Beruflich Dokumente
Kultur Dokumente
Introduction
This tip provides answers to frequently asked questions (FAQ) related to the impact of the Standard Release
2018 on Alliance Access/Entry, Alliance Messaging Hub and Alliance Lite2.
Disclaimer
This tip describes functional behaviour planned for a future 2018 delivery of Alliance Access/Entry, Alliance
Messaging Hub and Alliance Lite2. As such it describes intended behaviour, without any guarantee that the final
software delivery will deliver exactly what is described below.
Glossary
Field 111 Service type identifier – a new field in block 3 of FIN messages. Previously known as the
SLA ID.
Field 121 Unique end-to-end transaction reference (UETR) - a new field in block 3 of FIN
messages
Service type identifier Field 111 in Block 3 identifying which SWIFT gpi service the sender is subscribed to.
SWIFT gpi The project that aims to improve customer experience in cross-border payments by
increasing their speed, transparency, and traceability. To achieve this, SWIFT gpi
customers agree to respect service-specific business rules and technical requirements
captured in rulebooks. The rules for the gCCT (gpi Customer Credit Transfer) service
are described in the SWIFT gpi Customer Credit Transfer
(https://www2.swift.com/uhbonline/books/public/en_uk/udic/trm_67611976.htm)
rulebook which covers Customer Credit Transfers, Cover (gCOV) and Stop & Recall
(gSRP) services. A rulebook will be developed for each additional service. The SWIFT
gpi product suite comprises three components, the Tracker for SWIFT gpi
(https://www2.swift.com/uhbonline/books/public/en_uk/udic/trm_67610856.htm), the
Observer Insights for SWIFT gpi
(https://www2.swift.com/uhbonline/books/public/en_uk/udic/trm_67610550.htm), and
the Directory for SWIFT gpi
(https://www2.swift.com/uhbonline/books/public/en_uk/udic/trm_67602495.htm).
Table of Contents
Field 111 Service type identifier is used together with field 121 within SWIFT gpi (Global Payments
Innovation). SWIFT users which are not a member of the SWIFT gpi service are not allowed to generate
or forward field 111 in messages sent.
From a receiving perspective, to cover (potential) expansion of the gpi service (not necessarily linked to a
Standards MT Release) any SWIFT user is requested in SR 2018 to implement the ability to receive the
fields 111 and 121 in header block 3 for all category 1 and all category 2 MTs (for example, a SWIFT gpi
bank can send an MT 192 with UETR to a non-gpi bank).
In addition, the tank file contains messages that you can use to tune to your environment.
For institutions generating cover payments, it is important to understand the difference in behaviour
depending on whether MT 202 COV is sent before or after the corresponding MT 103 when you chose to
let the interface adding the UETR.
In SR2017, if the field 111 and 121 were present in the MT 103 they were copied in the block 4 (body) of
the MT 096 by SWIFT.
This means the FIN copy server is potentially already receiving MT 096 with 111 and 121.
Alliance Access and AMH did not perform any particular change for the MT 097, and processed what it
got from the back-office.
For SR2018 there are no changes in this area from a definition point of view. Depending on the FINCopy
service definition, it will be possible that the MT 103, MT 202 and MT 205 only contains the field 121
(UETR), so the MT 096 can only have the field 121 in block 4.
While Alliance Access/Entry 7.3 was announced already in 2017 to implement SR2018, SWIFT will also
provide update 7.2.50 on top of release 7.2 in line with the SWIFTNet and Alliance release policy
(https://www2.swift.com/uhbonline/books/protected/en_uk/s_snrp/s_snrp.pdf).
IMPORTANT: As Alliance Access/Entry 7.1 will reach end of support end November 2018, no SR2018
update will be made available for Alliance Access/Entry 7.1. Migration from 7.1.xx to release 7.2.00 is
required prior to the upgrade to 7.2.50.
Assuming you already migrated to release 7.2 you will require to perform the following steps:
3. What will happen if I send messages without UETR after the cut-over and Alliance Access/Entry
Only assigning the LT to SR2018 at the cut-off date (22 July for Test&Training, 18 November in live) to
avoid unwanted NAK’ed messages.
SWIFT FIN Interfaces will not offer functionality to pass on the UETR unchanged from received
(incoming) message into outgoing message. Therefore intermediary institutions must not rely on the
FIN interface and implement this change in the back-office.
6. I’m becoming a SWIFT gpi bank. Can I rely on Alliance Access/Entry for adding UETR and Service
Type Identifier?
Alliance Access/Entry can help to fast track SWIFT gpi roll-out, but you cannot rely on Alliance
Access/Entry for all SWIFT gpi needs. In the end SWIFT gpi business logic must be built in your
payments system.
Alliance Access/Entry SR2018 implementation will have a configuration parameter to add for a specific
BIC the Service Type Identifier 001 in field 111 for every MT 103 and related MT 202 COV. This will help
banks in the role of Instructing Agent to become a SWIFT gpi member very fast without the need to
change the back office to add UETR and Service Type Identifier immediately. Banks in this case should
however enhance their back-office to create UETR and Service Type Identifier at their earliest
convenience to take the full benefits from the SWIFT gpi service.
Banks joining SWIFT gpi in another role (i.e. Intermediary Agent) will however have to implement
additional changes in the back office as of the start. Typically, after receiving an MT 103, MT 202 COV,
MT 205 COV where they act as intermediary bank, they will have to use the same UETR in the forwarded
MT 103 and (if applicable) MT 202 COV and MT 205 COV. Alliance Access/Entry does not provide such
features.
Adding the field 111 configuration option must only be used by gpi member banks and BICs that are
configured in the gpi Closed User Group. Use of this option by non-gpi member banks will result in the
messages being NAKed because of presence of field 111.
When the SR2018 update is installed on 7.2, for BICs assigned to SR2018, Alliance Access/Entry will
automatically add a UETR to all MT 103, MT 103 REMIT, MT 103 STP, MT 202, MT 202 COV, MT 205
and MT 205 COV which do not have a UETR at the moment the message is added to the database.
8. How will Alliance Access/Entry add UETR on messages from the back-office?
Alliance Access/Entry allows since version 7.1.20 the addition of Service Type Identifier (field 111) and/or
UETR (field 121) through any channel that can add messages (including Message Partners, ADK
modules, IPLA modules and REST APIs).
When the SR2018 update is installed on 7.2, for BICs assigned to SR2018, Alliance Access/Entry will
automatically add a UETR to all MT 103, MT 103.REMIT, MT 103 STP, MT 202, MT 202 COV, MT 205
and MT 205 COV which do not have a UETR at the moment the message is added to the database. For
the MT 202 COV this is dependent on finding the related MT 103. (See question 10)
9. When in the message flow will Alliance Access/Entry add the UETR?
Alliance Access/Entry will add the UETR on messages for which it is mandatory at the moment the
message is created in the Alliance Access/Entry database, independent of the method used to create the
message. (i.e. manual entry, message partners of all types as well as ADK and IPLA components)
Alliance Access/Entry will make no distinction between FIN Input messages and FIN output messages
when it comes to adding a UETR.
· Add a random RFC4122 variant 4 for the MT 103, MT 103 REMIT, MT 103 STP, MT 202, MT
205 and MT 205 COV
· For the MT 202 COV, Alliance Access/Entry will:
o look in the live database (excluding archives) if it can find an MT 103, MT 103 REMIT, MT
103 STP with a sender BIC and TRN (field 20) matching the sender BIC and related TRN
(field 21) of the MT 202 COV
§ If exactly one is found the MT 202 COV will get the same UETR as the MT 103
§ If none or multiple are found, the MT 202 COV will be routed to the modification
queue for manual processing
Note: If the MT 103 was received on a different instance of Alliance Access than the one from which the
MT 202 COV is sent, or if the MT 202 COV related reference doesn’t match the referenc of the MT 103,
Alliance Access will not be able to find that MT 103, and move the MT 202 COV to the modification
queue for manual handling.
Note: Through system wide configuration (BSS – Message – MT 103 look-up), it will be possible to
disable the UETR look-up feature for MT 202 COV and use random UETR instead. This to avoid
excessive number of MT 202 COV to go to the modification queue In certain cases. Such scenario
however will result in the institution not implementing the Standards Usage guidelines as a new UETR
will always be created for the MT 202 COV whereas the Standards require copying the same UETR in
the MT 202 COV as in the underlying MT 103. Although the messages will not be rejected by the
network, this will break the end-to-end tracking of the messages within the payment chain which SWIFT
is currently building on all payment transactions.
11. What will happen if my back-office sends the MT 202 COV first?
In case the back office sends the MT 202 COV without UETR before the MT 103 to your Alliance
Access/Entry, the MT 202 COV will be routed to the modification queue for manual processing. It will be
up to the person who handles the MT 202 COV to wait for the related MT 103 to find the UETR, find the
UETR from another source or add a random UETR.
At the moment that the related MT 103 without UETR is sent from the back-office to Alliance
Access/Entry, no lookup will be done for a related MT 202 COV and a random UETR will be added to the
MT 103.
If this is your normal business scenario it is highly recommended to make sure that the back-office adds
the same UETR to both MT 103 and MT 202 COV belonging to the same transaction in order to avoid
excessive manual repair. Alternatively it will be possible to disable the MT 202 COV UETR look-up
feature and use random UETR instead.
13. Will Alliance Access/Entry add the same UETR to an outgoing MT 103 if I’m an Intermediary
institution?
Intermediary institutions are expected to pass on, unchanged, a received UETR in the MT 103, MT 103
REMIT, MT 103 STP, MT 202, MT 205, MT 202 COV and MT 205 COV in the next MT sent in the
transaction chain. When such an MT 103, MT 103 REMIT, MT 103 STP, MT 202, MT 205, MT 202 COV
or MT 205 COV is sent, Alliance Access/Entry will add a random UETR if no UETR was provided. There
is no UETR look-up feature like the one we provide for the MT 202 COV. Such scenario however will
result in the user not implementing the Standards Usage guidelines as a new UETR will always be
created whereas the Standards require to pass unchanged the same UETR from the incoming message
to the next message in the transaction chain when acting as intermediary institution. Although the
messages will not be rejected by the network, this will break the end-to-end tracking of the messages
within the payment chain which SWIFT is currently building on all payment transactions.
14. How does Alliance Access/Entry send the UETR to the back-office?
Already today, message ACK sent to Back Office always contains the MT-Blocks 1,2,3,5 of the original
message even if the Message Partner configuration parameter Transfer Original Message with
Notification is set to Never. Therefor the UETR and Service Type Identifier are part of the block 3.
· When using simple batch files (like RJE) the header of the original message would be appended
to the ACK and it would carry the UETR and Service type identifier
· When using the XMLv2 format (revision 7 introduced with 7.1.15 or later), the information would
be provided via
<xs:element name="ServiceLevelAgreement" type="ServiceLevelAgreement" minOccurs="0" />
As this is the case already today; this can be tested with the current software..
· DOS/PCC
· MERVA/2
· RJE
· MQ MT
The checkbox will be checked by default and propagate the UETR field to the back-office. If the checkbox
is not checked, then Alliance Access/Entry will remove the UETR (field 121) field from the block 3 of FIN
messages sent to the back-office. The Service Type Identifier (field 111) will not be removed with this
option.
For the XMLv2, the checkbox is not available and the UETR is always sent to the back-office. Back-office
systems parsing XMLv2 typically ignore XML tags that they don’t know by default.
AMH 3.3 (AMH 3.3.x) is out of support in August 2018, i.e. before the November 2018 SR 2018 cut-over.
There will be no AMH update 3.3.20, and no Netpack on AMH 3.3 in support of the Standards MT 2018.
This means that AMH 3.3 will not support SR 2018, and will not be able to send MT messages with a
UETR.
2. What will happen if I send messages without UETR after the cut-over via AMH to SWIFTNet and
3. What logic does AMH use when automatically adding the UETR (field 121)?
AMH 3.x.20 foresees a mechanism that checks to see if the UETR is present for messages where the
field is mandatory and automatically adds a UETR when it is missing. For the MT 202 COV, an extra logic
is added to match the message to its corresponding MT 103 (103 variant) and copy the UETR from the
MT 103. This mechanism is activated by default but may be disabled.
No workflow changes are required to implement this logic (it is incorporated on the rule sequence
processing messages from a back-end). For manually entered messages, see question 7.
4. What logic does AMH use when adding the Service Type Identifier (field 111) to SWIFT gpi
messages?
AMH 3.x.20 foresees an optional mechanism that adds the Service Type identifier (SLA ID) according to
a configurable logic for the MT 103 variants and MT 202 COV. The configuration logic determines
whether all SWIFT gpi messages get the SLA ID added or only message with pre-defined sender BICs
are filled in with the SLA ID. The SLA ID will be set to ‘001’.
No workflow changes are required to implement this logic (it is incorporated in the same rule sequence
logic to add the UETR).
Note: This configuration option must only be used by gpi member banks and BICs that are configured in
the gpi Closed User Group. Use of this option by non-gpi member banks will result in the messages being
NAKed because of presence of field 111.
SWIFT FIN Interfaces will not offer functionality to pass on the UETR unchanged from received
(incoming) message into outgoing message. Therefore intermediary institutions must not rely on the
FIN interface and implement this change in the back-office.
6. I’m becoming a SWIFT gpi bank. Can I rely on AMH for adding UETR and Service Type Identifier?
AMH can help to fast track SWIFT gpi roll-out, but you cannot rely on AMH for all SWIFT gpi needs. In
the end SWIFT gpi business logic must be built in your payments system..
AMH 3.x.20 implementation will have a configuration parameter to add the Service Type Identifier(SLA Id
) value 001 in field 111 for every MT 103 and related MT 202 COV. This will help banks in the role of
Instructing Agent to become a SWIFT gpi member very fast without the need to change the back office to
add UETR and Service Type Identifier immediately. Banks in this case should however enhance their
back-office to create UETR and Service Type Identifier at their earliest convenience to profit more from
SWIFT gpi.
Banks joining SWIFT gpi in another role (Intermediary Agent) will however have to implement additional
changes in the back office. Typically, after receiving an MT 103, they will have to use the same UETR in
the forwarded MT 103 and (if applicable) MT 205 COV. AMH 3.x.20 does not provide such features.
- the addition of Service Type Identifier (SLA ID, field 111) and/or UETR (field 121) through manual
message creation.
- the addition of a UETR (field 121), either by typing or pasting it manually, or with a ‘Generate UETR’
button in the GUI next to field 121 to create a random UETR based on RFC4122 variant 4.
With 3.4.20, the above will also be possible for customers willing to stay on the AMH 3.4 release.
The configuration parameter used to control the visibility of UETR and SLA ID fields is removed from
AMH 3.5.20/3.6.20/3.7.20 onwards. As a consequence, in 3.x.20, those two fields are always displayed
on the transaction detail panel, for every FIN message.
This is also the case for SIC messages (which support a variant of UETR field since AMH 3.7). As an
example, as SIC pacs.008 & pacs.009 are part of the list of messages supporting the UETR field, any
pacs.008 and pacs.009 opened for SIC/euroSIC will have the gpi field displayed
If the operator that enters the message manually forgets to add the UETR, and if the UETR (field 121) is
mandatory for that SR 2018 message type, then normal validation for mandatory fields applies.
· Add a random UETR based on RFC4122 variant 4 for the MT 103, MT 103 REMIT, MT 103 STP,
MT 202, MT 205 and MT 205 COV
· For the MT 202 COV, AMH will, by default :
o look in the live database if it can find an MT 103, MT 103 REMIT, MT 103 STP with a
sender BIC and TRN (field 20) matching the sender BIC and related TRN (field 21) of the
MT 202 COV
§ If exactly one is found the MT 202 COV will get the same UETR as the MT 103
§ If none or multiple are found, the MT 202 COV will be routed to the modification
queue for manual processing
Note: If the MT 103 was received on a different instance of AMH than the one from which the MT 202
COV is sent, AMH will not be able to find that MT 103, and move the MT 202 COV in exception for
manual handling.
Note: Through configuration (application property), it will be possible to disable the UETR look-up feature
for MT 202 COV and use random UETR instead
11. Will AMH add the same UETR to an outgoing MT 103 if I’m an Intermediary agent?
Institutions that act as Intermediary Agent are expected, for an received (incoming)MT 103, to pass on
unchanged the UETR of that received MT 103, in the next MT that they send in the transaction chain.
This is the role of the back-office application. When such an MT 103 is sent, and no UETR is provided by
the back-office, then AMH will add a random UETR . There is no UETR look-up feature (like the one we
provide for the MT 202 COV), since AMH cannot automatically know if an outgoing MT 103 corresponds
to a previously received MT 103.
For sent (outgoing) messages, all 3.x.20 versions support the returning of the SWIFT gpi information (via
dedicated XML tags for UETR and SLA ID) in the AMP feedback report used to report ACK information.
This report is sent to the back office from AMH for FIN input messages. This can be used to report a
UETR generated by AMH to the back-office.
13. Is the gpi directory needed to activate some or all of the features above?
No. AMH supports SWIFTRef gpi directory upload since AMH 3.6, but only gpi members can obtain the
gpi directory. Therefore, it is not possible to leverage the gpi directory to make these features also
available for non SWIFT gpi customers.
Gpi members that use AMH can use the gpi directory information from within AMH e.g. for customised
processing of SWIFT gpi messages.
2. What will happen if I send messages without UETR after the cut-over?
The central Alliance Lite2 infrastructure will always add a UETR to the messages that must have one
when the UETR is missing. Through Alliance Lite2 it will not be possible to send a message that must
have a UETR without UETR to the FIN network.
3. Where will the UETR appear in the messages I receive via AutoClient?
To avoid any back office issues SWIFT will NOT transmit the UETR to the customer AutoClient by default.
If an Alliance Lite2 customer uses a UETR-ready back office system the UETR can be kept and passed
to the customer AutoClient for further back office processing. This will have to be requested via SWIFT
support as a customisation request.
Note that this doesn’t apply for XMLv2 files passed to back-office which will always contain the UETR
when present.
When the SR2018 is activated, Alliance Lite2 will automatically add the UETR to all MT 103, MT 103
REMIT, MT 103 STP, MT 202, MT 202 COV, MT 205 and MT 205 COV which do not have a UETR at the
moment the message is added to the database.
7. How will Alliance Lite2 add UETR on messages from the back-office?
When the SR2018 will be made available, Alliance Lite2 will automatically add the UETR to all MT 103,
MT 103 REMIT, MT 103 STP, MT 202, MT 202 COV, MT 205 and MT 205 COV which do not have a
UETR at the moment the message is added to the database.
8. When in the message flow will Alliance Lite2 add they UETR?
Alliance Lite2 will add the UETR on messages for which it is mandatory at the moment the message is
created in the database, independent of the method used to create the message (manual entry or
AutoClient).
9. Which UETR will Alliance Lite2 add?
When the SR2018 is activated, and when Alliance Lite2 needs to add a UETR (because it is mandatory
for the message type and was not present in the message received from the back-office application), it
will:
· Add a random RFC4122 variant 4 for the MT 103, MT 103 REMIT, MT 103 STP, MT 202, MT
205 and MT 205 COV
· For the MT 202 COV, Alliance Lite2 will:
o look in the live database if it can find an MT 103, MT 103 REMIT, MT 103 STP with a
sender BIC and TRN (field 20) matching the sender BIC and related TRN (field 21) of the
MT 202 COV
§ If exactly one is found the MT 202 COV will get the same UETR as the MT 103
§ If none or multiple are found, the MT 202 COV will be routed to the modification
queue for manual processing
10. What will happen if my back-office sends the MT 202 COV first?
In case the back office sends the MT 202 COV without UETR before the MT 103 to Alliance Lite2, the MT
202 COV will end up in the modification queue for manual processing. It will be up to the person who
handles the MT 202 COV to wait for the related MT 103 or add a random UETR.
At the moment that the related MT 103 without UETR is sent from the back-office to Alliance Lite2, no
lookup will be done for a related MT 202 COV and a random UETR will be added.
If this is your normal business scenario it is highly recommended to make sure that the back-office adds
an appropriate UETR in order to avoid excessive manual repair.
11. Will Alliance Lite2 add the same UETR if I’m an intermediate institution?
Intermediary institutions are expected to pass on, unchanged, a received UETR in the MT 103, MT 103
REMIT, MT 103 STP, MT 202, MT 205, MT 202 COV and MT 205 COV in the next MT sent in the
transaction chain. When such an MT 103, MT 103 REMIT, MT 103 STP, MT 202, MT 205, MT 202 COV
or MT 205 COV is sent, Alliance Lite2 will add a random UETR if no UETR was provided. There is no
UETR look-up feature like the one we provide for the MT 202 COV. Such scenario however will result in
the user not implementing the Standards Usage guidelines as a new UETR will always be created
whereas the Standards require to pass unchanged the same UETR from the incoming message to the
next message in the transaction chain when acting as intermediary institution. Although the messages will
not be rejected by the network, this will break the end-to-end tracking of the messages within the
payment chain which SWIFT is currently building on all payment transactions.
{1:F21SWHQBEBBBXXX0067084395}{4:{177:1802201155}{451:0}}
{1:F01SWHQBEBBBXXX0067084395}{2:I103SWHQBEBBXXXXN}{3:{111:001}{121:9f02c25b-e6f5-4cfd-
9482-40d63f1bf930}}{5:{CHK:0A14F68DFBF0}}{S:{CON:}}
RJE representation of message with Transfer Original Message with Notification set to Always
{1:F21SWHQBEBBBXXX0067084395}{4:{177:1802201155}{451:0}}
{1:F01SWHQBEBBBXXX0067084395}{2:I103SWHQBEBBXXXXN}{3:{111:001}{121:9f02c25b-e6f5-4cfd-
9482-40d63f1bf930}}{4:
:20:test
:23B:CRED
:32A:101118EUR9533,61
:33B:EUR1958,47
:50K:FRANZ GMBH
MAINZ
:59:/BE62510007547061
JOHANN DOE
RUE FERDINANT III, 119
1040 BRUSSELS
:71A:SHA
-}{5:{CHK:0A14F68DFBF0}}{S:{SPD:}}
XMLv2 representation of message with Transfer Original Message with Notification set to Never
Last update
12/03/2018
Product
Alliance Access
Alliance Entry
Alliance Lite2
Alliance Messaging Hub
Release
Platform
Change request
Found in
Fixed in