Stay organized with collections
Save and categorize content based on your preferences.
Banking FOP uses HTTPS (TLS) for transport layer security.
Transport layer encryption with HTTPS
All API endpoints must be served using HTTPS with TLS 1.2 or higher. API
clients must have common name (CN) checking turned on and the server's CN or
wildcards must match the hostname.
We strongly recommend using a certificate issued under a root certificate
included in the
Mozilla CA certification program
to reduce the level of maintenance necessary to keep this connection healthy.
However, if necessary, we do allow partners to issue self-signed certificates
that we can trust.
Cipher suites
The server must support at least one of these cipher suites and should not
support cipher suites outside of the following set:
ECDHE-ECDSA-AES128-GCM-SHA256
ECDHE-RSA-AES128-GCM-SHA256
ECDHE-ECDSA-CHACHA20-POLY1305
ECDHE-RSA-CHACHA20-POLY1305
ECDHE-ECDSA-AES128-SHA256
ECDHE-RSA-AES128-SHA256
All rights reserved. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2024-12-03 UTC.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2024-12-03 UTC."],[[["\u003cp\u003eBanking FOP leverages HTTPS with TLS 1.2 or higher for secure communication across all API endpoints.\u003c/p\u003e\n"],["\u003cp\u003eAPI clients must enable common name (CN) checking to ensure the server's CN or wildcards match the hostname for secure authentication.\u003c/p\u003e\n"],["\u003cp\u003eWhile certificates issued under the Mozilla CA certification program are recommended, self-signed certificates can be used, but require Google's trust and immediate replacement if revoked by the CA.\u003c/p\u003e\n"],["\u003cp\u003eServers must support at least one of the specified cipher suites (ECDHE-ECDSA-AES128-GCM-SHA256, ECDHE-RSA-AES128-GCM-SHA256, ECDHE-ECDSA-CHACHA20-POLY1305, ECDHE-RSA-CHACHA20-POLY1305, ECDHE-ECDSA-AES128-SHA256, ECDHE-RSA-AES128-SHA256) and avoid using any outside this set for robust security.\u003c/p\u003e\n"]]],["Banking operations use HTTPS (TLS) for secure transport. All API endpoints require HTTPS with TLS 1.2 or higher. API clients must enable common name (CN) checking, with the server's CN or wildcards matching the hostname. Certificates from the Mozilla CA program are recommended. Self-signed certificates are allowed, but a revoked server's certificate requires immediate replacement. The server must support one of six specified cipher suites and no others.\n"],null,["# Transport layer encryption\n\nBanking FOP uses HTTPS (TLS) for transport layer security.\n\nTransport layer encryption with HTTPS\n-------------------------------------\n\nAll API endpoints must be served using HTTPS with TLS 1.2 or higher. API\nclients must have common name (CN) checking turned on and the server's CN or\nwildcards must match the hostname.\nWe strongly recommend using a certificate issued under a root certificate included in the [Mozilla CA certification program](https://www.mozilla.org/about/governance/policies/security-group/certs/policy/) to reduce the level of maintenance necessary to keep this connection healthy. However, if necessary, we do allow partners to issue self-signed certificates that we can trust. **Note:** If a server's certificate is revoked by the CA, Google will contact you to get a new cert immediately.\n\n### Cipher suites\n\nThe server must support at least one of these cipher suites and should not\nsupport cipher suites outside of the following set:\n\n- ECDHE-ECDSA-AES128-GCM-SHA256\n- ECDHE-RSA-AES128-GCM-SHA256\n- ECDHE-ECDSA-CHACHA20-POLY1305\n- ECDHE-RSA-CHACHA20-POLY1305\n- ECDHE-ECDSA-AES128-SHA256\n- ECDHE-RSA-AES128-SHA256"]]