5. Temenos Digital Mobile Banking with HID Approve SDK & RMS

5.1 Registration (Mobile Channel Only)

  1. Customer has received the customer ID and Activation Code using the Temenos components.

  2. Customer installs the banking mobile application and launches it.

  3. Customer is prompted to enter the customer ID and Activation Code.


  4. Customer enters the customer ID and Activation Code.

  5. Activation code is successfully validated on the HID Authentication Service.

  6. Customer’s device is provisioned, and the registration process begins.

  7. Customer is prompted to add the PIN.

  8. Customer is prompted to enable Biometrics.

  9. Customer device registration is completed.

5.2 Login Web Channel (Secure Code)

  1. Customer accesses the online banking application.

  2. Online banking application requests JS probe and session data from RMS.

    1. RMS generates session data and returns it to Online banking application.

    2. Online banking application caches session data and sends data gathered by probe to RMS.

  3. Customer chooses the option to log in with Secure Code.

  4. Customer is prompted to enter the customer ID and Secure Code.

  5. Customer launches the mobile application.

  6. Mobile application checks the key validity and initiates Approve SDK key renewal if the keys are about to expire (prompt the user for PIN or Biometrics).

  7. Key renewal successful message is displayed to the customer.

  8. Customer selects the option to generate Secure Code.

  9. If Biometrics is enabled else go to the next step.

    1. Mobile application calls the HID Approve SDK to generate Secure Code.

    2. Customer is prompted to provide biometrics.

    3. Customer provides biometrics (e.g., TouchID or FaceID).

    4. HID Approve SDK returns Secure Code.

    5. Mobile application displays Secure Code to customer.

  10. Mobile application prompts the customer to enter the PIN.

    1. Customer enters PIN.

    2. Mobile application requests the HID Approve SDK to generate Secure Code.

    3. HID Approve SDK returns Secure Code.

    4. Mobile application displays Secure Code to customer.

  11. Customer enters the Secure Code in the online banking application.

  12. Secure Code is validated against the HID Authentication Service.

  13. Online banking application calls RMS to create session and get risk data (allow, step-up, block).

5.3 Login Web Channel (Scan 2 Approve - Explicit)

  1. Customer accesses the online banking application.

  2. Online banking application requests JS probe and session data from RMS.

    1. RMS generates session data and returns it to Online banking application.

    2. Online banking application caches session data and sends data gathered by probe to RMS.

  3. Customer chooses the option to log in.

  4. Customer is prompted to scan the QR code (Scan 2 Approve).

  5. Customer launches the mobile application.

  6. Mobile application checks the key validity and initiates Approve SDK key renewal if the keys are about to expire else go to the next step.

  7. Customer selects the option to scan the QR Code (Scan 2 Approve) to log in.

  8. If Biometrics is enabled else go to the next step.

    1. Customer is prompted to provide biometrics.

    2. Customer provides biometrics (e.g., TouchID or FaceID).

    3. Mobile application displays login information to the customer.

    4. Customer Approves or Declines the login attempt.

  9. Mobile application prompts the customer to enter the PIN.

    1. Customer enters PIN.

    2. Mobile application displays login information to the customer.

    3. Customer Approves or Declines the login attempt.

  10. HID Approve SDK signs and sends the signed login transaction to HID Authentication Service for validation.

  11. HID Authentication Service sends the customer transaction feedback to the online banking application.

  12. Online banking application calls RMS to create session and get risk data (allow, block).

  13. Customer is logged in successfully.

5.4 Login Mobile Channel (Secure Code)

  1. Customer launches the mobile application.

  2. Mobile application checks the key validity and initiates Approve SDK key renewal if the keys are about to expire (prompt the user for PIN or Biometrics).

  3. Key renewal successful message is displayed to the customer.

  4. HID RMS SDK requests session data from RMS.

    1. RMS generates session data and returns it to HID RMS SDK.

    2. HID RMS SDK caches session data.

  5. Mobile application displays the username based on the service or container already registered using the Approve SDK.

  6. Customer clicks on Next to log in to the mobile application (only required if multiple containers are found).

  7. Mobile application checks if biometrics is enabled for the service.

  8. If Biometrics is enabled else go to the next step.

    1. Mobile application calls the HID Approve SDK to generate Secure Code.

    2. Customer is prompted to provide biometrics.

    3. Customer provides biometrics (e.g., TouchID or FaceID).

    4. HID Approve SDK sends the Secure Code and validated against the HID Authentication Service.

  9. Mobile application prompts the customer to enter the PIN.

    1. Customer enters PIN.

    2. Mobile application requests the HID Approve SDK to generate Secure Code.

    3. HID Approve SDK sends the Secure Code to validate against the HID Authentication Service.

  10. Secure Code is validated against the HID Authentication Service.

  11. Mobile application sends session and user data to Temenos Digital.

  12. Temenos Digital calls RMS to create session and get risk data (allow, block).

  13. Note: In the mobile channel, Secure Code authentication can also be used by customers to authorize any non-financial transactions such as updating a mobile number or email address, etc.

5.5 Transaction Web Channel (Push-based)

  1. Customer initiates transaction in the online banking application.

  2. Online banking application calls RMS to create payment and get risk data (allow, step-up, block).

  3. Note: This workflow can also be used for any non-financial transactions such as updating a mobile number or email address, etc.

5.6 Transaction Web Channel (Offline Secure Code)

  1. Customer initiates transaction in the online banking application.

  2. Online banking application calls RMS to create payment and get risk data (allow, step-up, block).

  3. Transaction completed successfully.

5.7 Transaction Mobile Channel (Secure Code or Signature)

  1. Customer initiates transaction in the mobile banking application.

  2. Mobile application sends session and transaction request to Temenos Digital.

  3. Temenos Digital calls RMS to create payment and get risk data (allow, step-up, block).

  4. Transaction completed successfully.

5.8 Forgotten HID Approve PIN or Locked PIN or Device Lost or Stolen

  1. If a customer has forgotten the PIN for HID Approve SDK or has locked the HID Approve SDK service by entering an incorrect PIN value, it is not possible to recover the PIN and the customer must re-register the HID Approve SDK service on this device. Similarly, if a customer has lost their device or the device is stolen, they must re-register the new device. In both cases above customer needs a new Activation Code so they can re-register.

  2. If the customer has a second device registered, they can log in to web or mobile banking using the secondary device, authorize the action using the same device, and request a new Activation Code. Please note that this requires Temenos Digital to integrate with Spotlight so a new Activation Code request can be made. If the customer has only a single device registered, then they must contact the bank help desk to reset their account and request a new Activation Code. Please note that Spotlight integration is out of scope for HID Global.

5.9 Additional Device Registration

  • Registering an additional device requires a new Activation Code. Customers can log in to web or mobile banking using the secondary device, authorize the action using the same device, and request a new Activation Code. Please note that this requires Temenos Digital to integrate with Spotlight so a new Activation Code request can be made. Please note that Spotlight integration is out of scope for HID Global.

5.10 Device Management Web

  1. Login to the web or mobile banking applications.

  2. Go to the device management menu and initiate the action of suspending or deleting a device.

    Note: If a customer only has one registered device, sufficient warning must be provided to say that they will be unable to log in to banking channels after continuing this action. They will need to contact the bank for assistance.
  3. Online banking application calls RMS to create action and get risk data (allow, step-up, block).

  4. Note: If the customer does not have internet access on the mobile device the bank can provide an option to customers so they can authorize the action by authenticating using Secure Code.

5.11 Secure Code Authentication Policy Reset Failure Counter

  • A Secure Code authentication policy on the HID Authentication Service can be blocked due to customers entering incorrect Secure Codes for authentication to web or mobile banking channels. Even if a customer has multiple devices registered login from all devices will be impacted if the authentication policy on the backend is blocked. The customer must contact the bank help desk so the bank can reset the failure counter of the authentication policy from Spotlight. It is recommended that the bank staff perform Identity and Verification before resetting the failure counter. Please note that Spotlight integration is out of scope for HID Global.

Note: If Spotlight does not have the functionality, it is recommended that the system integrator updates the component to support it.

5.12 Push Authentication Policy Reset Challenge Counter

  • It is possible to configure the number of times a customer can request push notifications on the HID Authentication Service without actioning the push request. This configuration prevents the bank customers from being exposed to DDOS attacks. If this is configured to a limited number of requests and the customer has exceeded the threshold then they will not be able to request for push notifications anymore. The customer must contact the bank help desk so the bank can reset the failure counter of the push authentication policies from Spotlight. It is recommended that the bank staff perform Identity and Verification before resetting the challenge counter.

    Note: If Spotlight does not have the functionality, it is recommended that the system integrator updates the component to support it.

5.13 Change HID Approve SDK Service PIN

  1. Customer logs in to the Mobile Application.

  2. Customer requests to change the PIN in the mobile application.

  3. Mobile application prompts the customer to enter their old PIN and create a new PIN.

  4. Customer enters old and new PIN.

  5. Mobile application requests HID Approve SDK to change the PIN.

  6. HID Approve SDK updates the PIN.

  7. PIN change is completed successfully.

Note: Please note that this workflow can also be made applicable or implemented if the PIN policy for the HID Approve SDK Service is set to expire after N number of days. If the PIN expires then the mobile application should handle the exception and take the customer through the same process so they can set the new PIN.