Strong Customer Authentication

From ACT Wiki
Revision as of 22:20, 22 December 2019 by imported>Doug Williamson (Update. Source: The Treasurer, December 2019 https://www.treasurers.org/hub/treasurer-magazine/what-on-radar-treasury-2020?cmp=news-la-1912&_cldee=ZG91Z0Bkb3Vnd2lsbGlhbXNvbi5jb20%3d&recipientid=contact-61e01a18fd04e61180d1000d3ab15408-1a47beaf93064a619ebb)
Jump to navigationJump to search

Payments - PSD2.

(SCA).

Regulatory Technical Standards (RTS) define SCA as authentication through at least two out of the following three categories:

  • Something only the user knows (e.g., passcode or PIN);
  • Something only the user possesses (e.g., mobile phone or token);
  • Something the user is (e.g., fingerprint, facial, iris or eye vein), sometimes known as 'inherence'.


The RTS require that the selected factors must be mutually independent in that the breach of one does not compromise the reliability of the other.


The use of a single device for authentication and shopping is expressly permitted. This means, for example, that a smartphone may be used at the same time for transacting and for authenticating the cardholder. The risk connected to the use of multi-purpose devices (e.g. smartphones and tablets) must be mitigated through the use of separated secure execution environments.


A number of exemptions are available, including trusted beneficiaries and recurring payments, low-value transactions and Transaction risk analysis (TRA).


In addition, certain transaction types are outside the scope of the rules, for example mail order and telephone orders (MOTO).


See also