6. Temenos Digital Web Banking with PIN (or Password) & SMS Secure Code & RMS

6.1 Registration (SMS Authentication)

  1. Customer has received the customer ID and Activation Code using the Temenos components.

  2. Customer is prompted to enter the customer ID and Activation Code.

  3. Customer enters the customer ID and Activation Code.

  4. Activation code is successfully validated on the HID Authentication Service.

  5. Customer is prompted to add password.

  6. Customer's password is submitted.

  7. Password is stored securely on HID Authentication Service.

  8. Customer is sent the SMS Secure Code to the registered mobile number.

  9. Customer enters the Secure Code in the online banking application.

  10. Secure Code authenticated successfully.

  11. Customer has successfully registered for SMS-based authentication.

6.2 Login Web Channel (SMS)

  1. Customer accesses the online banking application.

  2. Online banking application requests JS probe and session data from RMS.

    1. RMS generates session data and returns it to Online banking application.

    2. Online banking application caches session data and sends data gathered by probe to RMS.

  3. Customer chooses the option to log in with SMS Secure Code.

  4. Customer is prompted to enter the customer ID and Password.

  5. Customer enters the customer ID and Password.

  6. Customer ID and Password are sent to HID Authentication Service for validation.

  7. If successful, the customer is sent an SMS Secure Code to their registered mobile number.

  8. Web online banking application prompts the customer to enter SMS Secure Code.

  9. Customer enters the received SMS Secure Code in the online banking application.

  10. SMS Secure Code is sent to the HID Authentication Service for validation.

  11. Online banking application calls RMS to create session and get risk data (allow, step-up, block).

  12. Customer is logged in successfully.

6.3 Transaction Web Channel (SMS Signature)

  1. Customer initiates transaction in the online banking application.

  2. Online banking application calls RMS to create payment and get risk data (allow, step-up, block).

  3. Note: This workflow can also be used for any non-financial transactions such as updating a mobile number or email address, etc.

6.4 Change PIN or Password

  1. Customer initiates SMS PIN or Password change in the online banking application.

  2. Online banking application calls RMS to create action and get risk data (allow, step-up, block).

6.5 Forgotten PIN or Password

The customer can't recover their forgotten or lost SMS PIN. Customer must contact the bank and request for their account to be reset. Upon reset customer will be sent a new Activation Code so they can re-register for SMS-based authentication to online banking.

Note: If Spotlight is not capable of handling the SMS-based authentication and PIN/Complex password policies, it is recommended that the system integrator updates the component to support the functionality.

6.6 Expired PIN or Password

  1. Customer accesses the online banking application.

  2. Online banking application requests JS probe and session data from RMS.

    1. RMS generates session data and returns it to Online banking application.

    2. Online banking application caches session data and sends data gathered by probe to RMS.

  3. Customer chooses the option to log in with SMS Secure Code.

  4. Customer is prompted to enter the customer ID and PIN.

  5. Customer enters the customer ID and PIN.

  6. Customer ID and PIN are sent to HID Authentication Service for validation.

  7. HID Authentication Service returns a response that the PIN or Password has expired.

  8. Infinity prompts the customer to enter a new PIN or Password..

  9. Infinity sends the new password to the HID Authentication Service to store it securely.

  10. Customer is prompted to enter the new PIN or Password.

  11. The new PIN or Password is sent to the HID Authentication Service for validation.

  12. If successful, the customer is sent an SMS Secure Code to their registered mobile number.

  13. Web online banking application prompts the customer to enter SMS Secure Code.

  14. Customer enters the received SMS Secure Code in the online banking application.

  15. SMS Secure Code is sent to the HID Authentication Service for validation.

  16. Online banking application calls RMS to create session and get risk data (allow, step-up, block).

6.7 SMS Authentication Policy Reset Failure Counter

An SMS Secure Code authentication policy on the HID Authentication Service can be blocked due to customers entering incorrect SMS Secure Codes for authentication in the web channel. The customer must contact the bank help desk so the bank can reset the failure counter of the authentication policy from Spotlight. It is recommended that the bank staff perform Identity and Verification before resetting the failure counter. Please note that Spotlight integration is out of scope for HID Global.

Note: If Spotlight is not capable of handling the SMS-based authentication policy it is recommended that the system integrator updates the component to support the functionality.

6.8 SMS Authentication Policy Reset Number of times the customer can request for Secure Code

It is possible to configure the number of times a customer can request for SMS Secure Code on the HID Authentication Service without validating it. This configuration prevents the bank customers from being exposed to DDOS attacks. If this is configured to a limited number of requests and the customer has exceeded the threshold then they will not be able to request for SMS Secure Code anymore. Customers must contact the bank help desk so the bank can unregister and register the SMS authentication policy so customers can continue to login. It is recommended that the bank staff perform Identity and Verification before they re-register the SMS authentication policy for the customer.

Note: If Spotlight is not capable of handling the SMS-based authentication policy it is recommended that the system integrator updates the component to support the functionality.