HomeCustomersPricingBlog
Back
  • January 06, 2025
  • 11 min read

A Practical Guide to Implement and Optimize 3D Secure

Shane Curran

Founder, CEO

Categories

Payments

How Does 3DS Work?

We wrote about 3D Secure (3DS) in a prior blog post, describing what it was and how it’s typically implemented.

As a reminder, 3DS is a security protocol designed to add an extra layer of authentication to card-not-present transactions. Initially introduced by Visa (alongside Celo Communications) in 1999 and subsequently adopted by other major card networks, it aims to reduce fraud by verifying that the individual completing an online payment is indeed the legitimate cardholder. The process typically involves risk-based authentication, one-time passcodes, biometric checks, or other verification methods before the transaction is approved.

While these authentication steps sometimes introduce friction, the goal is to find a balance that prevents illegitimate use of payment cards without unnecessarily disrupting legitimate purchases. Understanding the technical fundamentals behind 3DS can guide better decisions about authentication flows, fraud prevention measures, and user experience optimization. This blog post is intended to help provide that technical understanding for companies looking to evolve their payments stack.

Why Does 3D Secure Matter?

Traditional online card payments rely on static credentials—card number, expiration date, CVV—that can be compromised if exposed. This vulnerability can lead to increased fraud, operational costs from handling chargebacks, and complex disputes. By involving the card issuer in the authentication process, 3DS introduces dynamic, context-based checks to confirm identity. This not only reduces fraudulent activity but also supports compliance efforts with emerging regulatory frameworks that mandate stronger customer authentication (including the actual “Strong Customer Authentication” requirements under Europe’s PSD2). Over time, 3DS has evolved to integrate more subtle and user-friendly verification methods (like frictionless authentication), providing an infrastructure that aligns security with evolving payment expectations.

A Quick Primer: The “3 Domains” Explained

The name “3D Secure” hints at the underlying mechanics of the protocol. The name comes from the three distinct domains involved in the authentication process:

  1. Acquirer Domain: The merchant’s bank and associated payment gateway that initiates and processes the transaction (alongside a 3D Secure Server, sometimes (mis)named a Merchant Plug-in or MPI).
  2. Issuer Domain: The cardholder’s bank, equipped with an Access Control Server (ACS) that performs the actual authentication step.
  3. Interoperability Domain: The card network infrastructure that manages communication and data exchange, routing messages between acquirers and issuers and ensuring that the correct ACS is identified. In 3DS-speak, this is called the Directory Server.

These three entities coordinate in real-time to authenticate the transaction. The acquirer requests authentication, the issuer validates identity, and the card network provides the secure messaging environment that connects all parties. This differentiates 3DS payment flows from traditional card payment flows, which rely on static credentials—card number, expiration date, CVV—that can be easily exploited if exposed.

A Brief History of 3D Secure

3DS traces its roots back to 1999, originating as a Visa product (then under the codename “p42” and designed by Celo Communications). Over time, other major card brands adopted the concept, each under their own branding:

  • Visa: Verified by Visa (now Visa Secure)
  • Mastercard: SecureCode (now Mastercard Identity Check)
  • American Express: SafeKey
  • Discover: ProtectBuy
  • JCB: J/Secure

3DS 1.0:The first version introduced a standardized browser redirect flow. It was groundbreaking for its time since it added a security layer that simply didn’t exist before. But it had drawbacks—clunky pop-ups, static passwords, and an inconsistent user experience, often causing shoppers to abandon their carts.

3DS 2.0 and Beyond:Later versions of 3DS leaned into richer data sharing between merchant and issuer and supported mobile and in-app purchases. The goal: minimize friction and reduce the number of times a user must explicitly confirm their identity. The new standards enabled risk-based authentication, allowing many transactions to be authenticated silently in the background.

The Anatomy of a 3D-Secure Authentication

The 3DS technical standards are set by EMVCo and detailed here [LINK]. If you’re unfamiliar with EMVCo, it’s an industry consortium jointly owned by major payment networks—Visa, Mastercard, American Express, Discover, JCB, and UnionPay. Its primary mission is to facilitate and promote global interoperability and security of payment transactions. Although EMVCo is best known for the EMV chip specifications that govern smart card transactions at physical points of sale, it also oversees various other payment security standards, including 3D-Secure.

It’s also important to distinguish 3DS authentication from the actual payment authorization. They’re two separate processes managed by entirely different systems. 3DS happens first—if required—to establish that the customer is the legitimate cardholder. Only after successful authentication does the normal authorization request occur. (In theory you could perform 3DS after a payment authorization, but it would not provide the same benefits). This decoupling allows for maximum flexibility, with different vendors or infrastructure handling each phase independently.

Below is a step-by-step overview of the 3D Secure flow:

  1. Transaction Initiation:Once card details are submitted during checkout, the merchant’s payment system requests authentication by sending details to a 3D Secure Server (integrated by the merchant or PSP), which in turn passes the authentication request to the relevant Directory Server—normally operated by the card network.
  2. Directory Server Look-Up:The directory server checks whether the card is enrolled in 3DS and identifies the appropriate issuer’s Access Control Server (ACS). If the card is not enrolled, the transaction proceeds without the 3DS layer.
  3. Issuer Assessment:The ACS, controlled by the issuer or its delegated provider, evaluates risk using various data points: device characteristics, transaction amount, location, and historical card usage patterns. This data is generally collected directly from the user’s browser by sending a request to the ACS Method URL within a hidden iframe on the page. This step leverages additional data fields introduced in newer 3DS versions (the latest standard is version 2.3.1), enabling more nuanced decision-making.
  4. Frictionless vs. Challenge Flows vs. Decoupled
    • Frictionless Flow: If the ACS deems the transaction low-risk, it responds immediately with an authentication approval. The customer generally sees no interruption, and the payment proceeds seamlessly.
    • Challenge Flow: If risk signals are higher, the ACS requests a challenge—often a one-time password, biometric confirmation, or app-based verification. The cardholder must complete this challenge before the transaction can continue. The challenge page is generally a small page which is designed and served by the ACS, and intended to be embedded within an iframe on the merchant’s checkout page.
    • Decoupled Flow: The issuer may authenticate the user outside the immediate session, perhaps via SMS or email after the purchase attempt. This method is less common and significantly less well-supported across ACS providers, but it can be useful for authentications where the cardholder is not necessarily present on a webpage — such as in a telephone-order scenario.
  5. Result & Authorization:Once authentication is confirmed, the ACS sends its response back through the directory server to the merchant’s payment service. With a successful authentication in hand, the merchant’s system proceeds to the normal authorization step, where the issuer either approves or declines the transaction based on standard credit and fraud checks.


There are important differences between CIT (Customer-Initiated Transaction) vs. MIT (Merchant-Initiated Transaction). A CIT is a purchase started by the cardholder (like checking out in an online store), while an MIT might be a recurring or subscription payment initiated by the merchant without the cardholder’s immediate presence.

A successful 3DS authentication returns data elements like the ECI (Electronic Commerce Indicator) and a cryptogram (CAVV or AAV). These indicate whether liability shifts to the issuer for fraud-related chargebacks and confirm the transaction’s authenticated status. Essentially, authentication says “this cardholder is who they say they are,” while authorization later confirms “they have the funds or credit to cover this purchase.”

The Impact of 3D Secure on Payment Operations

Integrating 3DS influences multiple aspects of the payment ecosystem. Fraud management becomes more data-driven, potentially lowering both financial and operational overhead associated with chargebacks. Authentication steps can improve trust, thereby reducing disputes and manual reviews over time. Meanwhile, the technical infrastructure supporting 3DS—APIs, SDKs, and server integrations—must be reliable, scalable, and performant to ensure that verification is both secure and swift.

Continuous monitoring of key metrics, such as authentication times, challenge rates, and fallback scenarios, can inform adjustments in both technology and policy. Over time, optimizing these details helps maintain a stable equilibrium between security, cost-effectiveness, and a smooth checkout experience.

Geographic Adoption and Regional Nuances

The adoption and enforcement of 3D Secure vary notably across regions, influenced by regulatory mandates, market maturity, and local consumer preferences.

  • Europe:The European Economic Area (EEA) and the UK have seen significant growth in 3DS adoption driven by the regulatory framework known as PSD2 (Payment Services Directive 2) and its Strong Customer Authentication (SCA) requirements. Under SCA, most online card payments must undergo enhanced authentication. This regulatory push has led to near-ubiquitous implementation of 3DS by issuers and acquirers across Europe. As a result, European customers and merchants have become accustomed to occasional authentication prompts, and the region has developed more refined and seamless 3DS implementations, including mobile-friendly and biometric options.
  • North America:In the United States and Canada, regulatory requirements around authentication are less prescriptive than in Europe. 3DS use is more discretionary, typically tied to a merchant’s risk management strategies rather than a legal mandate. While large issuers and networks support 3DS, its deployment often depends on the merchant’s appetite for additional authentication steps versus the potential friction introduced. Some U.S. e-commerce players rely on advanced machine learning-based fraud tools and selectively implement 3DS for higher-risk segments rather than making it a blanket requirement.
  • Asia-Pacific (APAC):Adoption in the APAC region is mixed. Countries like Australia and Singapore show increasing use of 3DS as part of a broader emphasis on secure digital payment rails, while markets with less regulatory pressure may still consider it optional. In mobile-first economies, where a significant portion of e-commerce is done via smartphone, 3DS 2.0’s mobile-friendly features help reduce friction. However, localized payment methods—like bank transfers, wallets, and super-app ecosystems—sometimes overshadow card-based payments, influencing the overall penetration of 3DS.
  • Latin America (LATAM) and Middle East & Africa (MEA):These regions present a patchwork of adoption levels. In some markets, high card fraud rates incentivize issuers and merchants to embrace 3DS for risk mitigation. On the other hand, factors like low card penetration, reliance on alternative payment methods, and varying regulatory environments can slow widespread adoption. For example, in markets where cash-on-delivery, local bank transfers, or digital wallets dominate, the incremental value of 3DS may be less clear.

Overall, while the technology underpinning 3DS is global, its rollout and impact are shaped heavily by local factors. Regulatory mandates, market maturity, consumer behavior, and the competitive landscape of payment types all influence how widely and smoothly 3DS is integrated within any given region. Understanding these distinctions can help tailor authentication strategies that align with local expectations and requirements

Common Pitfalls and Gotchas

  • Acquirer BIN vs. MID Confusion:The identifiers used for 3DS authentication don’t necessarily need to match those used for the final authorization. This can be a point of confusion and needs careful configuration and coordination.
  • Challenges as Optional Steps (Outside Europe):Merchants and issuers can sometimes skip the challenge step if the transaction is low-risk. However, in places like Europe, SCA rules mean challenges are more routinely required unless an exemption applies.
  • Chargeback Protection Limitations:Liability shift applies mainly to fraud chargebacks (e.g., unauthorized transactions). It doesn’t protect against disputes like “goods not as described.”
  • Exemptions and High-Risk MCCs:Certain merchant category codes (MCCs) or transaction types may face exceptions or additional scrutiny.
  • Reusing Cryptograms:Under certain conditions, cryptograms generated during 3DS authentication may be reused for subsequent related transactions, particularly in MIT scenarios.

The Benefits of 3D Secure

3DS provides several strategic advantages:

  • Liability Shift: For authenticated transactions that meet the right criteria, issuers absorb some fraud-related chargeback liability. Specifically, any chargebacks with fraud reason codes are blocked from being filed.
  • Fraud Reduction: By authenticating cardholders, you reduce the risk of stolen card details being used as cards used need to be authenticated using a second factor (unless the issuer’s risk-based authentication is overly permissive)
  • Regulatory Compliance: In regions with Strong Customer Authentication mandates, 3DS helps meet these requirements.

Looking Ahead: A More Intelligent Authentication Layer

3D Secure is not static. Ongoing refinements are making it more adaptive, leveraging machine learning models, real-time risk intelligence, and biometric technologies. As online transactions continue to rise in volume and variety, 3DS will likely become an increasingly invisible and data-driven layer of protection. Future iterations may offer even tighter integration with tokenization frameworks, automated compliance checks, and cross-channel identity insights.

By understanding the technical underpinnings and operational considerations of 3DS, it’s possible to build a stable authentication framework that meets regulatory standards, mitigates fraudulent activity, and enhances the integrity of online payment operations.

Join our live webinar on Wednesday Jan 29th

If you're looking to leverage 3D-Secure to improve your payment security, for you and your customers, this session is for you!

Register Now
Shane Curran

Founder, CEO

Related Posts