[AlphaCommerceHub] Is it possible to implement tokenization client-side like for Stripe?

As I see in the «API Integration Guides» → «Tokenization» → «Appendix» → «Sample Token Request» documentation section, a Tokenize API request requires the merchant’s UserID parameter, which acts as a password and should be secured, so my extension (plugin) for Magento 2 should not pass it to the Magento 2 client site (browser).

So, my extension for Magento 2 should pass the sentitive bank card data to the Magento server side, which automatically obliges every extension’s user (merchant) to pass the 40-pages «Self-Assessment Questionnaire D» PCI DSS certification.

Otherwise, the modern payment service providers like Stripe provide a client-side tokenization (in browser with JavaScript) using just a public key (without passwords like AlphaCommerceHub’s UserID).

The Stripe’s website says:

We strongly discourage passing card information directly to Stripe’s API as it means your integration is directly handling card information. Even if you do not store any payment information, we can only help simplify PCI compliance if you’ve integrated with Checkout, Elements, or our mobile SDKs.

If you continue to send card details directly to our API, you’ll be required to upload your SAQ D annually to prove your business is PCI compliant. SAQ D is the most onerous of all the SAQs, with over 40 pages of requirements you must implement to remain PCI compliant. We highly recommend you migrate to client-side tokenization of card information to substantially reduce the scope of your PCI compliance.


See also:

I have got a response from the AlphaCommerceHub support:

There is the tokenization function as part of the HPP implementation that will cause the system to return a token after a transaction is processed.

This happens automatically when AlphaSecure is included in the process flow for AuthPayment.


This should be used to store the token so that you don’t need to handle the card number directly.

Another response:

yes we do support client side encryption
Attached guide and a sample/demo script

A sample script

<!doctype html>
    <title>JavaScript RSA Encryption</title>
    <script src="https://sb1hub.gpcloud.com/libs/jcse/crypto.min.js"></script>
    <script src="https://sb1hub.gpcloud.com/libs/jcse/apcpublickey.js"></script>
    <script type="text/javascript">

	  function encryptAndSubmit() {
		var encrypt = new Crypto();
		cardnumber =  document.getElementById("cn").value;
        var encrypted = encrypt.encrypt(cardnumber);
		document.getElementById("cn").value = encrypted;
		cvv =  document.getElementById("cvv").value;
        var encrypted = encrypt.encrypt(cvv);
		document.getElementById("cvv").value = encrypted;

	<form id="form-id">
		Card Number:<br>
		<input type="text" id="cn" name="cardnumber" value="5404920199980103">
		<input type="text" id="cvv" name="cvv" value="234">
		<input type="button" value="submit" onclick="encryptAndSubmit();"/>
		<input type="button" value="reset form" onclick="document.getElementById('cn').value = '5404920199980103'; document.getElementById('cvv').value = '123';"/>

AlphaHub Client Side Encryption Guide

Release Change Description
November 2016 First revision
October 2017 Document Rebrand
November 2017 Hosted CSE option

The purpose of this document is to define the details associated with utilizing the Alpha Client Side Encryption Library “Web-Crypto” and creating, submitting and interpreting “Client Side Encrypted” transaction requests via the AlphaHub API.


Client Side Encryption securely encrypts sensitive credit card information in the customer’s browser so that a merchant can accept the form data on their system and then pass it through to Alpha and reduce their PCI compliance scope.


Asymmetric encryption is used to encrypt the sensitive data using a public key from an RSA public/private key pair. The data is then only able to be decrypted by Alpha servers using the stored private key.
The public key is distributed to the merchant for encryption, however the private key is retained by Alpha so that only Alpha is able to decrypt sensitive data, in this manner we achieve end to end encryption between the final user and Alpha.


  1. Utilise the Public Key supplied by Alpha. This will be environment specific.
  • Include the Web-Crypto library crypto.js in your paypage
  • Encrypt the PAN/Card Number and CV2 (Card Security Value) fields utilizing the library
  • Submit an AuthPayment or OneStepPayment request with the encrypted values and CardDetails.Custom1 = ‘ENCRYPTED’ (not case sensitive)

Currently the AlphaHub Engine is designed to identify and interpret two unique inbound transaction XML/JSON layouts within the AlphaHub transaction engine.
They are differentiated by using the <Version></Version> tag within the inbound <Header> section of the request.

Version 2 - is associated with the “Dynamic Inbound” request that is specifically designed to obtain and generate the variable requests required to map and communicate with the fraud, risk, ecommerce and payment providers available within the AlphaHub product library.

For more information please refer to the Hub API Integration Guide.

Version 3 - Packet Level Encryption of version 2 requests encapsulated in a fully encrypted message.
Although the encrypted message body data parallels the existing version 2-layout structure, it is required that all inbound requests be designated as Version 3 on the http header in order to signify the need for the AlphaHub transaction engine to decrypt and interpret the message request.

The example API request in this document is for a Version 2 request where Client Side Encryption was used on sensitive data fields. It is possible that a request using Client Side Encryption can also be submitted utilizing Packet Encryption.
For more information on API Packet Encryption please refer to the Hub API Packet Encryption Guide.


Alpha Client Side Encryption has been tested on the most recent versions (as of November 11th 2016) of the following browsers: Firefox/Chrome/Opera/Chromium/Safari/Edge.

As Alpha Client Side Encryption utilizes Javascript if a customer has Javascript turned off in their browser the encryption will not function.


Alpha have introduced an option whereby the CSE library and public key are hosted on an Alpha server and the merchant can utilize the Alpha hosted files for the encryption routine.

Your account contact will advise the environment specific location of the resources:

  • /libs/jcse/crypto.min.js
  • /libs/jcse/apcpublickey.js

The implementation steps will be as follows:

  1. Utilise the Public Key hosted by Alpha. This will be environment specific.
  • Utilise the crypto library “crypto.js” hosted by Alpha
  • Encrypt the PAN/Card Number and CV2 (Card Security Value) fields utilizing the library
  • Submit an AuthPayment or OneStepPayment request with the encrypted values and CardDetails.Custom1 = ‘ENCRYPTED’ (not case sensitive)


  • All valid XML/JSON inbound message requests (Version 2) will need to be enhanced to utilize and Post the following:
  • Set CardDetails.Custom1 = ENCRYPTED
  • Supply encrypted values returned by library for CardNumber and CardCVV


		<CardNumber> DHtJk3taFNzrURymEDxyziK5z/CWjNEMCaq8S67pb28UVsMM3VLVsa4eyAlNo/qaD8k6Fr16OVu4JOj6H3Y9f3pXvVEkFN+5jh0VhwIcIACxs045xFy9ZdISsX86J/GsqlVvKMVVti3JjmEYRyZc93NYMhgylydEZNY0UTU+aDXJf4RxBstAxi2ijSjPuTG/jCEU9Y2ablyAHS7gjr8XGDASRbT1bHQCzGtb4JZXyd9cNmYbVQmItneg2NPhw5SLD1YMx3lDrAHMHfXu2KFt4dwwnwCsJPFJLUMP4BHfGC+XJcTRTbZOl+el3BJ6md5qVz44oOEb/0j+HpFUl78Xrg==</CardNumber>
		<CardHolder>Tom Jones</CardHolder>
		<CardCVV> Q+rAKkw1Qpueg2SG8PHvjatSNIlCtaWba3VCQ4fHTmQ3eU9OULMF67AD+6aMY5hehH5CoXP2C6TchZdBWkfYcTAkZEMPoBLtenkw+66EZhuBtN6vbPn8KxSuJF3pUIg7W30wwgXe2dFbFkXKVjsWUR8F8oBPO9IvHzsfn0tCJbUC4eELT2HI/tRClEiuGIxmWyGvS6IrDPdXijdgEByHYD1raWVgjX7cdSPnjRaAavSt2q9M2Mvwc72umFU9I+NOhRYlQjSYneuICDeQfB5DtjDbHPKFgnGbF7GJ3RmlrmJP5SthiJmBHBpc/ygjiXFw9yniuKqRBguAyHxCedC5Nw==</CardCVV>