Strong customer authentication

Your security is our priority. We prevent data theft by using strong authentication. Our actions are a result of new legal regulations adopted by the European Parliament and the Council of the European Union.

What is strong authentication?

Strong customer authentication (also known as SCA) is a type, or subset, of multi-factor authentication.

This is an additional layer of security aimed at ensuring that the person who executes transactions, logs in and entrusts us with their data is the one they claim to be.

With strong authentication, your passwords, finances and personal data are fully secured and inaccessible to others.

Why is authentication needed?

Why is strong authentication needed?

Access to your finances and personal data may be easier than you think.

To ensure the highest security standards, we introduce strong customer authentication. This way, we protect you from losing your money. With it, unauthorized persons will not gain access to your account.

Why is authentication needed?

How does the strong authentication work?

Efficient, safe and fast

The strong authentication works similarly to previously performed logins and ordered transactions. The only difference is the entry of an individual code, which will be generated each time and sent to you by email or text message.

1
Log in and order a transaction
2
Confirm your logging data or the ordered transaction with an authentication code
3
Now we are sure that you are the one who does all the actions

How does strong authentication protect your data?

Additional security shield

If someone knew and attempted to use your data, they would also need access to your phone or email, to which a one-time and individual authentication code will be sent.

Password and phone security

With the strong authentication, you protect your account with something you know, which is your password, and something you have — your phone.

Authentication codes are generated only for you

Codes are created and sent only when you need them.

How does authentication protect your data?

Trusted devices

If you are using our mobile apps, you can add your phone to your list of trusted devices. This way, you can authorize logging in and other important operations in the same way you unlock your phone.

You can check the list of your trusted devices in your User panel by going to the profile settings.

Trusted devices

Strong authentication — FAQs

1 answers
1 answers
1 answers
1 answers
1 answers
1 answers
1 answers
1 answers
1 answers
1 answers
Start chat