Konsentus Powering Trust in Open Ecosystems

PSD2 Communities – Survey on Communication Security Practices

This survey looks at how the security of communications has been defined by different API communities and what requirements have driven them to design their security solutions.

Share This Post

Purpose of the Survey

All Payment Service Providers (PSPs) are required to communicate securely when providing access to account services. There is also an expectation that those who provide access services do so in an interoperable way, to reduce the difficulty of using the Application Programming Interface (API) or other secure channels.

This survey looks at how the security of communications has been defined by different API communities and what requirements have driven them to design their security solutions.

Key Findings

Whilst there are differences in the approach taken by the different API communities, there is much in common. They all use Transport Layer Security (TLS) with mutual TPP/ASPSP authentication to provide basic security. However, there are many identified limitations in the use of TLS as the only method of securing the communications between ASPSPs and TPPs. These limitations are overcome through also supporting Digital Signatures carried in the HTTP header.

Different communities have made different choices when it is necessary to apply digital signature to PSD2 requests and responses, and what data needs to be protected. However, given that all API communities take the same general approach in securing PSD2 communication this should not prohibit interoperable security.

A key difference is the technical protocol used for carrying digital signatures, with some communities adopting HTTP Signatures (Cavage v10) whilst others using JSON Web Signatures (JWS RFC 7515).

This could potentially divide the overall PSD2 communities into two non-interoperable groups. However, Open Banking Europe (OBE), working with the API communities and the ETSI European Standards Organisation, are working on standard solution which is based on JWS but has the capability to protect HTTP header information as in HTTP Signatures (Cavage v10).

Subscribe To Our Newsletter

Keep up to date with all our news and publications.

More To Explore

Talk with Our Team Today

Join us on the Journey

Protect your customers transacting in open ecosystems.

Konsentus Rebrand Button - Konsentus Dot-23-23

Find out how our technology can protect your customers within open ecosystems.

Name(Required)

Opt-in

On completion of this form you will be sharing your personal data with Konsentus Ltd (company number 1115059) (“Konsentus”/”we”/”us”). We will process such information for the purposes of sending you the requested information. We may also send you marketing communications and information which we consider may be of interest to you from time to time. This may include sending information by email, or us contacting you by telephone, where relevant details are provided. We rely on our legitimate interests as the lawful basis for processing your data in this way. Under certain circumstances, you have rights under data protection laws in relation to your personal data, including the right to receive a copy of the data we hold about you. You also have the right to opt out of marketing communications at any time using the details in an email sent to you or by contacting us at insights@konsentus.com.

This field is for validation purposes and should be left unchanged.

Login to your account