MasterCard SecureCode Merchant Implementation Guide 03 January 2014 Version
MasterCard SecureCode Merchant Implementation Guide 03 January 2014 Version
3 January 2014
Notices
Following are policies pertaining to proprietary rights, trademarks, translations, and details about
the availability of additional information online.
Proprietary Rights
The information contained in this document is proprietary and confidential to MasterCard International
Incorporated, one or more of its affiliated entities (collectively “MasterCard”), or both.
This material may not be duplicated, published, or disclosed, in whole or in part, without the prior
written permission of MasterCard.
Trademarks
Trademark notices and symbols used in this document reflect the registration status of MasterCard
trademarks in the United States. Please consult with the Customer Operations Services team or the
MasterCard Law Department for the registration status of particular product, program, or service names
outside the United States.
All third-party product and service names are trademarks or registered trademarks of their respective
owners.
Disclaimer
MasterCard makes no representations or warranties of any kind, express or implied, with respect to
the contents of this document. Without limitation, MasterCard specifically disclaims all representations
and warranties with respect to this document and any intellectual property rights subsisting therein or
any part thereof, including but not limited to any and all implied warranties of title, non-infringement,
or suitability for any purpose (whether or not MasterCard has been advised, has reason to know, or is
otherwise in fact aware of any information) or achievement of any particular result. Without limitation,
MasterCard specifically disclaims all representations and warranties that any practice or implementation of
this document will not infringe any third party patents, copyrights, trade secrets or other rights.
Translation
A translation of any MasterCard manual, bulletin, release, or other MasterCard document into a language
other than English is intended solely as a convenience to MasterCard customers. MasterCard provides any
translated document to its customers “AS IS” and makes no representations or warranties of any kind
with respect to the translated document, including, but not limited to, its accuracy or reliability. In no
event shall MasterCard be liable for any damages resulting from reliance on any translated document.
The English version of any MasterCard document will take precedence over any translated version in
any legal proceeding.
Information Available Online
MasterCard provides details about the standards used for this document—including times expressed,
language use, and contact information—on the Publications Support page available on MasterCard
Connect™. Go to Publications Support for centralized information.
References to Maestro Global Rules have been removed and/or replaced Throughout document
with references to the MasterCard Rules or the Transaction Processing
Rules, whichever applies.
Added content about the Account Status Inquiry. Account in Good Standing
Updated the MasterCard Connect™ path by which customers may access Participation Requirements
the MasterCard and Maestro Advance Registration Programs Participation for Merchants
Request Form (Form 0900).
These factors increase costs to all parties for managing disputes and
chargebacks. According to MasterCard data, more than 70 percent of all
chargebacks for e-commerce transactions are associated with reason code
4837 (No Cardholder Authorization) or reason code 4863 (Cardholder Not
Recognized), and are currently estimated at a cost of USD 34.00 per chargeback
to the industry. These reason codes are used where the consumer denies
responsibility for the transaction and the acquirer lacks evidence of the
cardholder’s authentication, or the consumer does not recognize the transaction.
MasterCard now formally supports this risk based approach for merchants.
For additional information, and for information about Issuers through the
Risk Based Authentication options, see, Appendix F, MasterCard Advance
Registration Program.
The control byte contains a value that is specific to each security application.
MasterCard is responsible for assigning and managing UCAF control byte values
and the structure of UCAF application-specific data. Other solutions that use
UCAF for authentication collection and transport will be assigned their own
control byte value and the structure of the application-specific data will be
tailored to support the specifics of the security protocol.
Base64 Hexadecimal
Usage Encoded Value Value
What is an AAV?
The Accountholder Authentication Value (AAV) is a MasterCard® SecureCode™
specific token that uses the Universal Cardholder Authentication Field™ (UCAF)
field for transport within MasterCard authorization messages.
It is generated by the issuer and presented to the merchant for placement in the
authorization request upon successful authentication of the cardholder.
UCAF is the mechanism that is used to transmit the AAV from the merchant to
issuer for authentication purposes during the authorization process.
– Cardholder Browser
– Related Cardholder Software
– Enrollment Server
– Access Control Server
– Accountholder Authentication Value (AAV) Validation Server/Process
• Acquirer Domain—Systems and functions of the acquirer and its customers.
– Merchant Plug-In
– Signature Validation Server
• Interoperability Domain—Systems, functions, and messages that allow the
Issuer Domain and Acquirer Domain to interoperate. These components
will be globally operated and managed by MasterCard.
– Directory Server
– Certificate Authority
Components
Following is information about components related to the Issuer Domain,
Acquirer Domain, and Interoperability Domain.
Issuer Domain
The Issuer Domain is comprised of the following components.
Enrollment Server
The access control server serves two basic, yet vital, functions during the course
of a MasterCard SecureCode online purchase. First, it will verify whether a given
account number is enrolled in the MasterCard SecureCode program. Secondly,
it will facilitate the actual cardholder authentication process.
Acquirer Domain
The Acquirer Domain is comprised of the following components.
• Merchant plug-in
• Signature validation server
Merchant Plug-In
Interoperability Domain
The Interoperability Domain is comprised of the following components.
• Directory server
• Certificate authority
• Transaction history server
• Attempts server
Directory Server
All implementations of this issuer platform must use the MasterCard SecureCode
global directory server for processing MasterCard and Maestro® transactions.
Certificate Authority
In addition, SSL certificates based on a public root hierarchy are required. These
certificates are not issued by the MasterCard Certificate Authority and must be
obtained from another commercially available certificate-issuing provider.
Attempts Server
The Card Range Request/Response messages are used by the Merchant Server
Plug-In as a way to request updates to the cache from the Directory. MasterCard
discourages the use of caching and recommends that merchants check issuer
participation against the directory server—real time—for each transaction.
NOTE
Any merchant that wants to use caching must apply to do so, which will require
testing and, if accepted, compliance with procedures distributed to all merchants
accepted for caching.
Verification Request/Response
Message Pair: VEReq/VERes—The first step in the payer authentication process
is to validate that the cardholder account number is part of an issuer’s card
range, which is participating in 3-D Secure.
The Verification Request/Response messages are sent from the Merchant Server
Plug-In to the Directory to check card range eligibility. If the specified account
number is contained within a MasterCard® SecureCode™ eligible card range,
this message is then sent from the Directory to the Access Control Server to
check if the specific account number is enrolled and active to participate in
3-D Secure.
For those merchants that cache the contents of the MasterCard SecureCode
directory server, this message is not used if the cache indicates that the issuer
is not enrolled in 3-D Secure. If the cache does indicate that the issuer is
enrolled, or if no cache is being maintained, this message must be formatted
and processed as described.
Cardholder Enrollment
This section outline the cardholder enrollment process for MasterCard®
SecureCode™.
Part of the planning process for building a 3-D Secure infrastructure will involve
determining exactly how this process will work.
1. The cardholder visits an issuer enrollment site. This may be accessible, for
example, from the issuer’s Web site or home banking system.
The following graphics demonstrate the typical experience for static password.
Welcome
Cardholders will be prompted to enter their card number. This will be used
to perform a check to validate that the card number is part of a MasterCard or
Maestro issuer card range, which is participating in the MasterCard SecureCode
program.
This is the first of two displays that may be used to collect cardholder
authentication data. The “Name (as it appears on card)” field allows for
MasterCard SecureCode registration of multiple individuals using the same
account number (for example, husband and wife).
Only the Name and Expiration Date fields are required. All additional fields are
customizable as determined by the issuer.
Assuming that all cardholder data is successfully validated, the cardholder will
now have the opportunity to create:
Congratulations—Start Shopping
Cardholder Authentication
Following is information about the cardholder authentication process.
The figure below also assumes that all communication channels between the
various components are properly secured using the Secure Socket Layer (SSL)
protocol.
Link Description
SSL-1 The cardholder shops at the merchant and, when ready to checkout,
enters the appropriate payment information—including the account
number.
SSL-2 The Merchant Plug-In queries the Directory to verify the enrollment
status for a specific issuer using the verification request messages. It is
possible that this step will be performed locally at the merchant via the
local MasterCard directory cache, if applicable.
SSL-3 If the directory indicates that an issuer is participating, then the directory
must forward a request to the issuer’s Access Control Server to check the
enrollment status of a specific cardholder. The configuration information
in the Directory will indicate exactly which Access Control Server will
perform the check. The resulting response will flow back over the same
links to the Merchant Plug-In.
When received by the issuer, the AAV can be validated as part of authorization
request processing, as well as archived for use in potential cardholder disputes.
The cardholder will shop at a merchant location just as they would today.
After selecting the items to be placed into the shopping cart, the payment card
information to be used for the transaction is entered.
Once all of the payment and shipping information has been entered, the
cardholder is typically given an opportunity to review the purchase one last
time before submitting the order.
Enter SecureCode
Upon submitting the final order, the cardholder will be presented with an
authentication window from their MasterCard card or Maestro card-issuing
bank. At this point, the cardholder will enter his or her SecureCode value to
perform authentication processing.
Purchase Completed
Overview
The merchant activities and requirements for building and maintaining the
merchant components for MasterCard® SecureCode™ are divided into five
primary categories.
Category Description
NOTE
In this section, there are references to a merchant endpoint. This is the entity
that is actually operating the Merchant Plug-In software. These may include,
for example, individual merchants, hosting providers, and payment service
providers. Not all merchants participating in the MasterCard SecureCode
program are considered endpoints.
General Responsibilities
Merchant Infrastructure
Following are the merchant infrastructure requirements for the installation
of new hardware and software components that support MasterCard®
SecureCode™.
The following Web page contains a current list of vendors compliant with
MasterCard SecureCode:
• www.mastercard.us/merchants/securecode-vendors.html
Currently, this is defined as being when the merchant plug-in detects a value of
“Y” in the transaction status field of the PARes message.
NOTE
MasterCard currently uses a transaction status of “A” only when the
cardholder opts out of enrollment during activation during shopping (ADS). For
authorizations covered by the merchant-only liability shift, these transactions
still meet the liability shift qualifying criteria when authorized by the issuer.
Refer to the Merchant Processing Matrix for details of when to pass AAV and
liability shift provided.
Merchants must ensure that they follow the message formatting requirements
of their acquirer when generating Universal Cardholder Authentication Field™
(UCAF) related authorization requests.
MasterCard requires that the SPA AAV contained in the authorization from the
acquirer to the issuer be Base64 encoded. Passing this data in binary format
is not an option. Merchant plug-in software typically provides the SPA AAV
returned in the PARes message already in this format. While some acquirers
allow merchants to simply pass the Base64 encoded SPA AAV through in the
authorization, others have varying requirements.
If questions arise, merchants should consult with their acquirers for more
detailed information. Refer to the Merchant Processing Matrix for additional
information.
AAV Usage
The AAV contained within a single authorization request must match the AAV
value returned by the issuer for a single associated authentication request.
Therefore, an AAV can be used only once in a single authorization message and
must not be stored for reuse after receiving authorization.
As currently defined, the 3-D Secure protocol indicates that this ECI field be
determined by each brand. As a result, MasterCard has adopted values that may
be different from other participating payment brands.
When these values are used within the MasterCard authorization and clearing
systems, they are referred to as Security Level Indicators (SLIs). Most, if not all,
acquirers and payment processors have defined the ECI as a required field in
their authorization request message formats. Each merchant must ensure that
the MasterCard ECI value is properly translated to a valid value as defined in
the appropriate acquirer or payment processor authorization message format.
Failure to perform the appropriate translation may affect the ability to obtain
successful authorizations.
MasterCard has currently defined two ECI values. The following table indicates
the relationship between these values and the status field in the PARes message.
PARes
Status MasterCard ECI
Field Description Value
Y Cardholder was successfully authenticated 02
NOTE
MasterCard has additional definitions of SLIs that are not generated by the
PARes received but that may need to be used by the merchant. Refer to the
Merchant Processing Matrix section for additional information on SLIs.
Recurring Payments
Only the initial authorization request for a recurring payment may be
e-commerce transactions and may contain Universal Cardholder Authentication
Field™ (UCAF) data.
Merchants must not provide UCAF data in any subsequent recurring payment
authorizations as these are not considered electronic commerce transactions
by MasterCard and are not eligible for participation in the MasterCard®
SecureCode™ program.
With the following exception, Maestro® cards are not eligible to be used for
recurring payments.
Maestro Considerations
The following requirements and activities are specific to merchant support of
Maestro® cards as part of the MasterCard® SecureCode™ program. Contact your
acquirer for a complete set of Maestro e-commerce acceptance requirements.
Maestro rules require that all e-commerce merchants accepting Maestro cards
must use MasterCard SecureCode for all transactions, or apply and be accepted
for entry to Maestro Advanced Registration Program (MARP). See Appendix F,
MasterCard Advance Registration Program for additional information.
Maestro merchants must support cardholder account numbers that are 13–19
digits in length.
Merchants should be aware that not every Maestro card in issuance has a CVC2
and this should be factored in during checkout design.
Customization
Following are merchant requirements for customizing or configuring vendor
products in support of MasterCard® SecureCode™.
www.mastercard.com/us/merchant/secu-
rity/what_can_do/pdf/SecureCode_logo_usage.pdf
Inline Windows
With Frames
• The use of active HTML links in the branded header frame is not allowed.
MasterCard recommends including a link below the header frame that directs
the cardholder back to the checkout page in case of technical difficulties.
• The explanation text should be clear and concise. The text should not
assume that the cardholder is already enrolled in MasterCard SecureCode
and should not provide instructions that might conflict with the cardholder’s
issuer instructions.
• The merchant should ensure that the authentication window frame is fully
visible and is not located too low in the page because of long text or
large upper frame. A minimum space of 400 x 400 pixels is required for
the ACS frame.
• Merchants must ensure that the “back” button functionality works properly
and that cardholders will be routed back to the checkout page.
Without Frames
TERMURL Field
The TERMURL is a field that is provided by the merchant to the issuer during
the payer authentication request process.
This field provides the issuer with the merchant URL where the payer
authentication response message is to be sent. The use of mixed HTTP
and HTTPS frames typically results in a security box being presented to the
cardholder. Depending on how the cardholder responds to this dialog, the
current and all future attempts to transmit the PAReq message may fail.
NOTE
Therefore, merchants using inline authentication windows with frames must
populate the TERMURL field with an HTTPS address.
Replay Detection
Many issuer access control servers attempt to detect replay attacks by not
allowing a transaction with the same account ID and XID to be processed
more than once.
Merchants must ensure that each Payer Authentication Request (PAReq) contains
a unique combination of account ID and XID.
Each merchant endpoint must configure the MPI software to communicate with
the MasterCard® SecureCode™ Directory server.
For merchants that still use caching, the cache expiration period determines
how often cached directory entries must be updated. MasterCard requires that it
be updated no sooner than every eight hours and no later than every 24 hours.
The updates must not be performed at a specific time every day in order to
allow requests to the MasterCard directory to spread out through the day.
NOTE
A full refresh of a cache should only be undertaken when absolutely necessary,
for example, in the case of an MPI restart. In all other cases a partial cache
request should be used.
There are a number of MPI configuration parameters which, if not set properly,
may cause 3-D Secure protocol violations.
All merchants must ensure that their implementation plans account for the
following field restrictions:
• The merchant name within any applicable message must be less than or
equal to 25 characters including spaces.
• The merchant URL field in the PAReq message must be fully qualified
and, ideally, should be the URL of the merchant home page. Many ACS
providers present this URL to cardholders, including an active HTML link
that directs cardholders to this address.
• The merchant country code must be a valid, 3 digit, ISO 3166 country code.
• The purchase currency code must be a valid, 3 digit, ISO 4217 currency
code.
TERMURL
Merchants must ensure that the TERMURL used for testing is modified to
properly reflect the production environment. In addition, the TERMURL field
must be fully-qualified.
Merchants must make sure that all parameters sent to the ACS are valid and,
unless otherwise indicated by the 3-D Secure protocol, do not contain zero or
empty data elements. For example:
Operational
Following are MasterCard® SecureCode™ operational guidelines for merchants.
This root will be required by the merchant plug-in to perform digital signature
validation. It may also be required in order to establish SSL sessions using
certificates based on the MasterCard private hierarchy.
NOTE
Currently, MasterCard has two active root certificates that must be loaded.
For more information about certificate requirements and procedures, see the
MasterCard SecureCode—Production Procedures manual.
MasterCard recommends that the archival period for this data be the same as the
associated authorization transaction data, and should be a minimum of 180 days.
AAV Processing
The following processing steps are required by the 3-D Secure protocol and
typically handled by the MPI. Any subsequent processing is the responsibility
of the merchant.
The CAVV algorithm field in the PARes message indicates the algorithm
used to create the cryptogram contained in the CAVV field. All MasterCard
Account Authentication Value (AAV) values will be identified with a value of
3 (MasterCard SPA Algorithm). This is the only value that is permitted for
MasterCard and Maestro® card transactions.
All PARes messages returned to the merchant are digitally signed by the
associated cardholder’s issuer ACS using certificates provided by MasterCard.
The merchant is required to validate the signature prior to extracting the Secure
Payment Application™ (SPA) AAV from the PARes message for inclusion in the
authorization request sent to the acquirer.
The AAV value in the PARes must be considered unusable if the signature
validation process fails.
The purpose for this testing, which only encompasses cardholder authentication
testing, is to ensure that merchant implementations meet minimum functional
and brand requirements for participating in the MasterCard SecureCode
program. Any additional authorization testing should be coordinated through
the appropriate merchant acquirer or processor.
Throughout this section, the term “card issuer” refers to the bank or financial
institution that issued the MasterCard® card used by the consumer in the
transaction.
Question Answer
Question Answer
What is a Personal Greeting? The Personal Greeting is a message that the consumer
creates when registering for the card issuer’s
MasterCard SecureCode program. During an online
purchase, the Personal Greeting will appear in the
pop-up box from the card issuer. For the consumer’s
assurance, the Personal Greeting verifies that the
consumer is communicating with, and submitting the
SecureCode to, the card issuer.
Question Answer
How does our Web site know When a consumer uses a card that is enrolled
if a Card is Protected by in MasterCard SecureCode at your Web site, the
MasterCard SecureCode? MasterCard SecureCode software (the merchant
plug-in, or MPI) automatically makes an inquiry to
MasterCard, which will check with the consumer’s
card-issuing bank. If the consumer is participating,
the card issuer will open up a secure dialog with the
consumer. This dialog will enable confirmation of the
identity of the consumer and, assuming the correct
SecureCode is entered, guarantee the purchase to the
merchant.
Question Answer
Who knows the Consumer’s The SecureCode value is known only by the consumer
SecureCode? and the consumer’s card-issuing bank. The dialog
during which the consumer enters the SecureCode
value takes place with the issuing bank only. No
other parties, including your Web site or MasterCard,
are involved in this process. Your Web site is simply
notified of the result of this process via the MasterCard
SecureCode software.
What are the Consumer’s MasterCard SecureCode works with most browsers.
System Requirements for If the consumer has any difficulty performing
MasterCard SecureCode? authentication, he should contact his card issuer’s
customer service by calling the phone number on
the back of his card.
How Does a Consumer Enroll Refer to Cardholder Enrollment in this section for
in the MasterCard SecureCode information.
Program?
Will the Authentication There are two situations where the authentication
Window appear if the window may appear—both of which are related to
consumer never enrolled in the enrollment process.
the MasterCard SecureCode
• A SecureCode has been selected by one
Program?
authorized user and not communicated to the
other authorized users on the account. For
example, husband and wife. Most card issuers
do provide the ability for each authorized user
of the card to individually enroll and establish
his/her own SecureCode. In that case, the
SecureCode value for either user may complete
the authentication process.
• The card issuer tries to enroll the consumer
using Activation During Shopping. Refer to
Activation During Shopping in this chapter for
more information.
Question Answer
Cardholder Enrollment
Enrollment is the process whereby eligible MasterCard and Maestro® branded
cardholders will activate their cards for use in the program.
This type of enrollment typically takes place at a Web site designated by the
bank that issued the card. For example, it may be the bank’s home page or
home banking system.
In a typical example:
1. The consumer will be asked to provide enrollment data. During this phase
of the process, the consumer will be asked a series of questions to prove
identity to their bank. This may include asking for information such as the
last four digits of the consumer's social security number, birth date, or the
signature panel code from the back of the credit card.
2. The answers to the questions will be validated either in-house at the bank
or through a third party processor such as a credit bureau.
3. If the consumer answers the questions correctly, the consumer is considered
authenticated and will be allowed to establish the SecureCode for that
particular MasterCard account number. The SecureCode will be stored by
the card issuer for use later on during online purchases at participating
e-retailers.
• occurs after the consumer elects to submit the order but prior your site
actually initiating a request to authorize the transaction.
• begins at the point where the e-retailer is asking for final confirmation
of the purchase.
The following image is an example of the point at which the scenarios begin.
Authentication—Successful
In this scenario, the consumer is presented with the authentication window.
After entering the proper SecureCode, a message will be returned to your
website indicating the authentication was performed successfully.
At this point, your website will send the fully authenticated authorization
request to MasterCard for approval. An approved response for qualified
requests will result in a payment guarantee to your company.
Authentication—Forgotten SecureCode
In this scenario, the consumer is presented with the authentication window, but
does not remember the SecureCode.
In response to not knowing his or her SecureCode, the consumer clicks Forgot
Your SecureCode? on the Enter Your SecureCode screen and the following
screen appears.
A financial institution may decide to tell the consumer that they must call the
bank’s customer service department for additional help and will return a failed
authentication response to the merchant. In other cases, financial institutions
will prompt the consumer to answer a series of secret questions. Providing
the proper answer to these questions will permit the consumer authentication
process to complete successfully.
Authentication—Failed
In this scenario, the consumer is presented with the authentication window,
but enters an incorrect SecureCode.
Once the account has been locked, it may not be used for shopping at any
participating e-retailer. The consumer must use the facilities provided by their
card-issuing financial institution to reset the SecureCode. These may include the
bank’s customer service and/or MasterCard® SecureCode™ enrollment site.
If correct answers are provided to the questions, the merchant will be returned
a status indicating that the consumer was successfully authenticated just as if a
valid SecureCode had been entered.
If the incorrect responses are provided to the questions, the consumer will be
given at least one more opportunity to provide the appropriate answers.
If the consumer chooses not to enroll in the program at the current time, a
message will be displayed indicating that the purchase will continue without a
SecureCode value. To your Web site, this means the credit card authorization
will be unauthenticated.
If the incorrect responses are provided too many times, or if the issuer
requires enrollment and the cardholder declines to enroll, the merchant will
be notified that consumer authentication has failed. In this particular case,
merchants may either request an alternative form of payment or proceed with a
non-MasterCard® SecureCode™ authorization request.
At this point in time, the e-retailer will be notified that the consumer declined to
enroll in the program. In this particular case, the e-retailer should proceed with
an unauthenticated authorization using the current card number.
MasterCard recommends that card issuers give cardholders at least three chances
to enroll in the MasterCard® SecureCode™ program. If the cardholder does
not enroll after three chances, some card issuers will not give the cardholder
the ability to opt-out of their MasterCard SecureCode program, and will, in
fact, lock the account and present the consumer with a display indicating
that authentication has failed. Once the account has been locked, it may
not be used for shopping at any participating e-retailer. The consumer must
use the facilities provided by his card issuer financial institution to enroll in
MasterCard SecureCode. These may include the bank’s customer service center,
its MasterCard SecureCode enrollment site, or both.
AAV Layout
The format of the Accountholder Authentication Value (AAV) is defined
and described in the Secure Payment Application™ (SPA) Algorithm for the
MasterCard Implementation of 3-D Secure publication.
Base64 Encoding
The following overview of Base64 encoding is taken from RFC1521 “MIME
(Multipurpose Internet Mail Extensions) Part One: Mechanisms for Specifying
and Describing the Format of Internet Message Bodies”.
www.ietf.org/rfc/rfc1521.txt?number=1521
Introduction
The encoding process represents 24-bit groups of input bits as output strings
of four encoded characters. Proceeding from left to right, a 24-bit input group
is formed by concatenating three 8-bit input groups. These 24 bits are then
treated as four concatenated 6-bit groups, each of which is then translated into
a single digit in the Base64 alphabet. When encoding a bit stream via the
Base64 encoding, the bit stream must be presumed to be ordered with the
most-significant-bit first. That is, the first bit in the stream will the high-order
bit in the first byte and the eighth bit will be the low-order in the first byte,
and so on.
10001100
The data is then broken down into three 24-bit segments, which are interpreted
as four 6-bit segments for encoding. In this case, the first 6 bits equal:
100011
32 + 0 + 0 + 0 + 2 + 1
Decimal 35 = Base64 j
10000110
The data is then broken down into three 24-bit segments, which are interpreted
as four 6-bit segments for encoding. In this case, the first 6 bits equal:
100001
32 + 0 + 0 + 0 + 0 + 1
Decimal 33 = Base64 h
Base64 Alphabet
The following is the Base64 alphabet used to encode the Accountholder
Authentication Value (AVV).
4 E 5 F 6 G 7 H
8 I 9 J 10 K 11 L
12 M 13 N 14 O 15 P
16 Q 17 R 18 S 19 T
20 U 21 V 22 W 23 X
24 Y 25 Z 26 a 27 b
28 c 29 d 30 e 31 f
32 g 33 h 34 I 35 j
36 k 37 l 38 m 39 n
40 o 41 p 42 q 43 r
44 s 45 t 46 u 47 v
48 w 49 x 50 y 51 z
52 0 53 1 54 2 55 3
56 4 57 5 58 6 59 7
60 8 61 9 62 + 63 /
(pad) =
Completed and signed enrollment forms Send all completed and signed enrollment
forms to:
securecode_customer_sup-
[email protected]
Maestro® Customer Operations Services
U.S., Canada, Caribbean, Latin America, and
South Asia/Middle East/Africa regions
Phone: 800-999-0363 (Inside U.S.)
636-722-6176 (Outside U.S.)
636-722-6292 (Spanish Language Support)
Fax: 636-722-7192
Email:securecode_customer_sup-
[email protected]
Europe region
Phone: +32-2-352-54-03
Email:[email protected]
Customer Implementation Services
Asia/Pacific region
Email: [email protected]
Middle East/Africa region
Email: [email protected]
Europe region
Email:cis_europe_sup-
[email protected]
Canada and U.S. regions
Email: cis_northamerica_sup-
[email protected]
Latin America and the Caribbean region
Email: [email protected]
Support securecode_customer_sup-
[email protected]
– Merchant FAQs:
http://www.mastercard.us/merchants/assistance/faq-securecode.html
– Program Identifier Guidelines:
http://www.mastercard.us/merchants/securecode.html
These data elements must be used by the acquirer when placing an Account
in Good Standing transactions. Each acquirer is responsible for determining
how this transaction is supported in the point of interaction message defined
for the merchant to acquirer interface.
For Credit, there is the Account Status Inquiry, which is a non-financial request
that allows acquirers to validate aspects of the cardholder account. Some ACS
providers will also use this message to verify cardholder enrollment such as
CVC, AVC, and expiry date. Additional details can be found in the Customer
Interface Specification manual.
Overview
Following the successful deployment of 3-D Secure (MasterCard® SecureCode™)
for all domestic electronic commerce transactions, the banking authority of
India, Reserve Bank of India (RBI), has defined a mandate that requires a similar
two-factor authentication process to also be rolled out for IVR transactions.
These subelements will be used to support and identify IVR transactions within
the authorization message. Support for SecureTelephone Order within the
authorization message was mandated as part of the 7.2 Banknet release.
Please note that only Fully authenticated IVR transactions (Security Level
Indicator 2-UCAF data collection is supported by the merchant, and Universal
Cardholder Authentication Field™ (UCAF) data is present in DE 48, SE 43) are
applicable to SecureTelephone order (IVR) transactions.
The required data values for SecureTelephone order (IVR) are provided in
the table below.
What is an AAV?
The Accountholder Authentication Value (AAV) is a MasterCard® SecureCode™
specific token that uses the Universal Cardholder Authentication Field™ (UCAF)
field for transport within MasterCard authorization messages.
It is generated by the issuer and presented to the merchant for placement in the
authorization request upon successful authentication of the cardholder.
UCAF is the mechanism that is used to transmit the AAV from the merchant to
issuer for authentication purposes during the authorization process.
c. PAReq channel—DIRECT
d. Shopping Channel—IVR
e. Available Authentication Channels
4. The MasterCard Directory Server will forward VEReq to the appropriate
Issuer IVR-ACS, to validate that the PAN is enrolled in the service.
5. The issuer IVR-ACS responds to the MasterCard Directory with confirmation
of enrollment, and the VERes including the ACS URL is returned to the
Merchant IVR-MPI.
6. IVR-MPI generates a PAReq message with the IVR extension, and sends
to the appropriate Issuer IVR-ACS.
7. ACS receives and processes the PAReq message—IVR extensions may be
used by the Issuer ACS in the authentication process.
8. Upon successful validation of the cardholder (or using data contained in
the extended PAReq), the issuer ACS will generate the PARes message and
forward to Merchant IVR-MPI.
9. IVR-MPI receives PARes and proceeds with authorization request.
All vendors, merchant endpoints, and issuers are required to complete the
designated testing process prior to launch. More information regarding testing
is available from [email protected].
MasterCard has reminded issuers that the support of MARP is mandatory and
that issuers cannot selectively accept only the full MasterCard® SecureCode™
transactions.
For each merchant, the acquirer will complete a participation request form
designed to help MasterCard understand the merchant’s e-commerce acceptance
environment. MasterCard staff will review the participation request form, and
notify the acquirer if the merchant has been enrolled in the program.
To be eligible for this program the merchant must enable customers to register
on the merchant's Web site by selecting a username and password or similar
credentials, and provide cardholders with the option to register a MasterCard or
Maestro card number for use in future e-commerce transactions. The merchant
will also be expected to satisfy minimum security requirements intended to
help ensure the protection of all participants: the merchant, its acquirer, the
issuer, and the cardholder. The merchant must offer customers a safe, secure
shopping experience by using best practice risk management tools. In addition,
the merchant must demonstrate a commitment to conducting business in a
manner that does not result in excessive chargebacks. More information about
the program, including the program terms and the merchant enrollment forms,
are available on MasterCard Connect™.
• The merchant invites the customer to register on its Web site by choosing a
username and password, or similar credentials acceptable to MasterCard,
and must provide the customer with the option to register a MasterCard® or
Maestro® card account number for use in future e-commerce transactions.
• For the first MasterCard or Maestro e-commerce transaction, the merchant
must request MasterCard® SecureCode™ authentication before submitting
the transaction for authorization. If that transaction is subsequently
authorized by the issuer, it is guaranteed to the acquirer or its merchant,
regardless of whether the issuer or cardholder participates in MasterCard
SecureCode as determined by the merchant request.
• If the first MasterCard or Maestro e-commerce transaction for the cardholder
registered with the merchant is authorized by the issuer, the merchant can
skip the MasterCard SecureCode authentication on subsequent transactions
by the same customer using the same MasterCard or Maestro card account.
In that case, the merchant will populate:
Acquirer Impact
Participation in the MasterCard Advance Registration Program (MARP) is
optional for Europe region acquirers. Acquirers outside the Europe region are
not eligible to participate in the program.
Acquirers that would like to enroll a merchant for the program may do so by
following the enrollment process that is available on MasterCard Connect™.
To access this information, select Library> Forms and open the MasterCard
and Maestro Advance Registration Programs Participation Request Form (Form
0900).
Issuer Impact
Any Maestro® issuer that supports e-commerce is required to support the static
Accountholder Authentication Value (AAV) in authorization.