static data business requirements - european central bank
TRANSCRIPT
Target2-Securities Project Team
TARGET2-SECURITIES
TECHNICAL GROUP 4 ON STATIC DATA
STATIC DATA BUSINESS REQUIREMENTS
Reference: T2S-07-0250
Date: 18 September 2007
Version: 0.1
Status: Draft
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
i
TABLE OF CONTENTS
1 Introduction..................................................................................................................... 2 2 Glossary of Frequently Used Terms.............................................................................. 4 3 General Principles........................................................................................................... 6
3.1 Static Data Identifier Requirements.......................................................................... 6 3.2 Static Data Status Information Requirements........................................................... 7 3.3 Data Revision and Data History ............................................................................... 9 3.4 Static Data Management ......................................................................................... 12
4 Configuration Requirements ....................................................................................... 19 4.1 Business Date.......................................................................................................... 19 4.2 Daily Processing Schedule...................................................................................... 20 4.3 System Entity Configuration Requirements ........................................................... 20 4.4 Closing Day Calendar ............................................................................................. 25 4.5 Authentication and Authorization........................................................................... 26 4.6 Authentication Parameters ...................................................................................... 32 4.7 Roles and Privileges for Authorisation ................................................................... 33
5 Currency Data............................................................................................................... 44 6 Securities Reference Data Model................................................................................. 46
6.1 Securities................................................................................................................. 47 6.2 Securities Name ...................................................................................................... 48 6.3 Securities Code ....................................................................................................... 49
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 2 of 53 Status: Draft
1 Introduction
The aim of this document is to describe the complete static data user requirements for T2S.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 3 of 53 Status: Draft
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 4 of 53 Status: Draft
2 Glossary of Frequently Used Terms This section provides a glossary of terms, frequently used in the documents of T2S Technical Group
4, but that are not included in the officially approved T2S glossary.
Term Definition
Attribute An attribute defines a characteristic of an entity. For example, the type of security is an attribute of the entity security static data.
Authentication Authentication is a security mechanism for verifying the identity of an individual or process.
CSD in T2S A CSD in T2S is a central securities depository that 1) has entered into a contractual relationship to operate on the Target2-Securities platform, 2) fulfils Article 10 of the Settlement Finality Directive 3) settles in at least one T2S eligible currency and 4) settles in a central bank money.
CSD Participant
A CSD Participant is a legal entity that has a legal or contractual relationship with a central securities depository for the purpose of holding and transferring securities.
Entity In conceptual modelling terms, an entity is a collection of attributes used to define a person, place, event, object or thing that an information system needs to operate or about which an organisation collects data. Although an entity is conceptual, its physical implementation is one or more database tables.
Occurrence An occurrence is an individual element belonging to an entity. It would be a record in a database table or file in terms of physical implementation.
T2S Party A T2S party is the term used to define a legal entity using T2S or a participant of a legal entity using T2S. A T2S party is an occurrence in the T2S party static data and can be the T2S operator, a national central bank in T2S, a CSD in T2S or a participant of a CSD in T2S.
Party Type The party type classifies a T2S party into the T2S operator, a CSD in T2S, a participant of a CSD in T2S and a national central bank.
Privilege A privilege is right, either granted or denied, to execute certain functions within an application or to access and/or update certain data.
Role A role consists of a set of related privileges. The functions that a user performs to fulfil her/his responsibilities within an organisation define a role.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 5 of 53 Status: Draft
Term Definition
System Entity A system entity in T2S is the T2S operator or a central securities depository for which a segregation of processing capabilities and data is required.
T2S System User
A T2S system user is an individual or application that can log on to Target2-Securities with a login name and password. For example, a user may be an individual, who has an interactive access to T2S online functions; or an application programme, which requests services from T2S.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 6 of 53 Status: Draft
3 General Principles
General principles define the overall requirements pertaining to the management of all static data in T2S. The section Static Data Identifier Requirements specifies the requirements for uniquely identifying static data objects in T2S and avoiding the use of mnemonics as primary keys for static data. The Static Data Status Information Requirements sections details the standardised tracking of states for static data management in T2S. The section Data Revision and Data History provides the list of requirements for ensuring a full audit trail and history of static data. Static Data Management documents the standards applicable to the change management functions for all static data entities.
3.1 Static Data Identifier Requirements
3.1.1 Technical Identifier Requirement TG4.GP.1.1
Traceability Principles 20
Traceability Proposals 1, 11, 65
Occurrences in static data entities require a unique sequence as primary identifier. The allocation of
this primary identifier shall occur sequentially from a database counter. It shall be the object
identifier, used to identify the occurrence of a static or transactional data entity. When a user or
application appends a new occurrence in an entity, the application programme shall assign the current
value of the counter as the technical identifier to that occurrence, and increment the counter by one
for assignment to the next occurrence. The database administrator shall configure a counter for
exclusive use as a primary identifier for a static data entity. For example, security static data will use
a different counter as technical identifier than T2S party data.
3.1.2 Revision Number Requirement TG4.GP.1.2
Traceability Principles 20
Traceability Proposals 1, 11, 65
The revision number is the counter within a technical identifier of an occurrence of static data that is
incremented by one when a user or application updates an attribute of that occurrence. Its primary
use is to ensure the uniqueness of an occurrence when there are several revisions to that occurrence.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 7 of 53 Status: Draft
3.2 Static Data Status Information Requirements Requirement TG4.GP.2
Traceability Principles 20
Traceability Proposals -
Status information is required to define the technical state of a static data occurrence and any updates
to that occurrence in T2S. Every static data entity shall include status information. These status
attributes are not included in the attribute requirements for entities in the subsequent sections to avoid
repetitiveness.
3.2.1 Deletion Status Requirement TG4.GP.2.1
Traceability Principles 20
Traceability Proposals -
Every occurrence in static data shall have an attribute, which defines if it is active or deleted, i.e.
whether it is available for use by processing functions and applications.
3.2.1.1 Active Setting
Requirement TG4.GP.2.4
Traceability Principles 20
Traceability Proposals -
The active status shall specify that an occurrence of static data is available for processing. For
example, T2S shall accept and process settlement instructions only when the deletion status of the
security and the account are active. Otherwise, T2S shall reject them.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 8 of 53 Status: Draft
3.2.1.2 Deleted Setting
Requirement TG4.GP.2.3
Traceability Principles 20
Traceability Proposals 65
The deleted status shall specify that an occurrence of static data is no longer available for processing:
it shall define a record as deleted for further use in T2S. When an application or user logically deletes
an occurrence, the user must be able to use the occurrence of static data for historic queries and
information requests (e.g. a backdated position query on a deleted account). However, T2S shall
reject new settlement instructions for a logically deleted record. Neither must it be possible for a user
to amend logically deleted data.
3.2.2 Approval Status Requirement TG4.GP.2.4
Traceability Principles 20
Traceability Proposals 65
Every occurrence of static data shall have an approval status to define whether the user has approved
or rejected changes in attribute values of that occurrence, or if the update is awaiting approval by the
user.
3.2.2.1 Awaiting Approval Setting
Requirement TG4.GP.2.4.1
Traceability Principles 20
Traceability Proposals 65
“Awaiting approval” shall define any change to static data that has been input and requires
confirmation by a second user, but approval by a second user is outstanding. T2S processes and
applications must not use unapproved changes.
3.2.2.2 Approved Setting
Requirement TG4.GP.2.4.2
Traceability Principles 20
Traceability Proposals 65
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 9 of 53 Status: Draft
“Approved” shall define any change to static data, entered by a user or an application into T2S, that
requires confirmation by a second user, and confirmed to be correct by a second user.
3.2.2.3 Rejected Setting
Requirement TG4.GP.2.4.3
Traceability Principles 20
Traceability Proposals 65
“Rejected” shall define any change to static data, entered by a user or an application into T2S,
requiring confirmation by a second user, but cancelled by a second user as incorrect.
3.3 Data Revision and Data History Requirement TG4.GP.3
Traceability Principles 20
Traceability Proposals 65
T2S shall undertake a differentiation of static data between data revision and data history. Data
revision shall define any update to static data, which is not a result of chronological record keeping.
Data history shall define the chronological record of changes to reference data, subject to change in
its lifetime, but that remains valid for a specified period.
For example, T2S shall keep a chronological record, i.e. data history, for legal addresses for account
relationships in T2S, since the owner of the account may move corporate headquarters and legal
jurisdiction. Even though the new address and jurisdiction are in effect, the previous jurisdiction
remains valid for backdated regulatory reporting. Additionally, the address will require data revision.
If an application or user makes a correction to the address due to an erroneous input, it needs to
generate a revision to identify the modified data, the application or user that undertook the change and
the date and time of the change.
3.3.1 Data Revision Requirement TG4.GP.3.1
Traceability Principles 20
Traceability Proposals 65
T2S shall store data revisions in its physical static data model. T2S shall not simply log changes to a
text file and the text file archived as is the case in many applications today.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 10 of 53 Status: Draft
3.3.1.1 Data Revision Implementation
Requirement GP.3.1.1
Traceability Principles 20
Traceability Proposals 65
Storing data revisions in the database requires replicating all static data structures with their attributes
as revision tables. A current static data entity shall store only the occurrences that are currently valid
for processing in T2S. Therefore, the technical identifier shall uniquely identify each record in the
table. All previous states of the record, which include both approved and rejected changes, as well as
entered, but yet unapproved changes, shall be stored in the corresponding static data revision entity.
Since many records may exist for an occurrence in the revision table, the technical identifier in
combination with a sequential revision number shall uniquely identify each record. This shall ensure
uniqueness of occurrences in the revision table. The following figure provides an example of revision
for instrument static data.
Figure 1 - Instrument Static Data - A Revision Example
05/07/07 5
Instrument Static Data – An Example
Instrument Static Data
Security Identifier <pk>
Security Revision
Authorisation Status
Technical Status
Security Status
User Identification <fk>
Maintenance Stamp
. . .
Instrument Static Data Revision
Security Identifier <pk>
Security Revision <fk>
Authorisation Status
Technical Status
Security Status
User Identification <fk>
Maintenance Stamp
. . .
The current table stores the active record.
The revision table stores all previous changes as well as rejected and unapproved changes.
The current record is always identified by a unique sequential identifier.
The revision record is identified by the combination of the unique sequential identifier of the current table and a sequential revision number.
The user and the timestamp is documented in every record.
The Authorisation Status specifies the update status of a record, i.e. is the data in the record approved, unapproved (ready for approval) or rejected).
The Technical Status specifies whether the record is active or logically deleted.
This attribute defines market status of an instrument (e.g. “when issued” or “matured”.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 11 of 53 Status: Draft
3.3.1.2 Audit Trail
Requirement GP.3.1.2
Traceability Principles 20
Traceability Proposals 65
Each data revision shall document the modified data on attribute level, the user performing the
change and the timestamp of the change. Every static data entity shall include the audit trail
attributes.
Table 1 - Audit Trail Attribute Requirements
Attribute Definition
User Every static data entity shall include the technical identification of the user who updated an occurrence (record). It must be possible to identify explicitly the individual or application that changed the data by linking the technical identifier to the user name in the authentication application.
Time Stamp Every static data entity shall include the date and time to document when a user updated an occurrence (record). The time stamp is a snapshot of the operating system date and time when a change is committed.
Approval Status Every static data entity shall include the approval status to document whether processing status of an update.
3.3.2 Data History Requirement GP.3.2
Traceability Principles 20
Traceability Proposals 65
T2S shall store all data, requiring a history, with a valid from date and, if necessary, a valid to date.
Only information with a definite end date shall require a valid to date. For example, a change of legal
address will not require an end date. When the legal address changes, the user enters the new address
with a valid from date. Any application programme can identify immediately the active legal address
for a given date merely by comparing the date with the valid from date. There is no requirement for a
valid to date in this scenario, since T2S will always require a current legal address for an active T2S
party.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 12 of 53 Status: Draft
Adding an end date only would increase the complexity of maintenance process without adding value
in terms of business information and data consistency. In the case of the example, tracking a valid to
date for change of address would require both a new record to be written and the valid to date of the
previous record to be updated with the new valid from minus one calendar day. The use of a valid to
date in these circumstances does not simplify the reading or querying of data. It merely avoids the
use of a maximum value function in an SQL statement.
However, there are cases where a valid to date for a set of information is mandatory. In these cases, it
sets the end marker for the information chronology. The status of a relationship between a CSD and a
financial instrument in T2S would be such an example. A data entity in T2S will define the securities
for which a CSD acts as either an investor CSD or an issuer CSD. For example, CSD ABC acts as
investor CSD for financial instrument XYZ as of a given date in the past. Today, CSD ABC could
decide that it no longer wishes to be investor CSD for financial instrument XYZ as of a given date in
the future. In this case, the valid to date allows the CSD to specify today the future date from which
the CSD will no longer accept the security for settlement.
3.3.3 Archiving Requirement GP.3.3
Traceability Principles 20
Traceability Proposals 65
Data history and data revisions shall be subject to regulatory and legal data retention requirements. In
order to ensure the integrity of static and transactional data, data revisions and data history shall
remain in the current database until archiving procedures copy the transactional data that reference it
into either a history and/or archiving database.
3.4 Static Data Management Requirement GP.4
Traceability Principles 20
Traceability Proposals 65
Static data management refers to the functionality that T2S shall provide for maintaining static data in
T2S regardless of the type of conceptual entity. T2S will apply the same functional principles for the
deletion of a security, as it will for the deletion of an account.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 13 of 53 Status: Draft
3.4.1 Static Data Change Management Requirement GP.4.1
Traceability Principles 20
Traceability Proposals 65
Static data change approval specifies the business requirements for processing and approving updates
to static data.
3.4.1.1 Change Approval Configuration
Requirement GP.4.1.1
Traceability Principles 20
Traceability Proposals 65
The objective is for T2S to provide a flexible configurable change management component for static
data so that CSDs can parameterise their change approval processes for the various static data entities
according to their legal, regulatory and operational requirements. Change approval configuration
defines the functions, required in T2S, to parameterise the entities and types of updates made by a
user or process that require approval from a second independent user or process.
3.4.1.1.1 Manual or Automated Update
Requirement GP.4.1.1.1
Traceability Principles 20
Traceability Proposals 65
It must be possible to differentiate in the configuration of the second user approval between an
automated update through an interface and an interactive manual update by an individual for a static
data entity on CSD level. For example, it should be possible to specify that an update of security
static data by an automated interface should not require second user approval, but a manual update by
a person is subject to such an approval.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 14 of 53 Status: Draft
3.4.1.1.2 Change Type
Requirement GP.4.1.1.2
Traceability Principles 20
Traceability Proposals 65
It shall be possible for the user to specify whether second user approval is required for adding,
changing or deleting an occurrence in a specific static data entity for a specific CSD. For example,
the changing of account data may not require authorization by a second user, but its deletion does.
3.4.1.1.3 Combination of Change and Update Type
Requirement GP.4.1.1.3
Traceability Principles 20
Traceability Proposals 65
T2S shall support the configuration of change approval, based on the combination of change type and
update type (manual or automated).
3.4.1.2 Change Processing Algorithms
Requirement GP.4.1.2
Traceability Principles 20
Traceability Proposals 65
Any application, used to maintain static data, shall verify if the change to an occurrence of static data
it is processing is subject to approval by a second user. The static data maintenance application shall
read the change approval configuration for its entity / entities and shall process the update according
to the configured parameters.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 15 of 53 Status: Draft
3.4.1.2.1 Processing a New Occurrence
Requirement GP.4.1.2.1
Traceability Principles 20
Traceability Proposals 65
When a new occurrence in a static data entity is subject to approval by a second user, the static data
maintenance application shall create it immediately in the relevant current static data entity with a
status "awaiting approval". If a second user approves the change, then static data change
management shall reset the status from "awaiting approval" to "approved" in the current data. If the
second user does not approve the new occurrence, then static data change management shall delete
the update from the current entity and write it to the revision entity with the status "rejected". If a
new occurrence is not subject to approval by a second user, then static data change management shall
create it in the applicable current static data entity with a status "approved".
3.4.1.2.2 Processing an Update of an Occurrence
Requirement GP.4.1.2.2
Traceability Principles 20
Traceability Proposals 65
When a user updates an occurrence of static data, which is subject to approval by a second user, static
data change management shall create the changed version of data as a new occurrence in the relevant
revision entity with a status "awaiting approval". The current version shall remain unchanged and all
applications shall use it until a second user approves the update. If a second user accepts the change,
then static data change management shall write the changed occurrence to the current entity with the
status "approved" and delete it in the revision entity. Static data change management also deletes the
previously valid version of the data from the current entity and creates it as part of the audit trail in
the revision entity. If the second user does not approve the update, then static data change
management updates the status of the change to "rejected" and it remains as an unapproved change in
the revision entity.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 16 of 53 Status: Draft
3.4.1.3 Change Approval User Interface
Requirement GP.4.1.3
Traceability Principles 20
Traceability Proposals 65
The change approval user interface defines the requirements for
− identifying all static data changes awaiting approvals;
− searching for specific static changes;
− searching and displaying historic change information, both approved and rejected changes;
− and approving and rejecting static data changes.
3.4.1.3.1 Changes Awaiting Approval
Requirement GP.4.1.3.1
Traceability Principles 20
Traceability Proposals 65
The user shall be able to query static data changes awaiting approval. Access to this facility shall be
restricted to those users who have the necessary access rights to approve static data changes. A
search parameter window shall exist in the online user interface, where a user can enter criteria to
search for updates awaiting approval. Firstly, the user shall be able to specify type of data (e.g.
security static data, account static data, etc.) in the search. The user shall further be able to restrict the
search to a period for the update, the user account of the person who performed an update, or to a
specific mnemonic (e.g. ISIN, account number).
3.4.1.3.2 Search Results List
Requirement GP.4.1.3.2
Traceability Principles 20
Traceability Proposals 65
The results list shall display all changes awaiting approval for those data for which the user has
sufficient access rights - a user of one CSD shall not see the static data changes awaiting approval of
another CSD. The results list shall display the time stamp of the change, the user who made the
change, the static data entity that has been updated (e.g. user, party and security) and the mnemonic of
the occurrence in the static data entity for each result fulfilling the search criteria. The user shall have
the capability to select a change for approval from the search results list.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 17 of 53 Status: Draft
3.4.1.3.3 Approve or Reject Change Detail
Requirement GP.4.1.3.3
Traceability Principles 20
Traceability Proposals 65
When the user selects a static data change for approval or rejection, a change detail window shall
display the changes to a related the set of data. The change detail window shall show the mnemonic,
identifying the static data occurrence, and the old and new values for each changed field. The user
shall be able to accept or reject the update from this window. It should be noted that for a new
occurrence the column for old values will be empty. A change type shall indicate this.
3.4.2 Deleting a Static Data Occurrence Requirement GP.4.2
Traceability Principles 20
Traceability Proposals 65
The deletion of an occurrence of static data shall only occur logically. The physical deletion of static
data shall not be possible in T2S in order to ensure the referential integrity of information.
3.4.2.1 Validation and Logical Deletion
Requirement GP.4.2.1
Traceability Principles 20
Traceability Proposals 65
A logical deletion of an occurrence of static data shall be possible only when there are no active
transactions or holdings in T2S for that occurrence. When a user or application initiates the deletion
of an occurrence in static data, the deletion function must ensure that there are no open settlement
instructions and only zero positions pertaining to that data. If this is the case, then the deletion status
of the occurrence shall be set from 'active' to 'deleted'. Existing open settlement instructions or active
positions for the data, subject to deletion, shall result in the rejection of the deletion.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 18 of 53 Status: Draft
3.4.2.2 Reactivation of a Logical Deletion
Requirement GP.4.2.2
Traceability Principles 20
Traceability Proposals 65
In some instances, it will be necessary to reactivate a logically deleted occurrence of static data. A
generic function shall exist that allows the user to specify the static data entity and the identifier of an
occurrence in that static data entity, and to reset the deletion status of a record in that entity from
“deleted” to back to “active”.
3.4.2.3 Physical Deletion
Requirement GP.4.2.3
Traceability Principles 20
Traceability Proposals 65
Only archiving processes shall delete static data from the active T2S database To ensure the
referential integrity of data, the physical deletion of static data occurrences from the active database
shall be performed only after archiving processes have removed and archived the related transactional
and position data as of a cut-off date that is determined by a retention period. The physical deletion
of a static data occurrence shall only be possible for logically deleted occurrences. Data history and
data revisions, that are before the archive date, shall be included in any physical deletion process even
if the current record is still active - since the transactional data for which they are relevant would be
removed by the archiving.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 19 of 53 Status: Draft
4 Configuration Requirements This section documents the configuration requirements for processing in T2S.
4.1 Business Date Requirement C.1
Traceability Principles 20
Traceability Proposals 65
T2S shall have an internal business date, which will determine the date of processing. This date shall
be independent of the system date in the operating system. T2S will initiate processing for a new
business day before midnight. When this occurs, a process must use the T2S business date instead of
the operating system date to identify transactions for settlement and for updating balances. A
business date, independent from the operating system date, will also facilitate testing in that it allows
processing for a specific business day to be regression tested. The business date must have a valid
date format and must be a working day.
4.1.1 Manual Update of Business Date Requirement C.1.1
Traceability Principles 16
Traceability Proposals 21, 22, 24
An authorised user shall be able to change the business date manually in T2S through an online user
interface.
4.1.2 Automated Update of Business Date Requirement C.1.2
Traceability Principles 16
Traceability Proposals 21, 22, 24
A process shall exist to calculate the next business day from the current business day and to update
the business date to the next business day. It shall be possible to schedule or trigger this update in the
daily processing cycle of T2S.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 20 of 53 Status: Draft
4.1.3 Resetting Processes after Business Date Update Requirement C.1.3
Traceability Principles 16
Traceability Proposals 21, 22, 24
Mechanisms shall stop all continuously running processes, using the business date, before the
business day change so that all applications register the switchover to the new business day.
4.2 Daily Processing Schedule Requirement C.2
Traceability Principles 16
Traceability Proposals 17, 20, 21, 22, 23, 24, 25, 26, 56
The T2S operator shall maintain the T2S processing schedule as well as scheduling dependencies
between processes, regardless of the actual scheduling. For example, the start of process B is must
wait for the successful completion of process A even if process A runs longer than the scheduled start
time for process B.
It is not a requirement to store the processing schedule and processing dependencies as part of the
T2S application. Standard software products exist that fulfil the requirements for time- and event-
driven process automation for T2S.
4.3 System Entity Configuration Requirements Requirement C.3
Traceability Principles 4, 6
Traceability Proposals 3, 6, 12, 14, 15, 16, 52, 53, 54
Multi-entity configuration requirements in T2S encompass all functionality, needed to support the
segregation of processing capabilities and data by a participating CSD. The CSD is legally
responsible for its participants and its services it provides to its participants - the service offerings of
the CSDs may differ to various extents. Therefore, the CSD must be able to configure its service
offering by granting or denying access to specific functions and facilities of T2S to its participants.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 21 of 53 Status: Draft
The second dimension of multi-entity configuration is the segregation of data. System entity
configuration is fundamental for the segregation of the static and transactional data of CSDs in T2S.
A CSD must not be able to access the participants, positions and transactions of the other CSDs. The
configuration of CSDs as entities in a multi-entity architecture shall allow for the partitioning of data
on the database level as well as on the functional level in T2S.
4.3.1 Defining System Entities Requirement C.3.1
Traceability Principles 4, 6
Traceability Proposals 3, 6, 12, 14, 15, 16, 52, 53, 54
The implementation of a two level hierarchy shall support the multi-entity configuration of T2S. The
top level in the hierarchy shall define the T2S system operator. The second level of the hierarchy
shall define the CSDs, participating in T2S, as well as the Target2 operator. This means that the
operator(s) of T2S will be responsible for configuring the CSDs and the T2 operator as system
entities in the platform. The CSDs shall be able to create, maintain and access data for their
participants and to their data. The T2 operator is to be able to create, maintain and access data for
connected national central banks (NCB) and the payment banks connected to the NCBs.
Any CSD and the T2 operator shall be unique occurrences as T2S parties in the party static data, but
their configuration as system entities in T2S will be prerequisite for the user to enter the occurrences
in the static data. The T2S operator must configure a system entity before a business user can enter
the entity’s party and other static data as well as other configuration information.
4.3.2 Entity Attribute Requirements for System Entity Definition Requirement C.3.2
Traceability Principles 4, 6
Traceability Proposals 3, 6, 12, 14, 15, 16, 52, 53, 54
Entity attribute requirements specify the information, needed for the configurations of system entities
in T2S.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 22 of 53 Status: Draft
Table 2 – System Entity Definition
Attribute Definition
System Entity Identifier
The system entity identifier shall be the unique technical identifier assigned to a CSD and the T2S operator with the exception that the T2S operator shall manually assign this unique sequence.
Mnemonic The mnemonic shall be unique short code used to identify the entity to the business user in addition to the system entity identifier. The mnemonic must be unique.
Entity Name This attribute shall specify the full name of a system entity.
Operating Entity This Boolean attribute shall indicate whether the defined entity is the T2S operator. The system entity configuration shall allow only one occurrence of an operating entity in the system entity definition.
4.3.3 Functional Requirements
4.3.3.1 Segregation of Data
Requirement C.3.3.1
Traceability Principles 4, 6
Traceability Proposals 3, 6, 12, 14, 15, 16, 52, 53, 54
Static and transactional data shall be segregated by system entity, where applicable using the system
entity identifier. This means that the system entity identifier must be an attribute of specific static
data and transactional entities in T2S as the prerequisite for data segregation.
One implementation option for the segregation of data by CSD (or system entity identifier) is storing
only the system entity identifier in the necessary static data and transactional entities without the use
of database partitioning. However, data management operations, such as backup, recovery and data
loads, will occur on the entire table level. A T2S system operator will not be able to undertake these
operations independently on CSD level, when necessary.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 23 of 53 Status: Draft
The recommended implementation for a multi-entity system configuration is the partitioning of data
by CSD through the utilisation of the system entity identifier in the database. Partitioning of database
tables, using the system entity identifier, shall allow T2S system operators to undertake backup,
recovery and other data operations for one CSD. For example, if a CSD requires a full export of its
data, then the T2S system administrator can perform the data export operation for the data in the
CSD’s partition. A backup by CSD is also possible. Without data partitioning, a data export would
result in an unloading of data for all CSDs. SQL procedures would be required to unload CSD-
specific data in the case where partitioning does not exist. A backup operation would cover all CSDs
making the recovery of data for one CSD very complex.
The T2S database administrators shall undertake the necessary partitioning of data on the system
entity identifier in the relevant database tables. Partitioning requires changes on the database level
when a CSD joins T2S as a new participant.
4.3.3.2 Querying and Selecting System Entities
Requirement C.3.3.2
Traceability Principles 4, 6
Traceability Proposals 3, 6, 12, 14, 15, 16, 52, 53, 54
It shall be possible for a user to query system entities and to select an occurrence for update, display.
It shall also be possible to enter new system entities.
4.3.3.2.1 Parameter Window for Update and Display
Requirement C.3.3.2.1
Traceability Principles 4, 6
Traceability Proposals 3, 6, 12, 14, 15, 16, 52, 53, 54
A parameter window shall exist in the online user interface, where a user is able to enter the
mnemonic or the technical identifier of a system entity for update or display. If the user does not
know either code, then the user shall be able to execute a search, which displays the list of valid
system entities.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 24 of 53 Status: Draft
4.3.3.2.2 List of System Entities for Input
Requirement C.3.3.2.2
Traceability Principles
Traceability Proposals
Functions on the T2S operator level shall require the input of the system entity when querying,
entering, changing and maintaining data. T2S shall display a list of valid system entities for any field
in which the system entity can be input as either technical identifier or mnemonic. The list row shall
display the technical identifier, mnemonic and name of a system entity. When the user selects a
system entity from the list, then application shall automatically enter the value into the input field for
the system entity.
4.3.3.3 Maintaining System Entities
Requirement C.3.3.3
Traceability Principles
Traceability Proposals
System entity maintenance refers to the process of adding, changing and deleting system entities in
T2S. Access to this functionality shall be restricted to the T2S System Administrator of the T2S
operator.
4.3.3.3.1 Adding a System Entity
Requirement C.3.3.3.1
Traceability Principles
Traceability Proposals
It shall be possible for a user to add a new system entity from the search parameter window by
executing an add function. An input window shall appear where the user can enter the mnemonic,
technical identifier and name for the system entity. The reader should note that the database
administrator must create the database partition for the new CSD before a business user can enter data
for that CSD.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 25 of 53 Status: Draft
4.3.3.3.2 Updating a System Entity
Requirement C.3.3.3.2
Traceability Principles
Traceability Proposals
It shall be possible for a user to update an existing privilege by selecting it for update from the results
list.
4.3.3.3.3 Deleting a System Entity
Requirement C.3.3.3.3
Traceability Principles
Traceability Proposals
It shall not be possible for a user to delete an existing system entity by simply executing a delete
function in the update mode. Deleting a system entity must not be possible from the user interface.
4.4 Closing Day Calendar Requirement C.4
Traceability Principles
Traceability Proposals
T2S shall have a calendar, which will specify those dates on which T2S is not open for settlement.
Since the system shall support currencies other than Euro, the calendar model in T2S shall support the
differentiation of closing days by currency. The user shall not specify Saturdays and Sundays
explicitly as non-operating days in the calendar. The application shall identify these days through the
system calendar of the operating system.
4.4.1 Entity Attribute Requirements for Calendar Requirement C.4.1
Traceability Principles
Traceability Proposals
Entity attribute requirements specify the information, required for determining the non-opening days
of T2S by currency.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 26 of 53 Status: Draft
Table 3 – Non-Operating Day Calendar Definition
Attribute Definition
Settlement Currency Code
This attribute shall specify the currency code.
Date This attribute shall specify the date on which T2S is not open for the given settlement currency.
4.4.2 Update of Calendar Requirement C.4.2
Traceability Principles
Traceability Proposals
An authorised user shall be able to modify the closing day calendar in T2S through an online user
interface. The user shall be able to query the closing day calendar by currency. T2S shall provide a
parameter window in which the user can enter the currency code and the year. The user shall be able
to execute a search after entering valid values in both fields. The search function returns a results
window of all closing day for the specified year and currency. T2S shall provide the user with the
functionality to add or delete closing days in this results window.
The application shall not accept the definition of a Saturday or Sunday as a closing day. T2S will
automatically determine these two days of the week through the system calendar.
4.5 Authentication and Authorization
4.5.1 Business Role Classification Requirement AA.1.1
Traceability Principles
Traceability Proposals
Access to data and applications in T2S will be dependent on the business role of a T2S party. It is
premature at this stage in the project to define the specific applications and functions that a role shall
include. However, the broad categories of functions and data to which a T2S party must have access
to, or have its access restricted by, are definable based on its business roles and responsibilities of the
party in the marketplace and in T2S.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 27 of 53 Status: Draft
T2S shall place no restriction on the possible roles that a T2S system administrator can configure.
The legal, regulatory and contractual requirements of and between the parties in T2S will define any
constraints in the access to functionality within T2S. For example, a CSD may configure different
roles for its participants in order to provide a differentiated service offering based on their own
customer classifications. Some CSDs may want to offer direct connectivity to T2S while others will
not. It would also be feasible for CSD to allow users with direct connectivity online access to
positions and transactions in T2S as they do in some markets today.
The business requirements for roles establish the principles that will govern access to sets of functions
and data in the system. They do not predicate that a specific role(s) that will be technically
configured for T2S.
Figure 2 - Hierarchy of Roles
CSD A
T2SOperator
CSD nCSD B. . .
CSD B Bank A Broker A
Account 1 Account 2 Account n. . .
Level 1
Level 2
Level 3
Level 4
Level 5
T2Operator
NCB
PaymentBank
Dedicated T2SCash Account 1
AccountLink 1
Dedicated T2SCash Account n. . .
StockExchange
CentralCounterpart
CSD A
T2SOperator
CSD nCSD B. . .
CSD B Bank A Broker A
Account 1 Account 2 Account n. . .
Level 1
Level 2
Level 3
Level 4
Level 5
T2Operator
NCB
PaymentBank
Dedicated T2SCash Account 1
AccountLink 1
Dedicated T2SCash Account n. . .
StockExchange
CentralCounterpart
T2S shall support a hierarchical model of roles and access rights to ensure both the segregation of
functions and data.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 28 of 53 Status: Draft
4.5.1.1 Role T2S Operator
Requirement AA.1.1.1
Traceability Principles
Traceability Proposals
The T2S operator shall be the top level of the hierarchical role and access model. The role
classification T2S operator describes all T2S system users of the entity, which will be responsible for
the day-to-day operation and management of Target2-Securities. Its customers will be the CSDs
participating in T2S. At the top level, the T2S operator has access to all data and functionality in the
subordinate level.
4.5.1.1.1 Role of T2S System Administrator
Requirement AA.1.1.1.1
Traceability Principles
Traceability Proposals
The T2S system administrator role shall be responsible for
− the user administration for all T2S system users of the T2S operator;
− the user administration for the CSD system administrators;
− the day-to-day monitoring of system applications, processes, and communication channels;
− the configuration of privileges and privilege classes in T2S;
− the configuration of roles for the T2S system users of the CSDs, National Central Banks and the 3CB+ Target operator;
− the configuration of roles for T2S business support users;
− the contingency operations, i.e. starting and stopping processes outside of the normal operating schedule, in T2S;
− and the configuration of CSDs as system entities.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 29 of 53 Status: Draft
4.5.1.1.2 Role of T2S Business Support
Requirement AA.1.1.1.2
Traceability Principles
Traceability Proposals
The T2S business support role will be responsible for
− the maintenance of the T2S party static data, excluding accounts, for CSDs participating in T2S;
− the maintenance of T2S party static data for National Central Banks and the 3CB+ Target operator;
− providing the 1st level business support to CSD users;
− the maintenance of T2S code tables for global and CSD-specific codes;
− and query and maintenance privileges for all positions, settlement confirmations, settlement instructions and static data of all CSDs and their participants for provision of business support.
Maintenance and query privileges for business data, such as securities and cash positions and
transactions, of CSDs, the CSDs’ participants, and national central banks shall be limited to
emergency response situations only. The T2S system administrator shall restrict access to
maintenance functionality to a subset of T2S business support users, based on the support
requirements of CSDs, the T2 operator and national central banks. For example, maintenance
privileges could only be limited to the business support user for a specific CSD.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 30 of 53 Status: Draft
4.5.1.2 Business Role CSD
Requirement AA.1.1.2
Traceability Principles
Traceability Proposals
The role classification CSD describes all T2S system users of a CSD participating in T2S. It does not
include the T2S users of the participants of the CSD.
4.5.1.2.1 Role of CSD System Administrator
Requirement AA.1.1.2.1
Traceability Principles
Traceability Proposals
The CSD System Administrator role will be responsible for
− the user administration for all T2S system users of the CSD and its participants, including the assignment of roles;
− the configuration of roles for the T2S system users of the CSD’s participants;
− and the day-to-day monitoring of system applications, processes, and communication channels at the CSD;
CSDs shall be responsible for defining for its customers the functionality to which its participants can
connect. Therefore, it shall be possible for CSDs to configure roles and access rights to functionality
based on their business service model.
4.5.1.2.2 Role of CSD Business User
Requirement AA.1.1.2.2
Traceability Principles
Traceability Proposals
The CSD business user role will be responsible for
− the maintenance of the accounts of the CSD in T2S;
− the maintenance of account structures of the CSD;
− the maintenance of T2S party static data, including accounts, for its participants;
− the maintenance of CSD-specific instrument static data and, where applicable, the instrument static data across all CSDs;
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 31 of 53 Status: Draft
− maintenance of any settlement restrictions;
− the definition of roles for the T2S system users of the CSD’s participants;
− and query and maintenance privileges for all positions, settlement confirmations, settlement instructions and static data of specific to the CSD and its participants for provision of business support.
4.5.1.3 Business Role CSD Participant
Requirement AA.1.1.3
Traceability Principles
Traceability Proposals
The role classification CSD participant describes all T2S system users that a CSD maintains for its
participants. The scope of functions and processes that a CSD participant can access shall be
dependent on the business model of the CSD. However, the data access of a CSD participant shall be
limited to its accounts, positions and transactions.
4.5.1.4 Business Role National Central Bank
Requirement AA.1.1.4
Traceability Principles
Traceability Proposals
The role classification National Central Bank describes all T2S system users of central banks that
require access to the cash account balances and postings of the T2S dedicated cash accounts for
central bank money. The role shall enable the T2S system user of the national central bank to:
− query all Target2 dedicated cash accounts for which the NCB is responsible;
− determine the owner of every Target2 dedicated cash account;
− determine the CSDs through which the owner of the account generates postings;
− and query the balances and postings on cash accounts for which the NCB is responsible.
However, it will not be possible for the NCB to view the settlement transactions that have resulted in
a posting.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 32 of 53 Status: Draft
4.5.1.5 Business Role Target2 Operator
Requirement AA.1.1.5
Traceability Principles
Traceability Proposals
The role classification Target2 operator describes all T2S system users that require access to the cash
account information of all T2S dedicated cash accounts. The role grants access to all functions
provided by the role NCB, but across all Target2 dedicated cash accounts held at all national central
banks. Additional, the role shall include
− the maintenance of the national central banks as T2S parties,
− and the configuration of roles for users of the national central bank.
4.6 Authentication Parameters Requirement AA.2
Traceability Principles
Traceability Proposals
Authentication parameters define settings, required for login security. The application software,
providing the authentication facilities for T2S (e.g. LDAP, RACF, etc.), shall support the specified
parameters to ensure strong authentication.
Table 4– Authentication Parameters
Attribute Definition
Password Expiry This attribute defines the maximum number of calendar days that a password is valid.
Minimum Account Name Length
This attribute specifies the minimum number of characters allowed in the account name.
Password Complexity
This attribute allows the specification of the complexity of the password by the user. For example, it must be possible to specify that a password should contain at least on uppercase character, at least one symbol and at least one number.
Minimum Password Length
This attribute defines the minimum number of characters allowed for a password.
Password Reuse This attribute specifies the number of password changes before a user may reuse a password. This includes the specification of rules defining password reuse - i.e. what constitutes reuse.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 33 of 53 Status: Draft
Attribute Definition
Maximum Login Attempts
This attribute specifies the maximum number of login failed attempts before the authentication application locks the user account.
4.7 Roles and Privileges for Authorisation Requirement AA.3
Traceability Principles
Traceability Proposals
The business requirements for T2S shall define the functional capabilities for configuring roles and
privileges for the authorisation of users to execute specific functions or view specific data. The
requirements do predicate a specific technical solution or software product (e.g. LDAP, RACF, etc.).
They define the functional scope any proposed solution or application must provide to ensure the
configurability of access rights to T2S.
4.7.1 Privileges Requirement AA.3.1
Traceability Principles
Traceability Proposals
A privilege shall define a specific T2S functional capability within a process or application. For
example, within securities static data possible privileges may be add new security, delete security,
change security and display security. The definition of privileges is the prerequisite for granting and
restricting access to functionality and data for specific T2S parties and T2S system users. Any T2S
process, application and, where necessary, function shall have an associated privilege.
− A privilege shall be uniquely identifiable both internally in the application as well as to the user.
− A privilege shall have a setting (allow / deny) that specifies the type of authorisation granted.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 34 of 53 Status: Draft
4.7.1.1 Querying and Selecting a Privilege
Requirement AA.3.1.1
Traceability Principles
Traceability Proposals
It shall be possible for a user to query privileges existing in the authentication and authorization
component and to select a privilege for update or display. A search parameter window shall exist in
the online user interface, where a user can search for a privilege by inputting criteria defining the
privilege, such as privilege name. If the user does not enter any value for the given search criterion,
then the application shall display a list of all available privileges. The results list shall display all
information that a system administrator requires to identify a privilege.
4.7.1.2 Displaying and Maintaining Privileges
Requirement AA.3.1.2
Traceability Principles
Traceability Proposals
Privilege maintenance refers to the process of adding, changing and deleting privileges, used for
authorization in T2S.
− It shall be possible for a user to add a new privilege, using an online application. The user shall enter the details of the privilege in an input window.
− It shall be possible for a user to update an existing privilege by selecting it for update from a list of available privileges.
− It shall be possible for a user to delete an existing privilege logically by executing a delete function. The user shall not be able to delete a privilege, assigned to an active privilege class or role.
− It shall be possible to display a privilege in read-only mode.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 35 of 53 Status: Draft
4.7.1.3 Grouping Privileges
Requirement AA.3.1.3
Traceability Principles
Traceability Proposals
Any authorization and authentication solution, deployed for T2S, shall support the grouping of
privileges to facilitate the administration of roles and access rights. In the context of T2S, this
specification will refer to the grouping of a set of T2S functional capabilities within a process or
application as a privilege class. For example, the privilege class for adding a new security, changing
a security, deleting a security and displaying a security would be "Securities Static Data
Management". A one-to-many relationship is to exist between privilege class and privileges.
− A privilege class shall be uniquely identifiable both internally in the application as well as to the user.
− A privilege class shall link related privileges for the assignment to roles.
4.7.1.3.1 Querying and Selecting a Privilege Class
Requirement AA.3.1.3.1
Traceability Principles
Traceability Proposals
It shall be possible for a user to query privilege classes existing in the authentication and
authorization component and to select a privilege class for update or display. A search parameter
window shall exist in the online user interface, where a user can search for a privilege class by
inputting criteria defining the privilege class, such as privilege class name or a privilege assigned to
the privilege class. If the user does not enter any value for the given search criterion, then the
application shall display a list of all available privilege classes. The results list shall display all
information that a system administrator requires to identify a privilege class.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 36 of 53 Status: Draft
4.7.1.3.2 Maintaining and Displaying Privilege Classes
Requirement AA.3.1.3.2
Traceability Principles
Traceability Proposals
Privilege class maintenance refers to the process of adding, changing and deleting privilege classes,
used for authorization in T2S.
− It shall be possible for a user to add a new privilege class, using an online application. The user shall enter the details of the privilege in an input window.
− It shall be possible for a user to update an existing privilege class by selecting it for update from a list of available privileges.
− It shall be possible for a user to delete an existing privilege class logically by executing a delete function. The user shall not be able to delete a privilege class, assigned to an active role.
− It shall be possible to display a privilege class in read-only mode.
− The user must be able to add and remove privileges from a privilege class when the user enters a new privilege class or updates an existing privilege class.
4.7.2 Roles Requirement AA.3.2
Traceability Principles
Traceability Proposals
A role defines the set of functions and services to which the authorization application allows or denies
the user access. A role consists of one or more privilege classes. When a system administrator
assigns a privilege class to a role, the system administrator shall specify if the privilege within the
class allows or denies access to the functionality defined by the privilege.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 37 of 53 Status: Draft
4.7.2.1 Entity-Specific Roles
Requirement AA.3.2.1
Traceability Principles
Traceability Proposals
A CSD will retain the legal relationship with its customers and remain responsible for the services
that they provide to their customers. Furthermore, CSDs, participating in T2S, must continue to
comply with legal and regulatory requirements. Therefore, the authentication and authorization
application shall allow for the configuration of entity-specific roles. It must be possible for the CSDs
to differentiate access to T2S services and functions based on their business service model and
requirements. A CSD must be able to configure the valid roles for its participants.
4.7.2.2 CSD Participant-Specific Roles
Requirement AA.3.2.2
Traceability Principles
Traceability Proposals
The CSD shall not maintain the end user administration for its participants. CSDs shall create and
authorise a system administrator for its participant, who shall be responsible for maintaining users and
roles for the participant of the CSD. The system administrator of the participant shall have access
only to those roles for which the CSD grants access to its participant. The authorisation and
authentication component shall allow the CSD to grant access to a different set of roles, depending on
the services provided by the CSD to its participant.
4.7.2.3 Querying and Selecting a Role
Requirement AA.3.2.3
Traceability Principles
Traceability Proposals
It shall be possible for a user to search for roles in the system and to select a role for update or
display. A search parameter window shall exist in the online user interface, where a user can search
for a role by specifying an attribute of a role, such as the role name or a string within the role name or
a privilege class assigned to a role. If the user does not enter any value for the given search criterion,
then the application shall display a list of all available roles. The results list shall display all
information that a system administrator requires to identify a role.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 38 of 53 Status: Draft
4.7.2.3.1 Maintaining and Displaying Roles
Requirement AA.3.2.3.1
Traceability Principles
Traceability Proposals
Role maintenance refers to the process of adding, changing and deleting roles, used for authorization
in T2S.
− It shall be possible for a user to add a new role, using an online application
− It shall be possible for a user to update an existing role by selecting it for update from a list of available roles.
− It shall be possible for a user to delete an existing role logically by executing a delete function. The user shall not be able to delete a role, assigned to an active user.
− It shall be possible to display a role with its assigned privilege classes and privileges by selecting it for display in read-only mode.
− The user must be able to add and remove privileges classes from a role when the user enters a new privilege class or updates an existing privilege class.
− The user shall specify whether access role allows or denies access to a function, specified by the privilege within a privilege class assigned to the role.
4.7.3 Users Requirement AA.3.3
Traceability Principles
Traceability Proposals
A user in T2S shall define an individual or application that can log onto Target2-Securities with a
login name and password. For example, a user may be an individual, who has an interactive access to
T2S online functions; or an application programme, which requests services from T2S. The
authentication and authorization component shall support attributes defining named users. The user
information shall require encryption.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 39 of 53 Status: Draft
Table 5– User Definition
Attribute Definition
Account Name Authentication shall require a unique account name for a user. The account name shall define the code used to identify a user for authentication at login.
Name Authentication shall require named users. The name shall store the surname and first name of the user.
Contact E-Mail The contact e-mail of the user shall be an attribute of the user information.
Contact Telephone Number
The contact telephone number of the user shall be an attribute of the user information.
Password This attribute shall specify the password that the user enters at login to authenticate herself / himself.
Authentication This attribute shall define the type of authentication that the authentication component is to apply for a user at login. Simple authentication shall require the user to enter a password only. Smartcard authentication shall require the user to identify herself / himself to the system using a Smartcard in addition to entering the password.
Lockout Status The lockout status shall define whether the authentication component blocks the user from logging into T2S.
Lockout Timestamp From
A timestamp shall define the date and the time from which the authentication component shall lockout a user from the system. The timestamp shall allow the system lock a user out of the system at a future date. It allows the leavers from an organisation to be restricted from the system as per their expected leaving date while allow access until that date.
Password Change on Next Login
This attribute shall define if the user must change the password for the account on the next login. A password change on next login is usually mandatory when a new user account is created or when the password for an existing user changes.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 40 of 53 Status: Draft
4.7.3.1 User Assignment to T2S Party and System Entity
Requirement AA.3.3.1
Traceability Principles
Traceability Proposals
The user information shall specify the T2S party of a user for the purposes of data segregation. This
assignment information shall be used by the authorisation component to restrict access of the user to
the static and transactional data pertaining to the user’s T2S party and related sub-entities only. For
example, a user, assigned to system entity for the T2S operator, is eligible to access all data of the
T2S operator, CSDs and their participants and account. However, the roles can restrict the access of
this user to business data of the CSDs by denying access to business functions, which display the
business data. If the T2S party is a participant of a T2S-connected CSD, then the assignment shall
restrict access of the user to the static and transactional data of the user's financial institution. CSD-
specific roles and privileges shall restrict access to specific types of data for this user, where
necessary. The assignment of the user to a T2S party also shall establish the relationship between
user and system entity.
4.7.3.2 Querying and Selecting a User
Requirement AA.3.3.2
Traceability Principles
Traceability Proposals
The authorisation and authentication component shall provide the system administrator with the
functionality to search for users stored in the component. A search parameter window shall exist in
the online user interface, where a user can search for a user account by the user name, the account
name or additional criteria as active users, deleted user, users of a specific system entity /
organisational unit, etc. The results list should display the account name, the name of the user and
additional identifying attributes such as the T2S party assignment.
4.7.3.3 Displaying and Maintaining Users
Requirement AA.3.3.3
Traceability Principles
Traceability Proposals
User maintenance refers to the process of adding, changing and deleting users in T2S. Access to this
functionality shall be restricted to T2S system administrators and CSD system administrators.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 41 of 53 Status: Draft
4.7.3.3.1 Validation
Requirement AA.3.3.3.1
Traceability Principles
Traceability Proposals
The authentication component shall validate any change to user information.
• The account name must be unique and conform to minimum length requirements.
• The first and last name of the user is mandatory.
• A valid authentication type is mandatory.
• The assignment of a user to a T2S party is mandatory.
• A CSD system administrator shall have read and maintenance privileges only the user to
his/her CSD or to those of its participants.
• The password is mandatory.
• The user must have at least one role.
4.7.3.3.2 Adding of a User
Requirement AA.3.3.3.2
Traceability Principles
Traceability Proposals
It shall be possible for a system administrator to add a new user. The authentication component shall
provide an input window, where the system administrator can enter the attributes of the user.
4.7.3.3.3 Updating a User
Requirement AA.3.3.3.3
Traceability Principles
Traceability Proposals
It shall be possible for the system administrator to update an existing user by selecting it for update
from the results lists of the user search function or directly through input of the account name.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 42 of 53 Status: Draft
4.7.3.3.4 Deleting a User
Requirement AA.3.3.3.4
Traceability Principles
Traceability Proposals
It shall be possible for the system administrator to delete a user by executing a delete function.
4.7.3.3.5 Locking a User
Requirement AA.3.3.3.5
Traceability Principles
Traceability Proposals
It shall be possible for the system administrator to lock a user out of the system without deleting the
user. This shall be possible by setting the attribute "lockout status" to "yes". When this status is set,
the current system date is to appear in the field for the lockout timestamp. The system administrator
can opt to use the default timestamp or may set it to any date and time in the future. This feature
supports leavers' processes in that a user's access to the system can be restricted as per his/her planned
leaving date.
4.7.3.4 Displaying Users
Requirement AA.3.3.4
Traceability Principles
Traceability Proposals
It shall be possible to display a user with its assigned roles in read-only mode by selecting it for
display from the results list or through direct input of the account name.
4.7.3.5 Password Reset
Requirement AA.3.3.5
Traceability Principles
Traceability Proposals
A password reset occurs when the system administrator either inputs a password for a new user or
changes the password of an existing user. A password reset shall require the user to renew his/her
password at next login. The attribute "password change on next login" shall be set to "yes" to
indicate this.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 43 of 53 Status: Draft
4.7.3.6 Role Assignment
Requirement AA.3.3.6
Traceability Principles
Traceability Proposals
It shall be possible for the system administrator to assign roles to or to deactivate roles for a user
when adding a new user or an updating an existing user. The application shall automatically assign
the privileges associated with the role to the user.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 44 of 53 Status: Draft
5 Currency Data
Requirement CD.1
Traceability Principles
Traceability Proposals
A currency is not a financial instrument or a security according to Directive 2004/39/EC. In the T2S
context, the notion of currency shall apply to
− the currency in which a cash leg of a DVP transaction is settled;
− the currency in which a security is denominated;
− and the currency in which a security is traded at a particular trading venue.
The static data shall store the currencies eligible for processing or for the purpose of information.
The identification of the currencies in T2S shall adhere to the 3-character ISO 4217 currency code.
Table 6 – Attribute Requirements for the Entity Currencies
Attribute Description
Currency Code This attribute shall define the unique code of the currency sequential identifier of a security in T2S.
Currency Name This attribute shall specify the currency name.
Number of Decimals
This attribute shall specify the number of decimals a currency has.
T2S Settlement Currency
This attribute shall specify if the currency is a T2S settlement currency. The attribute shall differentiate between the currencies in which T2S settles and other currency codes that are required for validation and reporting purposes.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 45 of 53 Status: Draft
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 46 of 53 Status: Draft
6 Securities Reference Data Model
Requirement SR
Traceability Principles
Traceability Proposals
This section defines the business requirements for securities reference data. Securities reference data
in T2S shall be restricted to, but will include all, the data required for settlement and auto-
collateralisation in central bank money. The securities reference data model defines conceptual
structures that are required in T2S for storing the attributes of securities. The description represents a
logical model and not a physical implementation. Technical fields for the audit trail and static data
change management are not included to avoid redundancy.
Figure 3 - Conceptual Securities Data Model
SecuritiesCSDLink
SecuritiesName
SecuritiesSettlementRestrictions
SecuritiesCode
Securities
SecuritiesValuation
CSD-SpecificSecuritiesAttributes
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 47 of 53 Status: Draft
6.1 Securities Requirement SR.1
Traceability Principles
Traceability Proposals
The entity “Securities” shall hold all attributes that exist only once for a financial instrument, i.e.
where a 1:n relationship between the security and a set of information pertaining to the security is not
needed.
Table 7 - Attribute Requirements for the Entity Securities
Attribute Description Instrument Identifier
This attribute shall define the unique sequential identifier of a security in T2S.
CFI This attribute shall classify the instrument according to ISO 10962. It shall be the objective of T2S to use a harmonised securities classification, but this shall not preclude the use of CSD- or market-specific classifications for processing.
Current Instrument Market Status
This attribute shall define the status of a financial instrument in its lifecycle (e.g. “when issued”, issued or matured). It shall not define a blocking status for an instrument – this shall be stored as a security restriction.
Maturity or Expiry Type
This attribute shall specify if the date, stored by the attribute Final Maturity or Expiry Date, is a maturity date (e.g. bond) or an expiry date (e.g. warrant).
Final Maturity or Expiry Date
This attribute shall store the final maturity or expiry date of an instrument, where applicable. It shall remain possible to process instructions and settlements for a security that has matured if it has not been explicitly restricted from settlement through a settlement restriction.
Settlement Type This attribute shall specify whether the financial instrument settles in units or as a nominal.
Minimum Settlement Unit or Nominal
This attribute shall define the minimum unit or nominal of the financial instrument for settlement.
Settlement Volume Multiple
This attribute shall define that the settlement quantity or nominal must be a multiple of the value in this data item. The value must be greater or equal to zero.
Issue Currency This attribute uniquely identifies the issue currency of a security in the system using the standard ISO 4217.
Auto-Collateralisation
This attribute shall specify whether the security is eligible for auto-collateralisation for central bank money.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 48 of 53 Status: Draft
6.2 Securities Name Requirement SR.2
Traceability Principles
Traceability Proposals
This entity shall specify the valid long and short descriptions of an instrument. The name of a
security can change over time owing to mergers or acquisitions. Therefore, several names may exist
for a security although one name only can exist for a security at any given point in time. It is
necessary to store the name information of a financial instrument on a timeline basis. This storing
mechanism shall ensure that application programmes have the correct name for backdated queries and
reporting. A harmonised convention shall apply to the naming of financial instruments in T2S
according to ISO standards.
6.2.1.1 Naming Conventions and Standards
Requirement SR.2.1
Traceability Principles
Traceability Proposals
The instrument short name shall fulfil the requirements of ISO 18774. ISO 18773 Part 1 and Part 2
shall be the naming convention in T2S for the instrument long name.
6.2.1.2 Attribute Requirements
Requirement SR.2.2
Traceability Principles
Traceability Proposals
The following table specifies the attributes that T2S shall require for tracking the names of financial
instruments.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 49 of 53 Status: Draft
Table 8 - Attribute Requirements for the Entity Securities Name
Attribute Description
Instrument Identifier
This attribute shall define the unique sequential identifier of a security in T2S. It shall link the security name to the security.
Reason for Name Change
This attribute shall specify the reason for the financial instrument name change.
Valid From This attribute shall define the date from which the instrument name is valid. Since the instrument name may change over time, it is necessary to define period in which a name was valid.
Instrument Short Name
This attribute specifies financial instrument short description (FIDS) according to ISO 18774 to identify an instrument. Example: International Business Machines, 4.75% Preferred Non-voting Extendible Redeemable Fixed Rate Interest: IBM Pfd Nvtg Extbl Red FRI 4.75%. T2S shall display this name in addition to the ISIN.
Instrument Long Name
This attribute specifies long description of the financial instrument.
6.3 Securities Code Requirement SR.3
Traceability Principles
Traceability Proposals
This entity shall store the external security codes, which uniquely identify a financial instrument to
market participants. The ISO 6166 standard shall provide the convention for the unique identification
of a financial instrument: the ISIN. The entity shall link the T2S technical securities identifier to the
external code.
Table 9 - Attribute Requirements for the Entity Securities Code
Attribute Description
Instrument Identifier
This attribute shall define unique sequential identifier of a security in T2S. It shall link the security code to the technical identifier of the instrument.
Valid From This attribute shall the date from which the instrument code is valid. This date can be before the actual issue date of an instrument for “when-issued” securities, but may not be a date in the future for a new security entered into the system. On an initial migration of instrument data into T2S, this date could be set to the date of the initial load.
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 50 of 53 Status: Draft
Code Type This attribute shall define the code type, assigned to the unique internal instrument identifier. Although the model can support local market codes, T2S shall support only the ISIN as valid code type.
Security Mnemonic
This attribute shall specify the unique market code of a security, defined by the code type. T2S shall use this attribute to store the ISIN.
6.3.1 Interim or Internal ISIN Requirement SR.3.1
Traceability Principles
Traceability Proposals
The model shall support the assignment of interim or “internal” ISINs to securities. For example,
CSDs assign an interim ISIN for a “when-issued” security in markets where the national numbering
agency only provides official ISINs for issued securities. Financial institutions commonly undertake
over-the-counter trading in securities their official placement in the market. As it is not certain if the
securities will actually issue, some National Numbering Agencies (NNA) do not assign an official
ISIN for the instrument pre-issue. However, CSDs must be able to accept settlement instructions in
such cases. Therefore, the securities code model shall support the assignment of an interim ISIN by a
CSD with the facility to replace the interim ISIN with the official ISIN as assigned by the NNA.
6.3.2 Change of Interim of Internal ISIN Requirement SR.3.2
Traceability Principles
Traceability Proposals
The subsequent example provides a clarification of how ISINs shall be stored in the securities code
entity. In this scenario, a CSD has created a security in T2S and has assigned the security an interim
ISIN according to the conventions of ISO 6166, valid from 1 January 2007, since the NNA has not
yet issued the official ISIN. On 23 January, the NNA issues the official ISIN. The CSD has two
options available to change an ISIN. These options do not apply to changes of ISIN due to corporate
events, such as conversions. In such cases, transactions and positions of the old security must be
retained, and open settlement instructions and positions converted
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 51 of 53 Status: Draft
6.3.2.1 Change of ISIN with New Valid Date
Requirement SR.3.2.1
Traceability Principles
Traceability Proposals
In the example below, the CSD creates the official ISIN as of the date that the NNA issued the
identifier. This means that on searches that the interim ISIN will be valid for queries, reporting up to,
and including 22 January 2007. After this date, the official ISIN would be valid.
Identifier Valid From Code Type Code
1234 01.01.2007 ISIN XXABCDEFGHIJ1
1234 23.01.2007 ISIN DE0007100000 1XXABCDEFGHIJ represents as any internal ISIN according to ISO 6166
This model shall allow the CSD to change the ISIN without the requirement to open a new
instrument, realign transactions and transfer positions from the interim instrument to the new
instrument and closing the interim instrument. Transactions and positions would remain unchanged
with their original references.
6.3.2.2 Replacement of ISIN
Requirement SR.3.2.2
Traceability Principles
Traceability Proposals
The second option available to the CSD is to change the interim ISIN to the official ISIN. No second
record would be created with a new valid from date. However, in this scenario, the interim ISIN
would no longer be available to the user for queries, etc.
Before change:
Identifier Valid From Code Type Code
1234 01.01.2007 ISIN XXABCDEFGHIJ1 1XXABCDEFGHIJ represents as any internal ISIN according to ISO 6166
After Change:
Identifier Valid From Code Type Code
1234 01.01.2007 ISIN DE0007100000
Target2-Securities Technical Group 4 on Static Data
Static Data Business Requirements
Version: 0.1 Page: 52 of 53 Status: Draft
This replacement of the ISIN shall allow the CSD to change the ISIN without the requirement to open
a new instrument, realign transactions and transfer positions from the interim instrument to the new
instrument and closing the interim instrument. Transactions and positions would remain unchanged
with their original references.