Topic W: Transactional data for Payments and other use cases #496
Replies: 8 comments 29 replies
-
Thank you for sharing the discussion paper and request for feedback. As a general comment, please rename Topic W to “Transactional data for qualified e-signatures or e-seals and other use cases”. Under eIDAS Article 5a(5)(a)(xi) this is a mandatory feature, while payment is not mentioned directly under the Regulation. It is important to keep ensuring that the transactional data requirements are validated with the QES use case at minimum. |
Beta Was this translation helpful? Give feedback.
-
We are setting this up differently for QES:
To properly support interoperable QES creation, support for the CSC-specified transaction data types should be mandatory for EUDIW. Subsequently, QES providers or related organisations can issue the mentioned “service credentials” with their Attestation Rulebooks, which may vary by QTSP. That is, there is no need to harmonize these specific Attestation Rulebooks across QTSPs since each attestation typically has a single QTSP act as both issuer and verifier. So while indeed the Attestation Rulebook selects and refers to transactional data rules, these rules are specified in standards such as those of CSC. For EUDIW requirements, it is important to point at these standards to ensure consistent support. |
Beta Was this translation helpful? Give feedback.
-
Instead of signing, require proving possession of that private key. For example, an ECDH-MAC operation as specified in ISO 18013-5 can also provide a valid proof of possession. There is no reason why the methods for proofs of possession should be different for transactional data than for other presentations. |
Beta Was this translation helpful? Give feedback.
-
What is the use case for this authentication code? Usually the proof of possession is sufficiently randomised to for example detect message replay. |
Beta Was this translation helpful? Give feedback.
-
As of v0.95, TD_02 notes:
Note that if a Relying Party requires a non-repudiable proof of transaction, requesting a qualified e-signature over the transactional data may be a more appropriate option. For qualified e-signatures, the trust framework is legally well established. |
Beta Was this translation helpful? Give feedback.
-
Regarding TD_04 and the use case being payments, the requirements towards the "authentication code" can be found in PSD2 RTS (https://eur-lex.europa.eu/eli/reg_del/2018/389/oj), Article 4. In summary:
Now, for the current wording of TD_04 (v0.95), I am largely in agreement with some concerns on "this requirement is met by use of key binding in [SD-JWT-VC]":
|
Beta Was this translation helpful? Give feedback.
-
The discussion paper (v0.95) makes two important observations in Section 3.1.2: The Registration of an authenticator with the Service Provider before first usage in a transaction context, and the use of functional "service credentials", following the principle of least privilege. I suggest considering to reflect these as TDs. |
Beta Was this translation helpful? Give feedback.
-
I am coming late into the discussion - apologies for that. I think the debate about SCA (Strong Customer Authentication) referred to in eIDAS article 5f2 obscures a wider requirement of even more critical relevance for payments - that is of evidencing payer's consent to the payment. Payer's consent is legally what fundamentally matters for payment interactions as Payment Service Providers (banks) are in principle liable when releasing funds that are not authorized by payers. PSD2 and - most unfortunately - the draft Payment Services Regulation (PSR) expected to be enacted later this year and which will replace PSD2 take the view that payment consent processes are managed by PSPs (see PSD2 article 64.2 and draft PSR article 49.6), a position which we find difficult to reconcile with eIDAS article 5f2 (as one knows, it is practically impossible to separate SCA from payment consent). How this difficulty will be solved in unknown today, but it is expected (or rather "hoped") that the European Banking Authority will issue PSR regulatory technical standards guidelines in 2026 or more likely 2027 dealing with the matter. So it's not just SCA which matters - it clearly does - but in fact it's the wider payer consent's topic. If banks are to "accept EUDIW SCA" as per eIDAS article 5f2 and validly release funds as a result of EUDIW payment authorization, they need to rely on a very clear and robust proof package evidencing payer's consent and which can be presented in court proceedings. This is what truly matters - the rest is nowhere near as relevant. At a more technical level, this approach is implementing the so-called "embedded SCA" model, which is very promising and in our view a better approach to identity-based payments than the current "redirection" (or "decoupled") SCA standard practice relying on redirection the PSPs. How this proof package evidencing payer's consent is structured is a major unknown today, especially when looking at using the OID4VP "Transaction Data" specifications for the communication protocol between the EUDIW and the ASPSP (payer's bank) which give minimal indications as to how this should happen. It is not clear today that the legal requirement ensuring that PSPs can validly release funds will be met, especially considering the need to ensure that, if SCA is to be "accepted" by banks as per article 5f2, the EUDIW must be solely in charge of SCA and not rely on an unregulated third party for such purpose. The implications of this debate are very important for payment interactions as they will impact in a major way "who does what" in the payment ecosystem. In practice, we recommend using either eIDAS Advanced electronic signatures supported by a Qualified certificate or Qualified Electronic Signatures (probably AdES as an initial step), in all cases with an ASiC file as what matters is the proof package. Indeed, the weaker the proof package, the more likely banks will feel insufficiently protected and require redirection as a way to implement SCA. This would be a missed opportunity. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Welcome to the discussion on the Transactional data for Payments and other use cases, part of the ongoing development of the Architecture and Reference Framework (ARF) for the European Digital Identity (EUDI) Wallet.
This discussion is based on the document Topic W - Transactional data for Payments and other use cases.
The European Digital Identity Regulation requires the Wallets provide a functionality of strong authentication to play a role of an authenticator for various services, while the Service Providers are obliged to accept them in their (online) services. Consequently, to enable such processes, the Wallet Units should be able to handle transactional data related to an (external) service and a transaction, to enable required functionality, provide a proof of transaction and auditability, as well as ensure compliance with other regulations where necessary (like Payment Services related legislation).
Most of the use cases will use the standard Wallet functionality (meaning w/o the need to involve "transactional data"). However for the following use cases it is necessary handle the transactional data:
In this paper we focus on the cases, where the transactional data are involved.
This discussion is part of a structured process to refine and complete the ARF, with your input playing a vital role. We invite you to share your comments, insights, and suggestions here. Your contributions will be carefully reviewed and considered as we work towards the next version of the ARF, which will incorporate updates on this topic.
Thank you for participating in this important conversation.
Beta Was this translation helpful? Give feedback.
All reactions