/
Approaches explanation (DEPRECATED)

Approaches explanation (DEPRECATED)

This page is now deprecated. We urge you to check out our new Access Public Documentation that we recently published instead, which covers all state-of-the-art information of our products.

Note: due to overall restructuring for our new Access Public Documentation, there might not be a corresponding page with the exact same content like this deprecated page in our new documentation. However, we make sure to already cover all information you need, including this content, in our new documentation.

Related content

Downloading data for multi-interface accounts (DEPRECATED)
Downloading data for multi-interface accounts (DEPRECATED)
Read with this
finAPI Access PSD2 Migration Plan (DEPRECATED)
finAPI Access PSD2 Migration Plan (DEPRECATED)
More like this
XS2A Migration Howto (DEPRECATED)
XS2A Migration Howto (DEPRECATED)
Read with this
TPP Authentication using the finAPI PSD2-Licence (DEPRECATED)
TPP Authentication using the finAPI PSD2-Licence (DEPRECATED)
Read with this
XS2A Interface implementation (DEPRECATED)
XS2A Interface implementation (DEPRECATED)
Read with this
Using your own eIDAS Certificates and TPP Credentials in finAPI Access PSD2 (DEPRECATED)
Using your own eIDAS Certificates and TPP Credentials in finAPI Access PSD2 (DEPRECATED)
Read with this