...
Strong Customer Authentication (SCA) is a generic term used to describe multi-factor user authentication (MFA) supported by proofs-of-authentication, which came to prominence in the open banking due to its inclusion as a Regulatory Technical Standard (RTS) under Payment Service Directive 2 (PSD2) in the European Union (EU). It sets the requirements for authenticating a Payment Services User - the account-holding customer who is making a payment - that must be adhered to in local law. There are two key provisions that were heavily focused on in creating standards for open banking in the EU namely:
...
Principle | Rationale | |
---|---|---|
1 | User authentication is implemented using multi-factor authentication where two factors are required to authenticate a given User | Multi-factor authentication MFA is an existing best practice for User authentication that is prevalent in most open banking implementations. |
2 | Multi-factor authentication MFA is based on the attributes of Inherence, Knowledge and Possession | Inherence, Knowledge and Possession are established factors and can be readily supported in the majority of implementations of multi-factor authentication. |
3 | A given User authentication operation is uniquely identified | An audit trail should be provided to link a User authentication operation with an action in the open finance ecosystem. Establishing this link will provide solid foundations for activities such as fraud prevention and dispute resolution. |
4 | A given User authentication operation is correlated with a given data sharing or service initiation consent | A given User authentication operation should be linked to a consent that has been agreed between a TPP and the User, either as a first-time consent or reauthorisation of a long-term consent. Establishing this link provides accurate access controls established as a consequence of the User authentication operation and subsequent authorisation undertaken by the User. |
5 | Open standards are preferred to a bespoke implementationAttestation of User authentication is available as a cryptographically-verifiable proof-of-authentication | A given User authentication operation should be linked to a private key unique to the user. The presentation of a cryptographic signature generated using the private key can be verified using a corresponding public key that can be access by a relying party who depends on the User authentication operation to provide access to services or data. |
6 | Open standards are leveraged wherever possible | Using open standards is a recognised means to create an interoperable and extensible ecosystem. Organisation should look to leverage the standards and implementations described in the Emerging Standards section below. |
3. Controls
The following controls should be applied when implementing User authentication for use in the open finance ecosystem.
These controls are intended to be prescriptive, but not exclusive. Other controls, such as the OWASP Mobile Top 10 should be considered, together with existing organisational controls that govern mobile and internet banking.
Control | Rationale | Principles | |||||
---|---|---|---|---|---|---|---|
1 | Mobile apps that are used to authenticate Users are installed from an authorised and certified source |
| |||||
2 | Mobile apps that are used to authenticate Users verify they are installed on a mobile operating system version for which they are approved |
| |||||
3 | A given installation of a mobile app an application that performs User authentication is correlated to the signature of mobile device on which it is installed |
| |||||
4 | A given User is correlated to a private key, used for the purposes of User authentication, which in turn is correlated to a given device |
| |||||
5 | Private keys created on a mobile device for purposes of authentication are stored in the device security module | 5 | A biometric gesture is used to authenticate the User | 6 | A given authentication operation provides proofs-of-authentication that can be verified by a relying party based on a shared public key | 7 |
|
6 | Private keys are represented by their corresponding public key or certificate, which can be published for use by relying parties |
| |||||
7 | Use a biometric gesture (digit, face) as an authentication factor |
| |||||
8 | A given authentication operation accepts an input parameter that uniquely links a given authentication operation to a given consent or consent signature |
| |||||
9 | The identifier used to link to a given consent or consent signature is validated before a User authentication operation is initiated |
| |||||
10 | A given User authentication operation is asserted using a complex object that describes the conditions of the User authentication operation |
| |||||
11 | The assertion of a given User authentication operation is signed using the private key available in the device security module |
| |||||
12 | Signing of the assertion of a given User authentication operation is completed using an appropriate function or method available on the device that provides signing access |
| |||||
13 | Apps must verify the identity of external services on which they have a dependency for User authentication operations |
|
3. Emerging Standards
At the time of writing the standards and technologies considered are if the context of this page areconsistent with the principles and controls above as follows:
FIDO2
Passkeys
OpenID for Verifiable Credentials
Secure Payment Confirmation
...