MasterCard SecureCode SMI Manual Merchant

2015-01-11

: Mc Smi Manualmerchant SMI_ManualMerchant

Open the PDF directly: View PDF PDF.
Page Count: 72

DownloadMasterCard SecureCode  SMI Manual Merchant
Open PDF In BrowserView PDF
MasterCard SecureCode
Merchant Implementation Guide
17 June 2014

Notices
Following are policies pertaining to proprietary rights, trademarks, translations, and details about
the availability of additional information online.
Proprietary Rights

The information contained in this document is proprietary and confidential to MasterCard International
Incorporated, one or more of its affiliated entities (collectively “MasterCard”), or both.
This material may not be duplicated, published, or disclosed, in whole or in part, without the prior
written permission of MasterCard.
Trademarks

Trademark notices and symbols used in this document reflect the registration status of MasterCard
trademarks in the United States. Please consult with the Customer Operations Services team or the
MasterCard Law Department for the registration status of particular product, program, or service names
outside the United States.
All third-party product and service names are trademarks or registered trademarks of their respective
owners.
Disclaimer

MasterCard makes no representations or warranties of any kind, express or implied, with respect to
the contents of this document. Without limitation, MasterCard specifically disclaims all representations
and warranties with respect to this document and any intellectual property rights subsisting therein or
any part thereof, including but not limited to any and all implied warranties of title, non-infringement,
or suitability for any purpose (whether or not MasterCard has been advised, has reason to know, or is
otherwise in fact aware of any information) or achievement of any particular result. Without limitation,
MasterCard specifically disclaims all representations and warranties that any practice or implementation of
this document will not infringe any third party patents, copyrights, trade secrets or other rights.
Translation

A translation of any MasterCard manual, bulletin, release, or other MasterCard document into a language
other than English is intended solely as a convenience to MasterCard customers. MasterCard provides any
translated document to its customers “AS IS” and makes no representations or warranties of any kind
with respect to the translated document, including, but not limited to, its accuracy or reliability. In no
event shall MasterCard be liable for any damages resulting from reliance on any translated document.
The English version of any MasterCard document will take precedence over any translated version in
any legal proceeding.
Information Available Online

MasterCard provides details about the standards used for this document—including times expressed,
language use, and contact information—on the Publications Support page available on MasterCard
Connect™. Go to Publications Support for centralized information.

©2005–2014 MasterCard. Proprietary. All rights reserved.
SMI

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

Summary of Changes, 17 June 2014
This document reflects changes effective since the last publication of this manual.
Description of Change

Where to Look

Added notes indicating that both the MasterCard Advance Registration
Program and Maestro Advance Registration Program (MARP) are closed to
new business and will be decommissioned on 1 June 2015.

Throughout document

Added references to the MasterCard Attempts Processing Service and the
MasterCard Authentication History Server.

Throughout document

Added new appendix to provide an overview of the MasterCard
requirements to support IVR Transactions in India.

India IVR Transations
(SecureTelephone)

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

1

Summary of Changes, 3 January 2014
This document reflects changes effective since the last publication of this manual.
Description of Change

Where to Look

Updated email address for the MasterCard® SecureCode™ Customer Support Throughout document
Team to securecode_customer_support@mastercard.com.
References to Maestro Global Rules have been removed and/or replaced
with references to the MasterCard Rules or the Transaction Processing
Rules, whichever applies.

Throughout document

Updated the Customer Implementation Services contact information by
MasterCard SecureCode
region.
Contact Information
Updated the URL of the MasterCard SecureCode Merchant FAQs and Program
Identifier Guidelines.
Added content about the Account Status Inquiry.

Account in Good Standing

Updated the MasterCard Connect™ path by which customers may access
the MasterCard and Maestro Advance Registration Programs Participation
Request Form (Form 0900).

Participation Requirements
for Merchants

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 3 January 2014

1

Table of Contents
Chapter 1

SecureCode Merchant Implementation Overview............ 1-i

MasterCard and E-commerce ................................................................................................... 1-1
Maestro and E-commerce ........................................................................................................ 1-1
Grow Your Online Business .................................................................................................... 1-2
MasterCard SecureCode Program Platform............................................................................... 1-3
What is UCAF and Its Structure? ........................................................................................ 1-3
What is an AAV?................................................................................................................. 1-4
What is a Merchant Plug-In ............................................................................................... 1-5

Chapter 2

3-D Secure Solution............................................................. 2-i

3-D Secure Solution Overview................................................................................................. 2-1
Components............................................................................................................................. 2-1
Issuer Domain.................................................................................................................... 2-2
Acquirer Domain ............................................................................................................... 2-3
Interoperability Domain..................................................................................................... 2-3
3-D Secure Solution Message Types ........................................................................................ 2-5
Card Range Request/Response .......................................................................................... 2-5
Verification Request/Response........................................................................................... 2-5
Payer Authentication Request/Response............................................................................ 2-6
Payer Authentication Transaction Request/Response ........................................................ 2-6
Cardholder Enrollment............................................................................................................. 2-6
Cardholder Enrollment Process.......................................................................................... 2-7
Cardholder Authentication ....................................................................................................... 2-7
Sample Cardholder Authentication Process ....................................................................... 2-7
Sample Cardholder Authentication Flow ......................................................................... 2-10

Chapter 3

Merchants ............................................................................ 3-i

Overview ................................................................................................................................. 3-1
Merchant Infrastructure............................................................................................................ 3-1
Establishment of MasterCard SecureCode Operating Environment .................................... 3-2
Authorization System Message Enhancements......................................................................... 3-2
Passing the AAV in the Authorization Message.................................................................. 3-2
E-Commerce Commerce Indicator ..................................................................................... 3-3
Recurring Payments ........................................................................................................... 3-5

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

i

Table of Contents

Maestro Considerations............................................................................................................ 3-5
Customization .......................................................................................................................... 3-6
MasterCard SecureCode Program Identifier Usage Guidelines ........................................... 3-6
Integrated Support for Merchant Plug-In Processing ......................................................... 3-6
Consumer Message on Payment Page ............................................................................... 3-8
Creation of Cardholder Authentication Window................................................................ 3-8
TERMURL Field .................................................................................................................. 3-9
Replay Detection ............................................................................................................... 3-9
Merchant Server Plug-In Configuration............................................................................ 3-10
Operational............................................................................................................................ 3-12
Loading of MasterCard Root Certificates .......................................................................... 3-12
Loading of MasterCard SSL Client Certificate ................................................................... 3-12
MPI Log Monitoring ......................................................................................................... 3-12
MPI Authentication Request/Response Archival .............................................................. 3-13
AAV Processing ...................................................................................................................... 3-13
Global Infrastructure Testing Requirements........................................................................... 3-13
MasterCard Site Data Protection Program .............................................................................. 3-14
MasterCard SecureCode Merchant Process and Liability Shift Matrix ..................................... 3-14

Appendix A Merchant Customer Service Guide.................................... A-i
Frequently Asked Questions ....................................................................................................A-1
MasterCard SecureCode FAQs ............................................................................................A-1
Cardholder Enrollment in the MasterCard SecureCode Program..............................................A-4
Consumer Buying Scenarios ....................................................................................................A-5
Authentication—Successful................................................................................................A-6
Authentication—Forgotten SecureCode .............................................................................A-7
Authentication—Failed ......................................................................................................A-8
Activation During Shopping (ADS)....................................................................................A-8
Activation During Shopping—Opt Out of Enrollment ..................................................... A-10

Appendix B MasterCard SecureCode SPA Algorithm
Specifications ............................................................................................B-i
AAV Layout ..............................................................................................................................B-1
Base64 Encoding .....................................................................................................................B-1
Base64 Encoding Examples ...............................................................................................B-2
Base64 Alphabet ................................................................................................................B-2

©2005–2014 MasterCard. Proprietary. All rights reserved.
ii

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

Table of Contents

Appendix C MasterCard SecureCode Contact Information ..................C-i
MasterCard SecureCode Contact Information...........................................................................C-1

Appendix D Maestro Processing Considerations .................................. D-i
Account in Good Standing...................................................................................................... D-1

Appendix E India IVR Transations (SecureTelephone)........................... E-i
Overview ................................................................................................................................. E-1
Data Extensions to the Existing 3-D Secure Protocol............................................................... E-1
UCAF Transport in MasterCard Authorization Messages .......................................................... E-1
MasterCard SecureCode—Security Level Indicator (DE 48, subelement 42) ...................... E-2
Universal Cardholder Authentication Field (DE 48, subelement 43).................................. E-3
What is an AAV?................................................................................................................. E-3
Sample IVR Transaction Flow ............................................................................................ E-4
MasterCard SecureCode Compliance and Functional Testing ............................................ E-4

Appendix F MasterCard Advance Registration Program
Requirements ............................................................................................ F-i
MasterCard Advance Registration Program .............................................................................. F-1
MARP Merchant Use of MasterCard SecureCode...................................................................... F-1
Issuer Participation in MARP.................................................................................................... F-2

Appendix G MasterCard Extensions for the Brazil Market .................. G-i
Brazil Market Extensions......................................................................................................... G-1

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

iii

Chapter 1

SecureCode Merchant Implementation
Overview

This section provides a general overview of the MasterCard® SecureCode™ Electronic
Commerce program.

MasterCard and E-commerce ......................................................................................................... 1-1
Maestro and E-commerce .............................................................................................................. 1-1
Grow Your Online Business .......................................................................................................... 1-2
MasterCard SecureCode Program Platform..................................................................................... 1-3
What is UCAF and Its Structure? .............................................................................................. 1-3
What is an AAV?....................................................................................................................... 1-4
What is a Merchant Plug-In ..................................................................................................... 1-5

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

1-i

SecureCode Merchant Implementation Overview
MasterCard and E-commerce

MasterCard and E-commerce
E-commerce transactions account for a significant and increasing share of
MasterCard® gross dollar volume.
The number of remote transactions is increasing at a rate of more than 40
percent per year and growing. For this reason, it is important to position
e-commerce and mobile commerce channels—web access from PCs, PDAs,
mobile phones, and other wireless-enabled devices—to increase gross dollar
volume profitability by using security and authentication solutions that
authenticate cardholders. This reduces chargebacks and expenses that are
associated with disputed transactions.
From a risk perspective, the current MasterCard electronic and mobile
transaction environment closely resembles traditional mail order/telephone
order (MO/TO) transactions. The remote nature of these transactions increases
risk, resulting in more cardholder disputes, and associated chargebacks.
These factors increase costs to all parties for managing disputes and
chargebacks. According to MasterCard data, more than 70 percent of all
chargebacks for e-commerce transactions are associated with reason code
4837 (No Cardholder Authorization) or reason code 4863 (Cardholder Not
Recognized), and are currently estimated at a cost of USD 34.00 per chargeback
to the industry. These reason codes are used where the consumer denies
responsibility for the transaction and the acquirer lacks evidence of the
cardholder’s authentication, or the consumer does not recognize the transaction.
Proving that the cardholder conducted and authorized the transaction in a
virtual, non–face-to-face environment of electronic and mobile commerce
has been extremely difficult. The MasterCard® SecureCode™ program is
designed to provide the infrastructure for an issuer security solution that
reduces problems associated with disputed charges, offering the opportunity to
authenticate the cardholder at the time of purchase. Disputed charges affect all
parties in a transaction—issuer, acquirer, cardholder, and merchant.

Maestro and E-commerce
Low credit card penetration in many countries has led to the use of inefficient
payment forms like cash on delivery, check, and domestic transfer/automated
clearing house (ACH).
MasterCard® SecureCode™ will allow Maestro® cards to be used for Internet
purchases in a safe and secure environment. MasterCard SecureCode allows
Maestro to be the first fully-authenticated global debit brand accepted on the
Internet.
Unless otherwise stated by domestic country rules, all Maestro Internet
transactions are guaranteed. Please note that a merchant can not accept Maestro
transactions unless they support MasterCard SecureCode.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

1-1

SecureCode Merchant Implementation Overview
Grow Your Online Business

Grow Your Online Business
MasterCard® SecureCode™ offers flexible, robust, and easy to implement
solutions for cardholder authentication. Because requirements vary from issuer
to issuer, MasterCard places a premium on flexibility, enabling issuers to choose
from a broad array of security solutions for authenticating their cardholders.
These solutions include password, EMV chip card-based approaches, or other
solutions of their own choosing. Issuers should decide on their authentication
strategy by balancing their view of risk against the cardholder experience.
At launch of MasterCard SecureCode, a “risk averse” strategy was visualized
where every merchant transaction would be presented to the issuer for
authentication and the issuer would ensure that the cardholder authenticated
every transaction. As MasterCard SecureCode evolved, both retailers and issuers
began practicing active risk management and now only those transactions
deemed high-risk are authenticated. This risk-management is driving the
adoption of dynamic solutions and resulting in a reduction in use of the initial
static password solution.
MasterCard now formally supports this risk based approach for merchants.
The most common of these cardholder authentication solutions for MasterCard
and Maestro® issuers has been the use of static or dynamic passwords.
Dynamic password usage can be based on the Chip Authentication Protocol
(CAP) that provides for the creation of a one-time use cardholder authentication
password. This scenario is similar to what the cardholder experiences in the
face-to-face environment using EMV chip card and personal identification
number (PIN) and using the existing investments in EMV for new authentication
purposes. This program provides a seamless integration of both EMV and 3-D
Secure technologies that result in stronger authentication than traditional static
password solutions. Currently, many new implementations take a risk-based
approach to authentication and the use of dynamic codes, increasing both the
strength of security while also improving the customer experience.
MasterCard SecureCode is the consumer- and merchant-facing name for all
existing and new MasterCard cardholder authentication solutions. While
these solutions may each appear quite different on the surface, these various
approaches converge around the Universal Card Authentication Field™ (UCAF)
mechanism and share a number of common features.
Two common features in all MasterCard cardholder authentication solutions
include:
•

MasterCard card or Maestro card cardholders are authenticated using a
secure, unique, private code.

•

The authentication data is transported from party-to-party via the MasterCard
UCAF mechanism.

©2005–2014 MasterCard. Proprietary. All rights reserved.
1-2

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

SecureCode Merchant Implementation Overview
MasterCard SecureCode Program Platform

MasterCard SecureCode Program Platform
The MasterCard® SecureCode™ program platform is comprised of a number of
layered components.
As described in the following sections, each of the components provides for
specific authorization and authentication functionality during the processing of
a MasterCard SecureCode transaction. When combined, the platform provides a
mechanism for online merchants to receive a similar global payment guarantee
to one that brick-and-mortar retailers enjoy with POS transactions.

What is UCAF and Its Structure?
Universal Cardholder Authentication Field™ (UCAF) is a standard, globally
interoperable method of collecting cardholder authentication data at the point
of interaction across all channels, including the Internet and mobile devices.
This is also known as the Accountholder Authentication Value (AAV).
Within the MasterCard authorization networks (that is the Single Message
and Dual Message System, and RSC) UCAF is a universal, multi-purpose data
transport infrastructure that is used to communicate authentication information
among cardholder, issuer, merchant, and acquirer communities. It is a variable
length, 32-position field with a flexible data structure that can be tailored to
support the needs of a variety of issuer security and authentication approaches.
The generic structure of UCAF is illustrated as follows:

The control byte contains a value that is specific to each security application.
MasterCard is responsible for assigning and managing UCAF control byte values
and the structure of UCAF application-specific data. Other solutions that use
UCAF for authentication collection and transport will be assigned their own
control byte value and the structure of the application-specific data will be
tailored to support the specifics of the security protocol.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

1-3

SecureCode Merchant Implementation Overview
MasterCard SecureCode Program Platform

In most UCAF implementations, the application-specific data is defined as binary
data with a maximum length of 24 binary bytes including the control byte.
However, there are some restrictions in the various MasterCard authorization
networks regarding the passing of binary data in the authorization messages.
As a result, all UCAF data generated by Secure Payment Application™ (SPA)
algorithm-based MasterCard® SecureCode™ implementations must be Base64
encoded at some point prior to being included in the authorization message.
The purpose of this encoding is to produce a character representation that is
approximately 33 percent larger than the binary equivalent. For this reason,
the UCAF field is defined with a maximum length of 32 positions. For more
information about Base64 coding, refer to the MasterCard SecureCode SPA
Algorithm Specifications appendix.
The current MasterCard SecureCode control byte definitions include the
following.
Base64
Encoded Value

Hexadecimal
Value

3-D Secure SPA Accountholder Authentication
Value (AAV) for first and subsequent
transactions

j

x‘8C’

3-D Secure SPA AAV for attempts

h

x‘86’

Usage

What is an AAV?
The Accountholder Authentication Value (AAV) is a MasterCard® SecureCode™
specific token that uses the Universal Cardholder Authentication Field™ (UCAF)
field for transport within MasterCard authorization messages.
It is generated by the issuer and presented to the merchant for placement in
the authorization request. This AAV can be proof of a fully authenticated or an
attempted authentication transaction.
In the case of a chargeback or other potential dispute processing, the AAV is
used to identify the processing parameters associated with the transaction.
Among other things, the field values will identify the:
•

Issuer ACS that created the AAV. (This could be the Issuer ACS or, in the
case of an attempt, the MasterCard Attempt processing server.)

•

Sequence number that can positively identify the transaction for that location

•

Secret key used to create the Message Authentication Code (MAC), which
is a cryptographic method that ensures AAV data integrity, and binds the
entire AAV structure to a specific PAN.

UCAF is the mechanism that is used to transmit the AAV from the merchant to
issuer for authentication purposes during the authorization process.

©2005–2014 MasterCard. Proprietary. All rights reserved.
1-4

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

SecureCode Merchant Implementation Overview
MasterCard SecureCode Program Platform

What is a Merchant Plug-In
A merchant plug-in is a software application that is developed and tested to be
compliant with the 3-D Secure protocol and interoperable with the MasterCard®
SecureCode™ infrastructure.
The plug-in application is typically provided by a technology vendor and
integrated with the merchant’s commerce server. It serves as the controlling
application for the processing of 3-D Secure messages.
As part of the MasterCard SecureCode infrastructure requirements, all merchant
endpoints must implement application software capable of processing 3-D
Secure messages. An endpoint is described as any merchant or merchant
processor platform, which directly connects to the MasterCard SecureCode
infrastructure.
NOTE
If a retailer has qualified and accepted a merchant for the MasterCard Advance
Registration Program (MARP), then MasterCard will assign a static Accountholder
Authentication Value (AAV) for use when the transaction is undertaken as
MARP instead of standard MasterCard SecureCode. This value is passed in
plain text in the Universal Cardholder Authentication Field™ (UCAF) field. For
additional information, refer to the MasterCard Advance Registration Program
Requirements appendix.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

1-5

Chapter 2

3-D Secure Solution

This section provides an overview of the MasterCard implementation of 3-D Secure for
MasterCard® cards and Maestro® cards, including cardholder enrollment and payer
authentication.

3-D Secure Solution Overview....................................................................................................... 2-1
Components................................................................................................................................... 2-1
Issuer Domain.......................................................................................................................... 2-2
Acquirer Domain ..................................................................................................................... 2-3
Interoperability Domain........................................................................................................... 2-3
3-D Secure Solution Message Types .............................................................................................. 2-5
Card Range Request/Response ................................................................................................ 2-5
Verification Request/Response................................................................................................. 2-5
Payer Authentication Request/Response.................................................................................. 2-6
Payer Authentication Transaction Request/Response .............................................................. 2-6
Cardholder Enrollment................................................................................................................... 2-6
Cardholder Enrollment Process................................................................................................ 2-7
Cardholder Authentication ............................................................................................................. 2-7
Sample Cardholder Authentication Process ............................................................................. 2-7
Sample Cardholder Authentication Flow ............................................................................... 2-10

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

2-i

3-D Secure Solution
3-D Secure Solution Overview

3-D Secure Solution Overview
Cardholder authentication is the process of verifying cardholder account
ownership during a purchase transaction in an online electronic commerce
environment.
All MasterCard® SecureCode™ solutions define and provide a base level of
security around performing this authentication process. For this solution
specifically, MasterCard is deploying its own implementation of 3-D Secure
under the MasterCard SecureCode program branding for MasterCard® and
Maestro®. This implementation of 3-D Secure includes support for the Secure
Payment Application™ (SPA) algorithm and Universal Cardholder Authentication
Field™ (UCAF) without any changes to the 3-D Secure specification, messages,
or protocol.
The components described herein are organized according to requirements that
fall within the issuer, acquirer, and interoperability domains associated with
the payment process.
•

•

•

Issuer Domain—Systems and functions of the card issuing financial
institutions and its customers.
–

Cardholder Browser

–

Related Cardholder Software

–

Enrollment Server

–

Access Control Server

–

Accountholder Authentication Value (AAV) Validation Server/Process

Acquirer Domain—Systems and functions of the acquirer and its customers.
–

Merchant Plug-In

–

Signature Validation Server

Interoperability Domain—Systems, functions, and messages that allow the
Issuer Domain and Acquirer Domain to interoperate. These components
will be globally operated and managed by MasterCard.
–

Directory Server

–

Certificate Authority

–

MasterCard Authentication History Server

–

Attempts Processing Server (Stand-In Authentication)

Components
Following is information about components related to the Issuer Domain,
Acquirer Domain, and Interoperability Domain.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

2-1

3-D Secure Solution
Components

Issuer Domain
The Issuer Domain is comprised of the following components.
•

Cardholder browser and related software

•

Enrollment server

•

Access control server

•

Accountholder Authentication Value (AAV) validation server/process

Cardholder Browser and Related Cardholder Software
The Cardholder browser acts as a conduit to transport messages between the
Merchant Server Plug-In (in the Acquirer Domain) and the Access Control
Server (in the Issuer Domain). Optional cardholder software to support
implementations such as chip cards may also be included.
Both the browser and related software are considered to be off-the-shelf
components that do not require any specific modification to support 3-D Secure.
Enrollment Server
The purpose of the enrollment server is to facilitate the process of cardholder
enrollment for an issuer’s implementation of 3-D Secure under the MasterCard®
SecureCode™ program. The server will be used to perform initial cardholder
authentication, as well as administrative activities such as SecureCode resets and
viewing 3-D Secure payment history. In some cases, the enrollment server and
the access control server may be packaged together.
Access Control Server
The access control server serves two basic, yet vital, functions during the course
of a MasterCard SecureCode online purchase. First, it will verify whether a given
account number is enrolled in the MasterCard SecureCode program. Secondly,
it will facilitate the actual cardholder authentication process.
AAV Validation Server/Process
This server or process will be used to perform validation of the cardholder
authentication data received by the issuer’s authorization system in the
authorization messages. Issuers may perform their own validation or sign up for
the MasterCard-hosted on-behalf service. To register for the MasterCard-hosted
on-behalf service, send an email to your regional Customer Implementation
Service team.

©2005–2014 MasterCard. Proprietary. All rights reserved.
2-2

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

3-D Secure Solution
Components

MasterCard recommends that issuers validate the AAV contained in the
authorization message prior to the authorization decision. This is considered
a best practice, although it is not required. With the implementation of the
MasterCard Attempts Processing Service (Stand-In Authentication), issuers that
perform self-AAV validation will continue to be able to validate AAV values
generated by their Access Control Server (ACS) service. However, an issuer will
not have the ability to validate an attempt AAV generated by the MasterCard
Attempts Processing Service. Issuers that participate in the AAV validation
on-behalf service will have all AAV values validated.
The server of the MasterCard Attempts Processing Service will generate an
attempt AAV when:
•

The Issuer’s account ranges do not participate in MasterCard SecureCode.

•

The Issuer’s ACS responds negative to the merchant enrollment verification
message (VERes = N) for unenrolled cardholders.

•

The Issuer’s ACS times out or is unavailable.

Under these circumstances, an issuer will not be able to validate a MasterCard
generated attempts AAV. For security reasons, the keys will not be shared.

Acquirer Domain
The Acquirer Domain is comprised of the following components.
•

Merchant plug-in (MPI)

•

Signature validation server

Merchant Plug-In
The merchant server plug-in creates and processes payer authentication
messages and then returns control to the merchant software for further
authorization processing. The plug-in is invoked after the cardholder finalizes
the purchase request, which includes selecting the account number to be used,
and submitting the order but prior to obtaining authorization for the purchase.
Signature Validation Server
The signature validation server is used to validate the digital signature on
purchase requests that have been successfully authenticated by the issuer. This
server may be integrated with the merchant plug-in or may be a separately
installed component.

Interoperability Domain
The Interoperability Domain is comprised of the following components.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

2-3

3-D Secure Solution
Components

•

Directory server

•

Certificate authority

•

MasterCard Authentication History Server

•

Attempts server

Directory Server
The MasterCard® SecureCode™ global directory server provides centralized
decision-making capabilities to merchants enrolled in the MasterCard
SecureCode program. Based on the account number contained in the merchant
enrollment verification request message, the directory will first determine
whether the account number is part of a participating MasterCard or Maestro®
issuer’s card range. It will then direct eligible requests to the appropriate
issuer’s access control server for further processing.
All implementations of this issuer platform must use the MasterCard SecureCode
global directory server for processing MasterCard and Maestro® transactions.
Certificate Authority
The MasterCard Certificate Authority is used to generate and distribute all
private hierarchy end-entity and subordinate certificates, as required, to the
various components across all three domains.
These certificates include:
•

MasterCard Root certificate (used for both MasterCard and Maestro)

•

SSL Server and Client certificates issued under the MasterCard hierarchy
for communication to the Directory Server and MasterCard Authentication
History Server

•

Issuer Digital Signing certificates issued under the MasterCard hierarchy for
communication to the Directory Server and History Server

In addition, SSL certificates based on a public root hierarchy are required. These
certificates are not issued by the MasterCard Certificate Authority and must be
obtained from another commercially available certificate-issuing provider.
For more information, refer to the MasterCard SecureCode—Production
Procedures manual.
MasterCard Authentication History Server
The History Server is a central repository of all authentication activity occurring
within the issuer ACS for all transactions that occurred, including the PAReq
and PARes details.
Attempts Server
The MasterCard SecureCode infrastructure supports this component server.

©2005–2014 MasterCard. Proprietary. All rights reserved.
2-4

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

3-D Secure Solution
3-D Secure Solution Message Types

The MasterCard Attempt processing server provides the merchant with an
Attempt Accountholder Authentication Value (AAV) when:
•

The Issuer account range is not participating on the MasterCard SecureCode
Directory Server.

•

The Issuer sends a verify enrollment response with the value of an N
(Cardholder not enrolled).

•

The Issuer ACS is Unavailable or times out.

Issuers may choose to have their ACS provider to send a VEres=Y for
non-enrolled cardholders, and then providing the PAres=A to avoid invoking
the MasterCard Attempts Processing Service.
The AAV generated by the attempts Server service will be generated with
MasterCard keys which will not be shared. An issuer can identify an AAV
generated by the new MasterCard Attempts Processing Service by the ACS
identifier in the base64 decoded version of the AAV.

3-D Secure Solution Message Types
The card range request/response, the verification request/response, the payer
authentication request/response, and the payer authentication transaction
request/response are all message types associated with the 3-D Secure Solution
process.

Card Range Request/Response
Card Range Request/Response, also known as card range caching, is no
longer a viable implementation. The MasterCard Attempts Processing Service
generates a Stand-In Authentication for cardholders not enrolled, card ranges
not participating, and Access Control Server (ACS) services not responding.
This Attempts Accountholder Authentication Value (AAV) is only provided
upon Merchant Plug-In (MPI) communication to the Directory Server for each
transaction. This ensures proper processing by all parties.

Verification Request/Response
Message Pair: VEReq/VERes—The first step in the payer authentication process
is to validate that the cardholder account number is part of an issuer’s card
range, which is participating in 3-D Secure.

The Verification Request/Response messages are sent from the Merchant Server
Plug-In to the Directory to check card range eligibility. If the specified account
number is contained within a MasterCard® SecureCode™ eligible card range,
this message is then sent from the Directory to the Access Control Server (ACS)
to check if the specific account number is enrolled and active to participate in
3-D Secure.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

2-5

3-D Secure Solution
Cardholder Enrollment

All merchants will need to call the directory server for every MasterCard
SecureCode transaction to receive an Attempts Accountholder Authentication
Value (AAV) or an AAV from the issuer’s ACS provider. Upon implementation of
the Attempts Service, MPI services will only see VERes message values of Y.
The VERes will route the Merchant Plug-In (MPI) service via the cardholder’s
browser to either the cardholder’s ACS Service or the MasterCard Attempts
Processing Service for Stand-In authentication.

Payer Authentication Request/Response
Message Pair: PAReq/PARes—After determining that a cardholder is enrolled
to participate in 3-D Secure, the actual process of payer authentication is
performed for each online purchase.

The Payer Authentication Request/Response messages are sent from the
Merchant Server Plug-In to the Access Control Server to initiate the actual
authentication. At this point in the process, cardholders will be presented with
an authentication window and asked to enter their SecureCode or one-time
password (OTP).
The Access Control Server (ACS) will perform authentication and, if successful,
generate an Accountholder Authentication Value (AAV). It is returned to the
merchant within the PARes message. For successfully authenticated transactions
and Attempts, this AAV must be sent by the merchant to the acquirer and
forwarded to the issuer as part of the authorization request. ACS providers
should provide AAV values for all attempts (PARes = A) when the cardholder is
not enrolled or declines activation in addition to the fully authenticated (PARes
= Y) transaction status.

Payer Authentication Transaction Request/Response
Message Pair: PATransReq/PATransRes—Following authentication, it may
be desirable to centralize storage of authentication requests for later dispute
processing.

The Payer Authentication Transaction Request/Response messages provide a
record of this authentication activity sent from the Access Control Server (ACS)
to the MasterCard Authentication History Server. All ACS service providers must
support the PATransReq/PATransRes messages for the History Server.
The MasterCard® SecureCode™ global infrastructure supports the History
Server. All ACS providers must support these messages.

Cardholder Enrollment
This section outlines the cardholder enrollment process for MasterCard®
SecureCode™.

©2005–2014 MasterCard. Proprietary. All rights reserved.
2-6

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

3-D Secure Solution
Cardholder Authentication

Cardholder Enrollment Process
Enrollment is the process whereby authorized MasterCard and Maestro®
branded cardholders will activate their cards for a specific issuer’s MasterCard®
SecureCode™ program.
Part of the planning process for building a 3-D Secure infrastructure will involve
determining exactly how this process will work.
The major component associated with enrollment is the enrollment server. It is
responsible for driving the process under which the cardholder:
•

Validates that their account number is designated as eligible to participate in
MasterCard SecureCode by the card issuing financial institution.

•

Is authenticated by the card issuing financial institution through the
validation of secret questions, independently determined by each issuer
participating in the program.

•

Sets up and defines their MasterCard SecureCode.

•

Performs functions such as profile administration (including SecureCode and
email changes) and review of recent purchases.

Typically, the following steps are necessary to authenticate the cardholder:
1. The cardholder visits an issuer enrollment site. This may be accessible, for
example, from the issuer’s website or home banking system.
2. The cardholder is asked to provide issuer identified enrollment data.
During this phase of the process, the cardholder is asked a series of secret
questions to prove identity to the issuer if the issuer uses static password
for authentication. Otherwise, the cardholders are pre-enrolled with a
One-time password (OTP) solution.

Cardholder Authentication
Following is information about the cardholder authentication process.

Sample Cardholder Authentication Process
The sample flow that follows assumes that the cardholder has already enrolled
in the issuer’s MasterCard® SecureCode™ program and obtained a SecureCode
to use while shopping online at participating merchants.
The figure below also assumes that all communication channels between the
various components are properly secured using the Secure Socket Layer (SSL)
protocol.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

2-7

3-D Secure Solution
Cardholder Authentication

Link

Description

SSL-1

The cardholder shops at the merchant and, when ready to checkout, enters the appropriate
payment information—including the account number.

SSL-2

The Merchant Plug-In queries the Directory to verify the enrollment status for a specific
issuer using the verification request messages.

SSL-3

If the directory indicates that an issuer is participating, then the directory must forward a
request to the issuer’s Access Control Server to check the enrollment status of a specific
cardholder. The configuration information in the Directory will indicate exactly which
Access Control Server will perform the check. The resulting response will flow back over
the same links to the Merchant Plug-In.

SSL-4

If the Access Control Server indicates that a specific cardholder is participating, the Merchant
Plug-In creates the Payer Authentication Request message and sends it to the cardholder’s
browser.

©2005–2014 MasterCard. Proprietary. All rights reserved.
2-8

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

3-D Secure Solution
Cardholder Authentication

Link

Description

SSL-5

The cardholder browser redirects the message to the appropriate Access Control Server to
perform cardholder authentication. When the Access Control Server receives the Payer
Authentication Request message, it causes the user authentication dialog to begin. This in
turn causes a separate authentication window to appear to the cardholder that will facilitate
the cardholder authentication process.

SSL-6

The Access Control Server authenticates the cardholder SecureCode, constructs the SPA AAV
for MasterCard’s implementation of 3-D Secure, and builds and digitally signs the Payer
Authentication Response message. It is returned to the Merchant Plug-In, at which point the
cardholder authentication window will disappear.

SSL-7

The Access Control Server sends PATransRec to the MasterCard Authentication History Server.

After cardholder authentication is complete, the merchant is required to
pass the corresponding Secure Payment Application™ (SPA) Accountholder
Authentication Value (AAV) to the acquirer via the Universal Cardholder
Authentication Field™ (UCAF) within the authorization message. This value is
then passed from the acquirer to the issuer as part of the authorization message.

When received by the issuer, the AAV can be validated as part of authorization
request processing, as well as archived for use in potential cardholder disputes.
Issuers will only be able to validate an Attempt or fully authenticated AAV
generated by their own ACS. If the MasterCard Attempts Processing Service
generates an AAV, it cannot be issuer validated. The MasterCard Attempts
Processing Service uses a unique key that cannot be shared. For issuers wanting
to ensure that all AAVs are validated, MasterCard offers the MasterCard-hosted
on-behalf service. AAVs will also be generated by the MasterCard Attempts
Processing Service for Stand-In Authentication when cardholders are not
enrolled, card ranges are not participating in MasterCard SecureCode, or Access
Control Server (ACS) services are not responding. This Attemtpts AAV can only
validate through the MasterCard AAV Validation Service rather than through
self-validation.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

2-9

3-D Secure Solution
Cardholder Authentication

Sample Cardholder Authentication Flow
The following sample cardholder authentication flow is identical for both
MasterCard and Maestro™ cardholders.
Enter Payment Information
The cardholder will shop at a merchant location just as they would today.
After selecting the items to be placed into the shopping cart, the payment card
information to be used for the transaction is entered.
Confirm and Submit Order
Once all of the payment and shipping information has been entered, the
cardholder is typically given an opportunity to review the purchase one last
time before submitting the order.
Enter SecureCode
Upon submitting the final order, the cardholder will be presented with an
authentication window from their MasterCard card or Maestro card-issuing
bank. At this point, the cardholder will enter his or her SecureCode value to
perform authentication processing.

Purchase Completed
After validation of the cardholder SecureCode by the issuing bank, the
authentication window will disappear and the authorization of the payment
card will complete as usual.

©2005–2014 MasterCard. Proprietary. All rights reserved.
2-10

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

Chapter 3

Merchants

This section provides a general overview of the various activities and requirements
associated with building and maintaining the merchant components required to support
MasterCard® SecureCode™.

Overview ....................................................................................................................................... 3-1
Merchant Infrastructure.................................................................................................................. 3-1
Establishment of MasterCard SecureCode Operating Environment .......................................... 3-2
Authorization System Message Enhancements............................................................................... 3-2
Passing the AAV in the Authorization Message........................................................................ 3-2
E-Commerce Commerce Indicator ........................................................................................... 3-3
Recurring Payments ................................................................................................................. 3-5
Maestro Considerations.................................................................................................................. 3-5
Customization ................................................................................................................................ 3-6
MasterCard SecureCode Program Identifier Usage Guidelines ................................................. 3-6
Integrated Support for Merchant Plug-In Processing ............................................................... 3-6
Consumer Message on Payment Page ..................................................................................... 3-8
Creation of Cardholder Authentication Window...................................................................... 3-8
TERMURL Field ........................................................................................................................ 3-9
Replay Detection ..................................................................................................................... 3-9
Merchant Server Plug-In Configuration.................................................................................. 3-10
Operational .................................................................................................................................. 3-12
Loading of MasterCard Root Certificates ................................................................................ 3-12
Loading of MasterCard SSL Client Certificate ......................................................................... 3-12
MPI Log Monitoring ............................................................................................................... 3-12
MPI Authentication Request/Response Archival .................................................................... 3-13
AAV Processing ............................................................................................................................ 3-13
Global Infrastructure Testing Requirements................................................................................. 3-13
MasterCard Site Data Protection Program .................................................................................... 3-14
MasterCard SecureCode Merchant Process and Liability Shift Matrix ........................................... 3-14

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

3-i

Merchants
Overview

Overview
The merchant activities and requirements for building and maintaining the
merchant components for MasterCard® SecureCode™ are divided into five
primary categories.
Category

Description

Infrastructure

Requirements related to installation of
new hardware and software components.

Customization

Requirements related to customizing or
configuring vendor products.

Operational

Requirements related to operating the
components in a production environment,
including any process oriented changes
that may be required.

Accountholder Authentication Value
(AAV) Processing

Requirements related to handling and
processing of the AAV.

Global Infrastructure Testing
Requirements

Requirements related to testing of
MasterCard® SecureCode™ platform
components.

NOTE
In this section, there are references to a merchant endpoint. This is the entity
that is actually operating the Merchant Plug-In software. These may include,
for example, individual merchants, hosting providers, and payment service
providers. Not all merchants participating in the MasterCard SecureCode
program are considered endpoints.

General Responsibilities
MasterCard requires all merchants to ensure that MasterCard SecureCode
is not the only fraud management tool used to manage fraud. Additional
options available within standard card processing such as CVC2, and Address
Verification Service (AVS) (available in some territories) should also be used.
Many suppliers now offer fraud monitoring systems that take other non-card
information available for capture during the e-commerce shopping experience.
Check with your acquirer or shopping cart/MPI vendor for options. If using a
Service Provider to supply the checkout and MasterCard SecureCode experience,
additional options are likely available.

Merchant Infrastructure
Following are the merchant infrastructure requirements for the installation
of new hardware and software components that support MasterCard®
SecureCode™.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

3-1

Merchants
Authorization System Message Enhancements

Establishment of MasterCard SecureCode Operating
Environment
All merchants participating in the MasterCard® SecureCode™ program are
required to install or have access to a 3-D Secure v 1.0.2 or higher compliant
Merchant Server Plug-In.
For a current list of vendors, go to:
•

www.mastercard.us/merchants/securecode-vendors.html

Authorization System Message Enhancements
Following are enhancements to the Authorization System for supporting
MasterCard® SecureCode™.

Passing the AAV in the Authorization Message
MasterCard requires that the Secure Payment Application™ (SPA) Account
Authentication Value (AAV) returned to the merchant in the Payer Authentication
Response (PARes) message be included in all successfully cardholder
authenticated e-commerce transactions and Attempts Processing transactions
from either the issuer’s Access Control Server (ACS) provider or MasterCard
Attempts Processing Service’s “Stand-In” Authentication.
Merchants must ensure that they follow the message formatting requirements
of their acquirer when generating Universal Cardholder Authentication Field™
(UCAF) related authorization requests.
Following are potential issues to consider.
MasterCard requires that the SPA AAV contained in the authorization from the
acquirer to the issuer be Base64 encoded. Passing this data in binary format
is not an option. Merchant plug-in software typically provides the SPA AAV
returned in the PARes message already in this format. While some acquirers
allow merchants to simply pass the Base64 encoded SPA AAV through in the
authorization, others have varying requirements.
Depending on the specific merchant system and acquirer message formats, it
may be necessary for the SPA AAV to be converted between ASCII and EBCDIC
encoding prior to it being sent to the acquirer. Any such conversion must only
be performed on the SPA AAV after it has been Base64 encoded. Any attempt
to modify the binary representation of the SPA AAV will result in corruption
of the data and the inability of the issuer to perform cardholder authentication
verification processing.

©2005–2014 MasterCard. Proprietary. All rights reserved.
3-2

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

Merchants
Authorization System Message Enhancements

The only exception to the Base 64 encoding requirement of an AAV is when
MasterCard supplies this AAV to the merchant as a static code for use in Maestro
Advanced Registration Program (MARP) transactions. This static AAV must be
passed in plain text. For additional information on MARP, see Appendix D,
MasterCard Advance Registration Program.
For more information about Base64 encoding, refer to Appendix B, MasterCard
SecureCode SPA Algorithm Specifications.
While an authentication status of “A” is a valid PARes status response and
will contain a SPA AAV, it is not considered to be a successful cardholder
authentication. The AAV resulting from such a transaction is identified by a
lower case “h” in the first position (Base64 encoded). Acquirers must ensure
that transactions. All AAVs received as part of a PARes must be provided in
the Authorization Request/0100 message by acquirers in DE 48 (Additional
Data—Private Use), subelement 43 (3-D Secure for MasterCard SecureCode).
If questions arise, merchants should consult with their acquirers for more
detailed information. Refer to the Merchant Processing Matrix for additional
information.
AAV Usage
The AAV contained within a single authorization request must match the AAV
value returned by the issuer for a single associated authentication request.
Therefore, an AAV can be used only once in a single authorization message and
must not be stored for reuse after receiving authorization.

E-Commerce Commerce Indicator
An electronic commerce indicator (ECI) flag is required to be present in all
PARes messages sent by the issuer ACS to the merchant when the status field
contains a value of Y or A.
As currently defined, the 3-D Secure protocol indicates that this ECI field be
determined by each brand. As a result, MasterCard has adopted values that
may be different from other participating payment brands. The ECI value is
not the same as the Security Level Indicator (SLI). The Security Level Indicator
is contained in the Authorization Request/0100 message in DE 48 (Additional
Data—Private Use), subelement 42 (Electronic Commerce Indicators), subfield 1
(Electronic Commerce Security Level Indicator and UCAF Collection Indicator)
with position 1 (Security Protocol) containing a value of 2 (Channel) and
position 2 (Cardholder Authentication) containing a value of 1 (Cardholder
certificate not used). Position 3 (UCAF Collection Indicator) varies based on the
PARes status. If PARes is N, then the value should be 0 for non-SecureCode
standard e-commerce transaction without liability sift. If PARes is Y, then the
value should be 2 for fully authenticated. If the PARes is A or U, then the
value should be 1 for merchant-only authentication (attempts), which carries a
liability shift.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

3-3

Merchants
Authorization System Message Enhancements

When these values are used within the MasterCard authorization and clearing
systems, they are referred to as SLIs. Most, if not all, acquirers and payment
processors have defined the ECI as a required field in their authorization request
message formats. Each merchant must ensure that the MasterCard ECI value
is properly translated to a valid value as defined in the appropriate acquirer
or payment processor authorization message format. Failure to perform the
appropriate translation may affect the ability to obtain successful authorizations.
MasterCard has currently defined two ECI values. The following table indicates
the relationship between these values and the status field in the PARes message.
The ECI value is not the same as the Security Level Indicator. The Security
level indicator is contained in the Authorization Request/0100 message at DE
48, subelement 42, subfield 1 (Electronic Commerce Security Level Indicator
and UCAF Collection Indicator) with position 1 (Security Protocol) containing a
value of 2 (Channel), and position 2 (Cardholder Authentication) containing
a value of 1 (Cardholder certificate not used). Position 3 (UCAF Collection
Indicator) varies based on the PARes status. If PARes is N, then the value should
be 0 for non-SecureCode standard eCommerce transaction without liability sift.
If PARes is Y, then the value should be 2 for fully authenticated. If the PARes is
A or U, then the value should be 1 for merchant only authentication (attempts)
which carries a liability shift.
Any questions on translating MasterCard defined values for authorization should
be directed to your acquirer or payment processor.
PARes Status
Field

Description

MasterCard ECI Value

Y

Cardholder was successfully authenticated (SLI = 2)

02

A

Authentication could not be completed but a proof of
authentication attempt was provided SLI = 1.

01

N

Cardholder authentication failed SLI = 0

Absent

U

Authentication could not be completed due to technical
or other problems (SLI = 1)

Absent

NOTE
PARes status must correlate with the ECI and Security Level Indicator chart
shown in the Processing Maxtrix. The ECI value and Security Level Indicator
passed as part of the Authorization Request/0100 message are different values
and are denoted in the Processing Matrix.
NOTE
MasterCard has additional definitions of SLIs that are not generated by the
PARes received but that may need to be used by the merchant. Refer to the
Merchant Processing Matrix section for additional information on SLIs. (SLI)

©2005–2014 MasterCard. Proprietary. All rights reserved.
3-4

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

Merchants
Maestro Considerations

Recurring Payments
Only the initial authorization request for a recurring payment may be
e-commerce transactions and may contain Universal Cardholder Authentication
Field™ (UCAF) data.
Merchants must not provide UCAF data in any subsequent recurring payment
authorizations as these are not considered electronic commerce transactions
by MasterCard and are not eligible for participation in the MasterCard®
SecureCode™ program.
With the following exception, Maestro® cards are not eligible to be used for
recurring payments.
Recurring payments on Maestro cards issued in the Europe region are valid
but subject to specific acceptance rules. For more information, refer to the
Transaction Processing Rules document.

Maestro Considerations
The following requirements and activities are specific to merchant support of
Maestro® cards as part of the MasterCard® SecureCode™ program. Contact your
acquirer for a complete set of Maestro e-commerce acceptance requirements.
Required use of MasterCard SecureCode
Maestro rules require that all e-commerce merchants accepting Maestro cards
must use MasterCard SecureCode for all transactions, or apply and be accepted
for entry to Maestro Advanced Registration Program (MARP). See Appendix F,
MasterCard Advance Registration Program for additional information.
Account Number Length Requirements
Maestro merchants must support cardholder account numbers that are 13–19
digits in length.
CVC2 and Maestro
Merchants should be aware that not every Maestro card in issuance has a CVC2
and this should be factored in during checkout design.
Maestro Acceptance Rules
For additional information about accepting Maestro in e-commerce and the
rules pertaining to Maestro Acceptance, refer to the Transaction Processing
Rules document.
Additional Maestro Propositions and Considerations in E-commerce when
using MasterCard SecureCode
For additional information, refer to Appendix D, Maestro Considerations.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

3-5

Merchants
Customization

Customization
Following are merchant requirements for customizing or configuring vendor
products in support of MasterCard® SecureCode™.

MasterCard SecureCode Program Identifier Usage Guidelines
Issuers and acquirers must adhere to the applicable usage guidelines.
Merchants are required to adhere to the applicable usage guidelines.
These guidelines are indicated in the MasterCard SecureCode Program Identifier
Guidelines accessed using the following web address:
www.mastercard.com/us/merchant/security/what_can_do/pdf/SecureCode_logo_usage.pdf
Proof of adherence to these guidelines must be provided to MasterCard as a
condition of successful completion of MasterCard® SecureCode™ merchant
or service provider functional testing.
MasterCard highly recommends that all screenshots be provided for review as
soon as possible in case changes are required.
A copy of the MasterCard SecureCode logo artwork, as well as any updates
to the program identifier usage guidelines, is available for download at
www.mastercardbrandcenter.com/us/getourbrand/index.shtml.

Integrated Support for Merchant Plug-In Processing
The following diagram depicts a sample high-level flow of a transaction through
a merchant’s e-commerce site that has integrated support for MasterCard®
SecureCode™.
The following figure indicates merchant best practices regarding MasterCard
SecureCode processing.

©2005–2014 MasterCard. Proprietary. All rights reserved.
3-6

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

Merchants
Customization

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

3-7

Merchants
Customization

Consumer Message on Payment Page
MasterCard recommends the use of a consumer message on the payment page
to further indicate merchant participation in the program.

Creation of Cardholder Authentication Window
The 3-D Secure protocol is designed so that the creation of the cardholder
authentication window is performed by the merchant.
The actual content of the window is controlled by the issuer. There are two
primary methods for creation of this window, however only one approach,
inline windows, is now acceptable for deployment. and existing merchants are
expected to convert to an inline window implementation.
NOTE
Previous implementation approaches based on pop-up authentication windows
are no longer supported for new merchant implementations. As the requirement
to cease using pop-up windows has been in place since 2005, any merchant that
is found to support a pop-up window will be deemed as out of compliance with
MasterCard® SecureCode™ and may have their facility terminated or may be
liable for assessments. MasterCard recommends that merchants check their
checkout process and speak to their service providers on this point.

Pop-Up Authentication Windows
MasterCard prohibits this type of implementation.
Inline Windows
Inline window implementations, which have proven to virtually eliminate the
issues caused by pop-up authentication windows, are required for all new
merchant implementations. Existing pop-up implementations must convert to
inline windows. By presenting a full-page view, the MasterCard SecureCode
authentication process appears to be a seamless part of the merchant checkout
process, particularly when the merchant uses the “with frames” approach
described in the following paragraphs.
With Frames
A frame implementation allows the merchant to display a branded header and
explanation text that can assist cardholders who are new to the MasterCard
SecureCode experience. In a frame implementation, only part of the full
window is redirected to the issuer’s access control server.
MasterCard provides the following guidelines and specifications for merchants
that choose to implement the frames approach:

©2005–2014 MasterCard. Proprietary. All rights reserved.
3-8

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

Merchants
Customization

•

The use of active HTML links in the branded header frame is not allowed.
MasterCard recommends including a link below the header frame that directs
the cardholder back to the checkout page in case of technical difficulties.

•

The explanation text should be clear and concise. The text should not
assume that the cardholder is already enrolled in MasterCard SecureCode
and should not provide instructions that might conflict with the cardholder’s
issuer instructions.

•

The merchant should ensure that the authentication window frame is fully
visible and is not located too low in the page because of long text or
large upper frame. A minimum space of 400 x 400 pixels is required for
the ACS frame.

•

Merchants must ensure that the “back” button functionality works properly
and that cardholders will be routed back to the checkout page.

Without Frames
MasterCard research and feedback suggests that cardholders are uncomfortable
with the without frames method, therefore it can cause a higher abandonment
rate. The use of frames adds the sense of security that the cardholder is still
at the merchant site and is not being “phished.” MasterCard recommends that
this approach is not used. Any merchant currently supporting this cardholder
experience is encouraged to move to a “frame” experience.

TERMURL Field
The TERMURL is a field that is provided by the merchant to the issuer during
the payer authentication request process.
This field provides the issuer with the merchant URL where the payer
authentication response message is to be sent. The use of mixed HTTP
and HTTPS frames typically results in a security box being presented to the
cardholder. Depending on how the cardholder responds to this dialog, the
current and all future attempts to transmit the PAReq message may fail.
NOTE
Merchants using inline authentication windows with frames must populate the
TERMURL field with an HTTPS address.

Replay Detection
Many issuer access control servers attempt to detect replay attacks by not
allowing a transaction with the same account ID and XID to be processed
more than once.
Merchants must ensure that each Payer Authentication Request (PAReq) contains
a unique combination of account ID and XID.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

3-9

Merchants
Customization

Merchant Server Plug-In Configuration
Following is server plug-in information for merchants.
Initialization of MasterCard Directory URL
Each merchant endpoint must configure the MPI software to communicate with
the MasterCard® SecureCode™ Directory server.
Initialization of MPI Processing Timers
Following is information about cache expiration timers and transaction time-out
timers.
Cache Expiration Timers
MasterCard recommends that merchants send a VEReq to the directory for each
transaction rather than using caching to verify card range participation in the
program. With the implementation of the MasterCard Attempts Processing
Service’s “Stand-In” Authentication, all merchants must send all VEReq to
the Directory Server to ensure receipt of AAV value to include within the
Authorization Request/0100 message.
Transaction Time-out Timers
Transaction time-out periods determine how long to wait for a response to a
Verification Request message and a Payer Authentication Request message.
In the case of PAReq/PARes processing specifically, the wait times may vary
because of the requirement for cardholder interaction. In practice, however,
many financial institutions are using existing consumer credentials (for example,
home banking passwords) for the MasterCard SecureCode program. As such,
issues related to time consuming functions such as forgotten passwords are
minimized.
MasterCard recommends the following best practices regarding time-out values:

Function

Time-Out Values

Verify Enrollment Request

20 Seconds

Action if timer expires prior to
receipt of response
Continue as if the cardholder
is not enrolled in the program
(for example VERes transaction
status = “N”). This means the
Authorization Request/0100
message should be sent with a
Security Level Indicator of 211
(Merchant Only authentication
transaction [liability shift applies]).
With the implementation of the
MasterCard Attempts Processing
Service, this should not occur

©2005–2014 MasterCard. Proprietary. All rights reserved.
3-10

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

Merchants
Customization

Function

Time-Out Values

Payer Authentication Request

MasterCard requires that the
merchant allow a minimum of
five minutes for return of the
PARes, and recommends that the
merchant allow up to 10 minutes
for return of the PARes.

Action if timer expires prior to
receipt of response
unless the Directory Server is
unavailable.
Continue as if cardholder
authentication failed (for example
PARes transaction status = “N”).
This means the Authorization
Request/0100 message should
be sent with a Security Level
Indicator of 210 (non-SecureCode
transaction [no liability shift]).

Initialization of MPI Processing Parameters
There are a number of MPI configuration parameters which, if not set properly,
may cause 3-D Secure protocol violations.
All merchants must ensure that their implementation plans account for the
following field restrictions:
•

The merchant name within any applicable message must be less than or
equal to 25 characters including spaces.

•

The merchant URL field in the PAReq message must be fully qualified
and, ideally, should be the URL of the merchant home page. Many ACS
providers present this URL to cardholders, including an active HTML link
that directs cardholders to this address.

•

The merchant country code must be a valid, 3 digit, ISO 3166 country code.

•

The purchase currency code must be a valid, 3 digit, ISO 4217 currency
code.

TERMURL
Merchants must ensure that the TERMURL used for testing is modified to
properly reflect the production environment. In addition, the TERMURL field
must be fully-qualified.
Zero or Empty Parameters
Merchants must make sure that all parameters sent to the ACS are valid and,
unless otherwise indicated by the 3-D Secure protocol, do not contain zero or
empty data elements. For example:
1. The transaction amount should contain a non-zero amount. A Payer
Authentication Request (PAReq) transaction amount of USD 0 is required
to not authenticate transparently with Risk Based Authentication. This
is because the Merchant Plug In (MPI) process being used is to actually
authenticate the cardholder. This may occur when enrolling a card within
an Online Wallet.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

3-11

Merchants
Operational

2. As defined by the protocol, the MD field must always be provided, even
if it is not used.
3. If optional fields are not used, MasterCard recommends they be excluded
from the message instead of using empty data elements.

Operational
Following are MasterCard® SecureCode™ operational guidelines for merchants.

Loading of MasterCard Root Certificates
Merchant endpoints are required to load all active and pending MasterCard
Root hierarchy certificates.
This root will be required by the merchant plug-in to perform digital signature
validation. It may also be required in order to establish SSL sessions using
certificates based on the MasterCard private hierarchy.
NOTE
Currently, MasterCard has two active root certificates that must be loaded.

Loading of MasterCard SSL Client Certificate
Merchant endpoints are responsible for obtaining all necessary SSL client and
server certificates for use by the MPI platform.
Individual merchants will be required to use a single MasterCard hierarchy
SSL client certificate for their acquirer. If a processor is using the merchant
plug-in, MasterCard does not require an individual certificate for each merchant.
However, the processor will be required to use a separate and distinct client
certificate for each applicable acquirer.
For more information about certificate requirements and procedures, see the
MasterCard SecureCode—Production Procedures manual.

MPI Log Monitoring
Merchant endpoints should establish a policy of monitoring MPI logs for various
authentication failure messages, including signature validation failures.
Repeated failures should be reported to the merchant’s acquirer. Merchants
should note that this could be an indication of issues surrounding the
MasterCard® SecureCode™ implementation with possible loss of Liability Shift
or cost benefits on these transactions.

©2005–2014 MasterCard. Proprietary. All rights reserved.
3-12

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

Merchants
AAV Processing

MPI Authentication Request/Response Archival
Merchants, or merchant endpoints, should establish a policy for archival of
authentication request and response messages.
MasterCard recommends that the archival period for this data be the same as the
associated authorization transaction data, and should be a minimum of 180 days.

AAV Processing
The following processing steps are required by the 3-D Secure protocol and
typically handled by the MPI. Any subsequent processing is the responsibility
of the merchant.
Identification of SPA AAV Format in PARes
The CAVV algorithm field in the PARes message indicates the algorithm
used to create the cryptogram contained in the CAVV field. All MasterCard
Account Authentication Value (AAV) values will be identified with a value of
3 (MasterCard SPA Algorithm). This is the only value that is permitted for
MasterCard and Maestro® card transactions.
Validation of Payer Authentication Response (PARes) Signature
All PARes messages returned to the merchant are digitally signed by the
associated cardholder’s issuer ACS using certificates provided by MasterCard
or the Attempts Processing Server. The merchant is required to validate the
signature prior to extracting the Secure Payment Application™ (SPA) AAV from
the PARes message for inclusion in the authorization request sent to the acquirer.
The AAV value in the PARes must be considered unusable if the signature
validation process fails.

Global Infrastructure Testing Requirements
All merchant endpoints are required to complete MasterCard® SecureCode™
functional testing. This includes execution of the MasterCard SecureCode System
Test Agreement, when applicable, as well as remittance of applicable fees.
The purpose for this testing, which only encompasses cardholder authentication
testing, is to ensure that merchant implementations meet minimum functional
and brand requirements for participating in the MasterCard SecureCode
program. Any additional authorization testing should be coordinated through
the appropriate merchant acquirer or processor.
For additional information on the MasterCard SecureCode testing process, send
a request via email to securecode_customer_support@mastercard.com.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

3-13

Merchants
MasterCard Site Data Protection Program

MasterCard Site Data Protection Program
The MasterCard Site Data Protection Program (SDP) represents a critical piece
in the MasterCard comprehensive approach to payment card security.
All merchants impacted by the SDP mandate must demonstrate compliance
with the Payment Card Industry Data Security Standard (PCI-DSS) security
requirements to their acquirer. For more information about SDP, contact your
acquirer or visit www.mastercard.com/sdp.

MasterCard SecureCode Merchant Process and Liability
Shift Matrix
The following table illustrates merchant behavior during various potential
scenarios associated with MasterCard® SecureCode™ authentication request
processing.
MasterCard SecureCode Processing Matrix
To access the MasterCard SecureCode Processing Matrix in a Microsoft® Excel®
format that can be copied and used as needed, click here. This file can be
saved to a local drive for later use.

CIS DE 48 (Additional Data—Private Use) Components
These indicators, as listed in the table above, map to MasterCard Authorization
specification requirements for acquirers and issuers. DE 48, subelement 42
(Electronic Commerce Indicators), subfield 1 (Electronic Commerce Security
Level Indicator and UCAF Collection Indicator) contains the Security Level
Indicator and DE 48, subelement 43 (Universal Cardholder Authentication Field
[UCAF]) contains the UCAF Data (AAV). Merchants must refer to the appropriate
acquirer or payment processor message specifications for specific formatting
requirements.

©2005–2014 MasterCard. Proprietary. All rights reserved.
3-14

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

Merchants
MasterCard SecureCode Merchant Process and Liability Shift Matrix

Merchant Risk-Based Approach
A merchant is not required to undertake MasterCard SecureCode on every
transaction except when accepting Maestro®, as this is a requirement of
the program. Any merchant that chooses not to use a SecureCode on any
transaction should process on the basis of the last entry in the table above
labeled “Merchant Not SecureCode-enabled OR SecureCode Not Used for
Transaction” (SLI = 210).
Failed Authentication
A merchant may proceed with a transaction for which the authentication failed,
but it must be on a SecureCode not used for transaction basis (SLI = 210).
This transaction must not be submitted as merchant only and is not eligible
for any liability shift. No AAV will be provided, and issuers are likely to
decline the transaction if submitted. MasterCard reserves the right to undertake
noncompliance proceedings against any merchant or acquirer deemed to be
undertaking merchant-only transactions for failed authentications.
Liability Shift
A fully authenticated liability shift is in effect globally for all commercial and
consumer cards.
Merchant-only liability shift is in effect globally for all consumer cards.
Commercial cards carry merchant-only liability for all interregional transactions
and are only excluded for intraregional transaction in the U.S. and Canada
regions.
For more information, refer to the Chargeback Guide.
Notes
The following numbered items correspond with the numbers provided in the
“Notes” column in the table above.
1. Best practices would suggest that fraud may be involved, and the merchant
should prompt the consumer to try again or use a different form of
payment. If the merchant decides to send for authorization, the transaction
is not eligible for the liability shift.
2. The AAV associated with an attempt must be included in any subsequent
authorization message.
3. The merchant should check the reason for the error message before
deciding whether to proceed with the authorization. Not all reason codes
may indicate a failure.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

3-15

Appendix A Merchant Customer Service Guide
This section provides customer service staff with a general overview of the MasterCard®
SecureCode™ service, along with an understanding of the consumer experience, in order to
provide assistance to customers when needed. This publication is designed for customer
service staff at e-retailers that support MasterCard SecureCode.

Frequently Asked Questions ..........................................................................................................A-1
MasterCard SecureCode FAQs ..................................................................................................A-1
Cardholder Enrollment in the MasterCard SecureCode Program....................................................A-4
Consumer Buying Scenarios ..........................................................................................................A-5
Authentication—Successful ......................................................................................................A-6
Authentication—Forgotten SecureCode....................................................................................A-7
Authentication—Failed ............................................................................................................A-8
Activation During Shopping (ADS)..........................................................................................A-8
Activation During Shopping—Opt Out of Enrollment ........................................................... A-10

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

A-i

Merchant Customer Service Guide
Frequently Asked Questions

Frequently Asked Questions
A merchant should provide these frequently asked questions (FAQs) online and
make them available to call center staff.
NOTE
All graphics in this document are samples. Actual consumer experiences may
vary based on the specific implementation by the e-retailer and the card issuer.
Throughout this section, the term “card issuer” refers to the bank or financial
institution that issued the MasterCard® card used by the consumer in the
transaction.

MasterCard SecureCode FAQs
Following are answers to frequently asked questions about MasterCard®
SecureCode™.
Question

Answer

What is MasterCard SecureCode?

Today, when a consumer makes a purchase from your website,
there is no way to confirm the consumer’s identity. MasterCard
SecureCode is a service that provides a mechanism for the
consumer’s identity to be validated by the bank that issued the
consumer’s card. By doing so, it provides your business with the
ability to obtain a payment guarantee similar to what is available in
the physical point-of-sale world.

What is a SecureCode?

A SecureCode is a secret password, known only to the consumer,
which is used to validate the consumer’s identity. Depending
upon the consumer’s bank, the consumer may be asked to enter
their “SecureCode,” “SecureCode Password” or simply “Password.”
Regardless, all of these terms refer to the same thing.

What is the format of a SecureCode?

The format of a consumer’s SecureCode will vary based on the
security policy of the consumer’s card-issuing bank. Typically,
it will be a combination of between 4–10 letters and numbers.
One-time password (OTP) solutions will likely be 6–8 digits.

Why is our website supporting
MasterCard SecureCode?

MasterCard SecureCode gives your website a method to securely
authenticate the identity of the consumer. In the online world,
there is no signed sales receipt and, in the case of a disputed
purchase, it is difficult for you to prove that a consumer made
a particular purchase. In those instances, your business is liable
for ‘unauthorized purchase’ fraud. By asking a consumer for a
SecureCode, and obtaining confirmation from the consumer’s card
issuer, your business can obtain a guarantee against certain types
of fraud. In addition, MasterCard consumer research has shown
that consumers are more confident shopping at websites that
support MasterCard SecureCode.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

A-1

Merchant Customer Service Guide
MasterCard SecureCode FAQs

Question

Answer

How does our website support
MasterCard SecureCode?

To participate in MasterCard SecureCode, your website has new
functionality that works to connect consumers with the card
issuer so that the consumer’s identity can be validated each time
a purchase is made. Your website group may have decided to
purchase and operate Merchant Plug-in software from an outside
vendor. Alternatively, your website may be communicating
with a server that runs the software program. Depending on
the implementation, there are times when consumers may be
presented with vendor-specific error codes. Your technical support
staff should consult with your vendor or service provider for a
list of these codes.

What is a personal greeting?

The personal greeting is a message that the consumer creates when
registering for the card issuer’s MasterCard SecureCode program.
This is only applicable for static password implementations. As
more issuers move to dynamic OTP solutions, personal greetings
may no longer be present. During an online purchase, the Personal
Greeting will appear in the pop-up box from the card issuer. For
the consumer’s assurance, the Personal Greeting verifies that the
consumer is communicating with, and submitting the SecureCode
to, the card issuer.

What is the difference between
authentication and authorization?

Authentication is the process of validating a consumer’s identity
prior to completing the purchase. MasterCard SecureCode is a
cardholder authentication program.
Authorization is the process of obtaining approval from the credit
card issuing bank for a specific purchase.

How does MasterCard SecureCode
work?

First, a consumer must register and create a SecureCode. Each time
an online purchase is made at a participating e-retailer, a window
will automatically appear asking for the SecureCode. MasterCard
requires this window to be part of the existing browser display
and does not permit the use of pop-up windows for cardholder
authentication purposes. The exact implementation is controlled
by your website.
After reviewing the details of the purchase and confirming that
the Personal Greeting is correct, the consumer simply enters the
appropriate SecureCode to complete the purchase. When the
consumer correctly enters the SecureCode, the card issuer confirms
the authorized user of that card and provides your website with a
piece of data, called the accountholder authentication value (AAV),
which proves that the authentication was successful. This value
must be added to the credit card authorization request to prove
that authentication was performed. If a consumer does not enter
the correct SecureCode, the card issuer cannot confirm the identity,
and no authentication token is provided. In this particular instance,
the online merchant should ask the consumer for an alternative
form of payment.

©2005–2014 MasterCard. Proprietary. All rights reserved.
A-2

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

Merchant Customer Service Guide
MasterCard SecureCode FAQs

Question

Answer

What is the difference between a
pop-up and an inline authentication
window?

The MasterCard SecureCode program is designed so that the
merchant is responsible for creating the authentication window
and the card issuer is responsible for the content of this window.
Merchants create an inline window, which will appear as part of
the current browser session. MasterCard no longer permits the use
of a pop-up window for cardholder authentication because of the
prevalence of pop-up blocking software.

How does our website know if a
card is protected by MasterCard
SecureCode?

When a consumer uses a card that is enrolled in MasterCard
SecureCode at your website, the MasterCard SecureCode software
(the merchant plug-in, or MPI) automatically makes an inquiry to
MasterCard, which will check with the consumer’s card-issuing
bank. If the consumer is participating, the card issuer will open
up a secure dialog with the consumer. This dialog will enable
confirmation of the identity of the consumer and, assuming the
correct SecureCode is entered, guarantee the purchase to the
merchant.

Who knows the consumer’s
SecureCode?

The SecureCode value is known only by the consumer and the
consumer’s card-issuing bank. The dialog during which the
consumer enters the SecureCode value takes place with the issuing
bank only. No other parties, including your website or MasterCard,
are involved in this process. Your website is simply notified of the
result of this process via the MasterCard SecureCode software.

What are the Consumer’s System
Requirements for MasterCard
SecureCode?

MasterCard SecureCode works with most browsers. If the consumer
has any difficulty performing authentication, he should contact
his card issuer’s customer service by calling the phone number
on the back of his card.

How does a consumer enroll in the
MasterCard SecureCode Program?

Refer to the Cardholder Enrollment section for information.

What information is contained
in the MasterCard SecureCode
authentication window?

The authentication window is similar to the receipt that consumers
sign in a store. It includes details such as where the purchase is
being made and how much money is being spent. The actual
content of this window is provided by the consumer’s card issuing
bank based on information provided by your website.

Will the authentication window
appear if the consumer never
enrolled in the MasterCard
SecureCode Program?

There are two situations where the authentication window may
appear—both of which are related to the enrollment process.
•

A SecureCode has been selected by one authorized user
and not communicated to the other authorized users on the
account. For example, husband and wife. Most card issuers
do provide the ability for each authorized user of the card to
individually enroll and establish his/her own SecureCode. In
that case, the SecureCode value for either user may complete
the authentication process.

•

The card issuer tries to enroll the consumer using Activation
During Shopping. Refer to Activation During Shopping in this
chapter for more information. Activation During Shopping
will only occur if the issuer has selected static password as
their authentication method for cardholders. If a dynamic OTP

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

A-3

Merchant Customer Service Guide
Cardholder Enrollment in the MasterCard SecureCode Program

Question

Answer
solution is used, the Activation During Shopping step will not
occur.

What happens if the consumer does
not know their SecureCode?

It varies by card-issuing bank but consumers are usually given
three chances to successfully enter the SecureCode. An invalid
attempt will result in a prompt to the consumer to try again. In the
event that a consumer forgets the SecureCode, most card issuers
provide an alternative mechanism to complete the authentication
process. Typically, there is a “Forgot my SecureCode” link that the
consumer can click to obtain assistance.
After the allowable number of tries has been exceeded, the
card-issuing bank may prompt the consumer with a series of
questions to authenticate his identity—for example, last four
digits of social security number, birth date, signature panel code
on card, and more. If this information is successfully validated,
a successful authentication response will be returned to your
website. If not, the account will most likely be locked to prevent
any further authentication attempts at your website and also at
other participating websites.
Refer to Authentication—Forgotten MasterCard SecureCode in this
chapter for additional information.

What happens if authentication fails?

The result of a failed authentication depends on how your
particular website has been set up. At some websites, a failed
authentication will cause the e-retailer to request a different
payment method before allowing the purchase to proceed. In
other cases, the transaction may be submitted for authorization as
a non-MasterCard SecureCode transaction.
Refer to Authentication—Failed in this chapter for additional
information.

Cardholder Enrollment in the MasterCard SecureCode
Program
Eligible cardholders of MasterCard® and Maestro® cards activate a card for use
in the MasterCard® SecureCode™ program through an enrollment process.
The following bullets are related to the weaker static password authentication
option. The stronger one-time password (OTP) authentication approach
requires much less screen development and more time spent on the OTP
delivery mechanism and communication. Additional feature of Risk Based
Decision authentication also improves the enrollment/authentication approach.
This process typically occurs in one of two ways:
•

Traditional Cardholder Enrollment—The cardholder will need to go to his
issuing bank’s website to enroll, prior to going shopping.

•

Activation During Shopping—The cardholder will activate his account
during a purchase.

©2005–2014 MasterCard. Proprietary. All rights reserved.
A-4

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

Merchant Customer Service Guide
Consumer Buying Scenarios

It is important to remember that all enrollments are between the authorized
cardholders and their card-issuing banks. MasterCard is not involved in the
enrollment process.
Traditional Cardholder Enrollment
This type of enrollment typically takes place at a website designated by the
bank that issued the card. For example, it may be the bank’s home page or
home banking system.
In a typical example:
1. The consumer will be asked to provide enrollment data. During this phase
of the process, the consumer will be asked a series of questions to prove
identity to their bank. This may include asking for information such as the
last four digits of the consumer’s social security number, birth date, or the
signature panel code from the back of the credit card.
2. The answers to the questions will be validated either in-house at the bank
or through a third party processor such as a credit bureau.
3. If the consumer answers the questions correctly, the consumer is considered
authenticated and will be allowed to establish the SecureCode for that
particular MasterCard account number. The SecureCode will be stored by
the card issuer for use later on during online purchases at participating
e-retailers.
Activation During Shopping
Unlike the traditional enrollment process, Activation During Shopping (ADS)
does not require the consumer to visit an enrollment website before shopping.
This type of enrollment, which has proven to be very successful, takes place
during the shopping process. When an eligible consumer goes to checkout,
the card-issuing bank will ask a series of questions—similar to the traditional
enrollment process. Providing the correct answers will result in both a
successful enrollment and a successful authentication response returned to your
website. Refer to Consumer Buying Scenarios in this chapter to for a sample
shopping scenario.

Consumer Buying Scenarios
This section provides sample screen shots of consumer scenarios that may be
encountered while shopping at your website.
The following details apply to each of the buying scenario examples.
Authentication:

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

A-5

Merchant Customer Service Guide
Authentication—Successful

•

Occurs after the consumer elects to submit the order but prior your site
actually initiating a request to authorize the transaction.

•

Begins at the point where the e-retailer is asking for final confirmation
of the purchase.

The following image is an example of the point at which the scenarios begin.

Actual screen content may vary from the samples depicted.

Authentication—Successful
In this scenario, the consumer is presented with the authentication window.
After entering the proper SecureCode, a message will be returned to your
website indicating the authentication was performed successfully.
At this point, your website will send the fully authenticated authorization
request to MasterCard for approval. An approved response for qualified
requests will result in a payment guarantee to your company.

©2005–2014 MasterCard. Proprietary. All rights reserved.
A-6

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

Merchant Customer Service Guide
Authentication—Forgotten SecureCode

Authentication—Forgotten SecureCode
In this scenario, usually associated with static password authentication solutions,
the consumer is presented with the authentication window, but does not
remember the SecureCode.
In response to not knowing his or her SecureCode, the consumer clicks Forgot
Your SecureCode? on the Enter Your SecureCode screen and the following
screen appears.

A financial institution may decide to tell the consumer that they must call the
bank’s customer service department for additional help and will return a failed
authentication response to the merchant. In other cases, financial institutions
will prompt the consumer to answer a series of secret questions. Providing
the proper answer to these questions will permit the consumer authentication
process to complete successfully.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

A-7

Merchant Customer Service Guide
Authentication—Failed

Authentication—Failed
In this scenario, the consumer is presented with the authentication window,
but enters an incorrect SecureCode.
Each subsequent attempt to enter an invalid value will result in an error
message on the authentication window.

After a predetermined number of attempts, the card-issuing bank may optionally
lock the account and present the consumer with a display indicating that
authentication has failed. In addition, the display may give information on how
to obtain help in order to reset the SecureCode value for next time.
Once the account has been locked, it may not be used for shopping at any
participating e-retailer. The consumer must use the facilities provided by their
card-issuing financial institution to reset the SecureCode. These may include the
bank’s customer service and/or MasterCard® SecureCode™ enrollment site.

Activation During Shopping (ADS)
In this scenario, associated with static password authentication solutions, the
consumer is presented with the authentication window, but the consumer has
never enrolled in the MasterCard® SecureCode™ program.
Instead of being provided with a window to enter the SecureCode, the
consumer is provided with a window to enroll in the program and authenticate
their identity for the current transaction. This window will typically ask a series
of secret questions.

©2005–2014 MasterCard. Proprietary. All rights reserved.
A-8

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

Merchant Customer Service Guide
Activation During Shopping (ADS)

If correct answers are provided to the questions, the merchant will be returned
a status indicating that the consumer was successfully authenticated just as if a
valid SecureCode had been entered.
If the incorrect responses are provided to the questions, the consumer will be
given at least one more opportunity to provide the appropriate answers.

If the consumer chooses not to enroll in the program at the current time, a
message will be displayed indicating that the purchase will continue without a
SecureCode value. To your website, this means the credit card authorization
will be unauthenticated.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

A-9

Merchant Customer Service Guide
Activation During Shopping—Opt Out of Enrollment

If the incorrect responses are provided too many times, or if the issuer
requires enrollment and the cardholder declines to enroll, the merchant will
be notified that consumer authentication has failed. In this particular case,
merchants may either request an alternative form of payment or proceed with a
non-MasterCard® SecureCode™ authorization request.

Activation During Shopping—Opt Out of Enrollment
In this scenario, the consumer opts not to enroll in the program at the current
time.
Instead of providing answers to the questions on the window, the consumer
clicks the Do Not Continue link.

©2005–2014 MasterCard. Proprietary. All rights reserved.
A-10

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

Merchant Customer Service Guide
Activation During Shopping—Opt Out of Enrollment

At this point in time, the e-retailer will be notified that the consumer declined
to enroll in the program. In this particular case, the e-retailer should proceed
with an unauthenticated authorization using the current card number. The
PARes should equal A and contain an Attempts AAV. This Attempts AAV must
be provided in the Authorization Request/0100 message in DE 48 (Additional
Data—Private Use), subelement 43 (3-D Secure for MasterCard SecureCode)
with subelement 42 (Electronic Commerce Indicators) containing 211 (Merchant
Only authentication transaction [liability shift applies]) for the Security Level
indicator denoting a Merchant Only Authentication. Liability shift for the
merchant is enforced for this type transaction.
MasterCard recommends that card issuers give cardholders at least three chances
to enroll in the MasterCard® SecureCode™ program. If the cardholder does
not enroll after three chances, some card issuers will not give the cardholder
the ability to opt-out of their MasterCard SecureCode program, and will, in
fact, lock the account and present the consumer with a display indicating
that authentication has failed. Once the account has been locked, it may
not be used for shopping at any participating e-retailer. The consumer must
use the facilities provided by his card issuer financial institution to enroll in
MasterCard SecureCode. These may include the bank’s customer service center,
its MasterCard SecureCode enrollment site, or both.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

A-11

Appendix B MasterCard SecureCode SPA Algorithm
Specifications
This section contains the layout of the Accountholder Authentication Value (AAV) to be
used by issuers participating in MasterCard® SecureCode™, as well as an overview of
Base64 encoding.

AAV Layout ....................................................................................................................................B-1
Base64 Encoding ...........................................................................................................................B-1
Base64 Encoding Examples .....................................................................................................B-2
Base64 Alphabet ......................................................................................................................B-2

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

B-i

MasterCard SecureCode SPA Algorithm Specifications
AAV Layout

AAV Layout
The format of the Accountholder Authentication Value (AAV) is defined
and described in the Secure Payment Application™ (SPA) Algorithm for the
MasterCard Implementation of 3-D Secure publication.
This is a licensed publication available only to MasterCard members or any
non-member that has successfully executed the MasterCard® SecureCode™
license agreement.

Base64 Encoding
The following overview of Base64 encoding is taken from RFC1521 “MIME
(Multipurpose Internet Mail Extensions) Part One: Mechanisms for Specifying
and Describing the Format of Internet Message Bodies”.
For more detailed information, open the following page:
www.ietf.org/rfc/rfc1521.txt?number=1521
Introduction
Base64 encoding is designed to represent arbitrary sequences of octets in a form
that need not be humanly readable. The encoding and decoding algorithms
are simple, but the encoded data are consistently about 33 percent larger than
the un-encoded data.
A 65-character subset of US-ASCII is used, enabling 6 bits to be represented
per printable character. The extra 65th character, “=”, is used to signify a
special processing function.
The encoding process represents 24-bit groups of input bits as output strings
of four encoded characters. Proceeding from left to right, a 24-bit input group
is formed by concatenating three 8-bit input groups. These 24 bits are then
treated as four concatenated 6-bit groups, each of which is then translated into
a single digit in the Base64 alphabet. When encoding a bit stream via the
Base64 encoding, the bit stream must be presumed to be ordered with the
most-significant-bit first. That is, the first bit in the stream will the high-order
bit in the first byte and the eighth bit will be the low-order in the first byte,
and so on.
Each 6-bit group is then used as an index into an array of 64 printable
characters. The character referenced by the index is placed in the output
string. These characters, identified by Base64 Alphabet., are selected so that
they are universally representable. The set excludes characters with particular
significance to SMTP (for example: “.”, CR, LF).

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

B-1

MasterCard SecureCode SPA Algorithm Specifications
Base64 Encoding Examples

Base64 Encoding Examples
The following examples will perform the beginning steps of Base64 encoding of
an Accountholder Authentication Value (AAV) control byte field. The encoding
process for the remainder of the AAV will follow the same process.
The decoding process will simply work in reverse.
AAV Control Byte hexadecimal “8C” (Successful Cardholder
Authentication)
Displaying hexadecimal 8C in its binary equivalent gives the following:
10001100
The data is then broken down into three 24-bit segments, which are interpreted
as four 6-bit segments for encoding. In this case, the first 6 bits equal:
100011
Converting this to its decimal equivalent yields the following:
(1*25) + (0*24) + (0*23) + (0*22) + (1*21) + (1*20)
32 + 0 + 0 + 0 + 2 + 1
Decimal 35 = Base64 j
AAV Control Byte hexadecimal “86” (Attempted Cardholder
Authentication)
Displaying hexadecimal 86 in its binary equivalent gives the following:
10000110
The data is then broken down into three 24-bit segments, which are interpreted
as four 6-bit segments for encoding. In this case, the first 6 bits equal:
100001
Converting this to its decimal equivalent yields the following:
(1*25) + (0*24) + (0*23) + (0*22) + (0*21) + (1*20)
32 + 0 + 0 + 0 + 0 + 1
Decimal 33 = Base64 h

Base64 Alphabet
The following is the Base64 alphabet used to encode the Accountholder
Authentication Value (AVV).

©2005–2014 MasterCard. Proprietary. All rights reserved.
B-2

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

MasterCard SecureCode SPA Algorithm Specifications
Base64 Alphabet

Decimal
Value

Encoding

Decimal
Value

Encoding

Decimal
Value

Encoding

Decimal
Value

Encoding

0

A

1

B

2

C

3

D

4

E

5

F

6

G

7

H

8

I

9

J

10

K

11

L

12

M

13

N

14

O

15

P

16

Q

17

R

18

S

19

T

20

U

21

V

22

W

23

X

24

Y

25

Z

26

a

27

b

28

c

29

d

30

e

31

f

32

g

33

h

34

I

35

j

36

k

37

l

38

m

39

n

40

o

41

p

42

q

43

r

44

s

45

t

46

u

47

v

48

w

49

x

50

y

51

z

52

0

53

1

54

2

55

3

56

4

57

5

58

6

59

7

60

8

61

9

62

+

63

/

(pad)

=

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

B-3

Appendix C MasterCard SecureCode Contact Information
This section contains names, areas of responsibility, and contact information for MasterCard
personnel who can assist customers with e-commerce enrollment, testing, and
implementation issues.

MasterCard SecureCode Contact Information.................................................................................C-1

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

C-i

MasterCard SecureCode Contact Information
MasterCard SecureCode Contact Information

MasterCard SecureCode Contact Information
This section contains contact information for MasterCard personnel who can
assist customers with e-commerce enrollment, testing, and implementation
issues.
Area of Responsibility

Contact Information

Completed and signed enrollment forms

Send all completed and signed enrollment forms to:
securecode_customer_support@mastercard.com

Maestro®

Customer Operations Services
U.S., Canada, Caribbean, Latin America, and South
Asia/Middle East/Africa regions
Phone: 800-999-0363 (Inside U.S.)

636-722-6176 (Outside U.S.)
636-722-6292 (Spanish Language Support)
Fax: 636-722-7192
Email:securecode_customer_support@mastercard.com
Europe region
Phone: +32-2-352-54-03
Email:css@mastercard.com
Customer Implementation Services
Asia/Pacific region
Email: cis_ap_support@mastercard.com
Middle East/Africa region
Email: cis_mea_support@mastercard.com
Europe region
Email: cis_europe_support@mastercard.com
Canada and U.S. regions
Email: cis_northamerica_support@mastercard.com
Latin America and the Caribbean region
Email: cis_lac_support@mastercard.com

Program Management Support
Pricing/Billing

securecode_customer_support@mastercard.com

Support

securecode_customer_support@mastercard.com

MasterCard SecureCode Online Resources
For additional information about MasterCard® SecureCode™, visit one of the
following websites:

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

C-1

MasterCard SecureCode Contact Information
MasterCard SecureCode Contact Information

•

MasterCard Security Resources

•

MasterCard SecureCode 360 Webinars

•

Consumer Website

•

MasterCard SecureCode Vendor List

•

MasterCard SecureCode Frequently Asked Questions

•

Merchant Website
–

Merchant Frequently Asked Questions

–

Program Identifier Guidelines

Additional references are available on MasterCard Connect™ in English,
Spanish, and Portuguese under Library> Publications> SecureCode.

©2005–2014 MasterCard. Proprietary. All rights reserved.
C-2

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

Appendix D Maestro Processing Considerations
This section contains detailed information about specific processing issues associated with
Maestro® and MasterCard® SecureCode™. Merchants should contact their acquirer for
specific authorization and clearing requirements.

Account in Good Standing............................................................................................................ D-1

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

D-i

Maestro Processing Considerations
Account in Good Standing

Account in Good Standing
An account in good standing transaction is a request by a merchant to check
the authenticity of a Maestro® account number.
Unlike other Maestro transactions, Account in Good Standing is not a financial
transaction. It does not perform a value check or guarantee that the customer
has sufficient funds to cover the purchase. The objective is to satisfy the
merchant’s primary concern to ensure that the Maestro card number being
provided by the customer is not counterfeit.
Merchants must not confuse an Account in Good Standing transaction with a
pre-authorization transaction used for self-service pumps at petrol/gas stations.
These transactions are used to guarantee a block of funds up to the amount
in the transaction, provided it is followed within 20 minutes by a completion
transaction.
An account in good standing transaction is a standard authorization message
with the following specific data content requirements.
Data Element

Value

DE 4 (Amount, Transaction)

One unit of purchase currency

DE 61 (Point-of-Service [POS] Data),
subfield 7 (POS Transaction Status)

4 = Preauthorized Request

These data elements must be used by the acquirer when placing an Account
in Good Standing transactions. Each acquirer is responsible for determining
how this transaction is supported in the point of interaction message defined
for the merchant to acquirer interface.
For Credit, there is the Account Status Inquiry, which is a non-financial request
that allows acquirers to validate aspects of the cardholder account. Some ACS
providers will also use this message to verify cardholder enrollment such as
CVC, AVC, and expiry date. Additional details can be found in the Customer
Interface Specification manual.
Data Element

Value

DE 3 (Processing Code)

00 = Purchase

DE 4 (Amount, Transaction)

Must be zero

DE 48 (Additional Data—Private Use),
subelement 82 (Address Verification
Service Request)

52 = AVS and authorization Request 0100

DE 48 (Additional Data—Private Use),
subelement 92 (CVC 2)

CVC2 from signature panel if applicable

DE 61 (Point-of-Service [POS] Data),
subfield 7 (POS Transaction Status)

8 =Account Status Inquiry Service

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

D-1

Appendix E India IVR Transations (SecureTelephone)
This section provides an overview of the MasterCard requirements to support IVR
Transactions in India.

Overview ....................................................................................................................................... E-1
Data Extensions to the Existing 3-D Secure Protocol..................................................................... E-1
UCAF Transport in MasterCard Authorization Messages ................................................................ E-1
MasterCard SecureCode—Security Level Indicator (DE 48, subelement 42) ............................ E-2
Universal Cardholder Authentication Field (DE 48, subelement 43)........................................ E-3
What is an AAV?....................................................................................................................... E-3
Sample IVR Transaction Flow .................................................................................................. E-4
MasterCard SecureCode Compliance and Functional Testing .................................................. E-4

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

E-i

India IVR Transations (SecureTelephone)
Overview

Overview
Following the successful deployment of 3-D Secure (SecureCode) for all
domestic electronic commerce transactions, the banking authority of India,
Reserve Bank of India (RBI), has defined a mandate that requires a similar
two-factor authentication process to also be rolled out for IVR transactions.
As there was no technology or precedent of authenticating an IVR transaction
with two-factor authentication, MasterCard has worked with IVR vendors to
utilize existing investments in technology, process and infrastructure to build a
framework and specification using the 3-D Secure protocol. As owner of the
3-D Secure Protocol, Visa has published a country-specific (India) specification
that defines a number of additional data elements in the existing 3-D Secure
messages.
For more information, refer to the Visa document 3-D Secure Functional
Requirements—Extensions for Mobile and IVR Transactions in India v1.1.

Data Extensions to the Existing 3-D Secure Protocol
As detailed in the 3-D Secure Functional Requirements—Extensions for Mobile
and IVR Transactions in India v1.1, the Verify Enrollment Request (VEReq),
Verify Enrollment Response (VERes), and PAReq messaging within the 3-D
Secure protocol have been extended to allow the Merchant plug-in (MPI)
and Issuer Access Control Server (ACS) to convey the additional transaction
related elements that identify an IVR transaction, as opposed to an electronic
commerce transaction.

UCAF Transport in MasterCard Authorization Messages
MasterCard has designated specific subelements within DE 61 (Point-of-Service
[POS] Data) and DE 48 (Additional Data–Private Use) for the identification of
SecureTelephone Order and transport of Universal Cardholder Authentication
Field™ (UCAF)-related data and associated indicators in authorization messages.
These subelements will be used to support and identify IVR transactions within
the authorization message. Support for SecureTelephone Order within the
authorization message was mandated as part of the 7.2 Banknet release.
The subelements are described in the following sections. Refer to the
Customer Interface Specification manual for additional information regarding
authorization message formatting.
SecureTelephone—DE 61—Point-of-Service (POS) Data, subelements 4, 7,
and 10. The following subelement values are to correctly identify an IVR
(SecureTelephone Order) DE 61.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

E-1

India IVR Transations (SecureTelephone)
MasterCard SecureCode—Security Level Indicator (DE 48, subelement 42)

Position

Value

Description

4—POS Cardholder
Presence

3

Cardholder Not Present, Phone/ARU Order

7—POS Transaction
Status

2

SecureCode Phone Order

10—CardholderActivated Terminal
Level

MUST
NOT
BE 6

Authorized Level 6 CAT:Electronic Commerce

MasterCard SecureCode—Security Level Indicator (DE 48,
subelement 42)
The SecureCode Security Level Indicator contains the fields representing
the security protocol and cardholder authentication type associated with the
transaction.
MasterCard requires that DE 48 (Additional Data—Private Use), subelement 42
(Electronic Commerce Indicators) be included and properly populated for all
electronic commerce and SecureTelephone (IVR) transaction authorizations.
Please note that only Fully authenticated IVR transactions (Security Level
Indicator 2 [UCAF data collection is supported by the merchant, and Universal
Cardholder Authentication Field™ {UCAF} data is present in DE 48, subelement
43 [Universal Cardholder Authentication Field {UCAF}]) are applicable to
SecureTelephone order (IVR) transactions.
The required DE 48 (Additional Data—Private Use), subelement 42 (Electronic
Commerce Indicators), subfield 1 (Electronic Commerce Security Level Indicator
and UCAF Collection Indicator) values for SecureTelephone order (IVR) are
provided in the table below.
Position

Value

Description

1—Security Protocol

2

Channel

2—Cardholder
Authentication

1

Cardholder certificate not used

3—UCAF Collection
Indicator

0

UCAF data collection is not supported by the
merchant

1

UCAF data collection is supported by the merchant,
and UCAF data may be available (DE 48, subelement
43 may be present for MasterCard SecureCode)

2

UCAF data collection is supported by the merchant,
and UCAF data must be present (DE 48, subelement
43)

©2005–2014 MasterCard. Proprietary. All rights reserved.
E-2

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

India IVR Transations (SecureTelephone)
Universal Cardholder Authentication Field (DE 48, subelement 43)

Universal Cardholder Authentication Field (DE 48, subelement
43)
The Universal Cardholder Authentication Field™ (UCAF) contains the encoded
MasterCard® SecureCode™ issuer-generated authentication data (collected by
the merchant) resulting from all MasterCard SecureCode fully authenticated
transactions.
UCAF is a standard, globally interoperable method of collecting cardholder
authentication data at the point of interaction. Within the MasterCard
authorization networks, UCAF is a universal, multipurpose data transport
infrastructure that is used to communicate authentication information between
cardholders, merchants, issuers, and acquirers. It is a variable length (maximum
32 characters) field with a flexible data structure that can be tailored to support
the needs of issuer security and authentication approaches.
NOTE
All acquirers and issuers must ensure that they can send and/or receive contents
in this field up to the maximum length of 32. Note that applications utilizing
this field, such as MasterCard SecureCode, may provide contents that are less
than the maximum length. For MasterCard SecureCode specifically, this field
will be 28 positions. This field should NOT include any padding to meet the
maximum length of 32 bytes.

What is an AAV?
The Accountholder Authentication Value (AAV) is a MasterCard® SecureCode™
specific token that uses the Universal Cardholder Authentication Field™ (UCAF)
field for transport within MasterCard authorization messages.
It is generated by the issuer and presented to the merchant for placement in
the authorization request. This AAV can be proof of a fully authenticated or an
attempted authentication transaction.
In the case of a chargeback or other potential dispute processing, the AAV is
used to identify the processing parameters associated with the transaction.
Among other things, the field values will identify the:
•

Issuer ACS that created the AAV. (This could be the Issuer ACS or, in the
case of an attempt, the MasterCard Attempt processing server.)

•

Sequence number that can positively identify the transaction for that location

•

Secret key used to create the Message Authentication Code (MAC), which
is a cryptographic method that ensures AAV data integrity, and binds the
entire AAV structure to a specific PAN.

UCAF is the mechanism that is used to transmit the AAV from the merchant to
issuer for authentication purposes during the authorization process.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

E-3

India IVR Transations (SecureTelephone)
Sample IVR Transaction Flow

Sample IVR Transaction Flow
An example of a SecureTelephone order (IVR) transaction is as follows.
1. Cardholder calls the merchant to order items, and finalize purchase.
2. Merchant collects all necessary data, including the cardholder’s primary
account number (PAN) and phone information.
3. The merchant’s modified IVR-MPI creates a Verify Enrollment Request
(VEReq) message with the IVR extensions, including the following data:
a. Format of Phone number or Device ID
b. Cardholder Phone number or Device ID
c. PAReq channel—DIRECT
d. Shopping Channel—IVR
e. Available Authentication Channels
4. The MasterCard Directory Server will forward the VEReq message to the
appropriate Issuer IVR-ACS, to validate that the PAN is enrolled in the
service.
5. The issuer IVR-ACS responds to the MasterCard Directory with confirmation
of enrollment and the Verify Enrollment Response (VERes) message
including the ACS web address is returned to the Merchant IVR-MPI.
6. IVR-MPI generates a PAReq message with the IVR extension, and sends
to the appropriate Issuer IVR-ACS.
7. ACS receives and processes the PAReq message—IVR extensions may be
used by the Issuer ACS in the authentication process.
8. Upon successful validation of the cardholder (or using data contained in
the extended PAReq), the issuer ACS will generate the PARes message and
forward to Merchant IVR-MPI.
9. IVR-MPI receives PARes and proceeds with authorization request.

MasterCard SecureCode Compliance and Functional Testing
MasterCard has developed vendor compliance testing, as well as issuer and
merchant functional testing, to ensure vendor products and member and
merchant implementations are compliant and successfully interoperate with all
MasterCard® SecureCode™ platforms and infrastructure.
All vendors, merchant endpoints, and issuers are required to complete the
designated testing process prior to launch. More information regarding testing
is available from securecode_customer_support@mastercard.com.

©2005–2014 MasterCard. Proprietary. All rights reserved.
E-4

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

Appendix F

MasterCard Advance Registration Program
Requirements

This section introduces the MasterCard Advance Registration Program (MARP) and
identifies the program requirements.

MasterCard Advance Registration Program .................................................................................... F-1
MARP Merchant Use of MasterCard SecureCode............................................................................ F-1
Issuer Participation in MARP.......................................................................................................... F-2

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

F-i

MasterCard Advance Registration Program Requirements
MasterCard Advance Registration Program

MasterCard Advance Registration Program
The MasterCard Advance Registration Program (MARP) was introduced for
Maestro® in 2008, and for MasterCard in 2010.
NOTE
MARP is closed to new business and will be decommissioned 1 June 2015. For
more details, refer to Europe Region Operations BulletinNo. 2, 3 February 2014.

MARP Merchant Use of MasterCard SecureCode
The MasterCard Advance Registration Program (MARP) enables enrolled
merchants to authenticate e-commerce transactions.
NOTE
No new merchants are allowed to enroll in MARP. Effective 30 April 2014,
MasterCard will be withdrawing MARP. For more details, refer to the Europe
Region Operations Bulletin No. 2, 3 February 2014.

•

The merchant invites the customer to register on its website by choosing a
username and password, or similar credentials acceptable to MasterCard,
and must provide the customer with the option to register a MasterCard® or
Maestro® card account number for use in future e-commerce transactions.

•

For the first MasterCard or Maestro e-commerce transaction, the merchant
must request MasterCard® SecureCode™ authentication before submitting
the transaction for authorization. If that transaction is subsequently
authorized by the issuer, it is guaranteed to the acquirer or its merchant,
regardless of whether the issuer or cardholder participates in MasterCard
SecureCode as determined by the merchant request.

•

If the first MasterCard or Maestro e-commerce transaction for the cardholder
registered with the merchant is authorized by the issuer, the merchant can
skip the MasterCard SecureCode authentication on subsequent transactions
by the same customer using the same MasterCard or Maestro card account.
In that case, the merchant will populate:
–

Data Element (DE) 48, (Additional Data Private Use, subelement 32
(MasterCard Assigned ID) in the Authorization Request/0100 message
with an ID assigned by MasterCard.

–

DE 48, subelement 43 (3-D Secure for MasterCard SecureCode) in the
Authorization Request/0100 message with a MasterCard-assigned static
Account Authentication Value (AAV).

–

DE 48, subelement 42, position 3 (UCAF Collection Indicator) in the
Authorization Request/0100 message with a value of 3.

–

Private data subelement 0052 (Electronic Commerce Security Level
Indicator) subfield 3 (UCAF Collection Indicator) in the clearing record
submitted to GCMS for processing (where applicable) with a value of 3.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

F-1

MasterCard Advance Registration Program Requirements
Issuer Participation in MARP

–

The PDS 176 (MasterCard Assigned ID) in the clearing record submitted
to GCMS for processing with an ID assigned by MasterCard.

•

If the merchant populates the Universal Cardholder Authentication Field™
(UCAF) with the static AAV assigned by MasterCard, and populates the
UCAF Collection Indicator with the value of 3, and the issuer authorizes
the transaction, the issuer will have a right to charge back the transaction
for reason of fraud.

•

If a registered cardholder uses a different MasterCard or Maestro
card account number for a transaction, the merchant must request
MasterCard SecureCode authentication before submitting the transaction
for authorization.

•

Based on a risk assessment, the merchant always has the option of
requesting MasterCard SecureCode authentication for any MasterCard or
Maestro transaction, in which case the transaction will be governed by
existing MasterCard SecureCode and Chargeback rules. For instance,
for consumer cards acquired in the Europe region, if the transaction is
subsequently authorized by the issuer, it is guaranteed to the acquirer or
its merchant, regardless of whether the issuer or cardholder participates in
MasterCard SecureCode as determined by the merchant request.

Issuer Participation in MARP
Any Maestro® issuer that supports e-commerce is required to support the static
Accountholder Authentication Value (AAV) in authorization until 1 June 2015,
at which time MasterCard will discontinue the Maestro Advance Registration
Program (MARP). For more details, refer to Europe Region Operations Bulletin
No. 2, 3 February 2014.
Issuers must meet existing Europe region requirements to support Maestro
e-commerce transactions.
Requirements can be found in the Authorization Manual and, if applicable,
the GCMS Reference Manual available on the Publications page on MasterCard
Connect™.

©2005–2014 MasterCard. Proprietary. All rights reserved.
F-2

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide

Appendix G MasterCard Extensions for the Brazil Market
This section provides specifications related to extensions that support Brazil domestic
processing. These extensions allow passing of data from the merchant to the issuer in 3-D
Secure messages.

Brazil Market Extensions............................................................................................................... G-1

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

G-i

MasterCard Extensions for the Brazil Market
Brazil Market Extensions

Brazil Market Extensions
This section provides specifications related to extensions that support Brazil
domestic processing. These extensions allow passing of data from the merchant
to the issuer in 3-D Secure messages.
These extensions will be used in both the VEReq and PAReq messages.
•

Card Account Type

•

Mobile Phone Number

•

Merchant Category Code

•

Transaction Type

The VEReq and PAReq are extended to allow the Merchant Plug In (MPI) to
pass the additional transaction-related elements to the Access Control Server
(ACS) specified below.
Field Definitions for Brazil Market Extensions in VEReq and PAReq
Element Name

Description

Extension Id

visa.3ds.brazil_market

brazilmcc

Merchant Category
Code,provided by the
merchant

Length 1–4, Numeric digits

brazilaccounttype

Account Type as selected
by the cardholder during
checkout.

Length1–2, Numeric digits

Format and Values

•

00 (NOT APPLICABLE)

•

01 (CREDIT)

•

02 (DEBIT)

brazilmobilenumber

Mobile number (as entered
by the cardholder during
checkout)

Length 1–25, Numeric digits

braziltransactiontype

Transaction Type, provided
by the merchant

Length 1–2; Numeric Digit
•

00 (Goods/Service Purchase)

•

03 (Check Acceptance)

•

10 (Account Funding)

•

11 (Quasi-Cash Transaction)

•

28 (Prepaid Activation & Load)

NOTE
The critical attribute must be set to “false” for all Extension fields defined in
this protocol extension specification.

©2005–2014 MasterCard. Proprietary. All rights reserved.
MasterCard SecureCode—Merchant Implementation Guide • 17 June 2014

G-1

MasterCard Extensions for the Brazil Market
Brazil Market Extensions

Message Sample of Brazil Market Extensions in VEReq

Message Sample of Brazil Market Extensions in PAReq

©2005–2014 MasterCard. Proprietary. All rights reserved.
G-2

17 June 2014 • MasterCard SecureCode—Merchant Implementation Guide



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : No
Encryption                      : Standard V4.4 (128-bit)
User Access                     : Print, Copy, Annotate, Fill forms, Extract, Print high-res
Arbortext Build                 : R60M050-168
Author                          : MasterCard
Compression Level               : 9
Compression Type                : zip
Config File                     : D:\arbortext\pe\custom\lib\Publication-screen.pdfcf
Create Date                     : 2014:06:11 12:36:46-05:00
EPS Processor                   : PStill version 1.74.14
GIF Image Passthrough           : Yes
Graphics Resolution             : 200
Graphics Resolution Threshold   : 250
Modify Date                     : 2014:06:11 15:05:41-05:00
Print Engine                    : Arbortext FOSI Print Publisher
Stylesheet                      : C:\WFH\custom\doctypes\ditabase\ditabase.style
Subject                         : MasterCard SecureCode
Has XFA                         : No
XMP Toolkit                     : Adobe XMP Core 5.2-c001 63.139439, 2010/09/27-13:37:26
Arbortext 0020 Build            : R60M050-168
Compression 0020level           : 9
Compression 0020type            : zip
Config 0020 File                : D:\arbortext\pe\custom\lib\Publication-screen.pdfcf
EPS0020processor                : PStill version 1.74.14
GIF0020image 0020passthrough    : Yes
Graphics 0020resolution         : 200
Graphics 0020resolution 0020threshold: 250
Print 0020 Engine               : Arbortext FOSI Print Publisher
Creator Tool                    : Arbortext Publishing Engine
Metadata Date                   : 2014:06:11 15:05:41-05:00
Producer                        : PDFlib+PDI 8.0.2p1 (Win32)
Format                          : application/pdf
Title                           : MasterCard SecureCode
Description                     : MasterCard SecureCode
Creator                         : MasterCard
Document ID                     : uuid:3aab8c0f-f97f-4ef5-b909-226fa7bbfde9
Instance ID                     : uuid:6dddba46-5da5-4bb6-bca7-518b842e32bf
Page Layout                     : SinglePage
Page Mode                       : UseOutlines
Page Count                      : 72
EXIF Metadata provided by EXIF.tools

Navigation menu