Commerce tokens and network tokens
Commerce tokens can be enriched with network tokens from the card schemes. Once a card payment method undergoes tokenization, and if the network tokens feature is enabled for your account, Commerce will request a network token from the card scheme and associate it with the token. If this operation is successful, the network token status is updated toactive.
To use the network tokens for payment authorization, a cryptogram must first be requested. This is created and used during the payment request as proof of token validation for card transactions requiring authorization. They help to authenticate the transaction and ensure its integrity.
The sequence diagram below demonstrates how the process works to use network tokens and request a cryptogram.
Network token payments
Step 1: Request authentication data
Commerce allows you to create these cryptograms using a previously imported token.Step 2: Decrypt authentication data
Commerce processes the request and returns the encrypted authentication data. This encrypted authentication data contains the network token and the cryptogram. For more information, please refer to our API documentation. The network token is used to authenticate the transaction, and the cryptogram is used to validate the network token. To decrypt the payload, follow these steps:- Use the
encryption_keythat was generated when the merchant was created - Use the
encrypted_authentication_datastring, which you receive as part of requesting a cryptogram response
Step 3: Authorize with your PSP
- Adyen v69
Advanced Token Management & Strategic Insights
Tokenization at scale introduces operational complexity that basic tooling can’t handle. The token management system is designed to give you full visibility into your token ecosystem, structured diagnostics when things go wrong, and the observability data you need to monitor and optimize performance over time.The token management interface is built to handle thousands of network tokens. You can navigate, filter, and inspect your full token inventory — active tokens and their associated network tokens — with a clear, real-time picture of what’s live and what needs attention. When tokenization failures occur, they surface structured error information including scheme-level failure reasons, giving you the context needed to identify whether a failure is recoverable, which scheme is the source, and where to focus optimization efforts.Failures from schemes- Tokenization Success Rate — track the share of successful tokenizations over time
- Failures by scheme — isolate which networks are contributing to failures
- Active Tokens / Network Tokens — monitor the size and health of your token base