Step 1: Prepare Your Card Payment Request
Create your payment request with the card payment method. Always use tokenized card data when possible for enhanced security.Always include a
return_url
when processing card payments. This is required for 3D Secure authentication flows.Step 2: Send the Payment Request
Make a POST request to the unified payment endpoint:Step 3: Handle the Response
Payment Response Scenarios
Card payments can have different response flows depending on whether 3D Secure authentication is required. When no additional authentication is needed, the payment is processed immediately and returns anauthorized
status. When additional authentication is required, the customer will be redirected to their bank and the response includes redirect information.
Step 4: Handle 3D Secure Authentication
When 3D Secure is required, follow these steps:1
Redirect the customer to the 3DS URL
Use the URL provided in
next_action.redirect_to_url.url
to redirect your customer.2
Customer completes authentication
The customer will complete the 3D Secure challenge on their bank’s page.
3
Customer returns to your site
After authentication, the customer is redirected back to your
return_url
.4
Check the final payment status
Make a GET request to verify the final payment status.
Implementation Tips
Follow the best practices below to handle card payments:General Tips
General Tips
- Always use tokenized card data to reduce PCI compliance scope.
- Ensure your UI can handle redirect flows smoothly for 3D Secure authentication.
- Save the transaction ID for future reference and reconciliation.
- Use test cards to verify both successful and failed scenarios.
Security Best Practices
Security Best Practices
- Never store raw card data on your servers.
- Always use HTTPS for all API communications.
- Implement proper error handling to avoid exposing sensitive information.
- Use webhooks to track payment status changes asynchronously.
PCI Compliant Raw Card Processing
For merchants with full PCI DSS Level 1 compliance, Tonder offers direct raw card processing that bypasses tokenization. This section covers the security requirements and considerations for this approach. When processing raw card data, you must maintain full PCI DSS Level 1 compliance. This section provides the essential requirements and best practices to ensure secure card data handling.Critical Security Requirements
Critical Security Requirements
These are the core security requirements for PCI compliant processing:
- Protect stored, processed, and transmitted card data at all times.
- Use TLS 1.2+ for all card data transmissions.
- Restrict access to card data on need-to-know basis only.
- Log and monitor all access to cardholder data environments.
- Continuously test security systems and processes.
- Maintain ongoing compliance validation and documentation.
Data Handling Requirements
Data Handling Requirements
Prohibited ActionsThese are the prohibited actions with card data:
- Do not store CVV data after authorization.
- Do not store card data without encryption or tokenization.
- Do not log card numbers, CVV, or expiration dates.
- Do not use HTTP without TLS 1.2+ encryption.
- Check card data format before processing.
- Confirm HTTPS before transmission.
- Log all access to payment processing systems.
- Apply security patches regularly.
PCI Compliant vs Tokenized Processing
The following table compares PCI compliant raw card processing with tokenized processing to help you choose the right approach:Aspect | PCI Compliant Processing | Tokenized Processing |
---|---|---|
API Calls | 1 step (direct process) | 3 steps (auth → tokenize → process) |
PCI Compliance | Full PCI DSS Level 1 required | Not required for merchant |
Integration Complexity | Lower (single endpoint) | Higher (multiple endpoints) |
Latency | Lower (direct processing) | Higher (additional API calls) |
Security Responsibility | Merchant responsibility | Handled by Tonder/Skyflow |
Maintenance Cost | Higher (compliance audits) | Lower |
Card Data Storage | Prohibited without encryption | Tokens can be safely stored |
Infrastructure Requirements | Dedicated secure servers | Standard infrastructure |
Audit Requirements | Annual PCI DSS audits | Minimal compliance requirements |
Choose PCI compliant processing only if you already have full PCI DSS Level 1 certification and dedicated infrastructure. For most merchants, tokenized processing is the recommended approach.
Next Steps
- Learn how to create payments with card tokens for enhanced security.
- Explore 3D Secure payments for additional authentication details.
- See the PCI Compliant Raw Card Processing guide for step-by-step implementation.
- Set up webhooks to receive real-time payment notifications.