中文 | English
Home > Document > Vendor Identity Authentification Flow

Vendor Identity Authentification Flow

Navigation

I. Why Authenticate Vendor's Identity?

II. Advantages of Vendor's Identity Authentication

III. Vendor's Identity Authentication Steps

I. Why Authenticate Vendor's Identity?

Target Scenario:

Some vendors may use software of a third party for interface interconnection with VIP and thus realizing subsequent commodity data uploading and order handling. In this scenario, the vendor is required to register one VIP account on the VOP and fulfill its identity authenication. After vendor's identity authentication is completed, the vendor can authorize ISV software to obtain its order data and commodity data via the authority page.

II. Advantages of Vendor's Identity Authentication

Once finishing identity authenication, the vendor's information will be bond to one VIP account completely. In addition, the ISV can only obtain the vendor's order information and commodity data via the vendor's authority. It can ensure security of vendor's information.

III. Vendor's Identity Authentication Steps

Step 1: Click http://vop.vip.com to enter the website of VOP, sign in using your account; if not signing in, please use VIP account for login.

1.png

Step 2: After successful login, register to be developer first

To be a Developer

2.png

Fill in relevant information

3.png

Successful registration

4.png

Step 3: fill vendor authentication information and submit

Note: The VIP's vendor will be provided with one unique vendor ID (vendor_id) as well as account and passward of VIP Vendor Management Platform at the first business cooperation with VIP. If the vendor is not clear about the ID, it can check the vendor management platform via http://scs.vis.vip.com/vendor/register.

5.png

Step 4:

Our support staff will authenticate identity information and complete review via the background. If you need any help, please contact the support staff via QQ:121332922 or 3084559687

Step 5:

After authentication is completed, the vendor can authorize ISV software. With authorization completed, the vendor can use ISV software securely. 2015-05-01至2015-05-26api调用统计(1).png