Skip to main content

Authentication

About

This section defines different types of authentication methods supported by the BOG protocol. It is mandatory that a service-provider uses one of the authentication methods listed here. Moreover, it is recommended to use multiple authentication methods at once to increase security.

Risks

This document does not aim at assessing risks imposed on the participants of the payment system in relation to electronic payments and respective responsibilities. The document describes the security regimes applicable to protect the payment system.

Supported Methods