Payments Made Easy with the New Visa API

Payments Made Easy with the New Visa API

Visa just announced to the developer community the general availability of the largest payment network in the form of a developer API ecosystem called Visa Developer. The Visa Developer API is a one-stop-shop for all your payment needs and would serve you in three specific categories:

  1. Payment Methods – the payment methods (named CyberSource) API lets you do secure payments, simple and easy checkouts, and also do Visa Direct fund transfers.
  2. General Services – under this section the API allows you to perform generic queries, like figuring out FOREX rates, fetch key attributes of a payment account, locate Visa supported ATMs across the globe, and, of course, validate payment accounts.
  3. Risk and Fraud – this is the final category in the API sub system that allows you to build payment systems that can protect consumers from fraudulent transactions. It uses geolocation intelligence to locate phone numbers involved in transactions. You can also get instant alerts on the transactions and there is a token service to reduce the risk of fraud using tokens.

There is also a Trial category where Visa would plan to publish APIs only available on the Visa Developer sandbox platform and are not generally available. You can use APIs under this category for experimental purposes and provide feedback to Visa. There is a Micro Transactions API available in the sandbox that you can use to experiment with virtual currency commerce.

You can register with the Visa Developer program to get the API Key and the Shared Secret. You can then use the sandbox to test payment processing. For example, if you are trying to use the CyberSource API to authorize a test payment transaction, you can fire an HTTPS POST against the following URI:

https://sandbox.api.visa.com/cybersource/payments/v1/authorizations?apikey=[your API_KEY].

In the POST message, you can form a JSON using amount, currency, payment, and the cardNumber attributes. You also need to add an x-pay-token header which could be generated using your shared secret, the current timestamp, the API URI, the query string parameter, and the POST body.

An important aspect to note is that this code most likely will execute in your backend, so you will have to get your servers PCI compliant to run them.

Share the Post:
XDR solutions

The Benefits of Using XDR Solutions

Cybercriminals constantly adapt their strategies, developing newer, more powerful, and intelligent ways to attack your network. Since security professionals must innovate as well, more conventional endpoint detection solutions have evolved

AI is revolutionizing fraud detection

How AI is Revolutionizing Fraud Detection

Artificial intelligence – commonly known as AI – means a form of technology with multiple uses. As a result, it has become extremely valuable to a number of businesses across

AI innovation

Companies Leading AI Innovation in 2023

Artificial intelligence (AI) has been transforming industries and revolutionizing business operations. AI’s potential to enhance efficiency and productivity has become crucial to many businesses. As we move into 2023, several

data fivetran pricing

Fivetran Pricing Explained

One of the biggest trends of the 21st century is the massive surge in analytics. Analytics is the process of utilizing data to drive future decision-making. With so much of

kubernetes logging

Kubernetes Logging: What You Need to Know

Kubernetes from Google is one of the most popular open-source and free container management solutions made to make managing and deploying applications easier. It has a solid architecture that makes

ransomware cyber attack

Why Is Ransomware Such a Major Threat?

One of the most significant cyber threats faced by modern organizations is a ransomware attack. Ransomware attacks have grown in both sophistication and frequency over the past few years, forcing

data dictionary

Tools You Need to Make a Data Dictionary

Data dictionaries are crucial for organizations of all sizes that deal with large amounts of data. they are centralized repositories of all the data in organizations, including metadata such as