3D Secure 2.0 Explained: The Developer's Guide to Strong Customer Authentication

10 min read
ISO 8583 Guides

You’ve seen it a hundred times: you click “Pay,” and suddenly your bank is asking you to confirm the purchase with a one-time code or a biometric scan. That extra step isn’t friction for friction’s sake — it’s 3D Secure, the protocol that has been quietly preventing billions of dollars in online card fraud since 2001. And its latest version, 3D Secure 2.0, is the engine behind Europe’s Strong Customer Authentication mandate.

What is 3D Secure?

3D Secure (3DS) is an authentication protocol designed by EMVCo (originally by Visa) that adds an extra verification layer during online card-not-present (CNP) transactions. The “3D” stands for three domains — the three parties that participate in every authentication:

DomainPartyRole
Issuer DomainCard-issuing bankAuthenticates the cardholder
Acquirer DomainMerchant’s bank / PSPInitiates the authentication request
Interoperability DomainCard network (Visa, Mastercard, etc.)Routes messages between domains

The goal is simple: prove the person making the purchase is the legitimate cardholder, not someone who stole their card number.

Related: Our PCI DSS Compliance Guide covers the broader security standards that protect cardholder data at rest and in transit.

Also Known As

Each card network brands 3D Secure differently, which causes endless confusion:

Card Network3DS 1.0 Brand3DS 2.0 Brand
VisaVerified by VisaVisa Secure
MastercardMastercard SecureCodeMastercard Identity Check
American ExpressSafeKeySafeKey 2.0
DiscoverProtectBuyProtectBuy 2.0
JCBJ/SecureJ/Secure 2.0
UnionPayUnionPay 3DS

Despite the different marketing names, they all implement the same underlying EMVCo 3DS protocol. When you hear any of these terms, they mean 3D Secure.

3D Secure 1.0: The Original (and Its Problems)

3D Secure 1.0 launched in 2001 as Visa’s “Verified by Visa.” It worked, but it had major user experience issues:

  • Full-page redirects — The cardholder was bounced to their bank’s website in a pop-up or iframe
  • Static passwords — Many banks used memorized passwords, which cardholders frequently forgot
  • No mobile support — The protocol pre-dated smartphones entirely
  • High cart abandonment — Studies showed 10-15% of shoppers abandoned checkout at the 3DS step
  • No risk intelligence — Every transaction got the same clunky challenge, regardless of risk level

The result? Many merchants chose not to implement 3DS 1.0, preferring to eat the fraud costs rather than lose sales.

3D Secure 2.0: The Modern Standard

3D Secure 2.0 (also called EMV 3DS or 3DS2) was released by EMVCo in 2016 and is a ground-up redesign. It solves nearly every problem with 1.0:

3DS 1.0 vs 2.0 Comparison

Feature3DS 1.03DS 2.0
User experiencePop-up / redirectInline / in-app
Authentication methodStatic passwordOTP, biometrics, push notification
Mobile supportNoneNative SDKs (iOS, Android)
Data points shared~15 fields150+ data elements
Risk-based authenticationNoYes (frictionless flow)
Cart abandonment impactHigh (10-15%)Low (< 5%)
Liability shiftYes (attempted)Yes (attempted + frictionless)
Protocol ownerVisaEMVCo (all networks)
Spec version1.0.22.1.0, 2.2.0, 2.3.1

The single biggest improvement is risk-based authentication: 3DS 2.0 sends over 150 data elements to the issuer (device fingerprint, transaction history, shipping address, etc.), allowing the issuer to approve low-risk transactions without ever challenging the cardholder.

How 3D Secure 2.0 Works

Here’s the step-by-step flow of a 3DS 2.0 transaction:

Step 1: Checkout Initiated

The cardholder enters their card details and clicks “Pay.” The merchant’s payment page collects device and browser data using the 3DS Method (a hidden iframe that gathers device fingerprinting data).

Step 2: Authentication Request (AReq)

The merchant’s server (via their 3DS Server) sends an Authentication Request (AReq) to the card network’s Directory Server (DS). This message contains:

  • Card number (PAN) and expiry
  • Transaction amount and currency
  • Device/browser fingerprint data
  • Merchant risk indicators
  • Cardholder name, email, phone
  • Billing and shipping addresses
  • Transaction history metadata

Step 3: Risk Assessment

The DS routes the AReq to the issuer’s Access Control Server (ACS). The ACS analyzes the 150+ data points and makes a risk decision:

DecisionWhat HappensResult
FrictionlessLow risk — approve silentlyCardholder sees nothing
ChallengeHigher risk — verify identityOTP, biometric, or push notification
DenyVery high riskTransaction declined

Step 4: Challenge Flow (If Required)

If a challenge is triggered, the ACS presents an authentication interface:

  • One-Time Password (OTP) — Sent via SMS or email
  • Biometric — Fingerprint or face recognition in the banking app
  • Push notification — Approve/deny in the banking app
  • Knowledge-based — Security questions (rare in 2.0)

Step 5: Authentication Response (ARes)

The ACS returns an Authentication Response (ARes) containing the critical values:

FieldDescription
Transaction StatusY (authenticated), N (not authenticated), A (attempted), U (unavailable), R (rejected)
ECIElectronic Commerce Indicator — liability shift evidence
CAVV / AAVCardholder Authentication Verification Value — cryptographic proof
DS Transaction IDUnique identifier for the 3DS transaction

Step 6: Authorization

The merchant submits the authorization request (ISO 8583 0100 message) to the acquirer with the 3DS results embedded. The ECI and CAVV travel in the authorization message, proving authentication occurred.

Try it yourself: Use our ISO 8583 Studio to parse authorization messages containing 3DS fields.

Strong Customer Authentication (SCA)

Strong Customer Authentication is a regulatory requirement under the European Union’s Payment Services Directive 2 (PSD2), effective since September 2019 (with enforcement deadlines extended to December 2020 in most EU countries and March 2022 in the UK).

SCA requires that electronic payments be authenticated using at least two of three factors:

FactorCategoryExamples
KnowledgeSomething you knowPassword, PIN, security question
PossessionSomething you havePhone (OTP), hardware token, banking app
InherenceSomething you areFingerprint, face recognition, voice

3D Secure 2.0 is the primary mechanism merchants use to satisfy SCA requirements, because it supports all three factor categories natively.

Who Must Comply?

SCA applies when:

  • The cardholder’s bank is in the European Economic Area (EEA) or UK
  • The transaction is electronic and customer-initiated
  • Both the issuer and acquirer are within the EEA/UK (one-leg transactions have different rules)

SCA Exemptions

Not every transaction requires a full challenge. PSD2 defines several exemptions that allow transactions to proceed without SCA — and knowing them is critical for reducing checkout friction:

ExemptionConditionWho Requests It
Low ValueTransaction ≤ €30 (cumulative limits apply)Acquirer or Issuer
Transaction Risk Analysis (TRA)Fraud rate below threshold for the amount bandAcquirer
Trusted BeneficiaryCardholder whitelisted this merchantIssuer
Recurring / SubscriptionFixed-amount recurring with same merchantAcquirer
Merchant-Initiated (MIT)No cardholder present (e.g., delayed charges)Not applicable (out of scope)
Mail Order / Telephone OrderMOTO transactionsNot applicable (out of scope)
One-leg TransactionIssuer or acquirer outside EEANot applicable
Corporate CardsLodged / virtual corporate cardsIssuer

TRA Thresholds

The Transaction Risk Analysis exemption has specific fraud rate requirements:

Transaction AmountMax Fraud Rate
Up to €1000.13%
Up to €2500.06%
Up to €5000.01%

Acquirers and issuers must maintain fraud rates below these thresholds to qualify for the exemption.

3D Secure in ISO 8583 and EMV

For payment engineers, 3D Secure results flow through several key fields in ISO 8583 authorization messages:

ISO 8583 FieldData Element3DS Content
Field 44Additional Response DataECI value
Field 48Additional DataCAVV / AAV
Field 55ICC Related DataDSRP cryptogram (for digital wallets)
Field 126 (Visa)Private Data3DS authentication results
DE 48, SE 43 (Mastercard)UCAFAAV data

Key 3DS Data Elements

AbbreviationFull NamePurpose
CAVVCardholder Authentication Verification ValueVisa’s cryptographic proof of authentication
AAVAccountholder Authentication ValueMastercard’s equivalent of CAVV
ECIElectronic Commerce IndicatorIndicates authentication level and liability shift
XIDTransaction IdentifierUnique ID for 3DS 1.0 transactions
DS Trans IDDirectory Server Transaction IDUnique ID for 3DS 2.0 transactions (replaces XID)

ECI Values

The Electronic Commerce Indicator is critical for understanding liability shift:

ECIVisa MeaningMastercard Meaning
05Fully authenticated (3DS)Fully authenticated (SecureCode)
06Attempted authenticationAttempted authentication
07Non-3DS / e-commerceNon-authenticated
01Mastercard fully authenticated (some regions)
02Mastercard attempted authentication

An ECI of 05 (Visa) or 02 (Mastercard) means the liability for chargebacks shifts from the merchant to the issuer — one of the primary business motivations for implementing 3DS.

Decode your data: Use the EMV Tag Inspector to parse Field 55 data in contact and contactless transactions that include 3DS-related DSRP cryptograms.

Implementation Considerations

Frictionless vs. Challenge

The holy grail of 3DS 2.0 is the frictionless flow: the cardholder is authenticated silently based on risk analysis, with no visible challenge. Best practices for maximizing frictionless rates:

  1. Send all optional data fields — The more data the issuer has, the better its risk model
  2. Use the 3DS Method — Device fingerprinting improves risk scoring
  3. Maintain low fraud rates — Qualifies you for TRA exemptions
  4. Request exemptions correctly — Flag low-value and recurring transactions

Liability Shift

When 3DS is used (even if the challenge fails or isn’t available), the fraud liability can shift:

ScenarioLiability
Merchant uses 3DS, cardholder authenticatedIssuer bears fraud liability
Merchant uses 3DS, authentication attemptedIssuer bears fraud liability
Merchant does NOT use 3DSMerchant bears fraud liability
Issuer’s ACS is unavailableIssuer bears fraud liability

This liability shift is a powerful incentive — even if you’re outside the EU and SCA doesn’t apply, 3DS can save you from chargeback losses.

What 3D Secure Does NOT Do

Understanding the limitations prevents over-reliance:

Not a Silver Bullet for Fraud

  • Doesn’t prevent friendly fraud — Legitimate cardholders disputing charges
  • Doesn’t validate the merchant — Only authenticates the cardholder
  • Doesn’t protect stored data — That’s PCI DSS’s job
  • Doesn’t work for all transactions — MOTO, merchant-initiated, and some recurring payments are out of scope

Not a Replacement for Other Security

3DS works alongside other security measures, not instead of them:

LayerWhat It Does
3D SecureAuthenticates the cardholder at purchase
PCI DSSProtects stored cardholder data
EMV ChipPrevents card-present counterfeiting
TokenizationReplaces PANs with non-sensitive tokens
Luhn CheckCatches typos in card numbers

Learn more: See our Luhn Algorithm Guide for how basic card number validation works.

Quick Reference

TermDefinition
3DS3D Secure — authentication protocol for online payments
3DS2 / EMV 3DS3D Secure 2.0 — current version with risk-based auth
SCAStrong Customer Authentication — EU regulatory requirement
PSD2Payment Services Directive 2 — EU regulation mandating SCA
ACSAccess Control Server — issuer’s authentication system
DSDirectory Server — card network routing component
3DS ServerMerchant-side component that initiates authentication
AReq / AResAuthentication Request / Response messages
CReq / CResChallenge Request / Response messages
CAVVCardholder Authentication Verification Value
ECIElectronic Commerce Indicator
FrictionlessSilent authentication without cardholder challenge
TRATransaction Risk Analysis — exemption type

Next Steps

Now that you understand 3D Secure and Strong Customer Authentication:

  1. Verify cryptograms with the ARQC Calculator — The same HSM principles apply to CAVV generation
  2. Decode EMV data with the EMV Tag Inspector — Parse Field 55 including DSRP cryptograms
  3. Parse authorization messages with the ISO 8583 Studio — See where 3DS fields live in real messages
  4. Look up response codes in the Reference Database — Understand 05, 14, and other declines
  5. Review PCI compliance in our PCI DSS Guide — Protecting the data that 3DS authenticates
  6. Learn about HSMs in our HSM Basics Guide — The hardware behind cryptographic verification
  7. Explore tokenization in our Payment Tokenization Guide — 3DS + network tokens together boost approval rates by 2-6%
  8. Understand digital wallets in our Digital Wallet Guide — how Apple Pay and Google Pay use 3DS for wallet provisioning and online payments
  9. Explore biometric payments in our Biometric Payments Guide — biometrics provide inherence + possession to satisfy SCA requirements

This post is part of the ISO 8583 Mastery series. Follow along as we explore payment messaging in depth.

Related Posts

POS Entry Mode Codes Explained: ISO 8583 Field 22 Guide
Feb 18, 2026 13 min
DUKPT Explained: Key Derivation for Secure Payment Transactions
Feb 18, 2026 12 min
Interchange Fees Explained: What Every Payment Developer Should Know
Feb 18, 2026 12 min

💬 Discussion

Have a question or feedback? Leave a comment below — powered by GitHub Discussions.

Frequently Asked Questions

What is 3D Secure (3DS)?

3D Secure is a security protocol used for online credit and debit card transactions. It provides an extra layer of authentication, often requiring the cardholder to enter a one-time password or use biometric app approval before authorization.

What is the liability shift in 3D Secure?

When a merchant successfully authenticates a transaction using 3D Secure, the liability for chargebacks related to fraud is shifted from the merchant to the cardholder’s issuing bank.

What is SCA (Strong Customer Authentication)?

SCA is a regulatory requirement under Europe’s PSD2 directive. It mandates that electronic payments use multi-factor authentication. 3D Secure 2.0 is the primary technical method merchants use to comply with SCA regulations.

\n