Sign up

Understand 3-D Secure and SCA

When making transactions online, protection from fraud is key – for both your customers and you.

To accommodate to this need, the payments industry has established the 3-D Secure authentication protocol (which stands for Three Domain Secure). For any card transaction, your customers must prove themselves to be the rightful card owner.

The current 3-D Secure standard requires your customers to pass the authentication via Strong Customer Authentication (SCA). Thus, your customers have to authenticate themselves with at least TWO out of the following three methods:

  • Something they know (i.e. a PIN or password)
  • Something they possess (i.e. a card reader or mobile device)
  • Something they are (i.e. voice recognition or fingerprint)

Complying to SCA offers two big assets for your customer and you:

  1. Fraud protection: If a transaction turns out to be fraudulent, neither you nor your customer are liable. Instead, the issuer will compensate for the financial loss.
  2. Flexibility and enhanced customer experience: In some cases, the authentication process may run in the background, making it imperceptible for your customers. Sometimes it is even possible to skip 3-D Secure altogether. Read our dedicated chapter to learn more.

Exemptions and exclusions

To further enhance the flexibility and enhanced customer experience, the European Union allows to either exclude or exempt certain transactions from SCA:

  • Exclusions – The following use cases are considered out-of-scope:
    Transactions through mail order/telephone order (MOTO)
    Transactions for which your acquirer or your customer’s issuer is located outside of the EEA zone.
    Anonymous prepaid cards up to €150 (Article 63).

    Our platform detects these exclusions automatically, freeing you from indicating them in your transaction requests.

  • Exemptions – To enhance your customers’ payment experience, you can request skipping the authentication process if a transaction meets certain conditions. Read our dedicated chapter to learn more.

Understand 3-D Secure transaction flow

This is a high-level payment flow covering only the mandatory steps. Regardless of the mode you choose, the flow follows some basic steps as described below. Learn in our dedicated guides about the individual differences:

For card payments, your customers have to authenticate themselves as the rightful card owners at one point. A typical payment flow goes like this:

  1. Your customers finalise an order in your shop and select a card payment method.
  2. You send a CreateHostedCheckout/CreatePayment request to our platform, including a set of mandatory/recommended/optional 3-D Secure properties.
  3. Our platform sends you a response with instructions for the next steps of the flow. Depending on the integration method, differences apply:
    a. Hosted Checkout Page: The response contains a redirectUrl to our secure payment page. Once you redirect your customer to this URL and they enter their card number, our platform will automatically cover any 3-D Secure-related steps for you.
    b. Hosted Tokenization Page/Server-to-server/Integration für Mobilgeräte: The response contains a merchantAction object, instructing you to redirect your customers to a specific URL. This URL is your customers' issuer.
  4. Your customers provide their credit card number and are redirected to their issuer for 3-D Secure authentication.
  5. Our system receives the 3-D authentication result from the issuer.
  6. We process the transaction and receive the result from the acquirer.
  7. We redirect your customer to your returnUrl.
  8. You request the transaction result from our platform via GetPaymentDetails/GetHostedCheckout or receive the result via webhooks.

Was this page helpful?

Do you have any comments?

Thank you for your response.