You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: documentation/business-services/decision-manager.md
+4-1
Original file line number
Diff line number
Diff line change
@@ -24,9 +24,12 @@ In case you would like [disable DM checks](https://developer.cybersource.com/api
24
24
25
25
In case DM is enabled for a particular payment method and transaction is marked for Review authorization is still considered successfully from OCC standpoint. Webhook response code will still be '1000' and additional response reason (`AUTHORIZED_PENDING_REVIEW`) will be returned back to OCC so that interested parties (e.g. OMS) can detect such transaction in OCC being marked for review.
26
26
27
+
In case DM is enabled for a particular payment method and transaction is rejected after authorization with response reason(`AUTHORIZED_RISK_DECLINED`).Authorization Reversal will be triggered automatically.
28
+
29
+
27
30
From the referenced document we can follow the recommended approach for `Review` decisions:
28
31
29
-
1. A shopper enters credit card information and submits the order
32
+
1. A shopper enters card information and submits the order
30
33
2. OCC processes the order and triggers the payment webhook with transaction type “Authorize” to request authorization for the order
31
34
3. The Payment Integration Service receives this request and can function as the integration point for fraud detection
32
35
4. The Payment Integration Service invokes the fraud detection service along with authorization
Copy file name to clipboardexpand all lines: documentation/occ.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
2
-
# ISV OCC Payment Plugin
2
+
# Cybersource Official Payment Plugin
3
3
4
4
## Oracle Commerce Cloud
5
5
@@ -11,7 +11,7 @@
11
11
|[Package Contents](package-contents.md)| Detailed explanation of each package included into solution. Documents available payment gateway settings |
12
12
|[Installation](installation.md)| Go through installation steps to deploy and configure payment extensions to OCC |
13
13
|_Payment Services_||
14
-
|[Credit Card](payment-services/credit-card.md)| Detailed information about credit card payment services, e.g.Microform integration, Payer Authentication (3DSecure) etc |
14
+
|[Credit Card](payment-services/credit-card.md)| Detailed information about card payment services, e.g.Microform integration, Payer Authentication (3DSecure) etc |
15
15
|[GooglePay](payment-services/googlepay.md)| Documents GooglePay integration and related technical details |
16
16
|[ApplePay](payment-services/applepay.md)| Documents ApplePay integration and related technical details. Includes ApplePay setup steps |
17
17
|[Settlement and Refund](payment-services/settlement-refund.md)| Additional payment services to allow fulfillment processes to settle or refund particular transactions when needed |
@@ -23,7 +23,7 @@
23
23
24
24
## Audience and Purpose
25
25
26
-
This document is written for merchants who want to use Payment and Value added Business services. This document provides an overview for integrating ISV OCC payment services into Oracle Commerce Cloud platform.
26
+
This document is written for merchants who want to use Payment and Value added Business services. This document provides an overview for integrating Cybersource Official payment services into Oracle Commerce Cloud platform.
Copy file name to clipboardexpand all lines: documentation/payment-services/applepay.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -49,12 +49,12 @@ Default values:
49
49
50
50
You will need to go through the steps from the [Configure Apple Pay on the web](https://help.apple.com/developer-account/#/dev1731126fb) in order to setup ApplePay payments
51
51
52
-
1. Go to EBC portal -> Payment Configuration -> Digital Payment Solutions
52
+
1. Go to Business Centre -> Payment Configuration -> Digital Payment Solutions
53
53
2. Configure ApplePay by generating certificate signing request (CSR) and providing Apple Merchant ID
54
54
3.`applePayMerchantId` gateway setting should get the value of the introduced Apple Merchant ID
55
55
4. Download CSR
56
56
5. Create merchant identify in your ApplePay dev account (as per docs)
57
-
6. Create Apple Pay Payment Processing Certificate for the identity you have just created (upload the certificate file downloaded from EBC in previous step)
57
+
6. Create Apple Pay Payment Processing Certificate for the identity you have just created (upload the certificate file downloaded from Business Centre in previous step)
58
58
7. Create merchant identity certificate. This certificate is used on the Web when a session validation request is triggered.
59
59
8. Register merchant domain and verify it (https://help.apple.com/developer-account/#/dev1731126fb). Merchant domain is where an application is being deployed to.
5.[Capturing funds during authorization (SALE)](#capturing-funds-during-authorization-sale)
15
16
16
17
## Description
@@ -29,7 +30,7 @@ The following applies to credit card payments:
29
30
30
31
- Credit card payments using [Microform v2](https://developer.cybersource.com/api/developer-guides/dita-flex/SAFlexibleToken/FlexMicroform.html). The transient token represents both card number (PAN) and CVV. Only token, card expiration date and masked card number going to be sent in a webhook request.
31
32
- Payer Authentication (3D Secure)
32
-
- Shopper can choose to save credit card as part of profile
33
+
- Shopper can choose to save credit/debit card as part of profile
33
34
- Subscribe to Network Token life cycle updates
34
35
- Shopper can pay with a saved card
35
36
@@ -63,13 +64,13 @@ Default values:
63
64
64
65
### Microform Card Payments
65
66
66
-
The following describes the end to end use case with an option to save credit card:
67
+
The following describes the end to end use case with an option to save credit/debit card:
67
68
68
69
1. Shopper chooses to checkout
69
-
2. Shopper enters credit card information
70
-
3. Credit card information is sent to payment provider client side and a one time (transient) use token is returned.
70
+
2. Shopper enters card information
71
+
3. Credit/Debit card information is sent to payment provider client side and a one time (transient) use token is returned.
71
72
4. Save the one time client token and include the client token in the payment part of the order
72
-
5. Shopper chooses to save the credit card for later
73
+
5. Shopper chooses to save the card for later
73
74
6. Shopper places the order
74
75
7. Payment webhook is triggered with transaction type "0100" (authorize). The following properties sent in the request:
75
76
- Transient token
@@ -92,7 +93,7 @@ Below are credit card related components from Payment Widget:
92
93
93
94
The application is structured based on OSF especifications.
94
95
95
-
Inside the components there is the list of widgets that are necessary to integrate the credit card payment using Cybersource.
96
+
Inside the components there is the list of widgets that are necessary to integrate the card payment using Cybersource.
96
97
Inside the endpoints folder there is specific call to REST apis
97
98
Fetchers are used to call APIs before the widget is redered. This are used to load data that widgets need before they can be rendered in the page. Fetchers can be global or local that means that some fetcher will be contained inside the components/widget folder (where widget is your custom widget).
98
99
Actions are used to call APIs but when the user performeces an action like clicking a button.
@@ -105,7 +106,7 @@ REST API for Oracle Commerce Cloud 22D [Oracle Commerce Cloud](https://docs.orac
The structure that follows contain all the components necessary to run Credit Card Payment in OSF.
109
+
The structure that follows contain all the components necessary to run Card Payment in OSF.
109
110
110
111
```text
111
112
plugins
@@ -190,8 +191,8 @@ plugins
190
191
191
192
192
193
- Before Payment Widget is rendered available payment methods are retrieved from SSE `/ccstorex/custom/isv-payment/v2/paymentMethods` endpoint. Saved credit cards are also retrieved from OCC in case user is logged-in.
193
-
-`Card` component renders by default list of saved cards if it is not empty and user is logged-in. Otherwise credit card form is rendered
194
-
-Credit card form is managed by `IsvCheckoutCardDetails` component. Saved cards are managed by `IsvCheckoutSavedCards` component. Shopper can switch between both components to choose preferable way to pay.
194
+
-`Card` component renders by default list of saved cards if it is not empty and user is logged-in. Otherwise credit/debit card form is rendered
195
+
-Card Payment form is managed by `IsvCheckoutCardDetails` component. Saved cards are managed by `IsvCheckoutSavedCards` component. Shopper can switch between both components to choose preferable way to pay.
195
196
- Microform is initialized by fetching keys from SSE using `/ccstorex/custom/isv-payment/v2/keys` endpoint
196
197
- Transient token is generated client side and is then included into payment details during order submission
197
198
- In case shopper pays with saved card only savedCardId is sent and transient token is not generated. Shopper can also choose to set card as default
@@ -243,10 +244,10 @@ Payer authentication is enabled by default using `payerAuthEnabled` gateway sett
243
244
Generally payer authentication services are executed together with credit card authorization:
244
245
245
246
1. PayerAuth setup is created using card information using `/ccstorex/custom/isv-payment/v2/payerAuth/setup` SSE endpoint
246
-
2. Credit card is tokenized as per process described in the [Microform Card Payments](#microform-card-payments) section
247
+
2. Credit/Debit card is tokenized as per process described in the [Microform Card Payments](#microform-card-payments) section
247
248
3. Order is created and "Authorize" Webhook request is triggered
248
249
4. Credit card Authorization service is called along with Payer Auth Enrollment
249
-
5. In case credit card is enrolled in payer authentication, authorization is rejected with specific reason code (10000). The response from payment provider will contain all data needed to start consumer authentication flow in storefront
250
+
5. In case card is enrolled in payer authentication, authorization is rejected with specific reason code (10000). The response from payment provider will contain all data needed to start consumer authentication flow in storefront
250
251
6. Payer Auth data is included in Webhook response using custom payment properties
251
252
7. In storefront Cardinal Cruise continues the consumer authentication flow with the custom payment properties returned in Webhook response.
252
253
8. Popup window is displayed to finish consumer authentication
@@ -273,6 +274,10 @@ The following UI component contains Payer Authentication integration logic `plug
273
274
-`server-extension/src/services/payments/converters/request/mappers/payerAuthEnrollMapper.ts` Including payer auth reference id into PSP card authorization request
274
275
-`server-extension/src/services/payments/converters/request/mappers/payerAuthValidationMapper.ts` Including payer auth validation token into PSP card authorization request
275
276
277
+
#### Decision Manager with Payer Authentication
278
+
You can use Decision Manager with payer authentication services to allow the risk of an order to determine when you need to invoke payer authentication.
279
+
[Decision Manager with Payer Authentication](https://ebc.cybersource.com/content/ebc/docs/cybs/en-us/html/dm-develop/developer/all/so/oxy_ex-1/topics/c_Using_DM_With_Payer_Auth.html)
280
+
276
281
#### Strong Customer Authentication (SCA)
277
282
278
283
When `Payer Authentication` is enabled, if a transaction gets declined with the reason as Strong Customer Authentication required, then another request will be sent from Oracle Commerce Cloud automatically for the same order and the customer will be 3DS challenged.
@@ -283,13 +288,13 @@ In case 'Strong Customer Authentication' is enabled for credit cards, '10000' re
283
288
284
289
*Note:* The `scaEnabled` setting is applicable only if `Payer Authentication` is enabled.
285
290
286
-
### Network Tokenization
291
+
### Network Tokens
287
292
288
-
A Network Token is a network scheme generated token, that represents customer card information for secure transactions that references a customer’s actual PAN.
293
+
A Network Token is a card scheme generated token, that represents customer card information for secure transactions that references a customer’s actual PAN.
289
294
290
-
Before a MID can be enabled for Network Tokenization, it must be provisioned with a Token Requestor ID (TRID) for each card scheme.
295
+
Before a MID can be enabled for Network Token, it must be provisioned with a Token Requestor ID (TRID) for each card scheme. Please contact your Cybersource representative or reseller to arrange for Network Tokens to be enabled on your Cybersource account.
291
296
292
-
Plug-in would need to subscribe to the necessary webhook notifications and ingest them for changes to the card. Subscription is created automatically when Authorization is processed, while the Webhook Subscription feature is enabled.
297
+
Plug-in would need to subscribe to the necessary webhook notifications and ingest them for changes to the card. Webhook subscription to the Network Token life cycle updates is created when authorization is processed, while the Network Token Updates is enabled in the back office.
293
298
294
299
The following describes the Network Token update process:
295
300
@@ -300,7 +305,7 @@ The following describes the Network Token update process:
300
305
5. The expiry month, expiry year, and card suffix will be updated with the latest details.
0 commit comments