Topic AA - Support of Electronic Payments Customer Authentication (SCA) with the Wallet #582
Replies: 7 comments 13 replies
-
Hi, Phin 10 |
Beta Was this translation helpful? Give feedback.
-
Dear ARF team, Thank you for preparing the AA discussion paper. I would like to offer the following views/comments:
A strong yes from my side. Let's consider the opposite: If such a control is missing, then any (including malicious) Relying Party will be able to invoke "confirm payment" or "log in to your bank" screens in the user's EUDIW by combining the respective transaction data type with a request for any, including non-related, attestation. If that RP then serves some well-faked pages to the user (e.g., "Login successful. By the way, you must update your password. Enter current password here: ___"), this will allow for very powerful phishing attacks. That said, this check alone will likely not be enough, as we can assume that the certificate/registrar regime to limit RPs regarding which attestations they can request will not be perfect in the field, and some fraudsters will slip through. It therefore needs to be combined with a robust 'embedded disclosure policy' feature which allows issuers to exercise control over which RPs can request their SUA attestations. HLR EDP_07 of Topic 43 in Annex 2 currently only requires the Wallet Unit to show a Deny or Allow dialogue to the user in case the RP does not match the policy. I therefore propose that for SUA attestations, Wallet Units should enforce these policies. |
Beta Was this translation helpful? Give feedback.
-
One important aspect missing in this discussion is the topic of fraud signals from the perspective of a payment service provider. The financial sector today uses advanced analytics techniques together with a rule-based holistic approach across service domains collecting and analysing user transaction data to be able to react on fraudulent behaviour. These kinds of systems are depending on collecting user audit events with information from different service domains, channels, client applications, devices, etc to be able to get a holistic view of user activities over time and risk score a particular transaction.
The revised eIDAS Regulation, which guides the ARF's development, does not address the use of external data to combat fraud. In fact, it includes strict privacy limitations, particularly for Wallet Providers. As per Article 5a14, Wallet Providers are restricted from collecting unnecessary information about a wallet's use, or combining personal data from the wallet with data from other services without the user's explicit request. Therefor this is not only a technical issue, but also a regulatory one. The integration of the EUDI Wallet as an optional authenticator must be carefully managed to avoid any dilution of the robust security measures currently implemented by the banking sector. |
Beta Was this translation helpful? Give feedback.
-
First of all, I agree that -- as suggested -- the relevant functional requirements in this section 4.2 should be covered in a/multiple Technical Specification(s). In terms of HLRs, to me the following aspects appear to be specific/noteworthy and would benefit from being called out as requirements:
|
Beta Was this translation helpful? Give feedback.
-
As part of the work produced by EWC and NOBID on payments with EUDIWs, we have identified one functional requirement for wallets to improve security when it comes to man-in-the-middle attacks: "When receiving a request for an SUA Attestation including transaction data, the wallet SHALL bind its response to the requesting Relying Party e.g. by putting the RP's public key, which the wallet knows and has validated as part of the signed Authorization Request as per HAIP, into the 'aud' claim of the KB JWT accompanying the SUA Attestation." We imagine that this requirement may be useful also as a general rule (i.e. not only in the context of SUA attestations/transaction data), but we are unaware whether it has already been captured elsewhere. We are happy to engage in a discussion to find an appropriate "home" for this requirement. |
Beta Was this translation helpful? Give feedback.
-
Dear ARF team, Thank you for hosting the second consultation call on 1st October and preparing the updated AA discussion paper v0.95.
For SD-JWT VC over OID4VP, I believe the native capabilities of the protocol are sufficient given that the spec defines in detail how incoming transaction data needs to be handled and included in the response's KB JWT. For mdoc/mDL, I took from yesterday's call that we may need to profile the spec as part of the upcoming TS12 to guarantee uniform handling of transaction data in the wallet's response and specifically compliance with Dynamic Linking. Happy to contribute. |
Beta Was this translation helpful? Give feedback.
-
As an outcome of the first consultation call on 24th September, there was broad consensus in the group that we need to introduce provisions to prevent the scenario where a (malicious) Relying Party will be able to invoke "confirm payment" or "log in to your bank" screens in the user's EUDIW by combining the respective transaction data type with a request for any, including non-related, attestation. To address this topic, the AA discussion paper v0.95 introduces a new SUA_07. For the record, I would like to note that the wording of this HLR does not reflect the group consensus because it fails to meet the objective, given that it leaves the wallet's behaviour undefined for the non-happy path. I propose a more detailed handling as follows:
The second point is in line with the current solution for embedded disclosure policies, which is a comparable scenario as they aim to protect the user from presenting an attestation to an unwanted relying party. The warning mechanism is specified in EDP_07. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Description
Support of Electronic Payments Customer Authentication (SCA) with the Wallet needs to be discussed further. Intention is to draft and finalise the minimal needed high level technical requirements for the ARF.
Publication discussion paper
19 September 2025
Link to discussion paper
Link
Discussion close
Three weeks later.
Beta Was this translation helpful? Give feedback.
All reactions