How Indian Banks and Fintech Companies Can Comply With RBI's New Rules for Two-Factor Authentication

Posted:

11 March, 2026

Vaibhav Maniyar

RBI New Rules Two-Factor Authentication Compliance

TL;DR - Everything You Need to Know Right Now

The RBI released the "Authentication Mechanisms for Digital Payment Transactions Directions, 2025" on September 25, 2025. Here is the short version:

Deadline: April 1, 2026, for all domestic digital payment transactions

What changes: SMS OTP remains allowed but can no longer be the only authentication method. At least one factor must now be dynamically generated per transaction

Who must comply: All banks, non-bank entities, UPI apps, wallets, and payment platforms

Three accepted factor types: Something you know (PIN/password), something you have (device token/card), something you are (biometrics)

Cross-border CNP transactions: Separate deadline of October 1, 2026

Penalty for non-compliance: Full customer reimbursement for any losses caused by non-compliant transactions

What is NOT changing: SMS OTP is not being banned. Small-value contactless payments (up to Rs 5,000), recurring e-mandates, and offline small-value transactions remain exempt from the two-factor requirement

Why the RBI Changed the Rules

India's digital payments sector has grown at a pace that few predicted even five years ago. UPI alone now accounts for approximately 80% of all retail digital payments in India, processing over 13.5 billion transactions per month with 35% year-on-year growth. India recorded 208.5 billion total digital transactions in 2024, with UPI representing 83% of that volume.

That scale creates a larger fraud surface. In FY 2024-25, UPI-related fraud alone resulted in losses of approximately Rs 485 crore across 632,000 reported incidents. Cumulatively since FY 2022-23, reported UPI fraud cases have cost users Rs 2,145 crore across 2.7 million incidents. High-value, targeted attacks are rising even as basic low-value fraud attempts show some decline - which means the problem is getting more sophisticated, not less.

SMS OTP - the method most Indians use today - was never designed for the threat environment of 2025. It routes through the telecom network, which can be intercepted via SIM swapping, SS7 attacks, and social engineering. A one-time password delivered by text is also a static credential in the sense that someone who intercepts it has a usable window to act. The RBI's new direction addresses this by requiring that at least one authentication factor be dynamically generated and unique to each transaction.

The regulatory journey started publicly with a draft framework released on July 31, 2024, followed by a second draft on February 7, 2025, specifically covering cross-border card-not-present transactions. Stakeholder comments from both drafts were incorporated before the final directions were issued.


What the RBI's New Directions Actually Say

The formal name of the regulation is the "Authentication Mechanisms for Digital Payment Transactions Directions, 2025", issued under Section 18 read with Section 10(2) of the Payment and Settlement Systems (PSS) Act, 2007. The circular reference is RBI/2025-26/219.

  • The Core Requirement

    Every digital payment transaction must use at least two independent factors of authentication. These factors must come from different categories - so two PINs would not qualify; you need factors from two distinct types.

    The RBI has defined three accepted categories:

    Factor Type What It Means Examples
    Knowledge Something the user knows Password, PIN, passphrase
    Possession Something the user has Card, hardware token, software token, device-bound cryptographic token
    Inherence Something the user is Fingerprint, facial recognition, Aadhaar-based biometrics

    The critical addition in the 2025 directions is this: at least one of the two factors must be dynamically generated for that specific transaction. A static PIN alone on one side and a static password on the other would not meet the standard. One factor must be provably unique to the transaction being authorized.

    Independence of Factors

    The directions also state that if one factor is compromised, it must not affect the reliability of the other. This is not just a security principle - it is a design requirement. A bank that routes both its SMS OTP and its push notification through the same compromised channel fails this test.

  • Risk-Based Authentication

    Issuers can go beyond the minimum two-factor requirement based on the fraud risk of a transaction. Risk indicators that the RBI suggests include:

    Transaction value

    Origination channel (mobile app vs. web browser vs. USSD)

    Customer risk profile

    Beneficiary risk profile

    Geolocation

    Behavioral patterns

    High-risk or flagged transactions may require additional authentication steps beyond the baseline two factors. This gives banks and fintechs the flexibility to apply stronger checks without forcing extra friction on every routine low-value payment.

  • Real-Time Alerts Are Mandatory

    Issuers must notify customers of eligible digital payment transactions in near real-time. For recurring transactions above Rs 15,000, banks must also send a reminder at least 24 hours before the charge is debited, giving users a chance to cancel if the payment is no longer authorized.


Compliance Deadlines - A Clear Timeline

Requirement Deadline
Two-factor authentication for all domestic digital payment transactions April 1, 2026
Migration of all digital banking domains to .bank.in October 31, 2025
AFA for non-recurring cross-border card-not-present (CNP) transactions October 1, 2026

All Payment System Providers and Participants - banks and non-bank entities alike - must meet the April 1, 2026 deadline for domestic transactions. The extended deadline for cross-border CNP transactions reflects the added complexity of coordinating with international card networks. For that segment, issuers must also register their Bank Identification Numbers (BINs) with card networks and put risk-based controls in place.


Which Transactions Are Exempt

Not every payment requires two-factor authentication under the new directions. The RBI has carved out specific exemptions where the friction of authentication would outweigh the risk:

Small-value contactless card payments up to Rs 5,000 per transaction at Point of Sale terminals

E-mandates for recurring transactions beyond the initial registration payment - this covers EMIs, subscriptions, insurance premiums, credit card payments up to Rs 1 lakh, and other recurring transactions up to Rs 15,000

Small-value offline digital payments

Utility payments through select prepaid instruments

National Electronic Toll Collection (NETC) transactions where vehicles pass through automated tolls

Card-present transactions where the card is physically swiped or tapped

The exemptions are designed to keep everyday, low-risk transactions fast and convenient. The higher the value and the more remote the authentication context, the more the new rules apply.


What Authentication Options Are Now Available

The directions do not prescribe a single method. They set principles and let institutions choose how to meet them. Here is what currently qualifies:

  • Knowledge Factors (something you know)

    UPI PIN

    Card PIN

    Password or passphrase

  • Possession Factors (something you have)

    SMS OTP (still valid as a possession factor - the user's SIM is the "possession")

    Hardware token (e.g., FIDO2-based devices, display tokens)

    Software token on a registered device

    Device-bound cryptographic token (the most future-proof option)

    In-app push notification requiring approval on a registered device

  • Inherence Factors (something you are)

    Device-native fingerprint (e.g., the biometric sensor on a smartphone)

    Facial recognition

    Aadhaar-based biometrics

  • Emerging Methods Aligned With RBI's Direction

    Passkeys
    FIDO2/WebAuthn standards that bind authentication to the user's device and use public-key cryptography. The FIDO Alliance formally submitted input to the RBI in December 2024 advocating for these. Passkeys cannot be phished and require no OTP delivery infrastructure.

    Behavioral analytics
    Flagging transactions that deviate from a user's normal patterns to trigger additional checks.

    Device binding
    Tying a payment method to a specific registered device so that approvals on unrecognized devices are automatically flagged.


What Banks Need to Do to Comply

  1. Audit Your Current Authentication Stack

    Start by mapping every customer-facing payment flow and identifying which transactions currently use only a single factor or rely entirely on SMS OTP without any dynamic secondary element. This gap analysis is the foundation of your compliance project.

  2. Ensure At Least One Dynamic Factor Per Transaction

    Any factor that stays the same across transactions - a static PIN, for example - cannot be the only factor. Your system must generate something unique for each transaction. This is already built into SMS OTP (each code is different), but the new directions push banks toward options where the delivery channel is more secure.

  3. Build or Integrate a Risk-Based Authentication Engine

    The RBI explicitly supports tiered authentication. Build logic that assesses each transaction against risk signals - value, device, location, user behavior - and applies additional checks when risk is elevated. This is not just good compliance; it keeps friction low for genuine users while creating barriers for fraudsters.

  4. Implement the Factor Independence Requirement

    Review your architecture to confirm that if one authentication channel is compromised, the other is genuinely independent. If both your OTP and your in-app push notification go through the same server-side session, they are not truly independent from an attack surface perspective.

  5. Set Up Real-Time Alert Infrastructure

    All eligible transaction notifications must go out in near real-time. For recurring debits above Rs 15,000, a 24-hour advance notification system must be in place. If this infrastructure does not exist or is unreliable, it must be built before April 1, 2026.

  6. Update the Customer Onboarding and Re-Onboarding Process

    If a customer has had no digital transaction with a vendor in the last six months, the bank must redo KYC for any mandate linked to that relationship. Build this trigger into your mandate management system.

  7. Review Third-Party and Outsourced Providers

    The RBI's Master Direction on Outsourcing applies here. Any authentication service operated by a third party must be subject to your due diligence, audit rights, and security controls. Cloud-based authentication vendors must meet RBI's standards for confidentiality and data availability.

  8. Address the AePS Ecosystem Separately

    For banks operating in the Aadhaar-enabled Payment System (AePS) space, additional requirements apply. These include stricter API usage controls, alignment with SIEM systems, and periodic KYC updates for all AePS operators. Given that India's Aadhaar authentication volumes exceeded 2.11 billion in a single month as of May 2025, the security stakes in this segment are significant.

  9. Migrate Domains to .bank.in

    The October 31, 2025 deadline for moving all digital banking operations to the .bank.in domain has already passed or is imminent depending on when you are reading this. If your bank has not yet completed this migration, it is overdue. This is part of the same security perimeter that the 2FA directions address.


What Fintech Companies Need to Do

Fintech companies and non-bank payment system participants face the same April 1, 2026 deadline. The practical steps differ slightly from banks given the architecture differences.

  • Clarify Your Role in the Payment Chain

    The RBI's directions place compliance obligations on "issuers" - the entities that issue the payment instrument being used. If you operate as a payment aggregator, wallet provider, or UPI app, identify which authentication steps sit within your control and which sit with the issuing bank. Gaps in this handoff are a compliance risk.

  • Interoperability Is a Hard Requirement

    The directions state that all authentication and tokenisation services must be interoperable across platforms and applications regardless of device or operating environment. This matters for fintechs building on top of UPI or card rails - your authentication flow must work consistently across Android, iOS, web browsers, and USSD, not just the scenario you have optimized for.

  • Protect User Data Under DPDP Act 2023

    Biometric data and device-binding data are sensitive personal data under the Digital Personal Data Protection Act, 2023. Any authentication method that collects or stores biometric information must comply with DPDP Act requirements on consent, data minimization, and storage. Build your compliance approach for authentication and data protection together, not separately.

  • Prepare for Cross-Border CNP Requirements

    If your platform processes international card payments using Indian-issued cards, you have until October 1, 2026 to implement AFA for non-recurring transactions when requested by the overseas merchant or acquirer. This requires coordination with card networks and BIN registration. Start that process early because the coordination timeline is longer than domestic system changes.


The Liability Question - What Happens If You Do Not Comply

The RBI has put financial responsibility directly on issuers. If a customer suffers a loss from a transaction that did not comply with the authentication directions, the issuer must reimburse the full amount. There is no apportionment or shared liability - the institution is on the hook entirely.

This financial exposure should be the primary driver of urgency for compliance teams. A single high-value fraud incident in a non-compliant transaction flow could cost far more than the engineering investment required to meet the standards.


Key Numbers at a Glance

Metric Figure Source
UPI share of retail digital payments ~80% Astra Security / RBI data
UPI monthly transactions 13.5 billion+ Astra Security, 2025
UPI year-on-year transaction growth 35% Astra Security, 2025
Total India digital transactions in 2024 208.5 billion Business Standard
UPI fraud losses in FY 2024-25 Rs 485 crore Astra Security
UPI fraud incidents in FY 2024-25 632,000 Astra Security
Cumulative UPI fraud losses (FY22-FY25) Rs 2,145 crore Astra Security
Aadhaar authentication volume (May 2025) 2.11 billion Corbado / RBI data
Compliance deadline (domestic) April 1, 2026 RBI Directions, 2025
Compliance deadline (cross-border CNP) October 1, 2026 RBI Directions, 2025
Recurring transaction notification threshold Rs 15,000 RBI Directions, 2025
Contactless payment AFA exemption limit Rs 5,000 RBI Directions, 2025

Summary

RBI's new rules for two-factor authentication mark a shift from a system that defaulted to SMS OTP toward one that accepts a wider range of authentication methods - provided they meet clear principles around independence, dynamic generation, and factor diversity.

The core message for banks and fintechs is this: the SMS OTP you use today may still be part of your authentication flow after April 1, 2026, but it cannot be the whole story. You need a second factor from a different category, and at least one of the two factors you use must be unique to each transaction.

The compliance window is not short, but it is not long either. Building or integrating a risk-based authentication engine, ensuring factor independence, setting up real-time alert infrastructure, and addressing data protection requirements under the DPDP Act 2023 all take time. Institutions that start their gap analysis now will be in a far better position than those that wait for Q1 2026.

The financial risk of non-compliance is concrete: full customer reimbursement for any loss from a non-compliant transaction. The reputational risk is equally real in a payments market where trust drives adoption.


Frequently Asked Questions

No. The RBI has explicitly clarified that the new directions do not call for the discontinuation of SMS OTP as an authentication factor. SMS OTP remains a valid possession factor. What changes is that it cannot be the only means of authentication, and at least one factor used must be dynamically generated for each specific transaction.

April 1, 2026, for all domestic digital payment transactions. For non-recurring cross-border card-not-present transactions, the deadline is October 1, 2026.

All Payment System Providers and Participants operating in India - including commercial banks, small finance banks, payment banks, non-banking financial companies, UPI apps, wallet providers, and payment aggregators.

Small-value contactless card payments up to Rs 5,000, e-mandates for recurring transactions beyond the initial payment, small-value offline digital payments, certain utility payments via prepaid instruments, and NETC toll collection transactions.

Yes. Issuers may offer customers a choice of authentication factors, provided the combination chosen still complies with the two-factor, dynamic-factor principles in the directions.

The issuer is fully liable and must compensate the customer for the entire loss. There is no shared liability provision.

Primarily, no. The directions cover domestic digital payment transactions. However, for non-recurring cross-border card-not-present transactions where Indian-issued cards are used, issuers must implement AFA mechanisms by October 1, 2026, when requested by the overseas merchant or acquirer.

A dynamic factor is one that is uniquely generated for a specific transaction and cannot be reused. A standard SMS OTP is dynamic in this sense - each code is different and expires after use. The key is that the factor cannot be replayed or recycled from a previous transaction.

Passkeys built on FIDO2/WebAuthn standards are considered among the strongest options aligned with the RBI's directions. They are device-bound, phishing-resistant, and generate a cryptographic proof unique to each transaction - meeting the dynamic factor requirement. The FIDO Alliance submitted formal input to the RBI in December 2024 in support of these standards.

Comments

Leave A Reply