3D Secure
Card-issuing organizations face many challenges in preventing fraud and improving security measures for cardholders. Card-not-present (CNP) fraud is increasing, payment regulations are evolving, and card networks are mandating the use of improved security controls. Additionally, cardholders expect seamless and instant payments. Implementing a strong authentication strategy is key to meeting all of these demands. 3D Secure (3DS) adds a layer of security prior to the authorization of a transaction. 3DS requires customers to complete an additional verification step with the card issuer to authenticate the cardholder’s identity for online transactions. If the Marqeta platform determines that 3DS is required for the transaction, the cardholder completes a required authentication step, such as biometric authentication and verification using a smartphone. For more information, see About 3D Secure and the following figure.3D Secure configurations
The available 3DS option combinations are outlined below.-
Automated Decisioning (recommended for customers in Europe)
- Marqeta makes the decision whether to challenge based on static rules.
- No-code option fully handled by Marqeta.
-
Advanced Authentication (recommended for customers in Europe)
- Cardholder authentication is delegated via API request to customer to authenticate and return verification result.
- Low-code option decisioning.
-
Default OTP
- Marqeta handles verification using data configured via API.
- No-code option fully handled by Marqeta.
-
Delegated Decisioning
- Customer uses own risk logic to determine whether or not the transaction requires an SCA challenge.
- High-code option with full flexibility and control over 3DS attempts.
Automated decisioning
Marqeta’s 3DS solution provides an optional automated decisioning service that enables you to configure and implement a 3DS authentication decision-making policy without having to build or host your own. Based on our rules, the system decides whether to apply a challenge to an incoming transaction authentication request or to exempt it. Automated decisioning allows you to take advantage of the various exemptions that are allowed as part of the Payments Services Directive 2 (PSD2), automatically determining whether a transaction qualifies for an exemption or not, to maximize the frictionless experience for your customers. Under this option, you also get access to an API to download authentication and transaction data to satisfy necessary monitoring, reporting, and audit requirements.Automated decisioning rules
Marqeta’s automated decisioning service makes up one part of managing and challenging your cardholders to perform strong customer authentication (SCA). It comes configured with the following rule set based around PSD2 and SCA guidelines within the EU region.Article 14 – Exempt Recurring Payments – Payment service providers can decide whether to request SCA based on the following conditions:
- 1.1. Shall request SCA when a cardholder creates, amends, or initiates a recurring transaction of the same amount/payee for the first time.
- 1.2. Shall be allowed to exempt SCA for subsequent payment transactions, including a recurring transaction featuring the same amount/payee.
Article 16 – Exempt Low Value Transactions – Payment service providers shall be allowed to exempt SCA during e-commerce payments, provided the following conditions are met:
- 2.1. The amount of the payment does not exceed €30.
- 2.2. The cumulative amount of payments since the last SCA does not exceed €100.
- 2.3. The number of previous payments since the last SCA does not exceed 5.
Advanced authentication
Marqeta’s advanced authentication introduces enhanced device authentication, such as in-app login or biometrics (for example, fingerprint and face recognition), allowing you to assess which verification method is required for your cardholder. The details of advanced authentication are outlined below.-
Marqeta configures URL, username, and password (eight-character minimum), which act as the gateway to receive the authentication request and response within three seconds.
-
HTTP
200response to confirm authentication. -
Time allowed for authentication is shown within
max_response_time(in minutes).
-
HTTP
-
Upon
200response cardholder authentication, the screen prompts the cardholder awaiting the authentication result to be returned to Marqeta.- Your company logo can replace the Marqeta logo.
-
Verification results should be returned to Marqeta on an asynchronous URL within the timeframe sent in the initial request.
https://authentication-acs.marqeta.com/v3/three-ds/authentication-result
-
For browsers and devices that support JavaScript, auto-submit functionality immediately submits the request upon return of the API response.
- Auto-submit is hidden for JavaScript-enabled applications.
Unsecured e-commerce
It is the merchant’s decision whether they wish to trigger 3DS before a transaction event is processed. In some instances, merchants decide either not to request 3DS or to proceed with the transaction despite 3DS failing. Therefore, there is a need to monitor for unsecured e-commerce transactions and apply SCA when required. Merchants can submit authorizations without authentication within PSD2 rules (set via card product) if they meet the following conditions:-
The amount of the remote electronic payment transaction does not exceed €30;
AND -
The cumulative amount of previous remote electronic payment transactions initiated by the payer since the last application of SCA does not exceed €100;
OR - The number of previous remote electronic payment transactions initiated by the payer since the last application of SCA does not exceed five consecutive electronic payment transactions.
- A mobile wallet payment (for example, Apple Pay and Google Wallet) is considered to be SCA secured.
- The transaction has been through 3DS, and the cardholder has provided verification.
-
The
acquirer_exemptionfield is present, stating that SCA is not required or cannot be completed.
electronic_commerce_indicator field provides confirmation of the security applied to e-commerce transactions:
-
authentication_successful– Indicates 3DS was completed successfully. -
authentication_attempted– Indicates 3DS was attempted but was not successful. -
no_authentication– Indicates the transaction contains no authentication.
JSON
JSON
Cardholder authentication data
Visa’s Cardholder Authentication Verification Value (CAVV) and Mastercard’s accountholder authentication value (AAV) use the universal cardholder authentication field (UCAF) field within authorization messages. These tokens are generated by Marqeta’s access control server (ACS) and provide evidence of successful cardholder authentication or attempted authentication by the merchant. Cardholder authentication data is a network-provided service that offers further insight into the authentication of a transaction. These elements include:- A 3DS message version indicating the version (2.1 or 2.2).
- The status of the authentication (successful or failed).
- The method of which the transaction was secured (for example, biometrics or one-time password).
-
Matching
verification_resultandverification_value_created_byfields.
Alternative 3D Secure solutions
Default one-time passcode
This is the default authentication option if you do not want to use your own authentication mechanism. This option does not require an integration with Marqeta’s access control server (ACS) but does require some configuration. Marqeta’s default authentication option uses a one-time passcode (OTP) generated and delivered by Marqeta to the cardholder via an on-file phone number or email address. Default OTP options include:-
Challenge-all with default OTP.
- Challenges every attempt using default OTP and fully handled by Marqeta.
- Not fully compliant in all regions with the requirement to conduct further SCA.
- Delegate decisioning with default OTP.
- Marqeta automated decisioning with default OTP.
- SMS OTP (primary), Email OTP (secondary).
- Knowledge-based questions (KBA) Only.
-
SMS OTP (primary), Email OTP (secondary) plus KBA.
- Meets SCA standards in most regions.
3DS correspondence
Marqeta issues correspondence to the cardholder directly, on the customer’s behalf. This is predefined text with dynamic value injection. The template for the subject and body text is described below.-
Subject:
$programName<noreply@marqeta.com> -
Body: One-time PIN for the transaction of
$purchaseAmount$purchaseCurrencyat$merchantNameusing$programNamecard$lastFouris:$otpExpires in 10 minutes. Sincerely,$programName
ces), Dutch (nld), French (fra), German (deu), Greek (grc), Italian (ita), Polish (pol), Portuguese (prt), Romanian (rou), Spanish (spa), or Swedish (swe). The default language is English (eng).
3DS personalization
3DS configuration can be personalized to configure the screens and correspondence to better suit your cardholders’ language requirements and to show issuer logos. It can be configured only once, at the program level, and configuration characteristics are outlined below.-
A name or logo can be chosen to appear on the one-time passcode (OTP) screen to present to cardholders
- Supported format is .png
- Maximum file dimensions are 47 pixels (height) x 140 pixels (width)
- Maximum file size is 5 MB
- The program name can be displayed in customer notifications, such as email and SMS OTP
-
The custom alphanumeric sender ID for SMS OTP must contain at least one letter; special characters and punctuation are not allowed. Sender IDs can contain up to 11 characters from the following categories:
- Uppercase letters (A - Z)
- Lowercase letters (a - z)
- Numbers (0 - 9)
- Spaces
Knowledge-based questions
Knowledge-based questions can be used to authenticate the user, both solely and in conjunction with OTP, to provide enhanced SCA. The characteristics of knowledge-based questions are outlined below.- Cardholder metadata is used to configure questions and answers.
- Three free-form questions and answers can be set per cardholder.
- Marqeta displays one question at random and validates cardholder input with a stored answer.
- Cardholder validates OTP first, followed by a random knowledge-based question.
JSON
Delegated decisioning
If you want to fully control 3DS authentication decision-making, as well as related monitoring, reporting, and audit requirements, you can choose the delegated decisioning option. This option provides complete control over 3DS decisioning and delegates all 3DS decision-making to your systems. Delegated decisioning allows you to exempt low-risk authentication requests using risk rules that are tailored to your system and regions of operation. This option requires you to implement the web interfaces that call Marqeta’s systems, in order to delegate the 3DS authentication decision-making to you. You then integrate with Marqeta’s systems and set up the required configurations for your program. Marqeta informs customers of decision results via the/three-ds/authentication endpoint to confirm the outcomes of the decisions they request.
JSON
JSON
3D Secure webhook notifications
The Marqeta platform supports webhook notifications for 3DS transition events. 3DS transition events include when a merchant requests 3DS authentication for a transaction (initialization) and when the Marqeta platform sends the merchant the outcome of the authentication request (completion). For more details, see 3D Secure transition events.3D Secure (3DS) responsibilities
If you have a card program in Europe, there are several responsibilities that you and Marqeta maintain. These responsibilities include:| Responsibility | Powered By | Managed By |
|---|---|---|
| Set up and maintain 3DS configuration with the network | You | Marqeta |
| Host and provide 3DS solutions for customers, and provide support with different combinations | Marqeta | Marqeta |
| Manage risk decisions and implement delegated decision rules to challenge cardholders, if applicable (Delegated Decisioning) | You | You |
| Manage automated decisions using predefined rules to challenge cardholders, if applicable (Automated Decisioning) | Marqeta | Marqeta |
| Authenticate cardholders via a chosen verification method, if applicable (Advanced Authentication) | You | You |
| Authenticate cardholders via a chosen verification method, if applicable | Marqeta | Marqeta |