-signing keySandbox key or test key.Production key must be protected and registered before production use.
Test usersYCMT-approved fictional test users.Real customers only.
Environment separation rule Do not use production credentials, production customer data, production signing keys, or production webhook secrets in sandbox. Do not send sandbox events to production systems unless YCMT has approved a controlled test.

3. Sandbox data rules

  • Use fictional personal data or YCMT-provided test profiles only.
  • Do not upload real identity documents, real customer addresses, real phone numbers, or live financial details unless YCMT has explicitly authorised a controlled test.
  • Use test beneficiaries and test payout details supplied or approved by YCMT.
  • Do not treat sandbox transaction results as real payments or customer obligations.
  • Remove test data from partner logs and screenshots before sharing externally unless YCMT requests them for go-live evidence.

4. Minimum integration test plan

The following test plan is the minimum expected before go-live review. YCMT may add corridor-specific, partner-specific, or risk-specific tests during onboarding.

Test groupRequired before go-liveEvidence expected
Connectivity and credentialsYesSuccessful health/connectivity call or agreed equivalent.
Authentication and registrationYesScreenshots/log extracts showing registration, login, refresh, logout.
Customer profile and KYCYesProfile submission and KYC session completion or sandbox simulated result.
BeneficiariesYesCreate, list, retrieve, and archive where supported.
Quote and disclosureYesQuote retrieval/creation path, disclosure presentation, quote acceptance.
Transfer lifecycleYesSubmit transfer, confirm if required, funding webview, status polling.
Errors and recoveryYesAt least the negative scenarios in section 6.
Security and signingIf applicableQuote-signing, device confirmation, webhook verification, key handling evidence.
Webhook receiptIf enabled for partnerSuccessful receipt, verification, idempotent processing, retry handling.

5. Positive test scenarios

Positive scenarios prove that the partner can complete expected customer journeys without manual intervention.

IDScenarioExpected result
P-01New customer registers and logs in.Customer obtains access token and can continue to profile/KYC.
P-02Returning customer logs in.Existing customer session starts successfully.
P-03Customer submits profile details.Profile is accepted or returns customer-safe validation feedback.
P-04Customer starts KYC session.Partner app opens the YCMT-provided KYC webview or follows the documented redirect/return process.
P-05Customer creates beneficiary.Beneficiary is created and available in list/detail endpoints.
P-06Customer retrieves quote and disclosure.Partner app shows amount, fees, FX, payout details, and disclosure before acceptance.
P-07Customer accepts quote.Quote acceptance succeeds while the quote is valid.
P-08Customer submits transfer.Transfer is created/submitted and status polling becomes available.
P-09Customer completes confirmation/funding where required.Funding webview or confirmation flow completes and transfer status progresses.
P-10Partner app polls transfer status.Partner app displays customer-safe status and next action.

6. Negative and recovery scenarios

Negative scenarios prove that the partner app does not break, mislead customers, duplicate transactions, or expose sensitive information when the API returns expected errors.

IDScenarioExpected partner behaviour
N-01Invalid credentials or failed login.Show generic login failure. Do not reveal whether identifier exists.
N-02Expired access token.Refresh where supported or ask the customer to log in again.
N-03Quote expired before acceptance.Ask customer to refresh/recreate quote. Do not submit old quote.
N-04Unsupported destination or payout method.Show customer-safe message and prevent further submission.
N-05KYC not complete.Direct customer to complete required onboarding/KYC step.
N-06Customer status prevents action.Show approved remediation or support message. Do not reveal internal reason.
N-07Duplicate submission with same idempotency key.Treat returned result as the authoritative result of the original request.
N-08Rate limit or temporary service issue.Retry only according to documented backoff; do not create retry storms.
N-09Webhook duplicate delivery.Process idempotently and avoid duplicate partner-side actions.
N-10Webhook signature or freshness failure.Reject event and escalate if repeated.
Customer-safe error handling Partner apps must not expose internal explanations, internal identifiers, risk flags, sanctions details, screening reasons, or manual-review details. Use the documented customer-safe remediation text and escalation process.

7. Evidence required for go-live review

The partner must provide concise evidence that the integration has been tested. Evidence does not need to include secrets, tokens, real personal data, or full request payloads containing sensitive data.

Evidence itemRequired content
Completed test logScenario ID, date, environment, result, correlation ID where available, tester name/team.
Screenshots or screen recordingCustomer-facing flow evidence with test data only. Hide tokens and secrets.
API logs summaryEndpoint, timestamp, status code, correlation ID, result. No tokens or secrets.
Error-handling evidenceExamples of customer-safe handling for expired token, expired quote, validation error, and retryable failure.
Security evidenceConfirmation of secure credential storage, token handling, and no sensitive logging.
Webhook evidenceIf applicable: received event, verification result, idempotent processing result.
Release planTarget launch date, responsible technical contact, monitoring approach, rollback/contact plan.

8. Production readiness checklist

AreaReadiness requirement
API integrationAll required endpoints used according to the API Guide and Flows Guide.
Error handlingAll required negative scenarios handled with customer-safe messaging.
SecurityTokens, credentials, keys, and webhook secrets protected; sensitive data excluded from logs.
Idempotency and retryApplicable POST actions use idempotency keys; retry logic uses documented backoff.
WebviewsKYC and funding webview redirects/returns handled correctly.
WebhooksEndpoint reachable; verification and duplicate handling implemented if webhooks are enabled.
Support readinessPartner support team knows escalation route and required correlation information.
MonitoringPartner monitors API failures, webhook failures, customer drop-offs, and release errors.
Production configurationProduction base URL, credentials, signing keys, and webhook endpoint configured separately from sandbox.
Change freezeNo untested integration changes between go-live approval and launch without notifying YCMT.
Production activation gate Do not switch live customers to production until YCMT confirms production activation. Sandbox success alone does not authorise production launch.

9. Production activation process

  1. Partner completes the required sandbox test plan.
  2. Partner submits test evidence and production readiness checklist to YCMT.
  3. YCMT reviews evidence and confirms any remediation items.
  4. Partner remediates open items and re-tests where required.
  5. YCMT issues or activates production credentials and production endpoint details.
  6. Partner configures production environment without copying sandbox secrets or test data.
  7. Partner and YCMT agree the launch window and support contacts.
  8. Partner performs a controlled production smoke test if YCMT authorises it.
  9. Partner launches customer traffic according to the agreed plan.

10. Post-go-live monitoring

For the first production release, the partner should monitor integration performance closely and keep a named technical contact available during the agreed launch window.

Metric or signalPartner action
Authentication failures above expected levelCheck release/configuration; escalate with timestamps and correlation IDs.
High quote or transfer failure rateCheck request construction and customer messaging; escalate if not explained.
Webhook delivery or verification failuresCheck endpoint availability, verification code, clocks, and firewall rules.
Unexpected customer drop-off in KYC/funding webviewCheck redirect/return handling and app state recovery.
Rate-limit responsesReduce request volume, fix retry logic, and avoid retry storms.
Customer complaints about transfer statusUse transfer status endpoint and support escalation route. Do not speculate on internal review reasons.

11. Change management and version notices

  • Track the API changelog supplied in the OpenAPI and Postman Pack.
  • Test against sandbox before adopting any new endpoint or optional field.
  • Treat removed fields, changed required fields, changed enum values, changed authentication behaviour, or changed signing requirements as breaking changes unless YCMT states otherwise.
  • Keep backward-compatible parsing where possible: ignore unknown response fields unless your application specifically needs them.
  • Notify YCMT before major partner-app releases that affect registration, login, KYC, quote acceptance, transfer submission, funding, signing, or webhook handling.

12. Appendix: partner test log template

FieldExample
Scenario IDP-07
Scenario nameCustomer accepts quote
EnvironmentSandbox
Date/timeYYYY-MM-DD HH:MM UTC
TesterPartner QA / engineer name
ResultPass / Fail / Blocked
API status code200 / 400 / 401 / etc.
Correlation IDCorrelation ID from response/header/log, if available
Evidence referenceScreenshot name, log extract reference, test case link
NotesWhat happened; no secrets, tokens, or real personal data
Final developer reminder A successful integration is not just a successful happy path. YCMT expects partner apps to handle failed, expired, delayed, duplicated, and customer-action-required states safely and clearly.