For merchants with full PCI DSS compliance only.This approach allows you to send raw card data directly to Tonder without tokenization. Only use this if you are fully PCI DSS compliant.
Endpoints
There are two different endpoints for PCI compliant processing, one for testing and one for production:Environment | Endpoint | Purpose |
---|---|---|
Testing | https://process-sandbox.tonder.io/ | PCI compliant testing |
Production | https://process.tonder.io/ | PCI compliant live transactions |
Authentication
These are the required headers for the PCI compliant processing endpoints:PCI Compliant Request
A reques to the PCI compliant processing endpoints should have the following structure:Request Structure
Request Structure
Response Format
The reponse from the endpoints should have the following structure:Field | Type | Description |
---|---|---|
id | string | Unique transaction identifier |
operation_type | string | Always "payment" |
status | string | Transaction status |
amount | decimal | Transaction amount |
currency | string | Currency code |
client_reference | string | Your reference identifier |
payment_id | integer | Internal payment ID |
transaction_id | integer | Internal transaction ID |
provider | string | Payment provider used |
created_at | string | ISO 8601 timestamp |
status_code | integer | HTTP status code |
next_action | object | Required actions (3DS, redirects) |
Test Cards
Use these test cards in the sandbox environment:Card Number | Expected Result |
---|---|
4000 0000 0000 0077 | Successful payment |
5451 9515 7492 5480 | Card declined |
4456 5280 8038 9860 | 3ds authentication required |
4574 4412 1519 0335 | Processing error (No transaction recoded in Tonder) |
4349 0012 1084 6432 | Insufficient funds |
Status Values
The table below shows the different possible status values:Status | Description |
---|---|
Pending | Transaction awaiting completion |
Success | Payment completed successfully |
Failed | Payment failed or declined |
Cancelled | Transaction was cancelled |
PCI Compliance Requirements
When processing raw card data, you must maintain full PCI DSS Level 1 compliance. This section provides the essential requirements and best practices to ensure secure card data handling.Critical Security Requirements
Critical Security Requirements
These are the core security requirements for PCI compliant processing:
PCI DSS Level 1 Compliance RequiredOnly use this approach if you are fully PCI DSS Level 1 compliant. This is mandatory for processing raw card data.
- Protect stored, processed, and transmitted card data at all times
- Use TLS 1.2+ for all card data transmissions
- Restrict access to card data on need-to-know basis only
- Log and monitor all access to cardholder data environments
- Continuously test security systems and processes
- Maintain ongoing compliance validation and documentation
Data Handling Requirements
Data Handling Requirements
Prohibited Actions
These are the prohibited actions with card data:- Do not store CVV data after authorization
- Do not store card data without encryption or tokenization
- Do not log card numbers, CVV, or expiration dates
- Do not use HTTP without TLS 1.2+ encryption
Required Actions
Allways make sure to perform these actions when processing card data:- Check card data format before processing
- Confirm HTTPS before transmission
- Log all access to payment processing systems
- Apply security patches regularly
When to Use PCI Compliant Processing
This section explains when PCI compliant processing is recommended and when it is not. Use the information below to decide if this is the best approach for your business.Recommended For
Recommended For
- Large Enterprise Merchants already PCI Level 1 certified
- Payment Processors operating under existing PCI compliance
- High-Volume Businesses processing significant card transaction volumes
- Existing PCI Infrastructure already handling raw card data securely
Not Recommended For
Not Recommended For
- Small to Medium Businesses without existing PCI compliance
- New Integrations for first-time payment processing implementations
- Cost-Conscious Merchants where PCI compliance maintenance can be expensive
- Non-PCI Environments with systems not designed for secure card data handling
Comparison with Tokenized Processing
The table below compares PCI compliant processing with tokenized processing:Aspect | PCI Compliant Processing | Tokenized Processing |
---|---|---|
API Calls | 1 step (direct process) | 3 steps (auth → tokenize → process) |
PCI Compliance | Full PCI DSS Level 1 required | Not required for merchant |
Integration Complexity | Lower (single endpoint) | Higher (multiple endpoints) |
Latency | Lower (direct processing) | Higher (additional API calls) |
Security Responsibility | Merchant responsibility | Handled by Tonder/Skyflow |
Maintenance Cost | Higher (compliance audits) | Lower |
Important PCI Compliance Notes
- Only use this approach if you are fully PCI DSS Level 1 compliant
- Raw card data must be handled securely throughout your entire system
- All PCI DSS requirements apply to your infrastructure and processes
- Regular compliance audits are required
Next Steps
- Review Card Tokenization for non-PCI compliant card processing
- Learn about Core Endpoints for using PCI endpoints in your integration
- Check Payment Methods for card-specific implementation details
- Set up Webhooks for real-time payment notifications
- Review Error Handling for payment error management
- Explore Production Readiness for deployment checklist