Core
Security model
Defense-in-depth so your integration starts compliant.
TLS only
All traffic must use TLS 1.2+. Plain HTTP requests are rejected at the edge.
Bearer auth
Long-lived secrets are scoped per merchant + environment. Rotate at any time without downtime.
PCI scope avoided
Use hosted checkout to keep PAN out of your servers — we handle the SAQ-A scope on your behalf.
Signed webhooks
HMAC-SHA256 with timestamped payload prevents replay. Reject anything older than 5 minutes.
Encryption at rest
Merchant credentials, card tokens, and KYB documents are encrypted with KMS-backed keys.
IP allowlist
Optional. When enabled, secret-key requests must originate from a configured CIDR range.