📄️ 1. Introduction
1.1. Background
📄️ 2. High Level Architecture of NPI
2.1.High Level Block Diagram
📄️ 3. Sample Use cases
Following are some of the sample use cases of NPI.
📄️ 4. Security Features
Strong end to end security and data protection is implemented in NPI. Some of the key security features
📄️ 5. API Specifications
5.1. Authentication and Authorization
📄️ 6. Handling of Response Codes
Following are the list of response codes used in NPI that could be technical and business. HTTP Reason
📄️ 7. Source Authentication in NPI
7.1. Network Layer (L2 VPN and Source IP whitelisting)
📄️ 8. Virtual Payment Address (VPA) Based Payment
A Virtual Payment Address (VPA) is a unique identifier that resolves the bank account details and
📄️ 9. Third Party Net Settlement
Third party net settlement is for processing of final settlements for PSO or other institutions through
📄️ 10. Request to Pay (Event Based and E-Mandate Based)
Request to pay is a pull type payment instrument, such that NPI will be enabled for such Request to Pay (R2P)