API Strategy For Open Banking v2.2
API Strategy For Open Banking v2.2
Nordic APIs
© 2018 - 2022 Nordic APIs
Contents
Supported by Curity . . . . . . . . . . . . . . . . . . . . i
Supported by Curity
Nordic APIs was founded by Curity CEO Travis Spencer and has
continued to be supported by the company. Curity helps Nordic
APIs organize two strategic annual events, the Austin API Sum-
mit in Texas and the Platform Summit in Stockholm.
Curity is a leading provider of API-driven identity management
that simplifies complexity and secures digital services for large
global enterprises. The Curity Identity Server is highly scalable,
and handles the complexities of the leading identity standards,
making them easier to use, customize, and deploy.
Through proven experience, IAM and API expertise, Curity builds
innovative solutions that provide secure authentication across
multiple digital services. Curity is trusted by large organizations
in many highly regulated industries, including financial services,
healthcare, telecom, retail, gaming, energy, and government
services across many countries.
Check out Curity’s library of learning resources on a variety of
topics, like API Security, OAuth, and Financial-grade APIs.
Follow us on Twitter and LinkedIn, and find out more on cu-
rity.io.
Foreword: Embracing Open
Banking
by Eyal Sivan
It is with great pride that I write this foreword, for it is no exagger-
ation to say that Nordic APIs played a pivotal role in my journey,
which led me to dedicate my life to open banking.
The first time I ever heard of open banking was while presenting
at the Nordic APIs Summit event in Stockholm, where I met
Gunnar Berger from Nordea, featured here in this book. After
listening to him speak, describing large banks as battleships and
fintechs as speedboats, I discovered he had a curious title that I
had never heard of before: Head of Open Banking.
After speaking to Gunnar, doing some reading, and listening to
European politicians argue about PSD2 on YouTube, I became
immediately fascinated with open banking and its seeming con-
tradictions. Here was a situation where governments were the
ones driving innovation while market forces were slowing it
down, a situation where regulation was trying to reduce barriers
to entry instead of erecting them. In open banking, there seems
to be an attempt to create a financial system that is both more
competitive and healthier at the same time. In short, a better
way to handle money.
Upon further research, it became clear open banking activity
was taking place everywhere, not just in Europe. Moreover, re-
gardless of whether the approach being taken was driven by
regulation or by the market, the aim seemed to be the same:
to develop a common standard, enabling all the players in the
Foreword: Embracing Open Banking iii
companies, large and small, win because they can create and
build on open standards; and banks win (although many don’t
know it yet) because there is more banking activity overall. A
win-win-win-win.
Today, I am fortunate enough to hold the same title as my friend
Gunnar, Head of Open Banking, and I cannot help but smile at
the thought of it. Not merely because I have a good job at a
great company, but because it feels like I am helping to build
something bigger.
It is my distinguished pleasure to assist Nordic APIs in spreading
knowledge of open banking. I sincerely hope that you come
away from this book as excited as I am about the possibilities
of open banking and the open data future it makes possible.
– Eyal Sivan
Head of Open Banking at Axway
Mr. Open Banking
mropenbanking.com
Preface: APIs Support the
Open Banking Movement
by Bill Doerrfeld
Since Nordic APIs ran our first story on open banking and FinTech
in 2016, our writers have been carefully attuned to the world of
banking software architecture.
We’ve traced the EU’s Payment Services Directive 2.0 (PSD2)
regulation, and the rise of Application Programming Interfaces
(APIs) to help externalize personal data for end consumers. We’ve
also followed the modularization of banking components, as
valuable infrastructure becomes reusable through modern mi-
croservices designs.
Not only are financial institutions opening up with APIs to meet
global regulations, but innovative banks are finding success in
fully-fledged API-driven banking products, supplementing core
business models. Though there are many new opportunities,
banks must apply a keen strategy to accel in this new paradigm.
New entrants must be made aware of open banking pitfalls and
marketing gaps.
At Nordic APIs, we live for new strategies and technologies and
strive to introduce the benefits of API-first platforms to technical
and non-technical audiences. In our volume, API Strategy for
Open Banking, we compile our top articles on open banking from
the Nordic APIs writing team.
Within each chapter of API Strategy for Open Banking, a Nordic
APIs blogger digs into a niche aspect of open banking, covering
Preface: APIs Support the Open Banking Movement vi
1. Compliance
Conclusion
It’s fair to say that the current noise around open banking is
almost deafening. We constantly hear about the potential of this
new market — driven by APIs — to change financial services
by increasing consumer choice, crushing incumbent banks, or
making a barrel of cash for a cool startup.
There is, however, more to open banking than hyperbole. The
opportunities and challenges – for the incumbent banks and
Bring on the Players: Who Wins in Open Banking? 10
• Comply-first Providers
• Protectionists
• Open-first Providers
Comply-first Providers
and in the API economy at large. The first and most important
goal for comply-first providers is to meet regulatory deadlines
and avoid fines, penalties, or bad press.
An interesting side note that lends weight to this argument is
a report conducted by Paysafe. In Open Banking and PSD2: A
confused roadmap to innovation, they cite current impasses
in the landscape and the fact that banks “have had a mixed
approach to PSD2. The majority have treated it as an exercise
in minimum compliance rather than looking for customer-led
outcomes.”
Examples of such organizations are not hard to find. Some qual-
ities of comply-first providers include:
Protectionists
Open-first Providers
There are, of course, the players for whom open banking is the
reason they get up in the morning. Open-first providers are the
API consumers and providers who are at the bleeding edge of
open banking, looking to take advantage of or exploit opportuni-
ties in the new market. Most of the open-first protagonists carry
the “FinTech” label, but that’s not to say they have to. There
are the new kids on the block — the likes of the Starling Bank
— who are opening developer portals to be at the forefront of
Open Banking as a banking services provider. Established banks
like Nordea are also taking a plunge into this market, with or
without the major standards wrappers like UK Open Banking or
the Berlin Group Standards.
Bring on the Players: Who Wins in Open Banking? 14
Final Thoughts
Open Banking still has some way to go before the market reaches
anything near a state of maturity. In its current guise — with
multiple technical standards being developed and APIs coming
into the market all the time — it’s hard to see exactly how it will
develop. The key activity for many has been all about regulatory
compliance. So, when all the banks become API providers, what
happens next?
The most likely scenario is the Comply-first, and Protectionist
players will realize how big the opportunity really is. By provid-
ing APIs, they have already begun the transition to becoming
banking service providers. If they accept that as their raison
d’etre and accept that APIs can be used as a means to deliver
on their strengths, the developments in the next phase of open
banking could be positively seismic.
Case Study: Nordea’s
Journey to PSD2
Compliance, 300 Signups in
72 Hours
by Thomas Bush
Come Christmas, Gunnar realized it was only a year until the re-
quirements for PSD2 had to be fulfilled — or so he thought. With
that in mind, he asked his development team to focus just on
the compliance aspect of their new open banking infrastructure,
setting aside the more creative work.
While this wasn’t much fun for the developers, it got the project
back on track and meant that Nordea could start looking for
beta testers from February of 2017. Without giving it too much
thought, they published a signup page where external devel-
opers could apply for early access, expecting to get only a few
signups. Who would want to test out the boring new legal stuff,
anyway?
Case Study: Nordea’s Journey to PSD2 Compliance, 300 Signups in 72 Hours 19
Within 72 hours, the page had garnered 300 signups, with devel-
opers both big and small leaving enthusiastic comments about
what they wanted to build with the platform. Supposedly, Nordea
was the only bank communicating with the Nordic FinTech world
at the time, although by this point, the “communication” was
limited to just a signup form.
Final Thoughts
What is FinTech?
APIs are yet again another vital cog driving disruption, now fu-
eling FinTech startups and open banking data initiatives world-
wide. According to Weiss, Fidor decided to build their banking
platform with a community of third party developers in mind for
the following reasons:
small developer teams unfamiliar with the many laws that regu-
late these handlings. Banks can provide this knowledge via APIs
and partnerships to help FinTech companies excel, especially
those who are creating APIs themselves.
Banks need to create well-designed, standardized APIs, along
with self-serving adoption processes complete with documenta-
tion, sandboxes, simulated account structures, and more to get
in the hands of developer users quickly. Onboard more partner-
ships and make it cheaper for FinTech startups to launch, and
you’ve got a recipe for a banking API success.
Weiss recognizes a long term goal for Fidor is leveraging their API
to allow developers to create add-on services in a marketplace
format, enabling the end-user to customize their banking expe-
rience. The idea is that a bank can provide an API and open app
store (i.e. appstore.mybank.com) and pair apps with specific
accounts. Win-win-win. Banks can acquire new partners, third
party developers bring innovation, and customers are empow-
ered with more choice and customization. It’s true that for banks,
building an application manager is no easy task, however, but
API management solutions exist to aid this process.
Weiss admits that even though their full production API is mak-
ing 30,000 requests daily, the team consistently strives to reit-
FinTech and APIs: Making the Bank Programmable 26
Proof of Concepts
holdings were open for the public eye? How could this data be
used programmatically to create new, ethical services?
• Open standards
• Open Source
• Open data options
• Open innovation
It’s been proven that customers are interested in using new en-
trant services rather than their own. According to the Millenilal
Disruption Index, “71% would rather go to the dentist than listen
to what banks are saying” — proof to some that the industry is
ripe for “seismic” change.
Conclusion
Doing all of the above will have significant effects on the current
How Can Consumers Relate To Open Banking? 34
Control Matters
You’ve probably heard the whole “banks are becoming tech com-
panies” sentiment. The “X are becoming tech companies” idea
has been around for years, and used to depict the uberization of
various industries. It captures evolution in the way we consume
and use everything; from food to money. As consumers, we want
options at our fingertips, and perhaps it’s this forcing banks
across the world to open up their services with APIs and mi-
croservices, and ultimately turning them into tech companies.
How Banks Are Becoming Uberized 39
Time to API Up
The decision had been made. CIBC was going to build their own
microservice and API architecture, and now it was time to get
How Banks Are Becoming Uberized 42
work. But before they could do so, they’d need to establish their
guiding principles — among other things — Eyal explains.
Open Banking has been on our radar for several years now, with
Nordics APIs first publishing a post on PSD2 back in 2016. Since
then, there’s been continual coverage in the financial industry
press on the promise of Open Banking, with predictions of a
“revolution” as FinTechs unlock the banking market and provide
the tools, apps, and banks do not offer functionality that bank
customers want yet.
How Does Open Banking Apply to US Banks? 46
Regulation in Europe
Regulation in the US
Final Thoughts
In any sizable organization, it’s hard to feel like you can make
a difference with just your tech skills. There’s no surprise that
software engineer Flavia Sequeira felt precisely that when she
joined ING, the multinational banking firm with over 50,000
employees, in 2013.
You see, building an impactful IT product can take a lot of time
and effort. So, it’s hard for management to get excited about
that when it doesn’t offer an immediate value proposition. Who
Case Study: From API Doing to API Thinking at ING Bank 53
This means that, whereas web services might offer just a single
service or set of services for customers to make use of, public-
facing APIs allow for much more interactivity with your product,
such as tracking customer journeys.
The above anecdote makes it clear that Flavia joined ING with
a completely different mentality towards APIs. She wasn’t as
much interested in API doing as she was API thinking, and that
was an entirely novel approach.
She didn’t ask herself: * What data and functionality do we think
is useful for users? * How can we provide them with that data and
functionality? (In other words, how we do we build this API?)
Instead, she asked herself: * How do our users want to engage
with our services and what do they want to build? * How can we
make it as easy as possible for them to do so? * How will that
better help us understand and serve the needs of our customers?
Of course, that first set of questions — the API doing questions
— are just as important as the second set of questions. In fact,
they’re the more practical questions for a developer to ask.
However, it’s the second set of questions — the API thinking
questions — that really justify an organization to build an API.
What’s more, they solve that initial dilemma of convincing man-
agement what APIs have to offer.
See, unlike the business tools mentioned above, APIs offer just
as much to the user as they do to the bank itself. API usage in
banking, which is part of a greater movement called open bank-
ing, allows FinTech services to draw from the huge information
base and varied functionality that banks already have.
Think about it — there are thousands (if not millions) of third
and first-party apps built into our mobile phones, social media
platforms, and even houses. Yet there’s hardly an equivalent for
today’s banking services.
Imagine having an app store for your bank account. You could
choose from thousands of services, built with the collective
thinking power of third-party developers — big and small — that
would solve a multitude of problems and change banking for
good.
The possibilities for this are endless: collect all your accounts in
one place, send cash over social media, manage your spending
patterns, verify past transactions, and so forth.
With the way things are today, it’s not that it can’t be done,
but more that it’s impractical. Of course, any financial services
— banks included — need to be well-secured, with information
locked away in internal systems. This is why the existing (and
highly limited) model of giving FinTech services direct access
to your account (known as screen scraping) simply can’t go on.
The finance management service Mint performs screen scraping
regularly — gaining direct access to your bank accounts — but it
feels safe enough knowing their parent company, Intuit, already
holds millions of social security numbers.
However, requiring user login information is a significant barrier-
to-entry for smaller FinTech developers. These applications may
only need a limited scope of data to operate, such as your spend-
ing dates or locations your credit card has been used at.
APIs are an obvious solution to this, allowing third-party services
Case Study: From API Doing to API Thinking at ING Bank 57
When Flavia joined ING, they didn’t just lack in API execution, or
“API doing”, but they also lacked in API understanding, or “API
thinking.” This was making it hard to execute a definite platform
strategy.
She’s solved this by encouraging others to look at APIs holisti-
cally — to understand what they bring to an organization and its
clients or partners, and to employ that same information to then
build better IT products.
Along Flavia’s journey, her career description has changed from
“software engineer” to “API thinker.” She doesn’t just build IT
products at ING; instead, she educates fellow developers on how
those products, especially APIs, can be designed true to both
ING’s values and its customers’ experiences. This, in turn, will
allow them to create a better overall customer experience.
Ultimately, APIs aren’t made from doing or thinking alone — it
should be a mix of the two. Despite Flavia being an API thinker,
there has to be a number of API doers at ING, too.
Open Banking Amplifies the
Need For Definition Driven
APIs
by Saoirse Hinksmon
• Collaboration
• Quality
• Scalability
• Availability
• Performance
• Security
• Compliance
Service Virtualization
Rather than mocking and sandboxing, which can limit how many
scenarios can be tested at a time, service virtualization empow-
ers teams to use virtual services instead of production services,
enabling frequent and comprehensive testing even when key
components are missing from the system architecture. It is es-
pecially useful in the development of complex cloud, API, and
SOA-based systems, as well as at any point in a production cy-
cle where important hardware and software components aren’t
readily available for testing purposes. For API design and devel-
opment in the financial industry, service virtualization offers a
variety of benefits:
• Rapid creation
• Virtualization can be pre-packaged, modified, and reused
• Is not heavily manual
• Import real data into tests for more realistic results
Open Banking Amplifies the Need For Definition Driven APIs 63
• Ensure that any new updates or changes will not break the
monitors in production
• Gain a view of performance from an on-going perspective
• Capture performance and functionality metrics outside of
the specific test case
Open Banking Amplifies the Need For Definition Driven APIs 64
Potential Vulnerabilities
While financial data has its own set of caveats and considera-
tions, it is ultimately just data, and as such, can be considered
the same as any set of data would be regarded as when it comes
to potential vulnerabilities. Every data set is governed by three
simple letters – CIA.
As any security professional can tell you, CIA is an acronym that
represents the security scope when it comes to secured sys-
tems – Confidentiality, Integrity, and Availability. Understanding
these three concepts will help highlight vulnerabilities, and can
expose serious issues that are often hidden away from more top-
level audits.
In Confidentiality, the concern is keeping data private and ex-
posing it only to those who have the right to view it. This is a
significant part of financial protection, as the account holders
will not be the only people accessing the data. Investigators,
auditors, bank managers, employees, and others may have to
access bank data from time to time. As such, ensuring different
levels of Confidentiality is key to ensuring vulnerabilities are
kept to a minimum.
Integrity is concerned with data being stored and unaltered
between uses. This is majorly important for banks, as data in the
ledger states the value of holdings – allowing amounts, points of
origin, transactional information, and more to be altered would
nullify the entire purpose of a financial institution and would
result in absolute abject confusion and panic. Thus, securing sys-
tems from incorrect write actions and backing up these ledgers
in secure form for restoration is key to ensuring these vulnerabil-
ities do not propagate.
High-Grade API Security For Banks 70
API Keys
but only as a method of proving the user is who they say they are.
Compound this with the fact that API Keys lack control in granu-
larity (often either being a “yes or no” option for identification),
and you very quickly run into a situation where your API Key is
not enough.
The vast problems with API Keys come when end users, not
developers, start making API calls with these Keys, which more
often than not expose your API to security and management
risks. What it comes down to is that API Keys are, by nature, not a
complete solution. While they may be perfectly fine for read-only
purposes, they are too weak a solution to match the complexity
of a high-use API system. Whenever you start integrating other
functionality such as writing, modification, deletion, and more,
you necessarily enter the realm of Identification, Authentication,
and Authorization.
In other words, API Keys serve a particular purpose, and can
be used to significant effect for read-only functions of publicly
exposed endpoints on insecure data (such as verifying server sta-
tus or beginning a more stringent authorization/authentication
process), but should not be considered a “security solution.”
OpenID Connect
Conclusion
From “Financial Grade APIs Using OAuth and OpenID Connect,” by Travis
Spencer, CEO at Curity.
“In cases where it’s possible for a bad actor to intercept the
credentials, they may be able to entirely sidestep the use of
mutual TLS tokens outlined above.” He also highlights that this
is something particularly prevalent in mobile devices.
Is OAuth Enough for Financial-Grade API Security? 80
The solution? Proof Keys for Code Exchange (PKCE). “We can
add a step 0 into this process…The legitimate application uses
a proof key to prove that it is the actual application that started
this flow, with the OAuth server refusing to finish it unless that
proof is verified.”
You could think of this as a more robust version of Dennis Nedry’s
“ah ah ah, you didn’t say the magic word” in Jurassic Park…
It seems likely, for now at least, that the status quo will continue
as the norm in the world of financial and financial grade APIs.
From PayPal and Stripe to Coinbase, and probably Facebook’s
Libra in the not too distant future, there are plenty of financial
services utilizing APIs that are built around existing frameworks
and services like OAuth.
If actual financial services are already relying on these, then
there’s very little incentive for other API developers to go be-
yond what already, in effect, constitutes financial grade API se-
curity…barring massive data leaks or the exposition of serious
vulnerabilities.
In the meantime, we would expect to see OAuth continue to
be one of those rare exceptions: a service built with something
minor (securing blog comments) has effectively expanded to
something much more robust than its original intent.
OpenID Connect: Overview
of Financial-grade API (FAPI)
Profile
by Chris Wood
What is FAPI?
might seem obvious, but for the uninitiated, here are some key
points:
The Read and Write Profile adds further constraints that are
considered applicable for creating or updating account data
through – for example – initiating a payment. Arguably the most
important additional constraints introduced by the Read-Write
Profile are:
Decoupling Authentication:
Client-Initiated Backchannel
Authentication
Both these needs are at odds with the majority of Open Banking
implementations. Most processes expect to redirect a single user
to perform the acts of authentication and authorization either
within the browser or via a claimed URL to a mobile banking app.
Some standards have loosely addressed some aspects of this;
for example, the UK standards exposes a “MultiAuthorization”
property in their Consent resource. However, the authorization
workflow in this scenario is a facet of the API standards rather
than the security protocol, which seems somewhat orthogonal
and relies on the client polling an API to discover changes in the
authorization state.
CIBA provides the flexibility to address these needs elegantly.
Rather than expecting a synchronous or semi-synchronous re-
sponse, CIBA anticipates an entirely asynchronous workflow:
Final Thoughts
The prevalence of the FAPI is, of course, only as good as its adop-
tion. There will be a lag between Implementers Drafts becoming
available and their inclusion in supporting open source and
vendor solutions. Hopefully, adoption will continue to increase
as the suite of standards can only serve to provide more secure
implementation in Open Banking ecosystems.
Developers cannot view security as a static notion that, once
dealt with, can simply be marked “Done” and forgotten. Open
Banking ecosystems will continue to evolve, especially as we
move from solely banking-focussed APIs into the realms of Open
Finance. As such, how we define and apply appropriate security
protocols must also evolve. This is especially true when we
consider the role of digital identity and its relationship with the
OpenID Connect stack. The union of identity and “open every-
thing” ecosystems means security profiles such as FAPI will only
become more critical.
Case Study: Growing
Internal API Consumption in
Danske Bank
by Thomas Bush
Set-and-Forget Performance
Old Habits
The Fixes
Friction
Developers who did want to adopt the new APIs were met with
another issue: friction. To start with, there was friction in dis-
covering the new APIs. Indeed, the team offered an API discov-
ery tool, but John says that simply too much “stuff” had been
pushed into there, leading to early frustration.
A subsequent cause of friction was security tokens. Developers
were unsure how to create them, which should come as no
surprise, as they knew that they were generated from the main-
frame. This made the new REST APIs difficult to consume from
separate platforms.
The Fixes
Marketing
The Fixes
The fix for this lack of marketing was simply: the team had to
get out and sell their new APIs. This meant knocking on plenty
of doors — development directors’, engineers’, architects,’ CIOs,’
and even business folks’ — and sharing their latest develop-
ments. John found that with each meeting, the initiative gained
momentum.
The Results
Summary
Even the best APIs can suffer from slow adoption. In this post,
we looked at three reasons why Danske Bank’s internal APIs
were slow to gain traction. According to John Madsen, a Prod-
uct Owner who fought on the frontline, old habits, onboarding
friction, and a lack of promotion are major causes of poor API
growth. With any luck, the solutions presented herein should
help to minimize these issues, ensuring sure and steady adop-
tion.
It Started With PSD2 and
Personal Data
by Chris Wood
Regulatory Impact
The rationale for standard banking APIs is clear, and there has
always been the potential for a large bank to “break cover” and
offer a suite of APIs with access to customer data in advance of its
rivals. However, in the absence of this early mover encouraging
other banks to offer APIs by way of market competition, regula-
tory forces are now likely to coerce many into taking action.
PSD2 requires banks to allow third parties to access a given
customer’s data, where that third-party is acting as a data con-
sumer or a delegated authority: The EU describes these as “third
party providers (TPPs) [who] offer specific payment solutions or
services to customers”. As this could include making a payment
on a customer’s behalf, PSD2 grants third-parties considerable
power. There is a great deal of debate how this might be imple-
mented from a technical perspective, but an obvious solution
for anyone familiar with the API economy is the use of APIs to
facilitate access. Moreover, APIs could be coupled with a rich
framework such as JSON Web Tokens under the guise of OpenID
Connect to provide strong authentication and non-repudiation.
It is an oversimplification to say using APIs and OpenID Connect
would immediately provide the framework for implementing
PSD2, and some of the logical architecture has already been
framed: it includes the introduction of Account Information Ser-
vice Providers that will provide a single view across multiple cus-
tomer accounts. However, with the right governance framework
these technologies could provide the bedrock of a new open
It Started With PSD2 and Personal Data 102
Final Thoughts
It will take work to come to fruition but these are exciting times
for us all as consumers. It will be fascinating to see how banks
receive the PSD2 regulation, and how this personal data network
develops into the future.
Nordic APIs Resources
Create With Us
Nordic APIs Resources 107
Nordic APIs Resources 108
Nordic APIs AB ©
Facebook | Twitter | Linkedin | YouTube
Blog | Home | Newsletter