Priceless Specials
Mastercard loyalty program in Poland. Learn how to integrate. Mastercard value added services platform in Czech and Slovakia. Learn how to integrate.
Introduction to RPM
RPM is a platform that supports loyalty program components using Mastercard Rewards System (MRS) API services to support the reward catalog.
Where to start?
First check out our offers and make a decision:
- How to connect with us - Learn about the MRS API which we use to integrate our customers with MC loyalty programs— for more information (here)
- Or maybe you are interested in integration between Issuer application and loyalty platform? Check out our Webview implementation.
- Do you want to have your own Enrollment widget for direct user and card registration to MRS API? You can find more information here.
Intro slides
Rewards & Loyalty
Loyalty platform integrated with Mastercard Rewards Systems and other solutions enables collection of points, redemption of rewards and various value added functionalities.
Link to: Priceless Specials Program
- API: Mastercard Reward Systems, Pay With Rewards, Travel Tool, YesMail, Your Pass, Enrollment Widget to MRS
- Readiness: Live
- Widget available: Yes
- White label solution available: Yes
- Certification: Yes
- Implementation time: 6 months
Overview
Introduction
RPM is a paltform thet offers acces to loyalty services using various components.
The RPM consists of:
- RPM core,
- RPM Admin.
Main functionalities
Login/Enrollment process
There are three registration scenarios available for Priceless Specials:
- Via batch file,
- Via Issuer using RPM Company API – described in separate page “Priceless Specials Webview”,
- Via website.
Website registration path:
First, the Cardholder will be asked to go to the login page to enter PAN + DOB (verification option). Then the Verestro use the MRS API to determine the status of the card (getCustomerAccounts WS and getCustomerDetails WS).
If the card exists in the MRS API and has a status: (“Good-standing/Redeem Only”) then Verestro add it card to database and stores the AREF of card. Enrollment is not needed.
Cardholder additionally introduces data such as:
- E-mail Address,
- Password.
If the card does not exists in the MRS API then Verestro need to enroll the card using enroll WS. If the bank has 3DS enabled then the cardholder must pass the verification correctly. Then cardholder additionally introduces data such as:
- First Name,
- Last Name,
- Zip Code,
- Phone number,
- E-mail address,
- Password,
- Birth Date,
- Consent – Terms&Condition,
- Consent – Disclosure of Personal Data,
- Consent – Mastercard Processing Personal Data,
- Consent – General Mastercard marketing information Email,
- Consent – General Mastercard marketing information Phone.
MRS Data Mapping Elements:
Customer
- Bank Customer Number -> mapped to bank_customer_number (equal PAN+000 OR clientId),
- ICA -> mapped to member_ica,
- First Name -> mapped to primary_account_holder_first_name – enroll WS,
- Last Name -> mapped to primary_account_holder_last_name – enroll WS,
- Birth Date -> mapped to birth_date (YYYY/MM/DD) – enroll WS,
- Zip Code -> mapped to postal_code – enroll WS,
- Email - > mapped to email_address – enroll WS,
- Mobile -> mapped to mobile_phone_number – enroll WS,
- City -> mapped to city_name – enroll WS (generated by Verestro based on zip-code),
- Country Code -> mapped to country_code – enroll WS (“POL”).
Account:
- Bank Account Number -> mapped to bank_account_number (equal PAN+000),
- Bank Product Code -> mapped to bank_product,
- Account Status -> account_status_code (=001),
- Program Identifier -> mapped to program_identifier,
- DDA -> mapped to dda_account_number (generate by Verestro).
Consents:
- Terms & Conditions -> mapped to CUST_ACCEPT_PROMO_SWITCH – updateCustomer WS,
- Disclosure of Personal Data - > mapped to CUST_USER_DEFINED_2 (position 39) – updateCustomer WS,
- Mastercard Processing Personal Data -> mapped to CUST_USER_DEFINED_2 (position 40)– updateCustomer WS,
- Personalised Marketing Communications,
- Email - > mapped CUST_ACCEPT_EMAIL_MESSAGE_SWITCH – updateCustomer WS,
- SMS - > mapped CUST_ACCEPT_SMS_MESSAGE_SWITCH – updateCustomer WS.
Rewards catalog
In order to retrieve information on Catalog, Verestro uses getRewardCatalog WS and getRewardItems WS which return a full listing of the rewards catalog for a given program of cardholder’s card.
Verestro displays different categories for Cardholder.
The following data will be received from MRS API response:
- rewardMatrixItemId – the internal MRS Matrix ID associated with the item,
- rewardItemShortDescription - The short description of the item,
- rewardItemLongDescription - The long description of the item,
- Image URL - The url that links to the item image,
- rewardMatrixItemPointValue – The point value of the reward item,
- shippingAddressSw – indicates whether or not a Shipping Address is required (e.g. physical or instant),
- redeemableItemSw – indicates if the Reward Item can be redeemed,
- physicalAddressRequiredSw – indicates whether or not the Reward Item will be shipped to a physical address,
- SingleQuantityRedemptionSw – indicates whether or not the Reward Item can only be redeemed with a quantity of one,
- emailAddressRequiredSw – indicates if an Email Address is required for the Reward Item when redeemed,
- orderInformation - the Shipping Message associated to the Reward Matrix Item’s Reward Category in the requested language,
- personalizationInformationSw,
- personalizationInformationLength,
- personalizationLabel.
The cardholder can choose to mark a specific reward as “selected”. Such a reward is displayed on the main page.
Points balance
To display the point balance information for registered cards, Verestro send separate (per each card) API request to MRS system via getPointDetails WS.
The cardholder receives points for making any transaction with the card. For making a transaction with a partner, relatively more.
Opt-out process
There are following possible options to opt-out from Priceless Specials Program:
- via website,
- via Call Center,
- via RPM Company API.
Once Cardholder has requested to opt-out from the PS program, Verestro or Call Center needs to change the T&C for cardholder. During 30 day “grace period” cardholders continue to login to website, redeem points etc. – and can opt back in. Once 30 days have passed record is moved so cardholder no longer has access to account and website.
- Complete opt-out from program -> unticks the T&C:
- Verestro triggers updateCustomer WS -> -> CUST_ACCEPT_PROMO_SWITCH to “N” (T&C),
- Verestro triggers updateCustomerAccount WS -> accrue_points_sw to “N”.
- Cardholder will have a chance to change the communication preferences:
- Email Switch (updateCustomer WS -> CUST_ACCEPT_EMAIL_MESSAGE_SWITCH to N),
- SMS - > (updateCustomer WS -> CUST_ACCEPT_SMS_MESSAGE_SWITCH to N).
Benefits
Static benefits
Static benefits are a type of offers added and fully managed in CMS. Benefits are always active and their main goal is to display descriptions.
Travel tool
Travel Tool will be supported by existing Travel Tool vendor (Inspire). Online Travel to enable possibility to use the points on various travel selections (Hotel, Car Rental, Flight) and will be available for all new programs.
Offers
RPM is using Personalized Card Links Offers (PCLO) to provide possibility for cardholders to accrue additional points per specific merchant offers.
Cashback Offers
Cashback Offers are provided to users based on transactions made at participating merchants with Mastercard card and MRS points earned from this spend due to MRS Always-On Promotions configured for all cards (except Business). Cashback means points that can be converted into money back collected/provided by the merchant on cardholder’s virtual account and can be later redeemed for specific catalog item or redeemed as cash. In addition to MRS Always-On Promotions the Program will have the PCLO offers configured per merchant to allow accruing additional points for user based on their transaction activity at these merchants.
Generic offer refers to standalone MRS offer without matching with PCLO offer. It can be set-up separately in CMS.
Household
Householding functionality enables consolidation of all cards of selected user (only within one program) or account. The household is allowed between different accounts of same user.
This can be achieved and set up in MRS via MRS APIs:
- moveAccountToExistingHousehold WS – will allow to put one account under a HH of another account.
- Request fields:
- accountId - the MRS internal Account ID for the Customer's Account to be added to HH (can be extracted from getCustomerAccount WS, getPointDetails WS responses).
- householdId - unique ID for a Household in MRS, an internal value assigned to the household, when a Customer is enrolled; this will be the household that the account will be moved into (can be extracted from getCustomerAccount WS, getPointDetails WS responses).
- Response field:
- newHouseholdId - Unique ID for a Household in MRS; if successful, this will be the same householdId value that was specified in the request.
- Request fields:
- removeAccountFromHousehold WS – will allow to take out the account from HH;
- Request fields:
- accountId - the MRS internal Account ID for the Customer's Account to be removed from HH (can be extracted from getCustomerAccount WS, getPointDetails WS responses).
- householdId - unique ID for a Household in MRS, an internal value assigned to the household, when a Customer is enrolled; this will be the household that the account will need to be removed from (can be extracted from getCustomerAccount WS, getPointDetails WS responses).
- Response field:
- newHouseholdId - Unique ID for a Household in MRS; if successful, this will be the new householdId value that will be assigned for accountId removed.
- Request fields:
- updateHouseholdRole WS – will update the Role of account in HH (Primary Redeemer, Redeemer or Non-Redeemer, if applicable; by default – all Non-Redeemer Roles need to be updated with Redeemer by Verestro).
- Request fields:
- householdId - unique ID for a Household in MRS; this is the household that will have its redeemer roles managed (can be extracted from getCustomerAccount WS, getPointDetails WS responses).
- roleId - a code that defines the Customer’s redeemer role, within the household. Valid values are:
- P - Primary Redeemer,
- R - Redeemer,
- N - Non-Redeemer.
- childCustomerId - the internal MRS Customer ID of the customer that is having their redeemer role updated.
- Response field:
- success - his field will contain “true” if the Redeemer Status update was successful or “false” if the Redeemer Status update was not successful.
- Request fields:
Priceless Specials Webview
Overview
This documentation describe integration into Priceless Specials platform using few services provided by Verestro.
We should highlight few main products:
- Full SDK (called in document WEB SDK) - web based service, that allows to integrate Priceless Specials product into partners application. It can be embedded in the mobile application or provide service after redirect to it from partners web panel.
- Goal widget - web based micro app, that can display selected reward and progress % for particular card info.
- Company API - API that allows partner to interact with Priceless Specials product specific data e.g., customer point adjustment.
API Domain
All methods are available on below URL except initialization method
Endpoint URLs:
Stage: https://rpm-management.upaidtest.pl/,
Prod: https://rpm.secure-verestro.com/.
Security and authentication
For backend-backend communication, it is required to attach appropriate certificates to the requests sent.
This applies all methods with /company prefix.
Method: /issuer/initialize_sdk does not require certificate.
Certificate generation process.
First, the Partner needs generate a CSR (Certificate Signing Request).
The command to generate the CSR:
openssl req -new -newkey rsa:4096 -keyout client.key -out client.csr -nodes -subj '/CN=bankname cert/emailAddress=rpm@bankname.pl'
Once the CSR is generated, it should be passed to Verestro. Verestro will sign the CSR and provide x509 certificates based on it:
- certificate CERT.CRT – used for backend-backend communication,
- certificate CA.CRT – (recommended) used for backend-backend communication,
- certificate to sign the trustedIdentityToken (one of the payload parameters of initializeSdkToken).
Trusted Identity Token
Trusted identity is JWS Token provided by client and it is used to authentication and start user session. It is required as one of the payload parameters of initializeSdkToken during Webview initialization process.
Trusted identity structure
Every field which starts from signed is payload signed using JWS per RFC 7519. JWTs are composed of three sections: a header, a payload (containing a claim set), and a signature. The header and payload are JSON objects, which are serialized to UTF-8 bytes, then encoded using base64url encoding.
The JWS’s header, payload, and signature are concatenated with periods (.). As a result, a JWS typically takes the following form:
{Base64url encoded header}.{Base64url encoded payload}.{Base64url encoded signature} |
Object fields should be placed as claims in the token. Moreover, there are some additional required claims that are needed to protect against replay attack:
Name |
Description |
iat |
The time at which the token was issued. UNIX Epoch timestamp, in seconds |
jti |
Token ID - unique identifier for the JWS |
JWS tokens have TTL which is validated against "issued at" time from claims (iat). TTL is 10 minutes.
JWS tokens should be signed using private key from the RSA 2048 key pair.
In addition, JWS payload should contain: `cardHash` - hash of card number (described in 3.2.)
JWS tokens must have additional header:
Name |
Description |
x5c |
Parameter contains the X.509 certificates chain (RFC7515#section-4.1.6) |
PAN hash generating
PAN hash is an identifier in the Partner-Verestro communication and specifies the card for which the action should be performed.
It is used in:
- Endpoints described in Chapter 6,
- As a parameter in the trustedIdentityToken payload.
PAN hash generation process:
Hash value is as SHA-256 HMAC, please see links below for more details:
RFC: https://tools.ietf.org/html/rfc4868#page-3,
Wiki: https://en.wikipedia.org/wiki/HMAC.
Test and prod value of key used to calculate HMAC will be delivered by Verestro at the later stage of integration process.
To validate your implementation please check plain and hashed values below:
Plaintext (HEX) |
Hash |
5555444433332222 |
4f64c445c859f7e53209e0091a5faef7e8b3ebbad899fbf8c74df09a6bfe5646 |
6984576897634895763948576 |
4b2eab65ab16183fa6ac8a8b12ad690890db98c5ce20e6d56aa037b723bbe84 |
someTestValue398048096859607 |
29596a78a7382e90159d8ec78a8d37baff57d05f676c0607dd7fb24b0396270ce |
Connection to SDK and widgets
Initialization
To connect you need to send HTTP POST request to /initialize_sdk endpoint with required parameters. To choose what front-end way want to load, you need to provide widget_type parameter that determines also required parameters.
You can also add the parameter “redirect”: false, which is optional – the default value is true. That causes that you are not redirected, but you receive a response 201 with the body (in this case, you have to redirect manually):
{
"redirectUrl": "https://something.com"
}
Endpoint URLs:
Stage: https://rpm.upaidtest.pl/issuer,
Prod: https://rpm.upaid.pl/issuer.
Goal Widget communication
Initialization
To initialize Priceless Specials web SDK within mobile application, it is required to make POST request to RPM backend (API) with parameters (section 3.3). Make sure that parameter widget_type is set to "goal".
Example POST request body:
{
initializeSDKToken: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6InRlc3QiLCJpYXQiOjE1MTYyMzkwMjJ9.tRF6jrkFnCfv6ksyU-JwVq0xsW3SR3y5cNueSTdHdAg
}
JavaScript events for mobile applications
For getting proper messages on error or session expiration from widget you need to implement:
Android
Android.showMessage(message); |
Android developers must binding javascript code to android code using @JavascriptInterface annotation. More info here.
iOS
window.webkit.messageHandlers.payment.postMessage({ status: message }); |
More info here.
Partner can react on those in various ways that suits given use case or interface.
Events list
There are some rare cases that error will occur, here are list of most common:
- 'ERROR: Missing parameters',
- 'ERROR: Missing rewards',
- 'ERROR: Session expired'.
WEB application
If there is an error, and returnUrl is set, app will redirect to returnUrl so partner can react.
If there is no returnUrl, error page will be displayed.
Initialization of Priceless Specials Webview
Solution is prepared to open in webview and should be implemented in a way, where no iframe is used at all! Please make sure support for local storage and cookies is enabled. |
Base flow:
- Banking mobile app authenticates user,
- Bank's backend system generates trusted identity token,
- Mobile application initializes Native SDK – developed by Bank,
- Native SDK generates missing data:
- Unique device ID,
- System name,
- Public key.
Native SDK opens Priceless Specials Webview by POST request, like described below.
To initialize Priceless Specials Webview within mobile application, it is required to make POST request to RPM backend (API) with parameters (section 3.3). Make sure that parameter widgetType is set to "full".
Example POST request body:
{
initializeSDKToken: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6InRlc3QiLCJpYXQiOjE1MTYyMzkwMjJ9.tRF6jrkFnCfv6ksyU-JwVq0xsW3SR3y5cNueSTdHdAg
}
Partner will perform POST action /initialize_sdk with parameters as described above.
It will trigger communication between WEB APP and RPM API to log in user by provided trusted identity.
Closing of the session
Integration with Web application
In this type, if parameter returnUrl is present, in GUI customer will see button to go back, and will be redirected to returnUrl.
Integration with Mobile application
In mobile integration, parent mobile app can close web view at any time, but in case of some errors or loosing session, WEB APP will trigger JavaScript events to inform webview about it.
Session support mechanism
Only for WEB flow! |
This endpoint should be able to validate, if it is secure to extend user session, so keepSessionUrl should be signed by issuer.
WEB APP will periodically call this endpoint (Request GET) to avoid session timeout on issuer side. After user decide to return, WEB APP will log user out and redirect to partner site (returnUrl).
SDK Customization
Font styles and colors
Priceless Specials SDK allows to customize some parts of application layout:
Enrollment Widget
This document is intended for Mastercard partners willing to integrate their mobile applications or website solutions with Mastercard Reward System using Enrollment Website/Widget tool provided by Verestro.
The document is designed to cover the following fundamentals:
- High level overview of Enrollment Widget capabilities and architecture,
- Integration description,
- Data flow diagrams,
- Illustrative User flows and Screens.
Abbreviations:
AES – Advanced Encryption Standard ,
API – Application Programming Interface,
MRS - The Mastercard Rewards System - the platform from Mastercard dedicated to deliver loyalty solutions for customers,
PCI DSS - Payment Card Industry Data Security Standard.
Overview
Online Enrollment Capability (Enrollment Website/Widget) is a tool that can be integrated with Merchants, Issuers or other Clients and allows secure registration of cardholder PAN (and PII data, if applicable) into the MRS system. In addition to card enrollment (and PII, if applicable) into MRS, it also allows to perform certain card management activities (optional), including unenrollment and card replacements.
The Enrollment Capability (Enrollment Website/Widget) designed by Verestro supports all key web-browsers (see further in the document) and has mobile responsive design, as well as can be embedded into mobile applications (WebView). Also, it can be customized & localized per specific Client/Country (with unique URL) and enabled upon specific request from Mastercard.
Verestro is using MRS API v.2.0 to facilitate operation of Enrollment Capability (Enrollment Website/Widget). The Enrollment Capability will be hosted in Poland (EU) in Verestro PCI DSS certified environment (hosting center).
Limited PII data elements, stored in Verestro database are encrypted using AES 256 encryption standard. PAN is not stored in Verestro database at any time.
High Level Description of Flow and Requirements
Enrollment
Initialization Process
In order to start using Verestro solution, each Client is required to be setup in the Verestro back-end system. The Client setup process includes assignment of unique Client ID, Program ID, and Security Key exchange process.
In order to initialize Enrollment Website/Widget capability, Client will be required to trigger a dedicated URL provided by Verestro with parameters included into signed request described in 3.2 “Initialization process” (HTTP POST action /company/non_auth_initialize request with JWT token (RFC 7519) which contains valid payload data). For any new registration, payload should contain valid actionCode parameter that is equal to “N” value for new customer/card enrollments.
Please note – Client is required to authenticate/verify the customer and submit valid Customer ID in the initialization request to Verestro. If the Client does not provide Customer ID during the initialization of enrollment, Verestro will generate a Customer ID on behalf of the Client. In such case, Verestro will provide back to the Client the assigned Customer ID value and will display assigned value to the customer. The Customer ID enables further card management purposes such as e.g. opt-out) but is not a default option and will require additional security measures on Verestro side (including Re-captcha and/or 3DS process).
Upon successful validation on Verestro side, the Website/Widget is displayed, where user can enter the following data:
- PAN (Required),
- First Name (Optional),
- Last Name (Optional),
- Email (Optional),
- Terms & Condition consent (Optional, used in majority of cases),
- Privacy Notice consents (Optional, used in majority of cases).
The PAN during customer’s input in Website/Widget is validated using Luhn algorithm in real-time (in the browser). If successful Luhn check is passed in the browser, Verestro will encrypt the PAN using MC public key (see full process in section Security 3.3) and will pass the encrypted card information into MRS. After successful MRS enrollment, MRS will supply back to Verestro successful enrollment notification with Account Ref ID or RANAC (unique ID assigned by MRS per card) for further card management activities.
In addition, Verestro will be required to immediately feedback the enrollment result with assigned values to the Client (Customer ID, Account Ref ID or RANAC, additional values if required). Partner can use the one of initialization parameters (ranac_url) to send a specific endpoint to which Verestro will send RANAC after successful enrollment.
3DS authentication (optional)
Optionally, Verestro allows to trigger 3DS 2.0 authentication after submission of the registration data. If the card authentication is successful, the card enroll is performed into MRS.
This case must enable the decryption of the card on the API side.
Un-Enrollment User Flow
In order to initialize the Enrollment Website/Widget to execute un-enrollment, Client will be required to trigger dedicated URL provided by Verestro with required parameters included into signed request described in 3.2 “Initialization process”. In this case actionCode parameter should contain “C” value and Customer ID value is always required.
Verestro system will perform a search of Account Ref ID or RANAC assigned to Customer ID in Verestro database (decrypt stored values) and will trigger updateCustomerAccount MRS API with “CANCELLED” status. Upon successful un-enrollment in MRS, Verestro will immediately feedback the result of un-enrollment to the Client.
After X days from the status change to Canceled, the record with the any associated PII data (including Customer ID, Account Ref ID or RANAC, others) will be completely removed (deleted) from Verestro database. Please note – if there are multiple cards under single Customer ID, Verestro will be required to search Account Ref ID or RANAC having last 4 digits of card to perform card un-enrollment under associated Customer ID (only Account Ref ID or RANAC will be purged upon cancelation of card).
X – it is parameter configurable per Client/Program (e.g. 30 days).
Replacement User Flow
In order to initialize the Enrollment Website/Widget to execute replacement, Client will be required to trigger dedicated URL provided by Verestro with required parameters included into signed request described in 3.2 “Initialization process”. In this case actionCode parameter should contain “R” value and Customer ID is always required.Verestro system finds the cards assigned to this Customer ID in Verestro database and display the cards list in the following format:
- 1234 XXXX XXXX 1234
User can select the card he wants to replace and enters a new PAN.
Upon selection of card to replace, Verestro will propose to enter a new PAN. Verestro will capture & validate a new card number (in browser) and will trigger the new card enrollment into MRS (2.1 Enrollment). Upon successful enrollment of the new card, the cancelation of the old card will be triggered by Verestro into MRS (sequence will be followed). If by any reason, the card enrollment of the new card is not successful, Verestro will not delete the old card and will inform Client about the unsuccessful replacement attempt.
Verestro will immediately feedback the results of replacement including Customer ID, new Account Ref ID or RANAC (additional data if any) to the Client and confirm the successful replacement of old card.
After X days from the replacement, the record with the any associated PII data (including Customer ID, Account Ref ID or RANAC, others) will be completely removed (deleted) from Verestro database. X – it is parameter configurable per Client/Program (e.g. 30 days).
Widget Customization & Localization
Some parts of Enrollment Capability (Enrollment Website/Widget) can be customized per each integrating partner:
- Logotype.
Supported format is: PNG. Supported proportion is 21:9 with transparent background. Minimum height is 100px.
- Background image.
Supported format is: PNG Supported resolution is: Full HD (1920px x 1080px)
- Text/Translations.
The client will receive a translation file in JSON format, example below.
{
"register":{
"header":"Mastercard - Rewards",
"tittle":"Registration",
"accept_terms":"Accept Terms&Conditions",
"userData":{
"card_number":"Your card number",
"first_name":"First name",
"last_name":"Last name",
"email":"E-mail"
},
"optional":"optional",
"confirm":"Confirm"
},
"error":{
"title":"Something went wrong...",
"info_first_part":"Your card does not belong to the program. Read more about how to join the program.",
"info_second_part":"Incident identifier: "
},
"success":{
"title":"Success!",
"info":"Your card has been attached to the program."
},
"read_more":"Read more"
}
Browsers supported
Enrollment Website tool works on modern browsers including the most recent versions of Chrome, Firefox, Safari, and Microsoft Edge. Older legacy versions may still work, but for an optimal experience, please use the most up to date browser versions.
Technical description of the setup
Before configuring the Client on the Verestro side, Mastercard should provide a complete set of data for specified for the Partner (Client) and Program:
- Partner Name,
- Partner Language/Country (Translation File),
- Terms & Conditions or Privacy Notice (URL or Content),
- Type of Bank Customer Number,
- Member ICA,
- Bank Product Code,
- Program Identifier,
- List of BINs.
Initialization Parameters
In order to initialize the Enrollment Website/Widget, Client is required to make HTTP POST action /company/non_auth_initialize request to Enrollment Website (API) with JWT token (RFC 7519 algo: RS-256) which contains valid payload data signed with secret key.
Service URLs:
Test: https://rpm.upaidtest.pl
Prod: https://rpm.upaid.pl
Token signing
Client should generate key pair using commands:
openssl genrsa -out private-key.pem 2048
openssl rsa -in private-key.pem -pubout -out public-key.pem
Client provides public key for Verestro. Client signs JWT token with private key. Verestro will verify token signature by provided public key.
Headers:
The endpoint expect the following headers:
Name |
Value |
Accept |
application/json |
Content-Type |
application/json |
Client should execute HTTP POST /company/non_auth_initialize method with initializeWebsiteToken parameter in the JSON body.
JSON Body example:
{
"initializeWebsiteToken": "eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJtaWxlc2FuZG1vcmUiLCJzdWIiOiJ0ZXN0YWhkZmprc2RoZmciLCJwcm9ncmFtSWQiOiIxMDc2NSIsImFjdGlvbkNvZGUiOiJOIiwiY29uZmlybWF0aW9uVXJsIjoiaHR0cDpcL1wvdGVzdHVwZGFpZC5wbCIsImxhbmd1YWdlIjoicGwiLCJleHAiOjE2MTI5NTg3NTJ9.FV13fKPst5DLhCOz4VLOoeSUjKGtOxMlceJtDtXE_8Fa498fnP3DWqK763AQNF0U32UDeq10X6ctUYKxe2-xwTMFdBe8PU2xmz-khRFfV0l0fz9J3xFGjR59PTBdmYzLWJ5AmU5EDg4SpWCT4Oaobq2eBYJ_WGO7MKDx_7okFa7Z_H1OjMOAone3OSJWIY84J9rmeqt3GvD5r7CwewReExGI15MBy5VfUqh5_543b5gNjJgTeYBGha46DdtFChk7mJNfjNQwGMcqJZsjlCxoqRbWC9Jcz0T0eLfZBGLMeSszSwfXgKqM0NelFhVUSU99kFLvl8MSBcz1j6yhG6VziQ"
}
HTTP Request parameters:
Name |
Required |
Type |
Description |
initializeWebsiteToken |
Yes |
string |
JWT token signed by Client private key |
Token payload data:
Name |
Required |
Type |
Description. |
|
|
iss |
Yes |
string |
Partner ID (Client ID) – unique value assigned by Verestro per Client that is required to display the proper website/experience. |
|
sub |
Yes |
string |
External Customer ID - Unique Customer Identifier (unique Customer ID) assigned by the Client (e.g. Customer ID, Parent ID). Please note – Client is required to authenticate/verify the customer and submit Customer ID in the initialization request. If the Client does not generate Customer ID during the initialization of enrollment, but it is not default option and will require additional security measures on Verestro side (including Re-captcha and/or 3DS process). |
|
actionCode |
Yes |
string |
Unique action code for optional functionally: · N – New registration, · R – Replacement, · C – Opt-out. |
|
programId |
Yes |
string |
Program ID – unique value assigned by Mastercard for specific Program. |
|
iat |
Yes |
numeric |
The "iat" (issued at) claim identifies the time at which the JWT was issued. This claim can be used to determine the age of the JWT. Its value MUST be a number containing a numeric date value. Eg. 1516239022. |
|
exp |
Yes |
numeric |
The "exp" (expiration time) claim identifies the expiration time on after which the JWT MUST NOT be accepted for processing. Please set token lifetime to 10 min. |
|
language |
No |
string |
Partner preferred language code. If field is not specified then is return default language for given Partner. Eg. en_US (IETF language tag ISO 3316 & ISO 639). |
|
confirmationUrl |
No |
string |
The URL that will allow sending to partner backend status and parameters like RANAC (REFID from MRS API) parameter or other error codes allowing full tracking. |
Token payload example:
{
"sub": "CustomerID",
"actionCode": "N",
"programId": "ProgramID",
"iss": "ClientID",
"iat": 1516239022,
"exp": 1516269622,
"confirmationUrl": https://confirmation-sys.com/id/123,
"language": "en_US"
}
Response
This request will always respond with HTTP 302 code which is redirect status response. It’s because at first you hit a security layer application that translate tokens and grants access to main application.
The URL returned in HTML tag should be use to open the widget.
Security Details
General Security Measures
- Enrollment Website/Widget will be hosted in Poland (EU) in Verestro PCI PSS certified environment (hosting center).
- Vulnerability scans are performed quarterly on Verestro systems and external, certified PCI DSS auditor performs annual audit (latest PCI DSS certification has been successfully passed in October 2019).
- All systems are backed-up.
- Security policies are available anytime for Mastercard and its partners.
- All PII data elements, stored in Verestro database, are encrypted using AES 256 encryption standard. All parameters provided by the client at point of enrollment or card management (initialization) must be signed. PAN is not stored in Verestro database at any time - unique MRS card IDs will be assigned for any further activities with account.
PAN encryption process
The PAN is not stored in Verestro database at any time and the following PAN enrollment process is followed by Verestro:
- CH inputs PAN on the browser (enrollment page/widget hosted by Verestro), where Verestro will perform auto-check of Luhn to ensure correctness of card number input (still inside the browser - javascript). If supplied PAN number doesn’t pass the Luhn check, a notification will occur to cardholder to correct the PAN number.
- If successful Luhn check is passed in the browser, Verestro encrypts the PAN using MC public key (MTF – refid: 119009, Production – refid: 122744) and will pass the encrypted card information into https to backend API (Verestro) to further trigger enrollment of card data into MRS. The PAN is the field being encrypted. Verestro will take the encrypted data from the browser and will put it unchanged (encrypted) into the field along with the indicator that it is an encrypted value.
Example:
An unencrypted PAN would be sent like this:
<cus:bank_account_number>
5xxxxxxxxxxxxxxx</cus:bank_account_numbe>
An encrypted PAN would be sent like this:
<cus:bankAccountNumber encrypted="true">
{"key":"<received from browser>",
"data":"<received from browser>"}</cus:bankAccountNumber>
The values for “key” and “data” would be generated in the browser and sent to Verestro to relay on to us.
- Verestro backend will send this encrypted value (encrypted in browser) on to MRS within an enroll MRS API call.
- MRS will decrypt using MRS private key to check eligibility (incuding BIN-ranges) and upon successful check enroll PAN into MRS. After successful enrollment into MRS, MRS will supply back to Verestro successful enrollment notification with Account Ref ID or RANAC (unique per card) assigned for account (for further activities, if applicable).
- Other PII data (e.g. Customer IDs) will be stored by Verestro under AES 256 encryption. uPaid will also store Account Ref ID but at no time full PAN data.
Data storage
Any PII data (e.g. Customer ID), will be stored by Verestro only under AES 256 encryption that will allow to decrypt the PII data when there is a need to fulfill certain business requirements. In addition, Verestro will store Account Ref ID/RANAC under AES 256 (unique card ID assigned by MRS) but at no time full PAN data.
Communication from website
In general, all communication to and from the website we can list in a few categories below.
- Initialize.
- Partner not allowed - Signature for the token is invalid, or the partner has no access to that functionality.
- Invalid parameters - Some of the required parameters are invalid or required ones are not present.
- Ending confirmation – By JS events or HTTPS backend to backend request.
- Success - Enrollment, replacement, or removal was performed successfully.
- Error - There was some problem during enrollment, replacement, or removal.
The widget can be used in a couple of ways, eg.
- Web redirect (full page),
- Web iframe,
- Mobile WebView.
Widget supports two ways of feedback to partners.
- JS Event for WebView,
- HTTPS request for all above, optionally.
Name |
Required |
Type |
Description. |
status |
Yes |
string |
Main status, all possibilities listed above. |
status_code |
No |
string |
MRS error code, present only when the source of error is MRS API. |
parentId |
No |
string |
External Customer ID - Unique Customer Identifier. |
ranac |
No |
string |
Unique ID assigned by MRS per card. |
designCode |
No |
string |
Code representing card visual design. Eg. Gold, Blue. |
bin |
No |
string |
First 6 digits of PAN aka bin. |
last4 |
No |
string |
Last 4 digits of PAN. |
All the supported processes can have main statuses:
- Partner not allowed,
- ACCESS_DENIED,
- TOKEN_EXPIRED,
- Invalid parameters,
- INVALID_PARAMETERS,
- Success,
- SUCCESS_ENROLLMENT,
- SUCCESS_REPLACEMENT,
- SUCCESS_REMOVAL,
- Error,
- ERROR_ENROLLMENT,
- ERROR_REPLACEMENT,
- ERROR_REMOVAL.
Application support optional confirmation using secure backend to backend system HTTPS requests. This is optional, a partner can rely only on data from JavaScript event, or use both, depends on preferences. This request is sent, only when parameter confirmationUrl is present in the initialization process.
For each interaction with MRS (enrollment, replacement, or delete) system will send a request with the overall process status with all necessary parameters described below.
All potential statuses from MRS, that can be in the STATUS_CODE field, listed below:
Code |
Description. |
0 |
Success . |
-1 |
Invalid parameters (e.g. when invalid Bank Product Code is sent, but it should not happen as Verestro is hard coded). |
-5 |
Invalid Account was not found within MRS (e.g. if Veresto will send invalid RANAC for replacement, but it should not happen as Verestro has it mapped on their side). |
-10 |
Invalid Account Status (should not happen as Verestro knows the status of account). |
-32 |
Invalid Program ID (e.g. when Veresto will send the invalid Program ID to enroll the card, but should not happen as Verestro is hard coded to single ID). |
-44 |
Invalid Bank Account Number (e.g. when PAN doesn’t pass Luhn validation, impossible as Verestro checks in browser during input). |
-45 |
Bank Account Number Already Enrolled (e.g. when PAN is already enrolled under different Parent ID). |
-46 |
Invalid Bank Product Code (e.g. when BPC is not valid, should not happen as Verestro is hard coded). |
-47 |
Invalid Account Status Code (e.g. when non-standard code input, but Verestro knows all our status codes for enrollment and cancelations). |
-48 |
Invalid Program Identifier (when invalid Program Identifier input, but Verestro knows and coded to single Program Identifier so should not happen). |
-50 |
Bank Customer Number Already Enrolled (when Parent ID already enrolled, should not be a issue, as we have 1-1 customer account approach + Verestro keeps track of Parent IDs). |
-52 |
Account not qualified for the Program (when card doesn’t fall under DKB co-brand range, but should not happen as initially Verestro checks it). |
-85 |
Bank account number does not exist (when RANAC is not enrolled, but should not happen as Verestro has a track of RANACs with Parent IDs). |
-1001 |
Server Side Error. Internal Error (Connection to MRS error). |
Example confirmation request:
HTTPS request (POST) to confirmationUrl
Body (JSON):
{
"status":"SUCCESS_ENROLLMENT",
"statusCode":"-50",
"parentId":"5d7703f9-7df2-4323-9745-9474f3182aef",
"ranac":"03643782610476418733",
"designCode":"Gold",
"bin":"523400",
"last4":"0123"
}
Example JS event integration for communication widget à native mobile application.
Event name: "enrollmentEnded” for all type of actions.
Event data structure:
{
status: "SUCCESS_ENROLLMENT",
statusCode: "-50",
parentId: "5d7703f9-7df2-4323-9745-9474f3182aef",
ranac: "03643782610476418733",
designCode: "Gold",
bin: "523400",
last4: "0123"
}