Authentication Method for Visa Direct

Security and Authentication Requirements

All of the Visa Direct APIs use Two-Way SSL (Mutual SSL) authentication and channel encryption, which requires you to provide a user name and password as well as install an X509 security certificate issued by Visa. Test credentials can be obtained online in your Project Dashboard for sandbox testing. Production credentials will be supplied to you as part of production on-boarding. Contact developer@visa.com for more information or to begin the production on-boarding process.

Two-Way SSL

As one of the security protocols, Visa Developer sandbox secures its connections with clients by means of Two-Way SSL (Mutual Authentication) method. Refer to the link below to quickly learn about how to get credentials to start building with Two-Way SSL.

Visit the Two-way SSL Guide to learn more.

Data Encryption for Visa Direct Receive Side API

For clients using the Mobile Push Payment Receive Side APIs, it is important to understand that some of the sensitive information (e.g. PAN, consumer name) are encrypted by Visa in the outgoing message from Visa to the client. This encryption is done using a key ID and shared secret assigned to the client during onboarding. All the data elements in the payload that have the prefix "enc" are encyrpted, for e.g. 'encMerchantPan'.

 

Clients need to follow these steps in order to decrypt these fields:

 

  • Get the necessary software library that supports AES GCM mode encryption in client preferred programming languages (e.g. Java, PHP, C#, etc.) for software development. E.g. download and install Java Cryptography Extension (JCE) unlimited strength jurisdiction policy files.
       
  • When the request payload data from Visa is received,
    • Identify the data field that requires decryption, i.e field name starts with prefix "enc"
    • Parse the encrypted value using the software library and extract “Key ID”
    • Use “Key ID” to fetch the corresponding shared secret required for decryption. Note: client may have more than one “Key ID” and “shared secret” from Visa stored in their system due to key management
    • Decrypt the encrypted data field using the shared secret to get the field value.

There is no need to perform encryption of the response payload data as there is no sensitive data field in the response payload.