The Berlin Group Logo

The Berlin Group openFinance API Framework
Foundational course

Module 1: Architectural and Security Foundations

A robust understanding of the openFinance API Framework begins with its architectural principles and security model. These foundational elements are consistent across all services and are essential for building secure and interoperable solutions.

Guiding Principles: A RESTful, Resource-Oriented, and ISO 20022-Based Architecture

The framework is intentionally designed using modern, widely accepted industry standards to ensure ease of use, interoperability, and future-readiness.

RESTful APIs: The specifications define a set of RESTful APIs. This architectural style uses the standard methods of the Hypertext Transfer Protocol (HTTP/1.1 or higher) for communication and relies on JavaScript Object Notation (JSON) as its primary data format. This approach is familiar to the vast majority of software developers and aligns with modern web service design.

Resource-Oriented Approach: The API is designed around the concept of "resources." Financial concepts like payments, accounts, and consents are modelled as distinct resources, each with a unique identifier (URI) and a defined lifecycle. TPPs interact with these resources using standard HTTP verbs: POST to create a new resource (e.g., initiate a payment), GET to retrieve its state, PUT to update it, and DELETE to remove it. This resource-oriented design provides a logical and consistent structure for all interactions.

ISO 20022 Alignment: To ensure that all participants in the ecosystem have a common understanding of the data being exchanged, the framework's data model is based on the ISO 20022 dictionary. ISO 20022 is the global standard for financial messaging, providing a common semantic language for data elements. This alignment is critical for achieving true interoperability and simplifies the process for banks to map API data fields to their internal core systems.

Key Roles and Terminology

The framework documentation uses precise terminology to define the actors in the ecosystem:

The Security Framework: A Multi-Layered Approach

Security is the paramount concern in open finance, and the Berlin Group framework implements a multi-layered, defense-in-depth security model mandated by the EBA RTS.

Transport Layer Security: All communication between the TPP and the ASPSP must be secured using Transport Layer Security (TLS) version 1.2 or higher. A critical requirement is the use of mutual TLS (mTLS), where both the client and the server must present a valid certificate to authenticate each other before a secure channel is established. This prevents man-in-the-middle attacks and ensures both parties are who they claim to be.

eIDAS Certificates: The foundation of trust and identity within the European financial ecosystem is the eIDAS regulation. TPPs are required to identify themselves using qualified certificates issued in accordance with this regulation. Specifically, they must use:

Application-Level Message Signing: As an additional security measure, the framework specifies a mechanism for the TPP to digitally sign parts of the HTTP request, typically the headers. This is done using JSON Web Signature (JWS) as defined in [RFC7515] (JSON Web Signature) and [ETSI TS 119 182-1] (JAdES profile of ETSI). This signature provides the ASPSP with cryptographic proof that the request has not been tampered with in transit and that it originated from the TPP holding the corresponding qualified certificate.

The framework's flexibility in supporting different Strong Customer Authentication (SCA) models was a pragmatic and crucial design choice that greatly contributed to its widespread adoption. Financial institutions across Europe had already invested heavily in their own unique and secure online authentication systems long before PSD2 was enacted. Mandating a single, rigid SCA method would have created a significant technical and financial barrier, likely leading to implementation delays and resistance. The Redirect SCA model, in particular, offered a path of least resistance. It cleverly allows an ASPSP to continue using its existing, trusted, and compliant authentication infrastructure. The TPP simply redirects the PSU to the ASPSP's familiar and secure environment, where the ASPSP handles the entire authentication process. The TPP never needs to handle the PSU's sensitive credentials. This approach dramatically lowered the implementation burden for ASPSPs, accelerating their ability to comply with PSD2 and contributing to the NextGenPSD2 framework becoming a European standard. It was a design that prioritised interoperability at the data exchange level while accommodating necessary diversity at the user authentication level.

Deep Dive: Strong Customer Authentication (SCA) Flows

PSD2 mandates the use of SCA for sensitive operations such as accessing account data or initiating a payment. The Berlin Group framework provides several standardised flows to accommodate the diverse authentication methods used by ASPSPs across Europe.

Module 1 Quiz

1. What is the primary role of the Berlin Group?

  • A. To implement API solutions for banks.
  • B. To act as a regulatory body enforcing PSD2.
  • C. To define open and common technical standards for interoperability.
  • D. To provide commercial API aggregation services.

2. Which of the following is a mandatory requirement for a TPP to identify itself at the transport layer when connecting to an ASPSP under the Berlin Group framework?

  • A. A simple API key and secret.
  • B. An eIDAS Qualified Website Authentication Certificate (QWAC).
  • C. An OAuth 2.0 access token.
  • D. A username and password combination.

3. In the context of the Berlin Group SCA flows, which model is designed to allow the ASPSP to reuse its existing online banking authentication environment without the TPP ever handling PSU credentials?

  • A. Embedded SCA
  • B. Decoupled SCA
  • C. OAuth SCA
  • D. Redirect SCA

4. The data models and elements within the openFinance API Framework are semantically based on which international standard?

  • A. SWIFT MT
  • B. FIX Protocol
  • C. ISO 20022
  • D. XML Schema Definition (XSD)