Consolidated Feedback - Standard Draft 0.1
1. Do you have any questions or suggestions about the overall API Security Model?
Section | Sub Section | Participant ID | Feedback | Response |
API Security | Overview | 1 | Specification are sufficient | Noted |
2 | Overview is concise and introduces the topics to be discussed further in the document. | Noted | ||
3 | No question at this stage | Noted | ||
4 | It is not directly associated with the API itself, but we believe all participants will need to undertake audits. If that’s the case , it will be good to document all of the requirements which are required to get the access. | The application forms and related documentation requests necessary for a TPP to become licensed will be made available. | ||
5 | NO, THESE SEEM TO BE ADEQUATE | Noted | ||
6 | None | Noted | ||
7 | FEEDBACK | - | ||
8 | No specific questions or feedback. We are broadly support of the direction of security profile being based on FAPI 2.0 and the OAuth 2.0 Authorization Framework. | Noted | ||
9 |
|
| ||
10 | The API security model seems to be very banking specific, what variations should Insurance Companies expect in the overall security model? | The API Security Profile is data agnostic, that is, there’s no significant difference on the FAPI layer between Banks and Insurance companies. |
2. Do you have any questions or suggestions about the FAPI 2.0 Security Profile?
Section | Sub Section | Participant ID | Feedback | Response |
API Security | Security Profile - FAPI | 1 | FAPI is a comprehensive standard, might be a challenge in implementation. | For Data Providers we expect that the FAPI Layer will be implemented by the API Hub, and hence minimal effort to comply with FAPI is expected for the LFIs
|
2 | Question: Has FAPI 2.0 been finalised as a standard? The reduction in optionality is desirable. Security Profiles Section could do with a model or flow diagram. Under consent and management link, I assume this is a placeholder for a future document? | As of 24/04 the FAPI 2.0 WG is on their final definition round and expect to start the process to reach a final standard soon. We have included a flow diagram on the second version of the Security Profile. | ||
3 | FAPI 2.0 is good option and Bank use it for other markets | Noted | ||
4 | Will it require additional OpenID certification? For example, we are already certified by OpenID for FAPI 2.0 for our KSA entity. Do we need to obtain another certification for Lean’s UAE entity? | The FAPI 2.0 UAE Profile will be different from FAPI 2.0 Vanilla or any other variations and as such, a new certification would be required. We note that for all LFIs that will use the API Hub for sharing data and managing consents, The OpenID certification will be obtained centrally by the API Hub, so there’s no requirement to issue an individual certification. For Data Receivers a new will be required. | ||
5 | NO | Noted | ||
6 | None | Noted | ||
7 | Need clarification on what is required on LFI end to ensure & maintain FAPI security profile. There is no clarity on roles & responsibility of what TPP is required to maintain & what LFI has to adhere to & what is the role OFH will pay in the middle. E.g JWKS endpoint who will maintain & who will call? | The FAPI Security Profile will be maintained by the Open Finance Hub, and LFIs will be required to integrate with the API Hub. JWKS endpoints and certificates will be maintained and issued by the Trust Framework | ||
8 | No specific questions or feedback currently. | Noted | ||
9 | · Point 12 states "For consents that do not have an expiry, shall issue refresh_tokens without an expiration period, or, if not technically achievable, with an expiration period greater than 100 years.". Each consent must have an expiry set to a predefined period e.g. 2 years. This will allow user to reauthenticate and reauthorize the actions by reviewing. To overcome service disruption for its users, TPP could ask for consent renewal early. (As understood from April 17th call, consent refresh will be required which is 1 year at max. Documentation could be updated with clear explanation that there is no consent that will not expire.). · OAuth2.0 and mTLS should be mandatory for all the parties who want to be part of Open Finance network. · Implement Private Key JWT Client Authentication where clients signing JWT assertions using their private keys, which are then verified by the authorization server using the corresponding public keys. · Implement scopes and claims to manage and limit access to specific types of data and services according to the permissions granted to the client. · Use of PAR (Pushed Authorization Requests) to pre-register authorization requests before the client starts the authorization. · Implement encrypted tokens (JWE) to ensure that token contents cannot be tampered with or read while in transit or storage. · Use TLS1.3 where possible. · Data masking techniques should be used for all sensitive data. | The reasoning behind the refresh_token expiration is based on experiences with both the UK and Brazil. Both ecosystems started with a limited-time consent ( example: 12 months ) and transitioned to support consent with no expiration. When this change was rolled out, it was only possible for consents to be updated if they were initially created with a refresh_tokens that didn't include an expiration time. All other consents had to be revoked and recreated, something that could have been avoided if they were created with the change we are planning. | ||
10 | No specific feedback, we would like to understand variations expected for Insurance Companies? | The API Security Profile is data agnostic, that is, there’s no significant difference on the FAPI profile between Banks and Insurance companies. The only difference should be expected on the Consent Journey, more precisely on the Authorization Request, that is, the Payload that is sent when the user is redirected to authorize its consent. In this case the authorization details for Insurance should be different from the one from Banking as what the user will approve is slightly different, however, everything else should be similar. |
3. Do you have any questions or suggestions about the Registration Framework?
Section | Sub Section | Participant ID | Feedback | Response |
API Security | Registration Framework | 1 | All is good | Noted |
2 | Reasoning around the selecting OIDC as a solution is sound as issues with DCR did lead to completely avoidable issues in the UK market. On the table, principle and reasoning it mentions cross boarder integration. Is cross boarder integration something that is on the roadmap, or is it something we need to plan for in the nearer future? How often is it envisioned that a Data Provider will request the list of all Software Statements? | The Registration Framework has been updated to clarify this point : “It’s important to note that while there is an expectation of Cross Border Integration between Open Finance UAE and other Data Sharing Ecosystems, no agreements have yet been established by CBUAE, with this being a mid to long-term objective.” | ||
3 | No question at this stage | Noted | ||
4 | Do we impose having a dedicated dev portal for the banks? What security requirements TPPs / OFPs will need to be fulfilled to get the access to LFIs API. | Dev Portal will be provided as a central service by the OFP. From a purely technical perspective, TPPs will have to be FAPI 2 compliant RPs. Additional operational requirements may be placed on TPPs - this is in the regulatory / compliance space and tbc. | ||
5 | NO | Noted | ||
6 | None | Noted | ||
7 | FEEDBACK | - | ||
8 | No specific questions or feedback currently. | Noted | ||
9 | · In the section "Reasoning around Selecting OIDC Federation as the base for this Profile", the statement "This approach aims to streamline the data access journey, enabling Data Receivers (e.g., Fintechs) to interact with Data Providers without the need for a pre-registration step." might give misunderstanding as TPP needs to be registered by a Federation Admin first, manually. · In case an LFI doesn’t want to work with a TPP (e.g. TPP is not fully compliant), in current Federation Framework it seems not possible. What will be the solution for these cases? | Your understanding is correct. Once a Federation Administrator includes a TPP they are capable of easily connecting with a Data Provider. The documentation has been updated to clarify that we are talking about “Authorised Data Receivers”. As for restricting individual TPPs from interacting with LFIs, this is not possible. Once the Regulator and the Open Finance Structure authorize a TPP to operate within the Ecosystem, they are allowed to consume data from any of the providers that support the data that they are authorized to share. If there’s an understanding that the TPP should not be authorized to consume data because of a specific concern, this should be raised to the OF Structure or the Regulator so their Licenses are revoked and they are blocked from communicating with any Data Provider | ||
10 | · No specific feedback, we would like to understand variations expected for Insurance Companies? | The API Security Profile is data agnostic, that is, there’s no significant difference on the FAPI profile between Banks and Insurance companies. The only difference should be expected on the Consent Journey, more precisely on the Authorization Request, that is, the Payload that is sent when the user is redirected to authorize its consent. In this case, the authorization details for Insurance should be different from the ones from Banking as what the user will approve is slightly different, however, everything else should be similar. |
4. Do you have any questions or suggestions about the Certificate Standard?
Section | Sub Section | Participant ID | Feedback | Response |
API Security | Certificate Standard | 1 | Fine as per standards | Noted |
2 | Certificate Revocation Process will be included in future versions of this document? | The Documentation has been updated to clarify that certificates are expected to have a duration period of 13 months. The Process around creating and revoking certificates will be included in the Trust Framework Operational Guide, which should be released by June/July. | ||
3 | No question at this stage | Noted | ||
4 | It is advisable to document and standardize the complete certificate lifecycle which means documenting process for renewing certificates, supporting multiple versions of the certificates (there might be a temporal need of using old and new certificate version) | For the Go-Live it’s expected that all supported certificates will follow exactly the profile mentioned on the guide. Once the Platform is live we also expect to update the documentation to include all the relevant links for the Intermediates and Roots on the PKI. As for the Certificate Management and Lifecycle this will be included on the Trust Framework Operational Guide. | ||
5 | NO | Noted | ||
6 | None | Noted | ||
7 | What will be connectivity between OFH & LFI mTLS or via some other mechanism | To begin with, mtls will be supported to secure the connection between LFIs and OFH. We intend to introduce dpop as an alternative for LFIs to adopt in the near future (at their option). The use of MPLS is the subject of a seperate decision paper and tbc. | ||
8 | No specific questions or feedback currently. | Noted | ||
9 | · 1. When will the link to Open Finance UAE Certificate Practice Statement become available? · 2. What are the infrastructure and application layer protections for Ozone API Layer, Radium CA infrastructure and certificate management according to NIST SP 800-53? · 3. What is the FIPS compliancy level for HSM to be used for CA certificates management? · 4. How Radium platform's privileged accounts and their access will be protected, especially "Federation Administrator"? In case an account is compromised, what are the controls for detection and mitigation? · 5. Regarding message encryption, the statement is "Message Encryption JWE (JSON Web Encryption) to ensure the confidentiality of messages exchanged between participants". The content to be encrypted is not clear and need to be defined. We would like to have full message payload encryption as it’s a standard used in today's leading payment providers. · 6. RSA 2048-bit encryption or ECC (Elliptic Curve Cryptography) should be used for certificates. · 7. Certificate pinning will help here to prevent MITM attacks or we can also push for mandatory usage for mTLS usage. · 8. Certificate rotation and revocation should be in place. |
| ||
10 | No specific feedback, we would like to understand variations expected for Insurance Companies? | Noted |
5. Do you have any questions or suggestions about the User Experience Principles?
Section | Sub Section | Participant ID | Feedback | Response |
User Experience Principle | General | 1 | User experience is essential for so many elements:
| Noted |
2 | The current UX principles are fine and clearly set expectations on how to design a friendly and informative transaction journey for a user while using Open finance services. But to increase the overall awareness, and trust in Open Finance among the users TPP/LFIs need to establish an information repository or a help centre for their customers (can be bundled with the consent management page) where users can get access to:
And this information page can also be templatized/standardized across TPP/LFI so the user is comfortable seeing similar information across participant interfaces, and this will help generate more trust in the platform and clampdown on misinformation by bad actors. | A website will be made available from the Open Finance Company when established which will contain this type of content. | ||
3 | No question at this stage | Noted | ||
4 | While it’s good to have a good text description as it’s in point no 3. It would be useful for participants to see sample designs which should be followed by TPPs, OFPs, LFIs. While the expectations are clear from the MUST and SHOULD statements. There is too much subjectivity in the language as proposed. The standard should outline what specific information must be presented to users, and where applicable the correct terminology to use to describe that information - terms like ‘straightforward and easy to use interface’ leave a large amount of gray area both to TPPs and LFIs which can become somewhat unenforceable. | Sample designs with CBUAE branding will be available. Time lines to be confirmed. Section 3 has a detailed textual description of the main user experience principles that the Standard follows and that participants must/should follow when designing their user experience. Samples of the designs are shonw in the wireframes in the Banking Service Initiation and Data Sharing pages. The page in section 3 only documents the principles at a high level. The Service Initiation and Data Sharing pages in the Banking section provides the exact information that must be dsiplayed to the users by TPPs and LFI during each differct consent scenario. Similarly, it provides the correct teminology and language to use to each user screen. | ||
5 | NO | Noted | ||
6 | None | Noted | ||
7 | Provide the sample “approved” content of the Consent information page. For example, the requirements for the Transparency, Trust and Sense of Control are very robust in terms of information provided – but then mentions as unhelpful element “Where there are fewer screens but a significant amount of text on the screen” | Sample “approved” content is included in the wireframes in the Banking Service Initiation and Data Sharing pages. | ||
8 | Principles should be exactly that – principles, not regulations. On the basis that the ‘Use Experience Principles’ are provided and governed as ‘principles’ (and not prescriptive mandates), we are broadly in line with the proposal. However, LFI’s as regulated entities are obliged to do whatever they deem necessary to protect their clients and themselves against risk and fraud and the principles MUST be broad enough to enable LFIs to carry out this duty. An example may be additional step-ups in authentication (based on the LFIs own risk assessment) to validate the authenticity of a consent request. In some cases, this may add additional friction to the flow, but this would be by design, in order to raise the threshold required to appropriately validate the user/request. LFI’s MUST have discretion to authenticate users/consent requests, as they deem appropriate, and consistent with, the measures they apply to their own channels. We operate in a multi-lingual market; however nothing is covered in the principles with regards to language preferences. We should consider a language parameter in the consent interaction, to enable English or Arabic language preferences to be handed from the TPP to the LFI, to ensure a seamless experience. It is possible that users may have an Arabic language preference on their LFI channel, but be coming from an English TPP site/service (or vice versa) – we need to consider how to handle such scenarios (e.g. should the session override the existing channel language preference). | Noted The key principle here is that of parity between direct and API channels - there should be no additional friction carte blanche for all transactions initiated through API channels. LFIs will have the flexibility to apply additional authentication where appropriate based on risk factors. LFIs will be measured on successful authentication rates across channels and will need to demonstrate that risk measures are commensurate and not barriers. The multilingual aspect is noted. LFIs could utilise the same measures that they utilise on their direct channels (e.g. http | ||
9 | We suggest the summary information step for vulnerable users should be provided to all users for the first time they use open finance. · Do the User Experience Principles ensure accessibility for users with disabilities or special needs? | The summary information step is specifically designed for usage by vulnerable users, who may not be in a position to get informed appropriately for the use of Open Finance. For standard users, the information and education about Open Finance must be performed by the ecosystem participants. No, the current user experience example wireframes do not cater for users with disabilities or special needs. LFIs and TPPs are expected to adapt their UX to accommodate for these users. | ||
10 |
|
This is an option for LFIs that do not have mobile channels or that are not able to offer the mobile authentication experience.
|
6. Do you think that the Consent should also include a predefined list of purposes for the payments or data sharing?
Section | Sub Section | Participant ID | Feedback | Response |
Consent Setup | General | 1 | It is recommended to have in the consent for audit and compliance matters. On the other hand, For any payment, purpose is mandatory for initiation by the LFIs, which will be part of the payment initiation request. So, shall TPP collect those mandatory from the user and pass it in the payment request along with others parameters to LFI through OFP? Alternatively, when user authenticate the payment request in LFI app, LFI to display the additional fields needed and then execute the request (example; in single payment request)? Having said that for consent standards for TPPs for look and feel and user journey through its app. | The purpose for the consent if included will be sent by the TPP. This purpose is around the kind of use case that the Open Finance request is made for example, Account Aggregation, Personal Finance Manager,Tax Filing, Wallet Topup, P2P etc This is not to be mixed with the purpose which the user is asked to enter by the LFI for example in an international payments etc. That purpose which is specific to use cases like international payments or SME payments will also be sent by the TPP as part of the consent.
|
2 | Having a predefined list of purpose statements is a good idea to codify the consent structure, For payment transactions we can create a multi-level classification, level 1 will indicate participants in the txn and flow of funds (left to right) (example given below)
On Level 2 will be single payment or multiple And level 3 will have a brief description explain the context (this can be a free text field to be entered by TPP) The way the consent table is designed in the multi payment section of the shared document is a good example. But for data sharing request it might be tough because we will have to think an exhaustive list of business use case and codify them, and still make a provision to accommodate new use cases in future. Question: What are rules regarding Consent request expiry (authorization request expiry)? consider a scenario where a consent request is triggered and customer has not approved it, till when the consent request will remain valid. Question: This was raised in the workshop as well, in case of accounts that require multi-level authorization (joint a/c or business a/c), what happens if the authorization request expiry is reached but all consents have not been granted? Question: In case of multi-level authentication, how does LFI keep the TPP informed of consent progress, just one time update of consent granted when all approvals are in place, or approval by approval communication to TPP (ideally this should not be recommended because this is a risk revealing a client’s approval matrix to the TPP) | Agree that the purpose needs to be a codified list and it will be on the lines of Account Aggregation, Personal Finance Manager,Tax Filing, Wallet Topup, P2P etc We will consider your input on also indicating the participants as part of the coded list. Re: Authorization Request Expiry: The consent authorization request expiry is defined by the TPP as in https://openfinanceuae.atlassian.net/wiki/spaces/standardsv1draft2/pages/52528830/Common+Rules+and+Guidelines#8.-Authorization-Time-Window Re: Multi Authorization The consent will move to a Rejected state as explained in https://openfinanceuae.atlassian.net/wiki/spaces/standardsv1draft2/pages/56885249/Consent+Setup#4.-Consent-States Please refer to the section which details the flow for multi authorization Re: Notifications on Multi Authorization Please refer to the following two sections which details on how the TPP is notified. The TPP will receive the list of pending authorizations. |
© CBUAE 2025