Getting started
Transfer API allows initiating transfers between your Paysera account and either Paysera or another bank account.
How to start?
Step 1. Read the documentation
First of all, before continuing you should read the documentation to find out if it's the right tool, which you are looking for.
Step 2. Get Paysera account
There are two types of accounts which could be used with an integration:
-
Production
is used as a real environment. To obtain an account register in Paysera. -
Sandbox
is used as a developing environment. To obtain an account, register in Paysera Sandbox.
Žiūrėkite vaizdo įrašo instrukcijas
Step 3. Sign an Agreement
Contact Paysera with a description of how are you going to use specific API, which API will be used
and will it be used with Production
or Sandbox
. You might be asked to provide
additional information.
Signing an agreement can be skipped if Sandbox environment will be used, but we strongly advise to sign an agreement
at any case, as only with an agreement you might be sure,
that we will allow using our services in Production
.
Step 4. Get API client configured
Read the chapter about Authentication and choose the method you prefer, inform Paysera about your selection. It takes time to configure all, so when it will be ready, we will send credentials to your specified address.
Sandbox
and Production
environments are different, so you won't be able to use the same
credentials from one environment on another.
Sandbox
client can be configured without an agreement, while
Production
client requires an agreement.Authentication
All API calls must be authenticated. Currently, two authentication schemes are used:
- By using MAC access authentication - providing the signature of the request as a header in each request. The shared secret key is used, but never sent with the request. This authentication protocol is always used to provide the access token (getting user's information).
- By using SSL client certificate. Before using this protocol, the owner of the client provides a certificate request for Paysera administrators. The certificate request is signed and the certificate is provided back to the client's owner. This certificate, together with the related private key, is used to sign each API request. This method is safer, as the secret is never shared w ith Paysera system - the private key is known only to the client.
In any case, all requests to the Paysera system are made using HTTPS protocol. Paysera system always authenticates the client, but the client needs to be sure that the authentication on Paysera server is performed too. For all API calls, the certificate of Paysera server must be checked for validity. This protects from DNS spoofing, MITM, and similar attacks.
MAC access authentication
MAC access authentication used in API is based on the OAuth 2.0 Message Authentication Code (MAC) Tokens specification.
Before using API, you must register your app in Paysera system. Public registration is not yet available, please contact our support to register the client for this API. You will be provided with your credentials, for example:
client_id: wkVd93h2uS mac_key: IrdTc8uQodU7PRpLzzLTW6wqZAO6tAMU mac_algorithm: hmac-sha-256
mac_key
must be kept secret at all times.
At each request to API the client must construct an authentication header by calculating the UNIX timestamp
and
generating a random string used as a nonce
. From these values, together with the HTTP request method,
request URI, hostname, port and mac_key
, the client has to calculate hash using the algorithm
defined by mac_algorithm
. This calculated hash is mac
value, which must be included in the
authorization header.
Authorization header
Authorization header must contain the authorization protocol (MAC
) and the following parameters:
id
- ID assigned to the client making the request (client_id
);ts
- calculated UNIX timestamp;nonce
- randomly generated value; only characters in ranges %x20-21 / %x23-5B / %x5D-7E can be used;mac
- calculated hash of request values andmac_key
;-
ext
- extension to MAC protocol. May contain parameterbody_hash
and extra parametersproject_id
,location_id
. Parameters are URL-encoded.body_hash
is the result of sha256 and base64 encoded request content if it's present. If there is no content,body_hash
should be omitted.ext
can be empty if there are no parameters, includingbody_hash
.
Example:
GET /transfer/rest/v1/transfers/10145 HTTP/1.1 Host: wallet.paysera.com User-Agent: Paysera WalletApi PHP library Authorization: MAC id="wkVd93h2uS", ts="1343811600", nonce="nQnNaSNyubfPErjRO55yaaEYo9YZfKHN", mac="Bp22nWw9qFsz7ux5xOYkCIYJjXAz8mhxTSfJsoOKV3A="
Calculating MAC value
mac
value is calculated from the normalized request string and mac_key
parameter.
Normalized request string
The normalized request string is constructed by concatenating together, in order, the following HTTP request elements, each followed by a new line character (%0A
when urlencoded
, \n
in most of
programming languages):
timestamp
;nonce
;- HTTP request method in upper case;
- HTTP request URI;
Host
request header value in lower case;- Request port - in this API always
443
; - The value of
ext
field - URL-encoded string containing various extra parameters.
1343811600\n nQnNaSNyubfPErjRO55yaaEYo9YZfKHN\n GET\n /transfer/rest/v1/transfers/10145\n wallet.paysera.com\n 443\n \n
MAC calculation algorithm
If MAC algorithm ishmac-sha-256
, mac
is calculated using
HMAC algorithm
together with the sha256 hash function:
mac = HMAC-SHA256(mac_key, normalizedRequestString)
Please refer to HMAC and SHA256 specifications for more details on these algorithms.
The result is provided as a binary result, encoded in base64.
SSL client certificate authentication
When using this authentication scheme, no additional headers are needed. To register the certificate with Paysera system, the certificate request must be provided for our administrators to generate the signed certificate.
Before generating the certificate request, a private key must be generated. Always keep the private key securely and don't disclose it even to Paysera administrators.
For example, the certificate request can be generated using openssl command line client:
openssl genrsa -out private.pem 2048 openssl req -new -key private.pem -out certificate_request.csr Country Name (2 letter code) [AU]:LT State or Province Name (full name) [Some-State]: Locality Name (eg, city) []:Vilnius Organization Name (eg, company) [Internet Widgits Pty Ltd]:UAB Some Company Organizational Unit Name (eg, section) []: Common Name (e.g. server FQDN or YOUR name) []:example.com Email Address []:info@example.com
An optional company name []
when generating a certificate request