The implementation of PSD2 marked a historic shift, moving the balance of power away from centralised bank control towards an open and interoperable ecosystem. It is not just a regulation: it is an infrastructural revolution.
The core of this transformation lies in opening banking APIs to authorised third parties and in the mandatory Strong Customer Authentication, redefining security and transaction flows across Europe.
SCA requires that every account access or payment initiation is validated with at least 2 independent factors. Compromising one element must not make it easier to breach the second — multi-layered defence.
The authentication code is cryptographically bound to the amount and the payee. Changing either the destination or the amount immediately invalidates the code — anti Man-in-the-Middle.
The RTS provide exemptions to balance security and usability. The PSP must prove it has advanced fraud monitoring systems.
Sensitive card data never reaches the merchant's servers. The input is a protected iframe from the payment gateway, which returns only a unique token to the merchant.
Version 2.0 overcomes the limitations of v1.0 — poor mobile compatibility, static passwords, fragmented experience — thanks to a native SDK, ML and over 150 data points for risk assessment.
| Parameter | 3DS 1.0 | 3DS 2.0 ✓ |
|---|---|---|
| Integration | Browser (iframe / redirect) | Native mobile SDK + browser |
| Data exchanged | ~15 elements | 150+ elements |
| Authentication | Static password / SMS OTP | Biometrics + signed push notification |
| User Experience | Friction (frequent interruptions) | Frictionless / selective Challenge |
| Risk analysis | Static and limited | Real-time Machine Learning (RBA) |
A banking API allows a Fintech's software to "talk" to the bank in a standardised way. REST architecture, JSON format, three mandatory security layers.
The token mechanism separates user authentication from app authorisation, without ever sharing the bank's username and password.
Experience how the bank decides between speed and security through Risk-Based Authentication and 3DS 2.0.
Choose the scenario to simulate:
As technical defences have strengthened, criminals have shifted their focus to the weakest link: the user and legacy communication channels. Select a threat.
| Type | Main mechanism | Technical objective |
|---|---|---|
| Social Engineering / Vishing | AI voice cloning (deepfake) | Forced manual SCA authorisation |
| SIM Swap | Social engineering on telco | SMS-OTP interception |
| Phishing AitM | Transparent reverse proxy | Session cookie and token theft |
| APP Fraud | Context manipulation | Legitimate SCA for fraudulent payment |
You are about to receive a phone call…
An unknown number calls claiming to be your bank.