Secondary Settings
These settings are normally correct at their default values but can be overridden if necessary.
Table 5-2 Pay By Link - Secondary Settings
Setting | Description | Default | Example |
---|---|---|---|
maintenance.menu.timeout.seconds |
Specifies the admin menu timeout; in seconds. |
6000 |
|
adyen.paybylink.cnp.response.timeout.seconds |
Specifies how long to wait for a response from the customer not present endpoint; in seconds. |
600 |
|
adyen.paybylink.cnp.default.country.code |
Specifies the default country code to use in customer not present transactions when the country code has not been specified in the original request. This is in ISO 3166-1 alpha-2 format. |
N/A |
|
adyen.paybylink.cnp.default.shopper.locale |
Specifies the default shopper locale to use in customer not present transactions when the shopper locale has not been specified in the original request. |
N/A |
|
adyen.paybylink.cnp.default.link.expiry.hours |
Specifies the default link expiry of links created for customer not present transactions; in hours. |
24 |
|
adyen.paybylink.cp.endpoint |
Specifies the endpoint for customer present transactions/communications. |
N/A |
|
adyen.paybylink.cp.response.timeout.seconds |
Specifies how long to wait for a response from the customer present endpoint; in seconds. |
300 |
|
adyen.paybylink.cp.sale.id |
Specifies the sale id to send in customer present transactions. This is typically your unique cash register identifier. Mandatory setting if |
N/A |
|
adyen.paybylink.cp.POI.id |
Specifies the poi id to send in customer present transactions. This is your unique identifier of the terminal, in the format [device model]-[serial number]. Mandatory setting if |
N/A |
|
adyen.paybylink.cp.protocol.version |
Specifies the version of Adyen’s Terminal API to send in customer present transactions. Mandatory setting if |
3.0 |
|
adyen.paybylink.cp.adyen.crypto.version |
Specifies the Adyen crypto version to send in customer present transactions. Mandatory setting if |
N/A |
|
adyen.paybylink.cp.key.identifier |
Specifies the (Encrypted) Adyen Key Identifier to use to perform customer present transactions. Mandatory setting if |
N/A |
|
adyen.paybylink.cp.key.identifier.iv |
Specifies the (Encrypted) Adyen Key Identifier’s initialization vector. Mandatory setting if |
N/A |
|
adyen.paybylink.cp.key.passphrase |
Specifies the (Encrypted) Adyen Key Passphrase to use to perform customer present transactions. Mandatory setting if |
N/A |
|
adyen.paybylink.cp.key.passphrase.iv |
Specifies the (Encrypted) Adyen Key Passphrase’s initialization vector. Mandatory setting if |
N/A |
|
adyen.paybylink.cp.key.version |
Specifies the (Encrypted) Adyen Key Version to use to perform customer present transactions. Mandatory setting if |
N/A |
|
adyen.paybylink.cp.key.version.iv |
Specifies the (Encrypted) Adyen Key Version’s initialization vector. Mandatory setting if |
N/A |
|
crypto.keygenType |
Specifies the keygen type to use for the internal encryption processing. |
AES |
|
crypto.cipherType |
Specifies the cipher type to use for the internal encryption processing. |
AES/GCM/PKCS5Padding |
|
crypto.keySize |
Specifies the key size to use for the internal encryption processing. |
128 |
|
crypto.iterations |
Specifies the number of iterations to use for the internal encryption processing. |
100000 |
|
crypto.factoryinstance |
Sets crypto factory instance for keystore password encryption. |
PBKDF2WithHmacSHA512 |
|
crypto.secretkeyspec |
Sets crypto secret key spec for keystore password encryption. |
AES |
|
crypto.keystoretype |
Sets keystore type |
JKS |
crypto.keystoretype = JKS |
crypto.digest |
Sets digest for keystore password. |
SHA-512 |
|
crypto.hashbyteSize |
Sets hash byte size for keystore password. |
384 |
|
merchant.reference |
Specifies the unique merchant reference. |
N/A |
|
merchant.reference.format |
Specify the format of the merchant reference - replaces static value with a dynamically generated value using several substitutions. |
R (use existing static merchant ref) |
|
merchant.reference.special.characters |
Specifies a character that is to be passed through 'as is' in addition to the ones already mentioned. |
N/A |
|
truststore.trustAllServers | Disable validation of certificates with the truststore on connection between EFTLink and EPS devices. | false |
truststore.trustAllServers = false Disabling validation of the truststore is never a recommended practice. |
truststore.ProtocolsWhiteList | Restricts the protocols which are permissible in the connection between EFTLink and EPS devices. Default allows for TLS 1.3 security. | TLSv1.3,TLSv1.2 |
truststore.ProtocolsWhiteList = TLSv1.3,TLSv1.2 |
truststore.CipherWhiteList | Restricts the ciphers which are permissible in the connection between EFTLink and EPS devices. The whitelist only includes ciphers which are approved under Oracle Approved Technologies: Security Protocols |
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_AES_128_CCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_CCM,TLS_ECDHE_ECDSA_WITH_AES_128_CCM |
truststore.CipherWhiteList = TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_AES_128_CCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_CCM,TLS_ECDHE_ECDSA_WITH_AES_128_CCM |
truststore.CipherBlackList | Restricts the ciphers which are not permissible in the connection between EFTLink and EPS devices. The blacklist only includes ciphers which are not approved under Oracle Approved Technologies: Security Protocols |
SSL_.*,TLS_EMPTY_.*,.*_SHA,.*_3DES_.*,.*_DES_.*,.*_WITH_NULL_.*,.*_anon_.*,.*EXPORT.*,.*LOW.*,.*MD5.*,.*DES.*,.*RC2.*,.*RC4.*,.*PSK.*,TLS_DH_.*,TLS_DHE_.* |
truststore.CipherBlackList = SSL_.*,TLS_EMPTY_.*,.*_SHA,.*_3DES_.*,.*_DES_.*,.*_WITH_NULL_.*,.*_anon_.*,.*EXPORT.*,.*LOW.*,.*MD5.*,.*DES.*,.*RC2.*,.*RC4.*,.*PSK.*,TLS_DH_.*,TLS_DHE_.* |
truststore.useJVMTrustStore | Use JVM cacert truststore instead of EFTLink dedicated truststore. | False |
truststore.useJVMTrustStore = false Disabling use of the EFTLink dedicated truststore is never a recommended practice. |