Skip to main content

Platform overview

The CashXChain platform is organized around business resources that map to real payment operations.

Core resources

ResourcePurpose
AccountA verified business, platform, entity, or sub-entity.
UserA person with access to an account.
API keyA credential used by a server-side integration.
WalletA logical balance container.
BeneficiaryA person or business receiving funds.
FX quoteA priced conversion and route proposal.
PaymentAn instruction to move value.
StatementA reconciliation export for a period.
Webhook endpointA URL that receives event notifications.
EventA signed notification about a resource change.

Typical implementation path

  1. Create or access a business account.
  2. Complete KYB and risk review.
  3. Generate sandbox API keys.
  4. Create a beneficiary.
  5. Request an FX quote.
  6. Create a payment using the quote.
  7. Receive webhook events.
  8. Reconcile with statements and ledger records.
  9. Move to production after review.

Hosted and API-only flows

CashXChain supports two integration models:

  • API-only: your platform owns the user experience and calls CashXChain APIs from your backend.
  • Hosted: CashXChain provides secure hosted steps for onboarding, payment confirmation, or additional verification where required.

The exact model depends on your product, jurisdiction, partner requirements, and risk review.

Account hierarchy

A platform customer may operate one master account and create connected accounts for sellers, merchants, suppliers, or internal entities. Enterprise customers may use multiple accounts for subsidiaries, treasury entities, or operational separation.

Event-driven operations

CashXChain is designed for event-driven automation. Webhooks notify your system when payments change state, account verification is updated, a balance changes, a quote expires, or an action is required.

Production readiness

Before production, CashXChain reviews your use case, expected corridors, transaction volumes, compliance model, webhook handling, error handling, and security posture.