Chapa Merchant Security Handbook
Welcome to the Chapa Merchant Handbook — Your comprehensive guide to securely and efficiently managing transactions with Chapa. This handbook provides clear, step-by-step instructions on using key features such as fraud prevention, transaction approvals, API integrations, and security settings.
Whether you’re configuring Radar for fraud detection, managing API keys, enabling OTP approvals, or setting up IP address whitelisting, this guide is here to help you navigate Chapa’s tools with ease. Our aim is to ensure a seamless, secure payment experience for your business.
Table of Contents
- URL Approval / Server Approval
- OTP Approval
- Radar - Real-Time Fraud Protection Guide
- IP Whitelisting
- Encryption for Direct Charge API
- API Keys
- Verifying Webhook Origin
URL Approval / Server Approval
Ensures that a transfer request was initiated by you using a two-step verification process:
- Create an Approval URL
- Add URL to the Dashboard
Create an Approval URL
The Approval URL is a POST endpoint that validates transfer details. Chapa sends payment data and a hash (HMAC SHA256) generated with your approval_secret to this URL. Your server must verify the request and respond accordingly:
Response Codes & Meaning
Response code | Meaning | Status |
---|---|---|
200 | Transfer approved | pending |
400 | Transfer rejected | reverted |
Example Request
Headers:
{
"Chapa-Signature": "9f6a8c3b24d7e1f5a4c2b7a6e8f1c3d4"
}
Body:
{
"amount": "2000.00",
"reference": "MYMER3434989",
"bank": "telebirr",
"account_name": "Customer Name",
"account_number": "25190000000"
}
Add URL to Dashboard
Once you’ve implemented your Approval URL, follow these steps to add it to Chapa:
- Log in to your Chapa Dashboard
- Navigate to Settings → Account Settings
- Locate the Transfer Approval section
- Enter your Approval URL in the provided field
- Save your changes
OTP Approval
Enhance security by requiring a One-Time Password (OTP) confirmation before processing transfers.
How to Enable OTP Approval:
- Log in to your Chapa Dashboard
- Go to Settings → Account Settings
- Find the Transfer Approval section
- Toggle “Confirm transfer by sending OTP to my email”
- Click Save
Now, transfers will require an OTP sent to your email for confirmation before processing.
Radar - Real-Time Fraud Protection Guide
Getting Started with Radar
- Go to dashboard.chapa.co
- Sign Up or Sign In
- Click Radar from the side tab
- If not enabled, turn the toggle on to activate Radar
Lists
Create lists to block, allow, or review specific payments.
Common List Examples:
- Blocked List – Automatically deny payments from specific customers
- Maximum Withdrawal Amount – Set a limit on withdrawals
How to Add a List:
- Click the Lists tab → Add List
- Fill in:
- Name (required) – A unique, descriptive identifier
- Slug (optional) – A URL-friendly version of the name
- Type – Choose from:
- Phone Number
- Account Number
- IP Address
- Amount
- Card Number
- Customer ID
- Device ID
- Location
- Name
- List Items – Enter data as a comma-separated list or upload a CSV file. Ensure formatting matches the selected data type.
- Click Add – A confirmation message appears.
Rules
Radar allows you to create rules to block or authorize transactions based on specific conditions.
Types of Rules
- Authorization Rules – Determine whether a payment should proceed after review
- Block Rules – Automatically deny payments that match specific criteria
How to Add an Authorization Rule:
- Click Rules tab → Add Rule
- Fill in:
- Attribute – The type of data used in the rule (e.g., Mobile, Email, Amount, Daily Amount)
- Operator – Defines how the data is compared:
=
(Equal To)!=
(Not Equal To)>
(Greater Than)<
(Less Than)>=
(Greater Than or Equal To)<=
(Less Than or Equal To)LIKE
(Matches a pattern)@
(Contains)!
(Does Not Contain)
- List – Select a previously created list to validate against
- Rule Type – Choose whether the rule applies to:
- Payouts – Outgoing transactions
- Payins – Incoming transactions
- Click Test Rule – Verify if the rule works as expected
- Click Add
Note: Radar’s Default status is Disabled. You need to manually enable it after review.
IP Whitelisting
Enhances security by allowing only trusted IP addresses to access your account. Any login attempt from an unlisted IP will be blocked.
How to Enable IP Whitelisting:
- Log in to your Chapa Dashboard
- Go to Settings → Whitelisted IPs
- Toggle “Enable IP Whitelisting” → Click Update Whitelisting Setting
- Click Add New IP Address → Enter your trusted IP
- Click Add Whitelisted IPs to save
Encryption for Direct Charge API
When using Direct Charge API to charge a card or send OTP, you must encrypt the payload before making the request.
How to Encrypt the Payload?
- Get your encryption key from Settings → API in your Chapa Dashboard
- Use the 3DES (Triple DES) algorithm to encrypt the payload
What to Encrypt?
For sensitive data like card details or OTP, encrypt these parameters:
{
"requestID": "13434jjfhd8ududfy82e324234234jkhjsfhdfhskdjfh89fjhduohdfjhsgkdfksjdfskldhfkjs",
"otp": 1234
}
If OTP is required, include the request token returned during transaction initiation.
Example Encryption Function (Python)
import json
import base64
from Crypto.Cipher import DES3
def encryptData(key, plainText):
blockSize = 8
padDiff = blockSize - (len(plainText) % blockSize)
plainText = "{}{}".format(plainText, "".join(chr(padDiff) * padDiff))
cipher = DES3.new(key, DES3.MODE_ECB)
encrypted = base64.b64encode(cipher.encrypt(plainText))
return encrypted
The function:
- Converts the payload to JSON
- Pads the text to match block size
- Uses 3DES encryption in ECB mode
- Encodes the result in Base64
API Keys
When you sign up on the Chapa dashboard, you receive two types of API keys:
Secret Key
- The most powerful key, used for authorizing actions on your account
- Never share or expose this key publicly
Public Key
- Used for client-side operations (e.g., front-end JavaScript)
- Safe to include in public code but should still be handled securely
How to Find Your API Keys
- Log in to your Chapa Dashboard
- Click the profile icon (top-right corner, showing your initials)
- Go to Settings → API Keys to view both public and secret keys
Keeping Your Keys Secure
-
Do not expose your secret key in public repositories or code
-
If a key is compromised:
- Open Settings → API in your dashboard
- Click “Generate new keys” to revoke the old ones
- Update your app with the new keys
Note:
- Key with the prefix
PUBK
is the Public key - Key with the prefix
SECK
is the Private/Secret key - Public Keys with the prefix
TEST
are for Test mode accounts
Verifying Webhook Origin
To ensure webhook requests come from Chapa, you need to set up a secret hash. This helps prevent unauthorized access to your webhook URL.
Setting Up Webhook Verification
Define a Secret Hash
- Set a random and secure secret hash when configuring your webhook
- Store this secret hash securely as an environment variable on your server
How Chapa Uses the Secret Hash
- Every webhook request from Chapa includes a
Chapa-Signature
header - This signature is an HMAC SHA256 hash of your secret key, signed using the secret key itself
- Additionally, we send another header called
x-chapa-signature
, which is an HMAC SHA256 hash of the event payload
Verifying the Webhook Request
- Check for either the
Chapa-Signature
orx-chapa-signature
header - Compute the expected hash using your stored secret key and compare it with the received signature
- If either of the headers is missing or invalid, discard the request
- If both headers are present, at least one must be valid for the request to be processed
Example Code
var crypto = require("crypto");
var secret = process.env.SECRET_KEY;
// Using Express
app.post("/my/webhook/url", function (req, res) {
// Validate event
const hash = crypto
.createHmac("sha256", secret)
.update(JSON.stringify(req.body))
.digest("hex");
if (hash == req.headers["Chapa-Signature"]) {
// Retrieve the request's body
const event = req.body;
// Do something with the event
}
res.send(200);
});
The code verifies webhook requests from Chapa using HMAC SHA256:
- Retrieve the Secret Key from environment variables
- Generate a Hash of the request body using the secret key
- Compare the Hash with the
Chapa-Signature
header - Process the Event if signature is valid
- Respond to Chapa with 200 OK