All
FAQ
Announcements
Product documents
How do I use a physical security key to protect my account?
What is physical security key? A physical security key is a type of hardware-based authentication used to verify account access and transactions. Unlike software-based options, physical security keys work offline and are not reliant on cloud services, minimizing risks like account takeovers or unauthorized access.Why choose physical security key?Published on Jan 10, 2025Updated on Feb 12, 2026FAQ17,934How do I create passkeys? (web)
Select one of the available options to create your passkey: Create with this device Use another device or physical keyCreate with this device Select This Device and complete the biometric authentication/PIN code on your deviceUse another device or physical key Select USB security key Insert your security key and follow the instructions to create your passkey Select A different device Scan the QR code using your mobile device or tablet's native QR code scanner and complete the authentication on yourPublished on Jan 19, 2025Updated on Feb 9, 2026FAQ2I haven't received the SMS code
If you can't log in, switch to other alternatives, see the steps below to know how it's done.On the app Select Didn't receive anything?Published on Aug 16, 2023Updated on Feb 9, 2026FAQ23What's a dusting attack?
Alternatively, crypto dust can be transferred to you, which is a form of a malicious attack. This is a relatively new form of attack where hackers invade the privacy of crypto owners. They do it by sending a small amount of digital currency to multiple addresses. They then track these funds to reveal who the owner of the wallet is.Is crypto dust harmful? Crypto dust is not inherently harmful or a threat. It can appear naturally whilst carrying out transactions.Published on Oct 4, 2024Updated on Mar 3, 2026FAQ13Convert FAQ
Alternatively, the Buy crypto feature can be used to manage your portfolio as part of the broader process.Published on Sep 5, 2024Updated on Apr 1, 2026FAQ912How do I safeguard my Web3 wallet from fraudsters?
Safeguard your private key: minimize internet-connected device usage for storing/transmitting private keys on hardware. Avoid taking screenshots or photos of private keys/Mnemonic phrases. Be wary of unknown sources: avoid importing private keys into unknown websites or using wallets from unfamiliar sources. Promptly check for malware or viruses if abnormalities are detected. Store your data offline: keep sensitive information like private keys, passwords, and mnemonic phrases confidential.Published on Dec 13, 2023Updated on Jan 27, 2026FAQ988What onboarding information is required for a privately owned company?
Who are the key people for a privately owned company? As part of our due diligence checks for regulatory purposes, OKX will require key roles of your company and the authorized user (if different from the key roles) of your institutional account to provide identity verification information during the institutional verification process.Published on Oct 13, 2023Updated on Feb 12, 2026FAQ278What onboarding information is required for a Trust?
Upload a photo or scanned copy of the key person’s ID document Please upload both the front and back sides of the ID card. If the ID card does not have a back side, uploading the front side or the photo page is sufficient. What'll a Trust need to consider for the onboarding process? Identify all key parties Identify all parties involved in the trust, including the trustee, beneficiaries, grantors, and any authorized users.Published on Oct 13, 2023Updated on Feb 12, 2026FAQ113What onboarding information is required for the government-owned enterprise?
These entities are typically created to engage in commercial activities on behalf of the government.Who are the key persons for a government-owned enterprise?Published on Oct 13, 2023Updated on Apr 6, 2026FAQ61What onboarding information is required for a fund?
Funds are collective investment vehicles established by pooling money from investors, such as hedge funds, pension funds, mutual funds, and private investment funds.Who are the key persons for a fund?Published on Oct 13, 2023Updated on Feb 12, 2026FAQ116Get started with Orbit livestream
If you wish to include a Featured token in your livestream, select one from the dropdown menu Select Create stream key. Your stream key and stream URL can be found under the streaming window. Copy the stream key and stream URL, and paste it into your preferred external streaming software. The following screenshots use OBS as an example. Paste the stream key and stream URL into your external streaming software. Configure the source of your video and audio.Published on Jan 5, 2026Updated on Jan 29, 2026Product documentationKnow Your Business (KYB) FAQ
The KYB process starts by asking you to provide a range of basic identifying information, such as your institution’s legal name, address, organizational structure, and the identities of key persons in your institution (among other relevant and verifiable information). This identifying information is supported with documentation, such as evidence of formation, organizational structure charts, and identity documents for key persons.Published on Jan 29, 2025Updated on Sep 27, 2025FAQ30What should I do if I mistakenly withdraw crypto via the wrong network?
OKX Web3 wallet supports EVM and follows the same generation rules of public key and private key, so the address, private key, and seed phrase are universal in OKX Web3 wallet and ETH wallet. After you complete the above steps, you can continue withdrawing assets via the correct network on our platform. If you've selected the wrong network during the withdrawal process, your assets may not be visible. To avoid this, we suggest double-checking the crypto network before taking any action.Published on Jan 21, 2025Updated on Apr 3, 2026FAQWhat is sub-account?
Alternatively, you can go to Profile > Switch account, and select the sub-account you want to log in. If you've created your sub-accounts, and would like to know more about how to transfer/deposit with your sub-accounts, you are welcome to visit here.Published on Aug 22, 2023Updated on Mar 4, 2026FAQ1,832Introduction of rules on OKX Connect
Connect Model Apply Connect code to OKX, and place orders via Connect code + the user's API Key Authorize users to jump to the OKX OAuth page, and place orders with Connect code + the user's authorization code User 1. Create an account in OKX and automatically generate an API Key. 2. Register and bind their API Key with the Connect Institution. 3.Published on Feb 9, 2026Updated on Mar 2, 2026Product documentation