Mastercard Securecode: Acquirer Implementation Guide 21 March 2017
Mastercard Securecode: Acquirer Implementation Guide 21 March 2017
CIR
Summary of Changes, 21 March 2017
Updated the Mastercard Secure Code And Identity See the attached spreadsheet
Check Liability Shift Matrix
Updated the chart title from "Liability Shift— Liability Shift Rule Summary
Consumer Cards" to "Liability Shift—Cards and
Commercial Cards"
Removed chart "Libility Shift —Commercial
Cards"
Contents
Chapter 5: SecureCodeAcquirers........................................................................43
Acquirer Overview............................................................................................................44
Acquirer Infrastructure.................................................................................................44
Establishment of SecureCode Operating Environment............................................. 44
Digital Signature Key Management......................................................................... 45
Authorization System Message Enhancements........................................................ 45
Maestro Considerations.......................................................................................... 45
Acquirer Customization....................................................................................................47
Authentication Window Contents............................................................................... 47
Mastercard SecureCode Program Identifier Usage Guidelines....................................... 47
Acquirer Operational........................................................................................................ 48
Mastercard SecureCode Directory Server Maintenance................................................. 48
SSL and Digital Signing Certificates..............................................................................48
Mastercard SecureCode 360 Webinar Series................................................................ 48
Mastercard SecureCode Merchant Information............................................................ 49
Mastercard SecureCode Merchant Process and Liability Shift Matrix............................. 49
Notices.............................................................................................................................75
Mastercard rules require any merchant that wants to accept Maestro to undertake Mastercard
SecureCode on every Maestro transaction unless they have applied and been accepted to the
Maestro Advance Registration Program (MARP).
NOTE: MARP is closed to new business and will be decommissioned 1 June 2015. For more
details, refer to Europe Region Operations Bulletin No. 2, 3 February 2014.
Mastercard recommends that issuers deploy an authentication solution for cardholders to have
appropriate evidence of cardholder participation in the case of a disputed transaction.
Mastercard Debit
Issuers of Debit® Mastercard (either single or dual message) should note that the Single
Message System is capable of supporting transport of the Universal Cardholder Authentication
Field™ (UCAF) value.
Issuers must ensure that authorization, and clearing for dual message are compliant with the
latest debit standards available on the Publications product on Mastercard Connect™. The
Mastercard® SecureCode™ authentication program occurs before an authorization takes place,
therefore, it can be used to authenticate any Mastercard card. Issuers should ensure that their
systems can support the transport of the Account Authentication Value (AAV) before
proceeding with a Mastercard SecureCode program.
The decision on authentication strategy will influence the issuer’s Mastercard SecureCode
deployment and is, perhaps, the most important decision. This decision will balance the
following considerations:
• The cardholder experience that an issuer wants to support for their cardholders. Just as
card portfolios are segmented, authentication strategies can also be developed offering
multiple forms of authentication (for example, SMS for youth, and display card for High
Value).
• Cost of authentication
• Cost of fraud being experienced and projected
• Requirements from domestic regulators
When determining cost of deployment it is important to factor in the cost of both “Know
Your Customer” and “Identification and Verification” that affects any opt in service deployed
compared to the costs of a dynamic approach that does not require an opt-in by the
cardholder.
From a program perspective there are several decisions that an acquirer has to make prior to
implementing Mastercard SecureCode.
• Does the acquirer have concerns surrounding disintermediation or is it acceptable to allow
third-party vendors and service providers to supply merchants solutions?
• Does the acquirer want to directly support merchants? If so, then this will require a
minimum of a server based Merchant Plug-In solution available from any certified MPI
vendor. A list of the certified MPI vendors is available at www.mastercard.us/merchants/
securecode-vendors.html. Some merchants may require more than access to an MPI,
including for example, fraud management, or web design, that are commonly provided by
service providers such as DataCash. It is the acquirers responsibility to research what their
customer’s need and decide what propositions they want to offer.
• If reliant on third-party service providers who do you partner with? Are they certified for
submission of authorization on and clearing to the acquirers host systems? Are they PCI-
DSS compliant?
Although not within the acquirers area of responsibility, acquirers may be interested in the
following authentication information.
The most common solutions for Mastercard and Maestro® issuers is the use of static or
dynamic passwords. Dynamic password usage is typically based on the Chip Authentication
Protocol (CAP) that provides for the creation of a one-time use cardholder authentication
password. This scenario is similar to what the cardholder experiences in the face-to-face
environment using EMV chip card and personal identification number (PIN). CAP is now
available in a number of form factors ensuring that a single CAP Issuer solution can support
SMS, Mobile Applications, Display Card and the traditional CAP models using sleave devices.
See Issuer Authentication Options for more information on authentication options. This
program provides a seamless integration of both EMV and 3-D Secure technologies that result
in stronger authentication than traditional static password solutions.
Mastercard SecureCode is the consumer-and-merchant-facing name for all existing and new
Mastercard cardholder authentication solutions. While these solutions may each appear quite
different on the surface, these various approaches converge around the Universal Cardholder
Authentication Field™ (UCAF) mechanism and share a number of common features.
In every case, for example, two things occur:
1. Mastercard or Maestro cardholders are authenticated using a secure, private code that is
unique to them. Authentication can occur by weak implementation with static passwords;
or a stronger authentication approach can be implemented where the issuer pre-enrolls
cardholders with a static value or implements a one-time password (OTP) service provided
through text message, chip card reader, or on an EMV display card. Some local regulators
have more stringent rules based on region or country.
2. The authentication data is transported from party-to-party via the Mastercard UCAF
mechanism.
For more information about the Mastercard SecureCode platform components, see the
Mastercard SecureCode Program Platform section in this chapter.
Cardholder
A cardholder is an authorized user of a card issued by a licensed financial institution. In the e-
commerce environment, consumers and corporate purchasers interact with merchants
remotely, typically through personal computers. However, these points of interaction are
expanding to include new devices such as mobile phones. A cardholder uses a payment card
issued by a licensed Mastercard financial institution. Mastercard SecureCode will ensure that a
cardholder’s identity is authenticated prior to the completion of a purchase from a
participating merchant.
Cardholders participating in Mastercard SecureCode are expected to feel more confident
when shopping online and being authenticated by their issuer.
Issuer
An issuer is a Mastercard financial institution customer that issues either only Mastercard cards
or Mastercard and Maestro® cards. The issuer guarantees payment for an authorized
transaction using the payment card in accordance with payment card brand regulations and
local legislation. Specifically for Mastercard SecureCode, the issuer is responsible for providing
authentication services for eligible online purchases.
Mastercard and Maestro issuers can benefit from participating in Mastercard SecureCode by
increased transaction volume and value as consumer confidence increases from cardholder
authentication programs. Mastercard issuers can benefit from lower dispute management and
processing costs.
Merchant
A merchant is a retailer, or any other person, firm, or corporation that, pursuant to a merchant
agreement, agrees to accept Mastercard and/or Maestro cards when properly presented. With
Mastercard SecureCode, the merchant can offer a cardholder an authenticated electronic
interaction over the Internet. A merchant that accepts payment cards must have a relationship
with an acquirer. Merchants can benefit from participating in Mastercard SecureCode in
several ways including reduced fraud and dispute costs, increased transaction volume and
value, protection from unauthorized card use, and access to the Maestro card base.
Acquirer
The Mastercard SecureCode program platform is comprised of a number of layered
components. As described in the following pages, each of the components provides for
specific authorization and authentication functionality during the processing of a Mastercard
SecureCode transaction.
The control byte contains a value that is specific to each security application. Mastercard is
responsible for assigning and managing UCAF control byte values and the structure of UCAF
application-specific data. Other solutions that use UCAF for authentication collection and
transport will be assigned their own control byte value and the structure of the application-
specific data will be tailored to support the specifics of the security protocol.
In most UCAF implementations, the application-specific data is defined as binary data with a
maximum length of 24 binary bytes including the control byte. However, there are some
restrictions in the various Mastercard authorization networks regarding the passing of binary
data in the authorization messages. As a result, all UCAF data generated by Secure Payment
Application™ (SPA) algorithm-based Mastercard® SecureCode™ implementations must be
Base64 encoded at some point prior to being included in the authorization message. The
purpose of this encoding is to produce a character representation that is approximately 33
percent larger than the binary equivalent. For this reason, the UCAF field is defined with a
maximum length of 32 positions. For more information about Base64 coding, refer to the
#unique_12 appendix.
The current Mastercard SecureCode control byte definitions include the following.
Base64 Encoded
Usage Value Hexadecimal Value
3-D Secure SPA Accountholder Authentication Value
j x‘8C’
(AAV) for first and subsequent transactions
3-D Secure SPA AAV for attempts h x‘86’
NOTE: UCAF data or an AAV may not be reused in authorization. It should only be sent with
the original purchase authorization request. It should not be included in the Account status
check inquiry or within subsequent recurring transactions.
NOTE: MARP is closed to any new business and was decommissioned 1 June 2015. For more
details, refer to the Europe Region Operations Bulletin No. 2, 3 February 2014.
™
NOTE: The Universal Cardholder Authentication Field (UCAF) length is variable up to a
maximum of 32 positions. All acquirers and issuers must ensure that they can send and/or
receive contents in this field up to the maximum length of 32. Applications using this field,
such as Mastercard SecureCode, may provide contents that are less than the maximum length.
For Mastercard SecureCode specifically, this field will be 28 positions.
For additional information about the contents of this field for a Mastercard SecureCode
authorization request message, see What is AAV? in this chapter.
Sample DE 48 Contents
Following are samples of different DE 48 contents.
Scenario Sample DE 48
Scenario Sample DE 48
What is an AAV?
The Accountholder Authentication Value (AAV) is a Mastercard® SecureCode™ specific token
that uses the Universal Cardholder Authentication Field™ (UCAF) field for transport within
Mastercard authorization messages.
It is generated by the issuer and presented to the merchant for placement in the authorization
request. This AAV can be proof of a fully authenticated or an attempted authentication
transaction.
The AAV is used to identify the processing parameters associated with the transaction. Among
other things, the field values will identify the:
• Issuer ACS that created the AAV. (This could be the Issuer ACS or, in the case of an
attempt, the Mastercard Attempt processing server.)
• Sequence number that can positively identify the transaction for that location
• Secret key used to create the Message Authentication Code (MAC), which is a
cryptographic method that ensures AAV data integrity, and binds the entire AAV structure
to a specific PAN.
UCAF is the mechanism that is used to transmit the AAV from the merchant to issuer for
authentication purposes during the authorization process.
MARP Exception
For merchants that have qualified to participate in the Mastercard Advance Registration
Program (MARP), Mastercard assigns a static AAV that conforms to the same format as an
issuer-generated AAV.
NOTE: MARP is closed to new business and will be decommissioned 1 June 2015. For more
details, refer to Europe Region Operations Bulletin No. 2, 3 February 2014.
NOTE: If a retailer has qualified and accepted a merchant for the Mastercard Advance
Registration Program (MARP), then Mastercard will assign a static Accountholder
Authentication Value (AAV) for use when the transaction is undertaken as MARP instead of
standard Mastercard SecureCode. This value is passed in plain text in the Universal
Cardholder Authentication Field™ (UCAF) field. For additional information, refer to the
Mastercard Advance Registration Program Requirements appendix.
DEFINITION: An intraregional transaction is one in which the acquiring institution and issuing
institution are in the same Mastercard region, for example, the U.S., Canada, Europe, Asia
Pacific, Middle East/Africa, and the Latin America/Caribbean regions.
An interregional transaction is one in which the acquiring institution and the issuing
institution are in different Mastercard regions.
Issuing Regions
Acquiring U.S. * * * * * *
Regions CAN * * * * * *
EUR * * * * * *
LA/C * * * * * *
AP * * * * * *
MEA * * * * * *
Authorization Requirements
Mastercard issuers and acquirers must modify their authorization systems to support the
required Universal Cardholder Authentication Field™ (UCAF) transaction data elements.
Further, it is a requirement that all qualifying transactions must be properly coded e-commerce
transactions.
The following table highlights the field requirements that are required for coding of
Mastercard® SecureCode™ e-commerce authorizations. For more information about the
Subfields
42—Electronic Commerce Security Level Contains the security level in positions 1
Indicator (Mandatory) and 2 and the UCAF collection indicator in
position 3
• Position 1 = Security Protocol (for
Mastercard SecureCode, the value is 2
—Channel)
• Position 2 = Cardholder Authentication
(for Mastercard SecureCode, the value
is 1–Cardholder Certificate Not Used)
Clearing Requirements
In support of the Mastercard® SecureCode™ program, Mastercard requires that acquiring
members must support changes to the Global Clearing Management System (GCMS) clearing
records in support of associated interchange rate programs.
Mastercard requires that all clearing and chargeback records associated with an e-commerce
authorization message contain the DE 48, private data subelement 0052 (Electronic
Commerce Security Level Indicator). Failure to include this field will result in the message
being rejected by GCMS with an edit error. The contents of this field must be consistent with
the value of the DE 48, subelement 42, position 3 in the corresponding authorization
message. In addition, Universal Cardholder Authentication Field™ (UCAF) interchange rate
qualifications for all transactions acquired in the U.S. region are subject to interchange
compliance edits.
NOTE: Issuers should refer to the latest Interchange Manual for their region to determine
what interchange is applied for Full UCAF and Merchant UCAF transactions.
Enrollment Requirements
Following are acquirer requirements to participate in the Mastercard® SecureCode™ Electronic
Commerce Program:
• All participating customers must complete both a general enrollment form and the acquirer
program enrollment form. Refer to the Mastercard SecureCode Program Enrollment
Procedure section for additional information.
• Select a vendor or service provider to provide the required infrastructure (for example,
merchant plug-ins, access control servers, and more) if the acquirer has decided to directly
support an MPI.
• Select a vendor or service provider to provide the required infrastructure (for example,
merchant plug-ins, access control servers, and more) if the acquirer has decided to directly
support an MPI.
• Assign a program manager to manage, test, and integrate the current system with
Mastercard SecureCode, or to manage the recruitment of third parties or service providers
to provide Mastercard SecureCode to their e-commerce merchants.
• Ensure all authorization and clearing systems can support Universal Cardholder
Authentication Field™ (UCAF) data. For additional information, refer to the UCAF
Compliance Requirements section.
The Mastercard E-commerce Program Manager will review and approve customer enrollment
materials.
Maintenance Requirements
Issuers and acquirers should regularly review the content of their existing registration
document, especially when key individuals noted in the registration move to other roles or
leave the organization.
If changes are required, update the form and send it for amendment of the current
registration to [email protected]. Issuers should regularly
maintain their Mastercard® SecureCode™ contact in the Member Information-Mastercard by
accessing the Applications page from Mastercard Connect™.
No Representations or Warranties
Mastercard makes no representations or warranties whatsoever with respect to the
Mastercard SecureCode program, including without limitation any software, hardware or
other technology built to Mastercard standards, any services provided by it, or any other
matter relating to or arising out of any implementation of the Mastercard SecureCode
specifications. Without limiting the foregoing, Mastercard specifically disclaims all
representations and warranties as to its operation of the Mastercard Certificate Authority.
Mastercard specifically disclaims all implied warranties of merchantability, fitness for a
particular purpose and non-infringement of third party intellectual property rights with respect
to any and all Mastercard SecureCode implementations whether or not Mastercard has been
advised, has reason to know, or is otherwise in fact aware of any information regarding the
foregoing.
Acceptance of Terms
The signing of enrollment forms indicates that the member understands and agrees to the
terms and conditions set forth herein including but not limited to those above. The member
acknowledges that its acceptance of these terms and conditions is relied upon by Mastercard
in permitting member’s participation in the Mastercard SecureCode program.
Acquirer Responsibilities
The following are responsibilities specific to acquirers participating in the Mastercard®
SecureCode™ program.
• Soliciting merchants to participate in the Mastercard SecureCode program.
• Adhering to:
– Mastercard requirements for information and data security, including but not limited to
protection of Mastercard card numbers, Maestro account numbers, cardholder
enrollment information and management and protection of secret cryptographic keys.
– Applicable usage guidelines as published in the Mastercard SecureCode Program
Identifier Usage Guidelines section.
• Ensuring that merchants comply with the requirements documented within the Mastercard
SecureCode—Merchant Implementation Guide.
• Reporting to Mastercard on experiences and progress with merchants use of Mastercard
SecureCode products, shopping experiences, and related market research information.
• Providing:
Mastercard Support
Mastercard will provide support to customers enrolled in the Mastercard® SecureCode™
program.
Additional References
Unless otherwise noted, all publications are available from the Publications section of
Mastercard Connect™.
NOTE: The documentation regarding the industry standard for 3-D Secure is not available
from Mastercard. These documents must be sourced under license from the standard owner.
Components
Following is information about components related to the Issuer Domain, Acquirer Domain,
and Interoperability Domain.
Issuer Domain
The Issuer Domain is comprised of the following components.
• Cardholder browser and related software
• Enrollment server
Enrollment Server
The purpose of the enrollment server is to facilitate the process of cardholder enrollment for
an issuer’s implementation of 3-D Secure under the Mastercard® SecureCode™ program. The
server will be used to perform initial cardholder authentication, as well as administrative
activities such as SecureCode resets and viewing 3-D Secure payment history. In some cases,
the enrollment server and the access control server may be packaged together.
Acquirer Domain
The Acquirer Domain is comprised of the following components.
• Merchant plug-in (MPI)
• Signature validation server
Merchant Plug-In
The merchant server plug-in creates and processes payer authentication messages and then
returns control to the merchant software for further authorization processing. The plug-in is
invoked after the cardholder finalizes the purchase request, which includes selecting the
account number to be used, and submitting the order but prior to obtaining authorization for
the purchase.
Interoperability Domain
The Interoperability Domain is comprised of the following components.
• Directory server
• Certificate authority
• Mastercard Authentication History Server
• Attempts server
Directory Server
The Mastercard® SecureCode™ global directory server provides centralized decision-making
capabilities to merchants enrolled in the Mastercard SecureCode program. Based on the
account number contained in the merchant enrollment verification request message, the
directory will first determine whether the account number is part of a participating Mastercard
or Maestro® issuer’s card range. It will then direct eligible requests to the appropriate access
control server for further processing.
All implementations of this platform must use the Mastercard SecureCode global directory
server for processing Mastercard and Maestro® transactions.
Certificate Authority
The Mastercard Certificate Authority is used to generate and distribute all private hierarchy
end-entity and subordinate certificates, as required, to the various components across all three
domains.
These certificates include:
• Mastercard Root certificate (used for both Mastercard and Maestro)
• SSL Server and Client certificates issued under the Mastercard hierarchy for communication
to the Directory Server and Mastercard Authentication History Server
• Issuer Digital Signing certificates issued under the Mastercard hierarchy for communication
to the Directory Server and History Server
In addition, SSL certificates based on a public root hierarchy are required. These certificates are
not issued by the Mastercard Certificate Authority and must be obtained from another
commercially available certificate-issuing provider.
For more information, refer to the Mastercard SecureCode—Production Procedures manual.
Attempts Server
The Mastercard SecureCode infrastructure supports this component server.
The Mastercard Attempt processing server provides the merchant with an Attempt
Accountholder Authentication Value (AAV) when:
• The Issuer account range is not participating on the Mastercard SecureCode Directory
Server.
• The Issuer sends a verify enrollment response with the value of an N (Cardholder not
enrolled).
• The Issuer ACS is Unavailable or times out.
Issuers may choose to have their ACS provider to send a VEres=Y for non-enrolled
cardholders, and then providing the PAres=A to avoid invoking the Mastercard Attempts
Processing Service.
The AAV generated by the attempts Server service will be generated with Mastercard keys
which will not be shared. An issuer can identify an AAV generated by the new Mastercard
Attempts Processing Service by the ACS identifier in the base64 decoded version of the AAV.
Attempts Server
With the implementation of the Mastercard Attempts Processing Service’s “Stand-In”
Authentication, Attempts AAVs will be generated in the following cases:
• ACS Services are not responding to Verify Enrollments.
• Issuer card ranges are not participating or enrolled in the Directory Server.
• A cardholder is not enrolled or participating in the issuer’s service.
Issuers that perform self-validation on the AAV at the time of authorization are not be able to
validate an Attempts AAV generated by the Mastercard Attempts Processing Service since the
key which generates this value by Mastercard will not be provided or shared.
Verification Request/Response
Message Pair: VEReq/VERes– The first step in the payer authentication process is to validate
issuer and cardholder participation in the 3-D Secure. As designed by the protocol for the
safety and security of the authentication, the Mastercard Directory Server validates and routes
the VEReq/VERes between Merchant Plug-In (MPI) and Access Control Server (ACS) providers.
Therefore, the verification request process sent by the merchant is a two-step method
resulting in two verification requests (VEReqs).
1. A VEReq is sent from the MPI to the Directory Server to check card range enrollment and
routing to the appropriate authenticating ACS.
2. A second VEReq is sent from the Directory Server to the appropriate ACS for cardholder
enrollment verification and response back through the Directory Server.
All merchants will need to call the directory server for every Mastercard SecureCode
transaction to receive an Attempts Accountholder Authentication Value (AAV) or an AAV from
the issuer’s ACS provider. Upon implementation of the Attempts Service, MPI services will only
see VERes message values of Y. The VERes will route the MPI service via the cardholder’s
browser to either the cardholder’s ACS Service or the Mastercard Attempts Processing Service
for Stand-In authentication.
Cardholder Enrollment
Enrolling cardholders in the Mastercard Location Alerts is the sole responsibility of the issuer.
This section outlines the enrollment requirements and process.
There are two primary types of interactions between a cardholder and the issuer software:
• Enrollment—if static password
• Purchase Transactions—when risk-based authentication does not occur and the cardholder
needs to be challenged
Supplemental functionality is available based on Access Control Server (ACS) service provider
functionality:
• Account Management—to view historical activity or other account profile information
• Reregistration—if static password is used or mobile phone collection is necessary for SMS
• Frequently Asked Questions (FAQs)
• Contact Details
To shop with the assurance of 3-D Secure, a cardholder must enroll in the program through
the issuer. The enrollment process verifies the cardholder’s identity and allows the cardholder
to establish a SecureCode for authentication while shopping online. Enrollment of cardholders
can be a weak implementation with static passwords after answering basic enrollment
questions or a stronger authentication approach where the issuer pre-enrolls cardholders with
a static value or implements a one-time password (OTP) service. These options can be
discussed and reviewed with ACS Service Providers.
Cardholder Authentication
Following is information about the cardholder authentication process.
Link Description
SSL-1 The cardholder shops at the merchant and, when ready to checkout, enters the
appropriate payment information—including the account number.
SSL-2 The Merchant Plug-In queries the Directory to verify the enrollment status for a specific
issuer using the verification request messages.
Link Description
SSL-3 The Directory Server determines routing of the enrollment request to send a second
VEReq from the directory to the Access Control Server for enrollment verification and
response to complete the cardholder authentication. The configuration information in
the Directory will indicate exactly which Access Control Server will perform the check.
The resulting response will flow back over the same links to the Merchant Plug-In.
SSL-4 The Merchant Plug-In creates the Payer Authentication Request message and sends it to
the cardholder’s browser.
SSL-5 The cardholder browser redirects the message to the appropriate Access Control Server
to perform cardholder authentication. When the Access Control Server receives the
Payer Authentication Request message, it causes the user authentication dialog to begin.
This in turn causes a separate authentication window to appear to the cardholder that
will facilitate the cardholder authentication process.
SSL-6 The Access Control Server authenticates the cardholder SecureCode, constructs the SPA
AAV for Mastercard’s implementation of 3-D Secure, and builds and digitally signs the
Payer Authentication Response message. It is returned to the Merchant Plug-In, at which
point the cardholder authentication window will disappear.
SSL-7 The Access Control Server sends PATransRec to the Mastercard Authentication History
Server.
When received by the issuer, the AAV can be validated as part of authorization request
processing, as well as archived for use in potential cardholder disputes. Issuers will only be
able to validate an Attempt or fully authenticated AAV generated by their own ACS. If the
Mastercard Attempts Processing Service generates an AAV, it cannot be issuer validated. The
Mastercard Attempts Processing Service uses a unique key that cannot be shared. For issuers
wanting to ensure that all AAVs are validated, Mastercard offers the Mastercard-hosted on-
behalf service. AAVs will also be generated by the Mastercard Attempts Processing Service for
Stand-In Authentication when cardholders are not enrolled, card ranges are not participating
in Mastercard SecureCode, or Access Control Server (ACS) services are not responding. This
Attemtpts AAV can only validate through the Mastercard AAV Validation Service rather than
through self-validation.
Cardholder Overview.................................................................................................................... 38
Cardholder Infrastructure.............................................................................................................. 38
Cardholder Customization............................................................................................................ 38
Cardholder Operational................................................................................................................ 38
Accountholder Authentication Value Processing............................................................................39
Cardholder Global Infrastructure Testing Requirements................................................................. 39
Cardholder Overview
This section outlines the major activities and requirements for building and maintaining the
cardholder components that are required to support Mastercard® SecureCode™.
The activities and requirements are separated into five primary categories:
• Infrastructure—Installation of new hardware and software components.
• Customization—Customizing or configuring vendor products.
• Operational—Operating the components in a production environment, including any
process oriented changes that may be required.
• Accountholder Authentication Value (AAV) Processing—Handling and processing of the
AAV.
• Global Infrastructure Testing Requirements—Testing of Mastercard SecureCode platform
components with the Mastercard SecureCode global infrastructure.
Cardholder Infrastructure
Following is the cardholder infrastructure requirement for the installation of new hardware
and software components that support Mastercard® SecureCode™.
Cardholder Customization
There are no customization issues related to cardholder participation in the Mastercard®
SecureCode™ program.
Cardholder Operational
Following are the cardholder requirements for operating the components in a production
environment, including any process-oriented changes that may be required.
Cardholder Registration
Depending on the exact nature of a card issuer’s program, cardholders may be asked to
register with their issuer to participate in its Mastercard® SecureCode™ program. Issuers have
the option of allowing cardholders to enroll in the program while shopping at a participating
merchant or outside of this process all together. The exact method of registration will be both
issuer and issuer platform specific.
For accounts with more than one authorized user, both users should be able to register and
create their own unique SecureCode. After one of the authorized card users has registered, all
online payments using that card—at participating merchants—will cause the cardholder
authentication process to initiate. This process will initiate even if the buyer is not the
cardholder that explicitly enrolled in the program.
NOTE: Pop-up blocking software prevents most types of advertisement windows from being
created or “popping up” while a user browses websites.
Unlike standard enrollment processes, which require that the cardholder take initiative to
enroll in the program, ADS permits the issuer to solicit cardholder enrollment as part of the
shopping experience. This approach also provides issuers with a means for requiring
cardholder participation.
Cardholder response rates to ADS have been higher than those associated with standard
enrollment, when issuers have sufficiently communicated Mastercard® SecureCode™ program
details and benefits to their cardholder base. While effective in driving program enrollment,
issuers must take care to minimize any disruption to purchase completion and avoid negative
impact to participating merchants.
In recognition of this, Mastercard has outlined the requirements in this document with three
goals in mind:
• Maximize cardholder registrations. ADS has proven to be very effective when deployed
correctly. Several issuers have attained very high rates of registration with ADS.
• Minimize loss of volume. If not orchestrated correctly, ADS could cause some cardholder
dissatisfaction. This may result in loss of purchase volume for the issuer.
• Minimize lost merchant sales. If merchants perceive that consumers are spending
excessive time during the checkout process, they are likely to have concerns about the
Mastercard SecureCode program.
Early use of ADS caused some concern within the merchant community regarding the
potential for disruption of the sales process in some issuer deployments. Such concerns
included the consumer abnormally terminating the registration, thereby causing abandonment
of the entire purchase transaction.
Problems that occurred can be traced to a handful of causes that can be easily avoided:
• Lack of consumer education
• Lack of proper financial institution and program identifiers. Registration windows
must clearly identify the consumer’s financial institution to avoid confusion and fear of
spoofing or “phishing” scams.
• Overly long registration process. Once presented, the registration should be short and
straightforward. The use of too many questions to establish the identity of cardholders will
only tax their patience and cause them to abandon the process.
Each issuer is responsible for evaluating the pros and cons of ADS enrollment in general, as
well as the individual methods for initiating ADS, to determine which course of action is most
appropriate for its program.
However, the requirements and guidelines outlined below are based on issuer experiences as
well as on extensive focus groups and usability studies, so issuers may want to leverage these
learnings for their own Mastercard SecureCode deployments.
Chapter 5 SecureCodeAcquirers
This section provides an overview of the activities and requirements for building and maintaining
the acquirer components that are required to support Mastercard® SecureCode™.
Acquirer Overview........................................................................................................................ 44
Acquirer Infrastructure..............................................................................................................44
Establishment of SecureCode Operating Environment.......................................................... 44
Digital Signature Key Management...................................................................................... 45
Authorization System Message Enhancements.....................................................................45
Maestro Considerations....................................................................................................... 45
Acquirer Customization................................................................................................................ 47
Authentication Window Contents............................................................................................ 47
Mastercard SecureCode Program Identifier Usage Guidelines....................................................47
Acquirer Operational.....................................................................................................................48
Mastercard SecureCode Directory Server Maintenance..............................................................48
SSL and Digital Signing Certificates...........................................................................................48
Mastercard SecureCode 360 Webinar Series............................................................................. 48
Mastercard SecureCode Merchant Information......................................................................... 49
Mastercard SecureCode Merchant Process and Liability Shift Matrix.......................................... 49
Acquirer Overview
The activities and requirements for acquirers are separated into the following categories.
• Infrastructure—Installation of new hardware and software components. Internal or
outsourced provision of system support.
• Customization—Customizing or configuring vendor products.
• Operational—Operating the components in a production environment, including any
process oriented changes that may be required.
• Accountholder Authentication Value (AAV) Processing—Handling and processing of the
AAV.
• SecureCode 360—A Web presentation series available to merchants and acquirers with
information on implementation and benefits of the use of Mastercard SecureCode.
• Mastercard SecureCode—Merchant Implementation Guide—Detailed information specific
to merchants.
Acquirer Infrastructure
Following are the requirements related to the installation of new hardware and software
components. If the acquirer has contracted with a Merchant Plug-In (MPI) provider, then the
MPI provider will manage this.
Maestro Considerations
The following requirements and activities are specific to support of Maestro® cards as part of
the Mastercard® SecureCode™ program.
Track 2 Requirements
If the issuer’s authorization system requires track 2 data, the issuer will need to implement a
platform that can intercept the message prior to authorization and create real track 2 data.
Technology vendors, which implement surrogate account number solutions, are good
candidates for these platforms. Currently, Maestro authorization networks will add pseudo
Track 2 data in the following format.
2 Separator ans-1 D
Acquirer Customization
The following is Mastercard® SecureCode™ customization information for acquirers.
Acquirer Operational
Following are details about the operational aspects of acquirers implementing Mastercard®
SecureCode™.
Failed Authentication
A merchant may proceed with a transaction for which the authentication failed, but it must
be as a SecureCode not used for transaction (SLI = 210). This transaction must not be
submitted as merchant only and is not eligible for any liability shift. No AAV will be provided,
and issuers are likely to decline the transaction if submitted.
Liability Shift
For more information, refer to the Chargeback Guide.
Errors
Error responses are sent in lieu of the VERes. Error responses will have similar messages as iReq
Reason code for the following activities.
If an error is received in response to a VEReq, then the transaction must be submitted as non-
Mastercard Identity Check/SecureCode and will not carry liability shift.
• Directoy Server Cache Request (CRReq) - Error 2 - message element not defined message -
Mastercard does not support CRReq message
• Acquirer BIN / Merchant ID not enrolled - Error 50 - Acquirer not participating or Error 51 -
Merchant not participating
• Invalid PAN - not a Mastercard valid credit / debit / prepaid card - Error 2 - Not a Mastercard
supported card range
• If an error is found with the submission of the VEReq due to formatting or syntax, then the
authentication must be resubmitted or the transaction proceed as non-Mastercard Identity
Check/SecureCode
Notes
The following numbered items correspond with the numbers provided in the “Notes” column
in the table above.
1. Best practice would suggest that fraud may be involved and the merchant should prompt
the consumer to try again or to use a different form of payment. If merchant decides to
send for authorization, the transaction is not eligible for the liability shift and should be
submitted as non-Mastercard Identity Check/SecureCode
2. The AAV associated with an attempt must be included in any subsequent authorization
message.
3. The merchant should check the reason for the error message before deciding whether to
proceed with the authorization. Not all reason codes may indicate a failure.
4. The PAN failed a Mod-10 check or the Mastercard Attempts service is unavailable.
5. Merchant Risk Based Approach - A merchant is not required to undertake Mastercard
Identity Check/SecureCode on every transaction except when accepting Maestro, as a
requirement for debit acceptance. Any merchant who chooses not to use Mastercard
Identity Check/SecureCode on any transaction should process on the basis of the last entry
in the matrix above entitled Merchant Does not support Mastercard Identity Check/
SecureCode not used for transaction (SLI = 210).
6. The Directory Server converts the status on the ACS Verify Enrollment Responses (VERes)
for N (card not enrolled) and U (unsupported device) to a Y and includes the URL for the
Mastercard attempts processing Server.
Static Password
Mastercard launched the Mastercard® SecureCode™ static password in 2002 as an entry-level
initial deployment that could be quick to market, not as a long-term strategy. Much of this
publication is still aimed at this proposition and, therefore, does not provide in-depth detail.
• Quick to market.
• Relies on a static password and usually on static data to identify the customer when they
enroll.
• Know your customer, Identification and Verification (ID&V), is important to ensure that
fraudsters can neither enroll in the service on behalf of a genuine cardholder, nor change
the password of an enrolled cardholder.
• Activation During Shopping (ADS) produces good enrollment results for an issuer, but
interrupts the shopping experience. It is important to follow the practices identified in this
publication, because if executed poorly, ADS can cause genuine cardholders to abandon
transactions. Additional information is available in the Mastercard SecureCode Issuer Best
Practices.
• Needs communication to cardholders to ensure that they are aware of the Mastercard
SecureCode process before they are requested to enroll, especially in the case of ADS.
Although static password was a common solution in the past, new deployments where
Mastercard SecureCode deployment is strong such as the Asia/Pacific, South Asia/ Middle East/
Africa and Europe regions, are moving to a dynamic solution.
To avoid the issues surrounding ID&V some issuers using static password have undertaken a
“PIN Mailing” whereby all existing cardholders receive a SecureCode through the mail with
full information on its use. Making SecureCode part of the card-opening procedures is also
gaining in popularity.
Random Static
Random static is a variant of a static password solution that some issuers have chosen to
deploy.
It is similar to that seen for some banks Internet banking solutions. Although the cardholder
still has a static password, they are never asked to complete the entire password when
prompted but rather a random selection of characters from the password. For example, first,
sixth, and ninth are depicted in the following figure.
This method is an improvement in security, but makes the cardholder experience more
challenging, especially if the issuer chooses to enforce password requirements such as
minimum 9, or must be alphanumeric.
The same issues stated above for Static Password are also seen and should be considered in
this deployment.
It is important to ensure that the mobile device used is trusted as owned by the cardholder,
and that a back-up mechanism is in place for instances when a cardholder is unable to obtain
a mobile signal.
Mobile Application
Smart phones are growing in issuance and in popularity. The number of mobile applications is
also growing rapidly. Mastercard has a growing number of mobile applications, some of which
—such as wallets—are not yet available globally.
One option that is available globally is the Advanced Authentication for Mobile application.
This application resides on the smart phone and allows a secure software application to have
the equivalent of the consumers chip card on the phone. This solution allows the cardholder
to have a similar experience that they would in a face-to-face chip transaction. The customer,
opens the application, enters their PIN, and obtains a generated, dynamic, one-time password
(OTP) to use as the SecureCode, which is then used in the usual box required by their issuer
for authenticating the cardholder.
The issuer can verify the password by using the same “black box” solution available for any
EMV-generated authentication.
Ensuring that the application is delivered to the cardholders mobile phone will be a key
consideration in this deployment.
In this case, a cardholder would insert their card into the reader and follow the prompts on
the device to enter their PIN and generate their dynamic one-time password (OTP) to use as
their SecureCode.
Security can be increased by entering other information before entering the PIN, for example,
a dynamic challenge that the issuer could display when prompting for the SecureCode.
Balance needs to be maintained between the user experience and the chance for fraud. For
example, an issuer may decide that a simple PIN driven SecureCode would be sufficient for
amounts under a defined threshold with increased requirements for high-value items.
This may not be a practical solution for cardholders that shop from multiple devices and
locations. For those that shop either from home or work, this added security and simple
cardholder experience may be appealing.
Display Card
Mastercard has launched a new card design that integrates the CAP reader into the card in
two designs.
In the first design, the act of pushing a single button will generate a one time code in the
display. For increased security, there is a second option that works like the CAP reader in that
it requires the cardholder to first input their PIN.
These cards can be configured to also work with the CAP reader to provide both options for
generating the SecureCode.
The Display Card is still based on the EMV standard and the same “black box” solution that
would check the authentication from Mobile Authentication and CAP can be used to verify
the number generated by the display card.
These cards are available for all Mastercard cards including credit, debit, and Maestro®.
Virtual Card Numbers can be a strong issuer and cardholder solution if the numbers are
generated in a secure way.
Solutions, such as the inControl offering from Mastercard, can add further value through
features such as cardholder alerts, prohibitions from using the card at certain merchants/
MCCs, and maximum value of purchase. This can be used for any card but is particularly
popular for commercial cards.
Unfortunately a merchant can not distinguish if it is a real or a virtual card, or the level of
security that may have occurred. An issuer can have an ACS that is configured to work with
the inControl platform to provide the merchant with a valid fully authenticated transaction
avoiding any potential acceptance issues.
When the virtual card is used, this integration avoids the cardholder being prompted for an
additional SecureCode, and also delivers the fully authenticated response to the merchant in
silent mode as a transparent authentication. The added value is that this integration can also,
optionally, provide a failed authentication response to the merchant if the real card is used,
and an advice to the cardholder to use the virtual card system supplied to fulfill the
transaction.
For more information about inControl and SecureCode options, contact your Mastercard
representative.
In summary, virtual cards have the following characteristics:
• Strong issuer response securing transactions for all Internet purchases both current and
future. Benefits include:
– Real card number may or may not be used for Internet purchases
– Flexibility to be static, or a one-time generated virtual number
• Strong when integrated with Mastercard SecureCode by the issuer using inControl and
SecureCode Issuer ACS for “silent” authentication.
• Weak from a merchant perspective:
– Merchant cannot identify if the card is virtual
– No chance of full authentication, which could trip fraud merchant parameters
This section contains names, areas of responsibility, and contact information for Mastercard
personnel who can assist customers with e-commerce enrollment, testing, and implementation
issues.
Completed and signed enrollment forms Send all completed and signed enrollment forms
to:
[email protected]
®
Maestro Customer Operations Services
U.S., Canada, Caribbean, Latin America, and
Middle East/Africa regions
Phone: 800-999-0363 (Inside U.S.)
636-722-6176 (Outside U.S.)
636-722-6292 (Spanish Language Support)
Fax: 636-722-7192
Email:[email protected]
om
Europe region
Phone: +32-2-352-54-03
Email:[email protected]
Customer Implementation Services
Asia/Pacific region
Email:[email protected]
Middle East/Africa region
Email:[email protected]
Europe region
Email:[email protected]
Canada and U.S. regions
Email:[email protected]
Latin America and the Caribbean region
Email:[email protected]
Pricing/Billing
Support [email protected]
This section contains detailed information about specific processing issues associated with Maestro®
and Mastercard® SecureCode™. Merchants should contact their acquirer for specific authorization
and clearing requirements.
These data elements must be used by the acquirer when placing an Account in Good
Standing transactions. Each acquirer is responsible for determining how this transaction is
supported in the point of interaction message defined for the merchant to acquirer interface.
For Credit, there is the Account Status Inquiry, which is a non-financial request that allows
acquirers to validate aspects of the cardholder account. Some ACS providers will also use this
message to verify cardholder enrollment such as CVC, AVC, and expiry date. Additional details
can be found in the Customer Interface Specification manual.
This section defines the Mastercard Advance Registration Program (MARP) and identifies the
program requirements.
NOTE: MARP will be decommissioned 1 June 2015. For more details, refer to Europe Region
Operations Bulletin No. 2, 3 February 2014.
NOTE: No new merchants are allowed to enroll in MARP. Effective 30 April 2014, Mastercard
will be withdrawing MARP. For more details, refer to the Europe Region Operations Bulletin
No. 2, 3 February 2014.
• The merchant invites the customer to register on its website by choosing a username and
password, or similar credentials acceptable to Mastercard, and must provide the customer
with the option to register a Mastercard® or Maestro® card account number for use in
future e-commerce transactions.
• For the first Mastercard or Maestro e-commerce transaction, the merchant must request
Mastercard® SecureCode™ authentication before submitting the transaction for
authorization. If that transaction is subsequently authorized by the issuer, it is guaranteed
to the acquirer or its merchant, regardless of whether the issuer or cardholder participates
in Mastercard SecureCode as determined by the merchant request.
• If the first Mastercard or Maestro e-commerce transaction for the cardholder registered
with the merchant is authorized by the issuer, the merchant can skip the Mastercard
SecureCode authentication on subsequent transactions by the same customer using the
same Mastercard or Maestro card account. In that case, the merchant will populate:
– Data Element (DE) 48, (Additional Data Private Use, subelement 32 (Mastercard
Assigned ID) in the Authorization Request/0100 message with an ID assigned by
Mastercard.
– DE 48, subelement 43 (3-D Secure for Mastercard SecureCode) in the Authorization
Request/0100 message with a Mastercard-assigned static Account Authentication Value
(AAV).
– DE 48, subelement 42, position 3 (UCAF Collection Indicator) in the Authorization
Request/0100 message with a value of 3.
– Private data subelement 0052 (Electronic Commerce Security Level Indicator) subfield 3
(UCAF Collection Indicator) in the clearing record submitted to GCMS for processing
(where applicable) with a value of 3.
– The PDS 176 (Mastercard Assigned ID) in the clearing record submitted to GCMS for
processing with an ID assigned by Mastercard.
• If the merchant populates the Universal Cardholder Authentication Field™ (UCAF) with the
static AAV assigned by Mastercard, and populates the UCAF Collection Indicator with the
value of 3, and the issuer authorizes the transaction, the issuer will have a right to charge
back the transaction for reason of fraud.
• If a registered cardholder uses a different Mastercard or Maestro card account number for
a transaction, the merchant must request Mastercard SecureCode authentication before
submitting the transaction for authorization.
• Based on a risk assessment, the merchant always has the option of requesting Mastercard
SecureCode authentication for any Mastercard or Maestro transaction, in which case the
transaction will be governed by existing Mastercard SecureCode and Chargeback rules. For
instance, for consumer cards acquired in the Europe region, if the transaction is
subsequently authorized by the issuer, it is guaranteed to the acquirer or its merchant,
regardless of whether the issuer or cardholder participates in Mastercard SecureCode as
determined by the merchant request.
This section provides an overview of the Mastercard requirements to support IVR Transactions in
India.
Overview...................................................................................................................................... 68
Data Extensions to the Existing 3-D Secure Protocol...................................................................... 68
UCAF Transport in Mastercard Authorization Messages.................................................................68
Mastercard SecureCode—Security Level Indicator (DE 48, subelement 42)................................ 69
Universal Cardholder Authentication Field (DE 48, subelement 43)........................................... 70
What is an AAV?...................................................................................................................... 70
Sample IVR Transaction Flow.................................................................................................... 71
Mastercard SecureCode Compliance and Functional Testing..................................................... 71
Overview
Following the successful deployment of 3-D Secure (SecureCode) for all domestic electronic
commerce transactions, the banking authority of India, Reserve Bank of India (RBI), has
defined a mandate that requires a similar two-factor authentication process to also be rolled
out for IVR transactions.
As there was no technology or precedent of authenticating an IVR transaction with two-factor
authentication, Mastercard has worked with IVR vendors to utilize existing investments in
technology, process and infrastructure to build a framework and specification using the 3-D
Secure protocol. As owner of the 3-D Secure Protocol, Visa has published a country-specific
(India) specification that defines a number of additional data elements in the existing 3-D
Secure messages.
For more information, refer to the Visa document 3-D Secure Functional Requirements—
Extensions for Mobile and IVR Transactions in India v1.1.
NOTE: All acquirers and issuers must ensure that they can send and/or receive contents in this
field up to the maximum length of 32. Note that applications utilizing this field, such as
Mastercard SecureCode, may provide contents that are less than the maximum length. For
Mastercard SecureCode specifically, this field will be 28 positions. This field should NOT
include any padding to meet the maximum length of 32 bytes.
What is an AAV?
The Accountholder Authentication Value (AAV) is a Mastercard® SecureCode™ specific token
that uses the Universal Cardholder Authentication Field™ (UCAF) field for transport within
Mastercard authorization messages.
It is generated by the issuer and presented to the merchant for placement in the authorization
request. This AAV can be proof of a fully authenticated or an attempted authentication
transaction.
The AAV is used to identify the processing parameters associated with the transaction. Among
other things, the field values will identify the:
• Issuer ACS that created the AAV. (This could be the Issuer ACS or, in the case of an
attempt, the Mastercard Attempt processing server.)
• Sequence number that can positively identify the transaction for that location
• Secret key used to create the Message Authentication Code (MAC), which is a
cryptographic method that ensures AAV data integrity, and binds the entire AAV structure
to a specific PAN.
UCAF is the mechanism that is used to transmit the AAV from the merchant to issuer for
authentication purposes during the authorization process.
MARP Exception
For merchants that have qualified to participate in the Mastercard Advance Registration
Program (MARP), Mastercard assigns a static AAV that conforms to the same format as an
issuer-generated AAV.
NOTE: MARP is closed to new business and will be decommissioned 1 June 2015. For more
details, refer to Europe Region Operations Bulletin No. 2, 3 February 2014.
This section provides specifications related to extensions that support Brazil domestic processing.
These extensions allow passing of data from the merchant to the issuer in 3-D Secure messages.
Extension Id visa.3ds.brazil_market
NOTE: The critical attribute must be set to “false” for all Extension fields defined in this
protocol extension specification.
Notices
Following are policies pertaining to proprietary rights, trademarks, translations, and details
about the availability of additional information online.
Proprietary Rights
The information contained in this document is proprietary and confidential to Mastercard International
Incorporated, one or more of its affiliated entities (collectively “Mastercard”), or both.
This material may not be duplicated, published, or disclosed, in whole or in part, without the prior written
permission of Mastercard.
Trademarks
Trademark notices and symbols used in this document reflect the registration status of Mastercard
trademarks in the United States. Please consult with the Global Customer Service team or the Mastercard
Law Department for the registration status of particular product, program, or service names outside the
United States.
All third-party product and service names are trademarks or registered trademarks of their respective
owners.
Disclaimer
Mastercard makes no representations or warranties of any kind, express or implied, with respect to the
contents of this document. Without limitation, Mastercard specifically disclaims all representations and
warranties with respect to this document and any intellectual property rights subsisting therein or any part
thereof, including but not limited to any and all implied warranties of title, non-infringement, or suitability
for any purpose (whether or not Mastercard has been advised, has reason to know, or is otherwise in fact
aware of any information) or achievement of any particular result. Without limitation, Mastercard specifically
disclaims all representations and warranties that any practice or implementation of this document will not
infringe any third party patents, copyrights, trade secrets or other rights.
Translation
A translation of any Mastercard manual, bulletin, release, or other Mastercard document into a language
other than English is intended solely as a convenience to Mastercard customers. Mastercard provides any
translated document to its customers “AS IS” and makes no representations or warranties of any kind with
respect to the translated document, including, but not limited to, its accuracy or reliability. In no event shall
Mastercard be liable for any damages resulting from reliance on any translated document. The English
version of any Mastercard document will take precedence over any translated version in any legal
proceeding.
Mastercard provides details about the standards used for this document—including times expressed,
language use, and contact information—on the Publications Support page available on Mastercard
Connect™. Go to Publications Support for centralized information.