Skip to main content

MyDebit Secure Implementation for Issuer

Introduction

Issuer is a financial institution license to issue Cards, contracts with Cardholders to provide card services, determines eligibility of Cardholders and identifies Card number/BIN ranges to participate in the 3DS Program.

Benefits to Issuers

  • Reduced risk of fraudulent activities - Increased growth opportunities
  • Relatively easier implementation of a global EMV 3DS standard for authentication and keeping up with its development for future enhancements
info

EMV is a term referring to EMVCo’s specifications for global interoperability and acceptance of secure payment transactions and/or products and services complying with such specifications.

MyDebit Secure Program for Issuer

Access Control Server (ACS)

Access Control Server, ACS, is the key component of the Issuer Domain under the EMV 3DS specification. Its main function is to authenticate, frictionless or challenge, the consumer during a card-not-present transaction.

Issuer Domain

The Issuer Domain consists of the following components:

  • Cardholder
  • Consumer Device
  • Issuer Host System
  • Issuer Access Control Server

Serving the MyDebit Secure 3DS pages

In a transaction that requires challenging the Cardholder, the ACS provides the challenge UI for the Cardholder to enter the authentication information. Depending on the device in use, one of the three types of Challenge UI may be presented:

  • Browser-based
  • App-based (HTML)
  • App-based (Native)

MyDebit Secure Specific Static Settings for Issuer

Data Element / Field NameSourceMessageDescription
ACS Reference Number acsReferenceNumberEMVCoARES = RUnique identifier assigned by the EMVCo Secretariat upon Testing and Approval
ACS Operator ID acsOperatorIDPayNetARES = CPayNet-assigned unique ACS identifier
ACS URL acsURLIssuer DomainBrowser ARES = CFully qualified URL of the ACS to be used for the challenge
ACS Signed Content acsSignedContentIssuer DomainApp ARES = CContains the JWS object (represented as a string) created by the ACS for the ARes message
Error Message Timeout PeriodIssuer Domain-Timeout period from the sending an Error message to the receiving of a response
Protocol Version NumberIssuer Domain-The highest version supported. Must be backward compatible

Implementation Steps

This section highlights for an Issuer the major milestones of a MyDebit Secure implementation projects. Time taken to execute for each task may vary for every implementation, hence the durations stated in the project tasks list are only for reference.

NoProject TaskInvolvementDuration
1Requirement gathering:
  • Card profile migration strategies
  • Mode of authentication & authentication process flow
  • Look and feel, design, prototyping
  • Secret Key for AV, migration strategies
  • OTP delivery channels
  • Authenticator Mobile Apps, if applicable
  • RBA profiling
Issuer ACS provider3 weeks
2ACS Application Development & Customization
  • Database setup
  • Authentication module setup
  • Cardholder management system setup
  • Configuration for Authentication Secret Key (for PIAV) and its migration plan
  • OTP delivery channel(s) development
ACS provider*6 weeks
3Host Customization
  • Bank Host development if the host not ready to support EMV 3DS at the moment
Issuer*6 weeks
4Development/Test Environment Setup & Testing
  • Development testing
  • Test environment setup
  • SIT & UAT
  • Pre-live testing
Issuer ACS provider**3 weeks (subject to Issuer testing progress)
5
    Certification and PIT
  • PayNet ISO8583 Certification if the Issuing Bank Host is not certified to support EMV 3DS at the moment
  • PIT (Production Integration Test) with PayNet sandbox
Issuer**3 weeks (subject to Issuer certification progress)
6Production Environment Setup & Installation
  • Hardware/software, infrastructure configuration
  • Card profile enrolment to ACS
  • RBA profile setting, if applicable
  • Authentication mobile apps upload
  • Authentication Secret Key (for PIAV) installation or key migration
Issuer ACS provider3 weeks (subject to The Client readiness)
7TrainingIssuer ACS provider2 days

Note: *can happen concurrently **can happen concurrently

Frictionless flow vs Challenge flow

When receiving an AReq from DS, Issuers may apply different Authentication flows for different transaction environments. If the Issuer uses rules or data-analytic approach to assess the riskiness of a transaction, the Cardholder may experience a frictionless flow if the transaction is deemed low risk. Such Authentication method is known as Risk-Based Authentication.

For transactions that are required to go through the Challenge Flow, Issuer may also apply different authentication methods depending on the device channels in use, and the functional capabilities of the ACS.

The figure below is Various Authentication Flows and Methods.

General Overview

Authentication Methods for Challenge Flow

MyDebit Secure program does not support Static authentication type and methods. The table below is Authentication Types and Authentication Methods.

NoAuthentication Type ARES/RREQAuthentication Method RREQ
102 = Dynamic02 = SMS OTP 03 = Key fob or EMV card reader OTP 04 = App OTP 05 = OTP Other 10 = Other
203 = OOB07 = OOB Biometrics 08 = OOB Logins 09 = OOB Others

MyDebit Secure Branding Guide

MyDebit Secure is the Program name that consumers associate with during the authentication process. The figure below would be the initial screen right after the Cardholder click on the “Submit” button. If the transaction is to go Frictionless, this would be the only screen related to 3DS, and upon successful authorization from the Issuer, a “Confirmation” page from the Merchant would be presented to the Cardholder indicating the completion of the transaction.

Figure below Sample Processing Screen (Browser Lightbox).

Example Banner

In a transaction that requires challenging the Cardholder, the ACS provides the challenge UI for the Cardholder to enter the authentication information. Depending on the device in use, one of the three types of Challenge UI may be presented:

  • Browser-based
  • App-based (HTML)
  • App-based (Native)

The figure below is Sample Challenge UI Examples.

Example Banner

ACS Functional Requirements

This section makes reference to the EMV 3-D Secure Protocol and Core Functions Specification. It explains the functional requirements of the ACS, the main system components of the Issuer Domain. The ACS may be operated by an Issuer or a service provider on-behalf-of the Issuer.

MyDebit Secure Certificates for ACS

All digital certificates will be generated/signed under the Program root cert. These certificates for an ACS include:

  • TLS client and server certificates used in the establishment of the communication channels between the DS and the ACS
  • Signing certificates used to sign messages by generating a digital signature, and the digital signature is passed from the ACS to the 3DS Server or 3DS SDK

The table below is Certificates involved in an EMV 3DS environment for Issuer.

Certificate NameCertificate AuthorityUsage
MyDebit Secure CA root certificatePaynetValidation of all certificates issued under the same PayNet program root
ACS server certificatePaynetTLS channel encryption between DS and ACS for AREQ/ARES
ACS client certificatePaynetTLS channel encryption between ACS and DS for RREQ/RRES
Commercial CA root certificateCommercial CAValidation of all certificates issued under the same CA root
Commercial server certificate (for cardholder device connection)Commercial CATLS channel encryption between 3DS-SDK and ACS for CREQ/CRES
Commercial server certificate (for 3DS Method)Commercial CATLS channel encryption between browser and ACS for 3DS Method