HomeCustomersPricingDocs
Back
  • November 20, 2024
  • 7 min read

How to implement 3D-Secure authentication in 2025

John Hetherton

Head of Compliance

3D-Secure authentication (or 3DS for short) is a security protocol that reduces credit card fraud, identity theft, and other issues relevant to online transactions. Originally launched as Visa Secure in 2001, the 3D-Secure protocol has evolved to become the backbone of secure card transactions and fraud protection for online merchants worldwide.

Notably, merchants want to implement 3D-Secure authentication because it shifts the liability of a future chargeback on the issuing bank, not the merchant (provided that 3DS was correctly implemented).

3D-Secure is a constantly evolving protocol with geography-specific iterations. The latest 3D-Secure version includes significant improvements in payment authentication and fraud prevention. Today, we'll cover the most notable considerations for implementing 3D-Secure in 2025, including how to optimize the frictionless flow and manage liability shift requirements.

Understanding 3D-Secure's Foundation

The 3D-Secure protocol operates on a three-domain model: the acquirer domain (merchant/bank), issuer domain (card issuer), and the interoperability domain (payment networks). It creates an additional layer of security between all parties involved in online card transactions, providing robust fraud prevention while maintaining a smooth user experience. It also shifts the liability of a future chargeback onto the bank, away from the merchant.

The protocol has dramatically evolved from its initial version. Early 3D-Secure authentication relied heavily on redirect-based authentication and passwords, often leading to unnecessary friction and cart abandonment. These issues were tackled by EMV 3DS (3D-Secure 2.x), which incorporates risk-based authentication methods, biometrics, and enhanced data sharing, resulting in faster processing times and higher success rates.

Implementation Approaches of 3D Secure

Today, there are three primary options for implementing 3D-Secure authentication:

1. Hosted Payment Page (HPP) Solution

The simplest approach involves leveraging a pre-built payment page provided by a payment service provider. This page handles the complete authentication process, including challenge flow and regulatory requirements. While it offers quick implementation and automatic updates, it provides limited customization options and less control over the user experience. It's popular amongst smaller online merchants, but is rarely the ideal solution for larger operations.

2. Direct API Integration

For merchants requiring complete control, a direct API integration allows custom authentication flows and enhanced monitoring capabilities. The integration could require significant development resources but offers flexibility in implementation and user experience design. Merchants must manage their own security measures, including maintaining strong customer authentication protocols and payment processor connections.

3. Managed Integrations

For organizations seeking a balance between control and simplicity, managed implementations offer a hybrid approach. These solutions typically provide:

  • Direct integration with card scheme Directory Servers
  • Support for multiple payment methods and processors
  • Customizable challenge flow interfaces
  • Built-in optimization for frictionless authentication
  • Automated liability shift management

While this approach may carry higher operational costs than HPP solutions, it reduces the technical burden compared to direct API integrations while offering more flexibility and control over the payment authentication experience.

Authentication Flows

Modern 3D Secure implementations rely heavily on sophisticated risk assessment to determine the appropriate level of authentication for each online purchase.

For example, in frictionless flow scenarios, transactions proceed seamlessly when risk levels are deemed acceptable. The system analyzes multiple data points in real-time, including device characteristics, transaction history, and behavioral patterns. This background assessment happens invisibly to the user, creating a smooth online shopping experience while maintaining security. Success rates for frictionless authentication typically exceed 85% in well-implemented systems.

Meanwhile, when transactions trigger risk thresholds, the challenge flow kicks in. Rather than the jarring redirects of early 3D-Secure versions, modern authentication methods integrate seamlessly into the checkout process. Users might authenticate using their phone's fingerprint sensor, respond to a push notification in their banking app, or enter a one-time password.

For most payment teams, striking a balance between security and user experience is the principle challenge. The key is providing options – some users prefer biometrics, while others trust traditional SMS codes sent to their phone number. This flexibility, combined with clear error handling and timeout management, helps maintain conversion rates even when additional verification is required.

Technical Requirements in 2025

Successful 3D-Secure implementation requires robust technical infrastructure to support secure online transactions. Depending on the approach, some of these requirements are handled out-of-the-box by your payment service provider, while more hands-on implementations could take serious engineering work:

Server Needs:

  • Authentication servers with appropriate SSL/TLS configuration
  • Database systems for transaction logging and user data
  • Message queuing for high-volume card transactions
  • Load balancers for traffic management

Network Architecture Needs:

  • Secure API endpoints with failover systems
  • DDoS protection and intrusion detection
  • Caching strategies for performance optimization
  • Comprehensive monitoring and logging systems

What 3D-Secure Requires in 2025

As previously mentioned, 3D-Secure authentication is an evolving security protocol. Some requirements have been around since Mastercard SecureCode and American Express SafeKey first launched; others are specific to the latest 3D-Secure version.

Data Fields

Data fields help inform the payment processor and card issuer of the user's identity:

  • Cardholder name (required for all transactions)
  • Cardholder email address or phone number
  • Device information including IP address and screen parameters
  • Browser capabilities and version information

New Protocol Allowances

Today, merchants must comply with 3D-Secure 2.2.0 or higher for optimal fraud protection. Notably, this version created new authentication flows that weren't previously possible:

  • Delegated authentication, where a third-party service handles the authentication process
  • Decoupled authentication, where a device delegates another device (e.g., a desktop delegating to a smartphone) to authorize on behalf of the principle device

These new allowances make it easier for applications to pursue more creative 3D-Secure strategies that optimize for successful online authentication.

Regional Trends

3D-Secure implementations vary significantly by region, affecting how merchants approach payment security:

European Economic Area

Merchants must comply with the Payment Services Directive (PSD2)'s strong customer authentication requirements, demanding two-factor authentication for most online card transactions. The liability shift rules here are particularly important for merchant protection.

Asia-Pacific Markets

There's a growing emphasis on mobile payment authentication, with some countries requiring specific authentication methods for domestic transactions. Services like Mastercard Identity Check are widely adopted in this region.

North American Requirements

Focus remains more on fraud prevention than prescriptive authentication methods, though card schemes maintain strict technical standards for online merchants. The emphasis is on balancing security with minimizing unnecessary friction in the payment process.

Best Practices for Implementation

Successful 3D-Secure implementation starts with a thorough assessment of your current payment infrastructure and business needs. Begin by analyzing your transaction patterns and customer base – are your customers primarily engaging in online shopping? Do you operate across multiple regions? This understanding helps guide technical decisions and resource allocation.

When selecting an implementation strategy, consider not just current needs but future scalability. A hosted solution might work well for smaller merchants, but growing businesses might benefit from the flexibility of direct API integration. Factor in ongoing maintenance costs and the need for regular updates as the 3D-Secure protocol evolves.

The user experience should remain central to implementation decisions. Mobile optimization is no longer optional – it's essential. Focus on minimizing friction in authentication flows while maintaining clear communication with users about security steps. This includes providing context for authentication requests and clear paths for resolution when issues arise.

Regular monitoring and optimization keep your 3D-Secure implementation effective. Track authentication success rates across different regions and payment methods, analyze performance metrics, and stay alert for emerging CNP fraud patterns. Use this data to fine-tune risk parameters and authentication flows, ensuring your system balances security with user convenience.

Conclusion

Implementing 3D-Secure authentication requires careful planning and consideration of multiple factors. While technical requirements continue to evolve, focusing on core principles of security, user experience, and performance will ensure a successful implementation. As we move toward 2025, staying current with protocol updates and regulatory requirements while maintaining flexibility for future changes will be crucial for long-term success in managing online transactions securely.

The easiest way to get started with 3D-Secure

Evervault’s standalone 3D-Secure Server lets merchants and payment service providers authenticate payments, shift liability and comply with regulations like Strong Customer Authentication.

Learn more

John Hetherton

Head of Compliance

Related Posts