{"id":11513,"date":"2019-01-16T22:51:33","date_gmt":"2019-01-16T21:51:33","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=11513\/"},"modified":"2019-12-31T09:28:56","modified_gmt":"2019-12-31T08:28:56","slug":"securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/","title":{"rendered":"S\u00e9curit\u00e9 des op\u00e9rations financi\u00e8res en ligne en 2020 : Quelles limitations \u00e0 l\u2019efficacit\u00e9 de la DSP2 ? (2\/2)"},"content":{"rendered":"<p><em>La DSP2 est un nouveau jalon dans le renforcement de la s\u00e9curit\u00e9 sur les services de paiement. Elle apporte des mesures adapt\u00e9es aux besoins et \u00e0 la multiplication des acteurs num\u00e9riques dans le secteur. Malgr\u00e9 cet apport en s\u00e9curit\u00e9 cons\u00e9quent, les limitations de la directive apparaissent dues notamment \u00e0 son p\u00e9rim\u00e8tre d\u2019application mais \u00e9galement aux standards existants.<\/em><\/p>\n<h1>Les limites de la DSP2<\/h1>\n<h2>La limitation du p\u00e9rim\u00e8tre aux seuls comptes de paiement<\/h2>\n<p>La DSP2, en tant que directive sur les services de paiement r\u00e9git les op\u00e9rations en ligne des acteurs de ces services uniquement sur les p\u00e9rim\u00e8tres concern\u00e9s qui sont les comptes intervenant dans les op\u00e9rations de paiements.<\/p>\n<p>Dans les faits cependant, les acteurs, et en particulier les agr\u00e9gateurs, r\u00e9alisent aujourd\u2019hui des op\u00e9rations sur l\u2019ensemble des comptes des utilisateurs, notamment leurs comptes d\u2019\u00e9pargne. Un des enjeux de ces agr\u00e9gateurs \u00e9tant de fournir des services \u00e0 valeur ajout\u00e9e touchant \u00e0 l\u2019ensemble de l\u2019activit\u00e9 de l\u2019utilisateur sur ses comptes\u00a0: comptes courants, comptes d\u2019\u00e9pargnes, ch\u00e8que, cartes, cr\u00e9dits, plan en actions, \u2026<\/p>\n<p>En r\u00e9glementant uniquement sur l\u2019acc\u00e8s aux comptes de paiement, la commission europ\u00e9enne et l\u2019ABE mettent en lumi\u00e8re le fonctionnement des agr\u00e9gateurs (rejeu des secrets de connexion utilisateurs) sans fournir une solution \u00e0 l\u2019ensemble des probl\u00e9matiques des \u00e9changes entre ces acteurs non bancaires (agr\u00e9gateurs) et les banques.<\/p>\n<p>Dans l\u2019int\u00e9r\u00eat du d\u00e9veloppement des agr\u00e9gateurs, des solutions devront donc \u00eatre act\u00e9es pour \u00e9largir cette l\u00e9gislation. Par ailleurs, les travaux engag\u00e9s par les banques dans le cadre de la DSP2 les ayant amen\u00e9es \u00e0 construire l\u2019architecture n\u00e9cessaire \u00e0 l\u2019exposition de services sur internet, une \u00e9volution de ces services \u00e0 plus des comptes et \u00e0 plus de services utilisateurs est probablement \u00e0 venir.<\/p>\n<h2>Incompatibilit\u00e9 avec les standards existants<\/h2>\n<p>Contrairement \u00e0 l\u2019initiative OpenBanking UK, bas\u00e9 sur le standard reconnu du groupe de travail Financial API, au sein de la fondation OpenID, les nouveaux services offerts par les banques dans le cadre de la DSP2 se fondent sur des exigences r\u00e9glementaires plut\u00f4t que sur des standards de s\u00e9curit\u00e9 \u00e9tablis.<\/p>\n<p>Consentement utilisateur<\/p>\n<p>Le consentement utilisateur est un bon exemple de cet \u00e9loignement entre le standard, ici OpenID Connect, et la r\u00e9glementation.<\/p>\n<p>La directive implique que le consentement\u00a0de l\u2019utilisateur \u00e0 l\u2019utilisation d\u2019un ou plusieurs comptes pour un agr\u00e9gateur :<\/p>\n<ul>\n<li>Doit \u00eatre recueilli par le TPP (donc l\u2019application qui va consommer les API)\u00a0;<\/li>\n<li>Doit \u00eatre appliqu\u00e9 et v\u00e9rifi\u00e9 par l\u2019ASPSP (h\u00e9bergeant les API).<\/li>\n<\/ul>\n<p>Ceci est r\u00e9alis\u00e9 \u00e0 rebours du standard OpenID Connect (impl\u00e9ment\u00e9 dans le cadre de OpenBanking UK), dans lequel le consentement doit \u00eatre recueilli par le service h\u00e9bergeant les donn\u00e9es et les API.<\/p>\n<p>Cin\u00e9matique <em>authorization code<\/em><\/p>\n<p>Mise en \u0153uvre pour l\u2019usage des AISP, la cin\u00e9matique <em>authorization code<\/em> requiert une redirection de l\u2019utilisateur de l\u2019AISP vers le service d\u2019authentification et de consentement de l\u2019ASPSP, puis en retour une nouvelle redirection vers l\u2019application de l\u2019AISP.<\/p>\n<p>Cette redirection peut \u00eatre consid\u00e9r\u00e9e comme un obstacle \u00e0 l\u2019utilisation des services comme le mentionne en exemple l\u2019article 32 des RTS. En cons\u00e9quence elle peut s\u2019av\u00e9rer ill\u00e9gale et des travaux sont en cours pour trouver des alternatives conformes ou non aux standards OAuth2.<\/p>\n<p>L\u2019acceptation de l\u2019usage de cette cin\u00e9matique pour les besoins de la DSP2 rel\u00e8ve alors de chaque autorit\u00e9 nationale, ce qui a pour effet de limiter l\u2019uniformisation europ\u00e9enne de ces interfaces. Actuellement, en France, l\u2019ACPR a valid\u00e9 l\u2019usage de cette redirection.<\/p>\n<figure id=\"post-11514 media-11514\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-11514 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/01\/3-386x191.png\" alt=\"\" width=\"531\" height=\"263\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/01\/3-386x191.png 386w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/01\/3-768x380.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/01\/3-71x35.png 71w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/01\/3.png 957w\" sizes=\"auto, (max-width: 531px) 100vw, 531px\" \/><\/figure>\n<p style=\"text-align: center;\">Figure 3: Les acteurs de la DSP2 en sc\u00e8ne<\/p>\n<h1>Conclusion<\/h1>\n<p>Dans un environnement num\u00e9rique en constante mutation, la DSP2 prend le parti de favoriser le d\u00e9veloppement des acteurs interm\u00e9diaires de services de paiement, pour mieux standardiser les \u00e9changes et apporter une meilleure ergonomie de navigation des utilisateurs et une meilleure s\u00e9curit\u00e9 des transactions.<\/p>\n<p>Elle comporte des apports importants sur des sujets de s\u00e9curit\u00e9, qui imposent des \u00e9volutions des SI bancaires : l\u2019ouverture des services sur internet et le changement des moyens d\u2019authentification sont en particulier un sujet compliqu\u00e9 pour les banques historiques.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La DSP2 est un nouveau jalon dans le renforcement de la s\u00e9curit\u00e9 sur les services de paiement. Elle apporte des mesures adapt\u00e9es aux besoins et \u00e0 la multiplication des acteurs num\u00e9riques dans le secteur. Malgr\u00e9 cet apport en s\u00e9curit\u00e9 cons\u00e9quent,&#8230;<\/p>\n","protected":false},"author":81,"featured_media":9507,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3229,36],"tags":[533,417,3307,2619],"coauthors":[905],"class_list":["post-11513","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-for-financial-services","category-cybersecurity-digital-trust","tag-banque","tag-conformite","tag-financial-services-cyber","tag-paiement"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Quelles limitations \u00e0 l\u2019efficacit\u00e9 de la DSP2 ? (2\/2) - Risk Insight<\/title>\n<meta name=\"description\" content=\"La DSP2 est un nouveau jalon dans le renforcement de la s\u00e9curit\u00e9 sur les services de paiement. Mais quelles sont les limitations de la directive ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quelles limitations \u00e0 l\u2019efficacit\u00e9 de la DSP2 ? (2\/2) - Risk Insight\" \/>\n<meta property=\"og:description\" content=\"La DSP2 est un nouveau jalon dans le renforcement de la s\u00e9curit\u00e9 sur les services de paiement. Mais quelles sont les limitations de la directive ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-16T21:51:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T08:28:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/03\/vie-privee-grande-distribution.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1414\" \/>\n\t<meta property=\"og:image:height\" content=\"1414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bertrand Carlier\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bertrand Carlier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/\"},\"author\":{\"name\":\"Bertrand Carlier\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/47ccd9b6a5366b0cf6b1d1e9057ae6de\"},\"headline\":\"S\u00e9curit\u00e9 des op\u00e9rations financi\u00e8res en ligne en 2020 : Quelles limitations \u00e0 l\u2019efficacit\u00e9 de la DSP2 ? (2\/2)\",\"datePublished\":\"2019-01-16T21:51:33+00:00\",\"dateModified\":\"2019-12-31T08:28:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/\"},\"wordCount\":738,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/03\/vie-privee-grande-distribution.jpg\",\"keywords\":[\"Banque\",\"conformit\u00e9\",\"financial services cyber\",\"paiement\"],\"articleSection\":[\"Cyber for Financial Services\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/\",\"name\":\"Quelles limitations \u00e0 l\u2019efficacit\u00e9 de la DSP2 ? (2\/2) - Risk Insight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/03\/vie-privee-grande-distribution.jpg\",\"datePublished\":\"2019-01-16T21:51:33+00:00\",\"dateModified\":\"2019-12-31T08:28:56+00:00\",\"description\":\"La DSP2 est un nouveau jalon dans le renforcement de la s\u00e9curit\u00e9 sur les services de paiement. Mais quelles sont les limitations de la directive ?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/03\/vie-privee-grande-distribution.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/03\/vie-privee-grande-distribution.jpg\",\"width\":1414,\"height\":1414,\"caption\":\"Flat design vector concept of e-commerce symbols, online shopping and buying - vector illustration\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9 des op\u00e9rations financi\u00e8res en ligne en 2020 : Quelles limitations \u00e0 l\u2019efficacit\u00e9 de la DSP2 ? (2\/2)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/47ccd9b6a5366b0cf6b1d1e9057ae6de\",\"name\":\"Bertrand Carlier\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/bertrand-carlier_\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quelles limitations \u00e0 l\u2019efficacit\u00e9 de la DSP2 ? (2\/2) - Risk Insight","description":"La DSP2 est un nouveau jalon dans le renforcement de la s\u00e9curit\u00e9 sur les services de paiement. Mais quelles sont les limitations de la directive ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/","og_locale":"en_US","og_type":"article","og_title":"Quelles limitations \u00e0 l\u2019efficacit\u00e9 de la DSP2 ? (2\/2) - Risk Insight","og_description":"La DSP2 est un nouveau jalon dans le renforcement de la s\u00e9curit\u00e9 sur les services de paiement. Mais quelles sont les limitations de la directive ?","og_url":"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/","og_site_name":"RiskInsight","article_published_time":"2019-01-16T21:51:33+00:00","article_modified_time":"2019-12-31T08:28:56+00:00","og_image":[{"width":1414,"height":1414,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/03\/vie-privee-grande-distribution.jpg","type":"image\/jpeg"}],"author":"Bertrand Carlier","twitter_misc":{"Written by":"Bertrand Carlier","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/"},"author":{"name":"Bertrand Carlier","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/47ccd9b6a5366b0cf6b1d1e9057ae6de"},"headline":"S\u00e9curit\u00e9 des op\u00e9rations financi\u00e8res en ligne en 2020 : Quelles limitations \u00e0 l\u2019efficacit\u00e9 de la DSP2 ? (2\/2)","datePublished":"2019-01-16T21:51:33+00:00","dateModified":"2019-12-31T08:28:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/"},"wordCount":738,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/03\/vie-privee-grande-distribution.jpg","keywords":["Banque","conformit\u00e9","financial services cyber","paiement"],"articleSection":["Cyber for Financial Services","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/","url":"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/","name":"Quelles limitations \u00e0 l\u2019efficacit\u00e9 de la DSP2 ? (2\/2) - Risk Insight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/03\/vie-privee-grande-distribution.jpg","datePublished":"2019-01-16T21:51:33+00:00","dateModified":"2019-12-31T08:28:56+00:00","description":"La DSP2 est un nouveau jalon dans le renforcement de la s\u00e9curit\u00e9 sur les services de paiement. Mais quelles sont les limitations de la directive ?","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/03\/vie-privee-grande-distribution.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/03\/vie-privee-grande-distribution.jpg","width":1414,"height":1414,"caption":"Flat design vector concept of e-commerce symbols, online shopping and buying - vector illustration"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2019\/01\/securite-des-operations-financieres-en-ligne-en-2020-quelles-limitations-a-lefficacite-de-la-dsp2-22\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9 des op\u00e9rations financi\u00e8res en ligne en 2020 : Quelles limitations \u00e0 l\u2019efficacit\u00e9 de la DSP2 ? (2\/2)"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/47ccd9b6a5366b0cf6b1d1e9057ae6de","name":"Bertrand Carlier","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/bertrand-carlier_\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11513","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=11513"}],"version-history":[{"count":2,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11513\/revisions"}],"predecessor-version":[{"id":11518,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11513\/revisions\/11518"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/9507"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=11513"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=11513"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=11513"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=11513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}