Two-Factor Authentication Is Now Mandatory for Every Card Swipe — How RBI's April 2026 Rule Ends the Era of OTP-Only Payments
India’s digital payments landscape has just crossed a historic inflection point. As of April 1, 2026, the Reserve Bank of India has made Two-Factor Authentication compulsory for every digital transaction — and OTPs alone will never be enough again.
The Day Everything Changed for Indian Payments
Every time you tap your card at a grocery store, transfer money on PhonePe, or pay an EMI through your bank app, there is now a new layer of scrutiny waiting for you. Starting April 1, 2026, the Reserve Bank of India (RBI) officially enforced its landmark Authentication Mechanisms for Digital Payment Transactions Directions, 2025 — and the ripple effect touches every bank account holder, merchant, and payment platform in India.
This is not a minor regulatory tweak. This is a fundamental reimagining of how authentication works in India’s payment ecosystem. The era of receiving a single SMS-based OTP, typing it in, and calling your payment verified — is over.
To understand why this moment matters, you need to understand what went wrong with OTPs, what the RBI has replaced them with, and what this means for you as a user, a business, or a developer building payment infrastructure.
Why OTPs Failed: The Security Crack at India’s Core
For over a decade, the One-Time Password (OTP) was the cornerstone of India’s digital payment security. It was convenient, it was fast, and it was familiar. But it was also dangerously fragile.
The biggest structural vulnerability of OTP-based authentication is that it relies entirely on the security of one channel — your mobile number. Fraudsters discovered this weakness and weaponized it ruthlessly. SIM swap fraud, where criminals convince telecom operators to port a victim’s mobile number to a SIM card they control, rendered OTPs completely useless as a security tool. Once a fraudster has your number, every OTP meant for your bank account lands directly in their hands.
The numbers make the scale of this catastrophe viscerally clear. Digital payment fraud cases in India skyrocketed from 1,19,699 in 2020-21 to an alarming 14,57,000 in 2023-24 — a staggering compound annual growth rate of 130%, representing a near-12x explosion in fraud incidents in just three years. In the first 10 months of FY25 alone, digital frauds worth Rs 4,245 crore were reported, involving approximately 24 lakh incidents — a sharp jump from Rs 2,537 crore reported across all of FY23.
SIM swap fraud alone has left a trail of devastating losses. A Mumbai-based steel trading company lost Rs 7.5 crore in a single SIM swap attack when fraudsters intercepted all banking OTPs by gaining control of the company’s mobile numbers. These are not rare edge cases — they are symptoms of a systemic rot in OTP-dependent security architecture.
Alongside SIM swapping, phishing attacks evolved to capture OTPs in real time. Fraudsters built fake bank login pages that simultaneously called the real bank API, creating a relay attack where a victim unwittingly provided their OTP to a fraudster the moment they received it. Even multi-lakh transactions were compromised in seconds. The RBI recognized that the technology underpinning OTP security had not kept pace with the sophistication of attackers — and it acted.
The RBI’s Response: Authentication Mechanisms Directions, 2025
The regulatory groundwork for this revolution was laid on September 25, 2025, when the RBI issued its “Authentication Mechanisms for Digital Payment Transactions Directions, 2025.” The compliance deadline was set at April 1, 2026 — giving banks, payment service providers, and non-banking entities roughly six months to overhaul their authentication infrastructure.
The directions issued by the central bank are principle-based, meaning the RBI has deliberately avoided mandating one specific technology. Instead, it has established a clear minimum standard: every digital payment transaction must be authenticated using at least two distinct and independent factors, of which at least one must be dynamic — meaning it is unique to that specific transaction and cannot be reused or predicted.
This is a critically important distinction. Under the old framework, an OTP technically counted as a dynamic factor. But it was the only factor. Now, even if you use an OTP, you must also provide a second independent verification — a PIN, a password, a biometric scan, a device-based token, or a secure passphrase. The two factors must be drawn from separate authentication categories so that compromising one does not automatically compromise the other.
The rule applies to all entities in India’s payment ecosystem, including commercial banks, cooperative banks, payment banks, non-bank prepaid payment instrument issuers, and card networks. It is not optional. It is not a recommendation. It is a compliance obligation.
What Two-Factor Authentication Actually Means in Practice
For a regulation this sweeping, the everyday reality is more nuanced than it might first appear. The three categories of authentication factors are:
- Something you know: A PIN, a password, or a passphrase
- Something you have: A device, a hardware token, a smart card, or a software token
- Something you are: Biometric data such as a fingerprint, face ID, iris scan, or voice recognition
Under RBI’s new rules, any two of these categories can be combined to form valid 2FA — as long as one of the two factors is dynamic. For example:
- An OTP (something you have — your phone) combined with a PIN (something you know) is now the minimum valid combination.
- A biometric fingerprint scan (something you are) combined with a device-bound software token (something you have) is also valid.
- A face ID on your smartphone paired with an app-based approval notification is valid.
What is no longer acceptable is a single OTP sent via SMS standing alone as the sole authentication step for completing a payment. That model, however familiar and convenient, has been formally retired.
For card-present transactions at point-of-sale terminals — your daily grocery swipe, petrol station tap, or mall checkout — the physical card itself counts as “something you have.” This means existing PIN-at-terminal transactions already meet the 2FA requirement in many scenarios. However, for card-not-present transactions (online shopping, subscription payments), the October 1, 2026 compliance deadline applies, giving the ecosystem slightly more time to adapt.
The Risk-Based Authentication Layer: Smart Security, Not One-Size-Fits-All
One of the most sophisticated elements of RBI’s new framework is the introduction of a risk-based authentication (RBA) model. Rather than treating a Rs 10 coffee payment the same as a Rs 1 lakh wire transfer, regulated entities are now empowered — and encouraged — to apply risk-proportionate security checks.
Under this model, an issuer bank’s system continuously evaluates multiple real-time signals before deciding how much friction to introduce:
- Transaction location: Is this payment being made from your usual city, or from a different state or country?
- Device fingerprint: Is this your registered smartphone, or an unknown device?
- Behavioral biometrics: Does your typing speed, swipe pattern, and navigation behavior match your historical profile?
- Transaction history: Does this amount, merchant category, and timing fit your typical spending pattern?
- Time of day: Is this a 3 AM transaction on a dormant account?
If a transaction scores low on risk — say, your morning coffee at your usual café from your registered phone — the system may apply a lighter authentication experience. If the transaction triggers multiple risk flags, the system can demand additional verification steps beyond the standard two factors.
Sanjay Tripathy, CEO and Co-Founder of cross-border payments platform BRISKPE, noted that “the RBI by mandating risk-based checks has formalised a framework that encourages a variety of authentication mechanisms beyond just SMS-based OTPs.” This shift from rigid rule-based compliance to intelligent, adaptive security is arguably the most transformative aspect of the April 2026 framework.
What Changes Across Payment Channels
UPI Payments
UPI is India’s crown jewel in digital finance, processing billions of transactions monthly. Under the new rules, UPI transactions must also comply with 2FA mandates. In practice, many UPI transactions already use a combination of device binding (the app registered to your specific phone) and UPI PIN, which satisfies the two-factor requirement. However, payment apps must now ensure their backend infrastructure formally validates both factors, and risk-based additional checks must be deployable when flagged transactions arise.
Debit and Credit Card Payments
Card payments undergo the most visible transformation. For online card transactions, cardholders will routinely experience two distinct verification steps — not just a single OTP. This could mean entering your card details plus completing a biometric confirmation on your banking app, or combining a PIN with a device-based push notification. For card-present transactions at physical terminals, the card-plus-PIN combination already constitutes valid 2FA in many cases.
Mobile Wallets and Prepaid Instruments
Paytm, MobiKwik, Airtel Payments Bank, and similar wallets must now ensure that wallet transactions — even low-value ones above any applicable exemption threshold — go through dual authentication. This may involve app-based biometric verification combined with a wallet PIN.
Accountability: Banks Now Bear the Burden of Proof
Perhaps the most consequential clause for consumers is the shift in liability. Under the revised RBI instructions released in March 2026, banks and card issuers now bear direct liability for losses arising from weak authentication or non-compliance with the 2FA mandate. The central bank has simultaneously strengthened the framework on unauthorized electronic banking transactions, introducing a compensation mechanism and expanding AI-driven fraud analytics.
This is a landmark consumer protection move. Previously, the burden of proof in fraud disputes often fell on the victim, who had to demonstrate they had not been negligent. Now, if a transaction slips through because a bank failed to implement adequate authentication, the bank is on the hook for the resulting loss. Faster fraud complaint resolution timelines have also been introduced, meaning customers no longer have to endure months-long disputes to recover their money.
The Broader Context: India’s Digital Payments Juggernaut Needed Stronger Wheels
The urgency behind this regulation becomes starker when you look at India’s digital payments trajectory. The RBI’s Digital Payments Index (RBI-DPI) surged to 516.76 in September 2025, up from 465.33 the previous year — reflecting explosive growth in transaction volumes, payment infrastructure, and user adoption across the country. India now processes hundreds of millions of digital transactions daily, and that scale makes security failures astronomically more costly.
Banking fraud amounts hit Rs 21,515 crore in just the first six months of FY26 (April–September 2025), a 30% year-on-year surge, even as the number of individual fraud cases declined — suggesting that fraudsters are becoming more targeted and sophisticated, orchestrating fewer but far more lucrative attacks. A payment ecosystem handling the financial lives of 1.4 billion people cannot afford to run on security infrastructure designed for 2012.
The Department of Telecommunications had already flagged 80 lakh fraudulent SIM cards across India’s 134 crore mobile connections — 6 lakh of which had been directly blacklisted for their involvement in cyber scams. Each of those SIM cards was a loaded weapon pointed at OTP-based authentication. The April 2026 RBI mandate effectively neutralizes that entire class of attack vector.
What You Need to Do Right Now
If you are a bank customer or digital payments user, the action required on your part is minimal but important:
- Update your banking and payments apps to the latest version. Banks and payment providers have been rolling out 2FA-compliant updates ahead of and since the April 1 deadline.
- Enable biometric authentication on your banking apps if you have not already. Face ID and fingerprint authentication are the smoothest 2FA experience for most users.
- Register your device with your bank’s app. Device binding is a core component of the new authentication framework, and unregistered devices will face additional friction.
- Avoid sharing OTPs — this has always been good practice, but under 2FA, even a stolen OTP is only half the battle for a fraudster. Your second factor keeps you protected.
- Stay alert to unusual authentication prompts. Risk-based systems may occasionally ask for additional verification on transactions that seem atypical. This is the system working correctly, not a malfunction.
For businesses and merchants, particularly those running e-commerce platforms or subscription payment engines, the responsibility is higher. Your payment gateway integration must be validated for 2FA compliance. Card-not-present transactions have until October 1, 2026, to meet the full standard — but waiting until the deadline to begin integration testing is a risk not worth taking.
Why This Is a Turning Point, Not Just a Rule Change
India’s digital payments story has always been defined by ambitious leaps forward — from demonetization accelerating UPI adoption to BHIM democratizing mobile payments for rural India. The April 2026 2FA mandate is the next chapter in that story, and it is not merely a compliance exercise.
It represents India’s first formal, principle-based framework that decouples authentication security from any single technology. By refusing to mandate OTPs specifically — or biometrics specifically — the RBI has created a future-proof architecture. As authentication technology evolves, whether toward hardware security keys, behavioral biometrics, or zero-knowledge proofs, the framework can accommodate it without requiring fresh regulation.
The IBM analysis of the RBI’s directions frames this accurately: the mandate formally reinforces India’s long-standing AFA approach while pushing regulated entities to leverage recent technological advancements rather than defaulting to the path of least resistance. The path of least resistance — the SMS OTP — has been exploited long enough.
For the ordinary Indian cardholder, the change may initially feel like slightly more friction at checkout. A second tap, an extra confirmation screen, a biometric prompt where there used to be none. But that friction is not inconvenience — it is the sound of your money being protected by a system that finally matches the sophistication of those trying to steal it.
The era of OTP-only payments is over. And for India’s 700 million digital payment users, that is unambiguously good news.
This article is intended for educational and informational purposes. For regulatory compliance requirements specific to your organization, consult your legal and compliance advisors alongside official RBI circulars.