3DS

Overview

3D Secure serves as a security safeguard, protecting online payment data and simplifying consumer payment experience.

DECTA's payment solution has been meticulously designed to comply with PSD2 regulations, effectively addressing the mandatory Strong Customer Authentication (SCA) requirements and the exemptions from SCA.

Integration with MPI

To ensure secure payment processing, the merchant system is required to complete 3D authentication (3D Secure / UCAF) before sending a request to the Payment Server. This authentication step is necessary for most types of transactions, except for refunds or reversals.

Key details that the merchant system can expect to receive in the response from the MDPay MPI (Merchant Plug-In) include sli or eci, cavv, xid, 3ds_protocol, and 3ds_ds_id, mdStatus (it is not mandatory for all these details to be present).

Mapping of MDpay MPI mdStatus and ECI/SLI

Transaction Security Level / Use Case Card Type mdStatus from MPI Transaction Status CAVV/AAV Prefix or General Presence ECI (must be sent in authorisation; used for Visa and/or UPI cards) SLI (must be sent in authorisation; used for Mastercard cards)
Payment Transactions
Transaction successfully authenticated by ACS - Frictionless Visa 1 Y CAVV present 05 -
Transaction successfully authenticated by ACS - Challenge Visa, UPI 1 Y CAVV present 05 -
Attempt processing performed (also 3dsv1) Visa, UPI 4 A CAVV present 06 -
3DS requestor challenge preference acknowledged Visa 1 I CAVV present 07 -
Authentication failed; Not authenticated, Transaction denied Visa, UPI 0 N2 no CAVV Authorisation request is not allowed -
Authentication could not be performed; Technical or Other problems Visa, UPI 5 U2 no CAVV 074 -
Authentication rejected Visa, UPI 0 R2 no CAVV Authorisation request is not allowed -
Transaction successfully authenticated by ACS - Frictionless Mastercard 1 Y kA - 212
Transaction successfully authenticated by ACS - Challenge Mastercard 1 Y kB - 212
Transaction successfully authenticated by Mastercard Smart Authentication Stand-in Frictionless (low risk) Mastercard 1 Y kC - 212
Transaction successfully authenticated by Mastercard Smart Authentication Stand-in Frictionless (non-low risk) Mastercard 4 A kE - 211
Transaction could not be authenticated by either ACS or Mastercard Smart Authentications Stand-in - attempts Mastercard 4 A kF - 211
Transaction successfully authenticated by the ACS without challenging the cardholder - Whitelisting Exemption Mastercard 1 Y kR - 212
Transaction successfully authenticated by the ACS with challenge using Decoupled Authentications Mastercard 1 Y kS - 212
Authenticated by Mastercard Identity Check Insights Mastercard kX - 214
Reserved for future use Mastercard - - kY - 214
Reserved for future use Mastercard - - kZ - 214
Transaction was not authenticated by either ACS or Mastercard as Acquirer SCA Exemption was applied Mastercard Mastercard I1 kN - 216
Transaction successfully authenticated by Mastercard Smart Authentication Direct Acquirer Exemption (SADAE) Mastercard 1 I1 kU - 216
Reserved for future use Mastercard - - kV - 216
Data share only messages Mastercard - - kW - 216
Recurring transaction successfully authenticated by ACS - Frictionless Mastercard 1 Y kO - 217
Recurring transaction successfully authenticated by ACS - Challenge Mastercard 1 Y kP - 217
Recurring transaction successfully authenticated by Mastercard Smart Authentication Stand-on - Frictionless (low risk) Mastercard 1 Y kC - 212
Recurring transaction successfully authenticated by Mastercard Smart Authentication Stand-on - Frictionless (non-low risk) Mastercard 4 A kE - 211
Recurring transaction could not be authenticated by either ACS or Mastercard Smart Authentications Stand-in - attempts Mastercard 4 A kF - 211
Successfully challenged first recurring Customer Initiated Transactions (CITs) utilising Strong Customer Authentication (SCA) Mastercard 1 Y kG - Authorisation request is not allowed
Transaction successfully authenticated by Mastercard Smart Authentication Direct Stand-on-Frictionless (low risk RBA) Mastercard 1 Y kJ - 212
Transaction could not be authenticated. Attempts do not apply Mastercard 0 N no AAV - Authorisation request is not allowed
No authentication performed by either the ACS or Mastercard Smart Authentication Mastercard 5 U no AAV - 2103
Transaction rejected by Issuer. Authorisation could not be attempted Mastercard 0 R no AAV - Authorisation request is not allowed
General
3D Secure errors all brands 6,8 - no CAVV/AAV Authorisation request is not allowed Authorisation request is not allowed
Channel encryption (SSL) and 3D no used Visa, Mastercard - - no CAVV/AAV 07 210
MOTO (Mail Order / Telephone order) transaction Visa, Mastercard - - no CAVV/AAV 07 -
Non-authenticated authorisation transaction UPI - - no CAVV 10 -
Merchant data error all brands 94 - no CAVV/AAV Authorisation request is not allowed Authorisation request is not allowed
Scheme/Network/Directory errors all brands 93,92,99 - - Authorisation request is not allowed Authorisation request is not allowed

1 Status only for EMVco 3DS 2.2.x and 2.3.x; for EMVCo 3DS 2.1 Txn Status =N and Txn status reason =81
2 Sheck transaction status reason for more details
3 Merchant optional and applicable to Mastercard cards only; i.e., it is up to the merchant to decide whether to submit transaction for authorisation or do not

Compliance with Requirements of PSD2

Payment solution by DECTA is built to support the requirements of PSD2 for Strong Customer Authentication (SCA) as well the exemptions from SCA. EBA regulations and payment schemes are supporting seven types of payments where SCA exemptions could be applied:

  • recurring payments (SCA exemption per EBA);
  • low value payments (SCA exemption per EBA);
  • transaction risk analysis (SCA exemption per EBA);
  • secure corporate payment (SCA exemption per EBA);
  • merchant whitelisting (SCA exemption per EBA);
  • merchant initiated payment (out of PSD2 scope);
  • authentication outage (out of PSD2 scope).

These payments (except authentication outage exemption) should be performed with involvement of MPI (highly recommended by payment card schemes and then payment must include valid 3D data fields) or without 3D. Authentication outage SCA exemption should be used only in authorisation mode without 3D.

Recurring Payments

If a recurring (regular) payment is made as described in the Recurring scenarios section, then DECTA will automatically provide the SCA exemption flag recurring payment to payment card schemes.

If the card and payment data is stored on the IPSP side, then the IPSP must provide the initial transaction identifier cof_original_tid with other recurring payment data. The initial transaction ID is returned to IPSP, where the initial transaction response is in TLV format and the data field iss_ref_data is populated with tag 0003.

Merchant Whitelisting

DECTA does not support merchant whitelisting or trusted beneficiary exemption. This means that DECTA does not provide a mechanism for merchants to maintain a whitelist of trusted beneficiaries or recipients. Any payment or transaction must adhere to standard processing procedures without exceptions based on whitelisting.

Low Value Payments

IPSP must use sca_exemptions detail with value "1" to flag the payment as low value payment for the SCA exemption to be applied.

Transaction Risk Analysis

IPSP must use sca_exemptions detail with value "01" to flag that transaction risk analysis is performed by the merchant and the transaction could apply for the SCA exemption.

Secure Corporate Payments

IPSP must use sca_exemptions detail with value "0001" to flag that the transaction was authenticated, using a secure corporate payment process or protocol and the transaction could apply for the SCA exemption.

Merchant Initiated Transaction

If a merchant initiated payment (irregular (ad-hoc) or installment) is made as described in Recurring scenarios section, DECTA will automatically provide the SCA exemption flag "merchant initiated transaction" to payment card schemes.

If the card and payment data are stored on the IPSP / merchant side, then IPSP / merchant must provide the initial transaction identifier (cof_original_tid) with other payment data. Initial transaction ID is returned to IPSP / merchant, where the initial transaction response is in TLV format and the data field iss_ref_data is populated with tag "0003".

Authentication Outage

IPSP must use sca_exemptions detail with value "00000001" to flag that the transaction was not authenticated with SCA due to 3D authentication system shortage at the time of the purchase, and the merchant asks to apply the SCA exemption for this transaction.

VISA Authorisation Downgrade

When processing a 3D secure authorisation, Visa may downgrade a 3D Secure authorisation to non-3D Secure, if the field 44.13 in the issuer's response is "0". In such case,iss_ref_data will contain "CAVR" with the value of 0.

If the IPSP disagrees with Visa's downgrade, they should perform an authorisation reversal as for cancel / return or REFND scenarios. If the IPSP agrees with Visa's downgrade, no further action is needed, and the transaction proceeds as non-3D Secure.

Soft Decline

During authorisation, the issuer may respond with a "soft decline" (as described in the authorisation response code 160). Merchants are obligated to follow a specific process when encountering a soft decline to ensure compliance with ICO (Interchange Organization) rules:

  • When a soft decline is received, merchants should initiate 3D authentication with an additional challenge identifier TDS2.threeDSRequestorChallengeInd (also known as threeDSRequestorChallengeInd in the EMVCo specifications);
  • After initiating the 3D authentication, the merchant should repeat the card authorisation request. This authentication should occur within an already established cardholder session;
  • If 3D authentication is mandated, such as recurring payment initialization or SCA-mandated authentication for EEA (European Economic Area) issuers, merchants should use TDS2.threeDSRequestorChallengeInd=04;
  • If 3D authentication is not mandated, merchants should use TDS2.threeDSRequestorChallengeInd=03;
  • If a soft decline is received on a fully authenticated transaction (SLI 212), there is no need to repeatedly perform authentication. The transaction cannot be further processed.

Following these steps ensures compliance with ICO rules when encountering soft declines during the card authorisation, helping to maintain security and regulatory adherence in payment transactions.

Apple Pay and PSD2 SCA

PSD2 requires that SCA must be applied to all electronic payments - including proximity, remote and m-payments within the EEA.

Usually 3D Secure implementation is enough to meet the SCA requirements. However, Apple does not allow usage of 3D Secure in conjunction with the Apple Pay as Apple Pay payments should be considered as two factor authenticated payments.

Therefore, Apple Pay implementation is SCA compliant and this is currently verified for Mastercard and Visa payments.


Jump to

  • Overview
  • Integration with MPI
  • Mapping of MDpay MPI mdStatus and ECI/SLI
  • Compliance with Requirements of PSD2
  • Recurring Payments
  • Merchant Whitelisting
  • Low Value Payments
  • Transaction Risk Analysis
  • Secure Corporate Payments
  • Merchant Initiated Transaction
  • Authentication Outage
  • VISA Authorisation Downgrade
  • Soft Decline
  • Apple Pay and PSD2 SCA