4. Compute HASH
Hashing Methods
The parameter tampering attack is based on the manipulation of parameters exchanged between client and server in order to modify application data, such as user credentials, amount and quantity of products, etc.
SubVendor Hash Method
To ensure secure processing and prevent parameter tampering attacks, it is mandatory to generate a hash for each sub-vendor included in the SubVendors
array within the request body. This hash must be created using the respective sub-vendor's details and secured using the main merchant's Authkey
. The generated hash should be included in the request to verify the integrity and authenticity of each sub-vendor's data. Failure to include a valid hash for each sub-vendor may result in the rejection of the multivendor payment request.
Below is the code sample to create sub nvedor hash
Last updated