Re: Token Request Name support in the Token Inquiry Request
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Token Request Name support in the Token Inquiry Request
Hi
The Token Request Name is currently not supported in the response of the Token Inquiry Request.
What are your plans to support this field in this response?
And how else can we obtain the requestor name?
Thanks for your response.
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: Token Request Name support in the Token Inquiry Request
Thank you for reaching out, @claudio! An agent is looking into this and will get back with you shortly. -Jenn
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: Token Request Name support in the Token Inquiry Request
Hi @claudio,
Please visit our detailed Product page at Visa Ready and submit specific queries about VTS through Visa Ready using the “Contact Us” link.
Thanks,
Illana
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: Token Request Name support in the Token Inquiry Request
Hello,
@claudio wrote:Hi
The Token Request Name is currently not supported in the response of the Token Inquiry Request.
What are your plans to support this field in this response?
And how else can we obtain the requestor name?Thanks for your response.
The absence of Token Request Name in the Token Inquiry Response is a limitation. While there's no definitive timeline for its inclusion, you can consider these alternatives:
- Correlate with other request data: If your system logs token requests, try matching the token with request timestamps or other identifying information.
- Implement a custom request ID: Include a unique identifier in token requests and responses to track them.
- Leverage additional token attributes: If available, use other token attributes like creation time, expiration, or associated user information as clues.
- Directly query the system: If feasible, access system logs or databases to retrieve the requestor name based on the token.
Remember to prioritize data privacy and security when implementing these workarounds.