Mastercard Authentication Guide for Europe

Mastercard Authentication Guide for Europe

1 Table of Contents Section 1 – Naming convention............................................................................................................... 4 Authentication ................................................................................................................................. 4 Authorization (fields starting with “DE”) ......................................................................................... 4 Clearing (fields starting with “PDS”) ................................................................................................ 5 Section 2 - General authentication requirement .................................................................................... 6 2.1 Strong Customer Authentication (SCA) ................................................................................... 6 2.2 Authentication versus authorization amount policy ............................................................... 8 2.3 Accountholder Authentication Value (AAV) validity and extension ....................................... 9 2.4. Issuer Authentication Value (IAV) ........................................................................................... 9 2.5 DS Transaction ID .................................................................................................................. 10 2.6 Program Protocol .................................................................................................................. 10 2.7 Merchant names ................................................................................................................... 11 2.8 Biometric authentication support ......................................................................................... 13 2.9 Auto-enrollment .................................................................................................................... 13 2.10 Non-payment authentications for Card Add ......................................................................... 14 2.11 Liability shift with EMV 3DS ............................................................................................... 15 2.12 Co-existence of 3DS 1.0 and EMV 3DS .............................................................................. 15 2.13 Friendly fraud and Cardholder challenge .......................................................................... 17 2.14 General Data Privacy Regulation (GDPR) .......................................................................... 18 2.15 EMV 3DS and Data Collection ........................................................................................... 18 2.16 Staged Wallets ................................................................................................................... 19 Section 3 - PSD2 SCA Exemptions and Exclusions ................................................................................. 20 3.1 EMV 3DS support of the PSD2 RTS on SCA ............................................................................ 20 3.2 Acquirer SCA exemptions ...................................................................................................... 23 3.3 Flagging and liability shift matrix with PSD2 ......................................................................... 27 3.4 Soft decline or decline-as-SCA-required................................................................................ 28 3.5 PSD2 SCA Exemptions and Maestro ...................................................................................... 29 3.6 Low-Value Payments (LVP) and management of counters ................................................... 30 3.7 Merchant Whitelisting ........................................................................................................... 30 3.8 Secure Corporate Payments .................................................................................................. 31 3.9 Out of the scope of the PSD2 RTS ......................................................................................... 33 3.9.1 Anonymous prepaid cards ............................................................................................. 33 3.9.2 Mail Order / Telephone Order (MOTO) ........................................................................ 33 3.9.3 One-leg transactions (one leg in the EEA, the other out) ............................................. 34 3.9.4 Merchant-Initiated Transaction (MIT) ........................................................................... 36 2 Section 4 - Specific Use Cases under PSD2 ............................................................................................ 39 4.1 General flow for all use cases ................................................................................................ 39 4.2 Amounts to be used .............................................................................................................. 40 4.3 Use Cases for In-Session Payments ....................................................................................... 41 4.3.2 Delayed Delivery / Charge / Free Trial .......................................................................... 41 4.3.2 Partial / Split Shipment .................................................................................................. 42 4.3.3 Agent Model .................................................................................................................. 42 4.3.4 Unknown/undefined final amount before purchase .................................................... 43 4.4 Use Cases for Off-session Payments ..................................................................................... 43 4.4.1 Recurring Payments ...................................................................................................... 44 4.4.2 Instalments .................................................................................................................... 46 4.4.3 Decoupled Authentication ............................................................................................ 47 Section 5 - Specific requirements under PSD2 ...................................................................................... 48 5.1 When to apply SCA? .............................................................................................................. 48 5.2 Dynamic Linking requirements and AAV validation .............................................................. 49 5.3 Fraud level calculation ........................................................................................................... 53 5.3.1 Fraud types .................................................................................................................... 54 5.4 Transaction monitoring ......................................................................................................... 54 Section 6 - Authentication Services ....................................................................................................... 55 6.1 Digital Transaction Insights ................................................................................................... 55 6.2 Smart Authentication for Issuer/ACS .................................................................................... 56 6.3 Smart Authentication Stand-In .............................................................................................. 57 6.4 AAV Validation Service .......................................................................................................... 58 Section 7 - User Experience (UX) ........................................................................................................... 59 Section 8 - Implementation considerations .......................................................................................... 59 8.1 Identity Solutions Service Manager (ISSM) ........................................................................... 59 Section 9 Authentication Quality and Key Performance Indicators ...................................................... 60 Section 10 - Marketing, Education and Communication ...................................................................... 61 Section 11 - References: what should Customers have already read on the subject? ......................... 62 11.1 Publications other than Bulletins and Announcements: ................................................... 62 11.2 Operations Bulletins: ......................................................................................................... 62 11.3 Announcements: ............................................................................................................... 63 Section 12 - Appendix-A: Mastercard’s Digital Security Roadmap ....................................................... 65 Section 13 - Appendix-B: Reference announcements for all countries in Europe ................................ 66 Section 14 - Appendix-C: List of acronyms ............................................................................................ 68 Section 15 - Appendix-D: EMV 3DS Fields ............................................................................................. 71 3 Section 1 – Naming convention In this document, the following naming convention will be used to refer to flags/indicators in authentication, authorization and clearing messages. Authentication All authentication fields will be highlighted in italic and underlined. Authorization (fields starting with “DE”) Reference Data element Data element- Full name Transaction

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    75 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us