Contact salesSign inSign up
AuthsignalAuthsignal
Product
Passwordless / multi-factor authentication (MFA)
Drop-in authentication
Risk-based authentication
Passkeys
Biometric authentication
WhatsApp OTP
Authenticator apps (TOTP)
Push authentication
SMS OTP
Email OTP
Magic links
See all authenticators
See less authenticators
Palm biometrics
Contactless payments & identity verification
Flexible integration modes
Pre-built UI
Low code
UI components
Customizable
Custom UI
Flexible
Digital credentials API Beta
Authenticate customers instantly using digital credentials
Session management
Keep users signed in across web and mobile after authentication
Fraud Controls
Rules and policies engine
Step-up authentication
No-code rule creation
Risk alerts
User observability
Audit trails
Dynamic linking
Why Authsignal?
Complete authentication infrastructure from enrollment to step-up auth, modular by design
Solutions
By USE CASE
View All
Account takeovers (ATO)
Go passwordless
Call center
SMS cost optimization
Existing apps
QR code payments
Step-up MFA
Palm biometrics payments
By INDUSTRY
View All
Financial services
Marketplace
e-Commerce
FinTech
Crypto
Healthcare
By Integration (identity provider)
Amazon Cognito
Azure AD B2C
Duende IdentityServer
Keycloak
Auth0
NextAuth.js
Custom identity provider
By ROLe
Engineers
Product
Passwordless / Multi-factor Authentication (MFA)
Flexible Integration Modes
Pre-built UI · Low code
UI Components · Customizable
Custom UI · Flexible
Digital credentials API Beta
Authenticate customers instantly using digital credentials
Session management
Issue JWT access and refresh tokens
Why Authsignal?
Plug in Authsignal to elevate your IDP — effortless integration with any architecture.
Drop-in Authentication
Risk-based authentication
Passkeys
Biometric authentication
WhatsApp OTP
SMS OTP
Email OTP
Magic links
Authenticator apps (TOTP)
Push notifications
Palm Biometrics
Contactless payments & identity verification
Fraud Controls
Rules and Policies Engine
Step-up Authentication
No Code Rule Creation
Risk Alerts
User Observability
Audit Trails
Use Cases
Financial services
Account takeovers (ATO)
Marketplace
Go passwordless
e-Commerce
Solutions
By Use Case
Account takeovers (ATO)
Go passwordless
Call center
SMS cost optimization
Existing apps
QR code payments
Step-up MFA
Palm Biometric Payments
View all Use Cases
By Industry
Financial services
Marketplace
e-Commerce
FinTech
Crypto
Healthcare
View all Industries
By Integration (identity provider)
Amazon Cognito
Azure AD B2C
Duende IdentityServer
Keycloak
Auth0
NextAuth.js
Custom identity provider
By Role
Engineers
PricingAboutDocsBlog
Schedule a call
Try Authsignal
AUS Flag

Authsignal secures millions of passkey transactions out of our hosted Sydney region.

AUS Flag

Authsignal secures millions of passkey transactions out of our hosted Sydney region.

Join us today!
Right icon
Blog
/
Current article
Passkeys
PSD2 SCA
Implementation
Compliance
Guides

How to meet PSD2 Strong Customer Authentication (SCA) dynamic linking requirements with Authsignal.

Hamish Meikle
⬤
May 14, 2025
Share
How to meet PSD2 Strong Customer Authentication (SCA) requirements using passkeys with Authsignal

What is PSD2? What are the PSD2 revisions?

The second Payment Services Directive (PSD2), adopted in 2015, sets rules for retail payments in the EU, both euro and non-euro, domestic and cross-border. PSD2 builds on the first Payment Services Directive (PSD1) from 2007, which created a harmonized legal framework for an integrated EU payments market.

In 2022, the European Commission evaluated PSD2, focusing on charges, scope, thresholds, and access to payment systems. One of its critical components is the Strong Customer Authentication (SCA) requirement, designed to increase the security of electronic payments and reduce fraud.

How to comply with PSD2's Strong Customer Authentication (SCA)?

This step-by-step guide is designed to show how merchants and payment service providers can implement authentication challenges in order to comply with PSD2's Strong Customer Authentication (SCA) dynamic linking requirements while also ensuring a seamless customer experience by using passkeys with Authsignal.

Key Points of Strong Customer Authentication (SCA):

  1. Purpose:
    • To enhance security for online payments and transactions.
    • To reduce fraud and increase consumer trust in electronic payments.
  2. Requirements:
    • SCA mandates the use of two or more independent elements from the following categories:
      • Knowledge: Something the user knows (e.g., password, PIN).
      • Possession: Something the user has (e.g., mobile phone, hardware token).
      • Inherence: Something the user is (e.g., fingerprint, facial recognition).
  3. Applicability:
    • Applies to electronic payments within the European Economic Area (EEA).
    • Covers online transactions, bank transfers, and access to payment accounts.
  4. Exemptions:
    • Low-value transactions (under €30).
    • Recurring transactions (after the first SCA-protected payment).
    • Transactions with trusted beneficiaries (after initial SCA).
    • Low-risk transactions based on real-time fraud analysis.
  5. Implementation:
    • Financial institutions and payment service providers must comply with SCA requirements.
    • Retailers must ensure their payment processes support SCA, impacting user experience.
  6. Impact:
    • Enhances security and trust in digital payment systems.
    • Introduces challenges for merchants and payment service providers in ensuring compliance while maintaining a smooth customer experience.
    • Encourages the adoption of advanced authentication technologies.

SCA is a critical element of PSD2, which aims to secure electronic payments, safeguard consumers against fraud, and foster innovation in the financial sector.

In this blog, we'll demonstrate how Authsignal can help you meet the SCA requirement, including the critical aspect of dynamic linking, using passkeys, and contextual messaging.

Creating an action for a user payment.

Let’s create an action configuration for our payment action and head to the Rules section.

Payments that are under €30 are exempt from the PSD2 Strong Customer Authentication requirement. Therefore we can create a rule to require authentication when the payment amount exceeds €30.

Implementing dynamic linking with contextual messaging

Dynamic linking is a crucial component of the Strong Customer Authentication (SCA) requirements under the Revised Payment Services Directive (PSD2). It ensures that electronic payment transactions are securely linked to specific transaction details, enhancing the security of the transaction process.

Authsignal’s contextual messaging feature takes care of the following aspects:

  • Dynamic linking requires that the authentication process is uniquely tied to the amount of the transaction and the payee.
  • Payment service providers must ensure that users can clearly see and verify transaction details during the authentication process.

When a user has been required to strongly authenticate before making their payment, we can utilize contextual messaging to show the user the transaction details.

In the contextual messaging section for your payment action configuration, you can create and preview a message that your users will see when authenticating.

We used a custom data point called, paymentAmount , in our Require SCA rule. Any custom data points we use in our action’s rules are available to be inserted into our contextual message.

Integrating the payment action into your application

Now that we have our payment action configured to meet the SCA requirement let’s add it to our e-commerce application.

Visit the Integration tab to get a snippet that you can add to your code, e.g.

const { url } = await authsignal.track({
  userId: user.id,
  action: "payment",
  redirectUrl: "<https://yourapp.com/callback>",
  custom: {
    paymentAmount: payment.amount,
  },
});

Then follow our Using the pre-built UI guide to finish off your integration.

Demo of Strong Customer Authentication (SCA) using passkeys with Authsignal

With our integration complete, we can see that the user is being required to strongly authenticate with a passkey. The transaction details are also presented to the user: “Authenticate before proceeding with your payment of $262”.

By leveraging Authsignal, businesses can efficiently meet PSD2's Strong Customer Authentication (SCA) requirements, including dynamic linking, to ensure secure and compliant transactions. Authsignal's advanced authentication solutions, such as passkeys, enhance security, reduce fraud, and provide a smooth user experience, making it an essential tool for navigating the complexities of modern digital payments.

Create a free account and start integrating passkeys with Authsignal.

Question icon
Have a question?
Talk to an expert
NewsletterDemo PasskeysView docs
Passkeys
PSD2 SCA
Implementation
Compliance
Guides

You might also like

How to add push authentication to your app with Authsignal and React Native
Push authentication
React native
Node.js
Multi-factor authentication
Guides

How to add push authentication to your app with Authsignal and React Native

March 27, 2026
BSP Circular 1213: Philippine banks must replace SMS OTPs by June 2026
BSP Circular 1213
Philippine banking
SMS OTP
Risk based authentication

BSP Circular 1213: Philippine banks must replace SMS OTPs by June 2026

March 18, 2026
How to add adaptive MFA and passkeys to any web app with Authsignal and Lambda@Edge
AWS
Authentication
Security

How to add adaptive MFA and passkeys to any web app with Authsignal and Lambda@Edge

March 10, 2026

Secure your customers’ accounts today with Authsignal

Passkey demoCreate free account

Authsignal delivers passwordless and multi-factor authentication as a service. Focused on powering mid-market and enterprise businesses to rapidly deploy optimized good customer flows that enable a flexible and risk-based approach to authentication.

AICPA SOCFido Certified
LinkedInTwitter
Passwordless / multi-factor authentication (MFA)
Pre-built UI (low code)UI components (customizable)Custom UI (flexible)
Why Authsignal?
Drop-in authentication
Risk-based authentication PasskeysBiometric authenticationWhatsApp OTPSMS OTPEmail OTPMagic linksAuthenticator apps (TOTP)Push authenticationPalm biometricsDigital Credential Verification API
Rules and policies engine
User observability
Industries
Financial services
Marketplace
e-Commerce
FinTech
Crypto
View all industries
Teams
Engineers
Use cases
Account takeovers (ATO)
Go passwordless
Call center
SMS cost optimization
Existing apps
View all use cases
Identity providers (IDPs)
Amazon Cognito
Auth0
Azure AD B2C
Custom identity provider
Duende IdentityServer
Keycloak
NextAuth.js
Integrations
ASP.NET
C#
Java
Node.js
Open ID Connect (OIDC)
PHP
Python
React
Ruby
Ruby on Rails
Compare
Twilio Verify vs AuthsignalAuth0 vs AuthsignalAWS Cognito vs Authsignal + AWS Cognito
Resources
BlogDeveloper docsFree Figma mobile passkeys templateFree Figma desktop passkeys templateFree Figma webapp passkeys template
Company
About usWhy AuthsignalCareersPress releasesPartnersContact us
What is
SMS OTP
Risk Based Authentication
IP Spoofing
Passwordless authentication
Multi-Factor Authentication (MFA)
United States
+1 214 974-4877
Ireland
+353 12 676529
Australia
+61 387 715 810
New Zealand
+64 275 491 983
© 2026 Authsignal - All Rights Reserved
Terms of servicePrivacy policySecuritySystem statusCookies