Logo
  • Overview
  • Consent
  • Authenticate
  • Authorise
  • Consent Management
  • Notifications
Data Standards Body | CX Guidelines

CX Guidelines

Overview

Consent

Authenticate

Authorise

Consent Management

Notifications

Keep in touch

DSB Newsletter

Website use

Accessibility Statement

Copyright

Privacy

Disclaimer

In the spirit of reconciliation, the Data Standards Body acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their Elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples.

Consumer Experience (CX) Guidelines
/
Overview
/
CX Checklist
/
CX Guidelines
/
00. Fallback Authentication Framework

00. Fallback Authentication Framework

Checklist ref

2AU0.00.16

Area
2AU0. Fallback Authentication Framework
Wireframe ref

16

Type
Technical Standard
Requirement level
MUST
Participant
Data Holder
Statement

Where a data holder supports the ‘Redirect to Web with OTP’ flow: • The data holder MUST request a user identifier in accordance with User Identifiers. • The data holder MUST provide a one-time password (OTP) to the customer through an existing channel or mechanism that the customer can then enter into the redirected page. • The delivery mechanism for the OTP is at the discretion of the data holder, but MUST align to existing and preferred channels for the customer. • The data holder SHOULD implement additional controls to minimise the risk of interception of the OTP through the selected delivery mechanism. • The provided OTP MUST only be used for authentication for CDR based sharing and MUST NOT be usable for the authorisation of other transactions or actions. • The provided OTP MUST be invalidated after a period of time at the discretion of the data holder. This expiry period SHOULD facilitate enough time for the customer to reasonably complete the authorisation process. • The provided OTP MUST be numeric digits and be between 4 and 6 digits in length. • The algorithm for the creation of the OTP is at the discretion of the data holder but SHOULD incorporate a level of pseudo-randomness appropriate for the use case. • The data holder SHOULD implement additional controls to minimise the risk of enumeration attacks via the redirect page.

Reference

Security Profile, Credential Requirements, One Time Password Credential Requirements

Example

Authenticate: Fallback Authentication Framework

Version introduced
1.35.0
Date introduced

22 September 2025

Date modified

Status
Active