Contact salesSign inSign up
AuthsignalAuthsignal
Product
Passwordless / multi-factor authentication (MFA)
Drop-in authentication
Risk-based authentication
Passkeys
Biometric authentication
WhatsApp OTP
Authenticator apps (TOTP)
Push authentication
SMS OTP
Email OTP
Magic links
See all authenticators
See less authenticators
Palm biometrics
Contactless payments & identity verification
Flexible integration modes
Pre-built UI
Low code
UI components
Customizable
Custom UI
Flexible
Digital credentials API Beta
Authenticate customers instantly using digital credentials
Session management
Keep users signed in across web and mobile after authentication
Fraud Controls
Rules and policies engine
Step-up authentication
No-code rule creation
Risk alerts
User observability
Audit trails
Dynamic linking
Why Authsignal?
Complete authentication infrastructure from enrollment to step-up auth, modular by design
Solutions
By USE CASE
View All
Account takeovers (ATO)
Go passwordless
Call center
SMS cost optimization
Existing apps
QR code payments
Step-up MFA
Palm biometrics payments
By INDUSTRY
View All
Financial services
Marketplace
e-Commerce
FinTech
Crypto
Healthcare
By Integration (identity provider)
Amazon Cognito
Azure AD B2C
Duende IdentityServer
Keycloak
Auth0
NextAuth.js
Custom identity provider
By ROLe
Engineers
Product
Passwordless / Multi-factor Authentication (MFA)
Flexible Integration Modes
Pre-built UI · Low code
UI Components · Customizable
Custom UI · Flexible
Digital credentials API Beta
Authenticate customers instantly using digital credentials
Session management
Issue JWT access and refresh tokens
Why Authsignal?
Plug in Authsignal to elevate your IDP — effortless integration with any architecture.
Drop-in Authentication
Risk-based authentication
Passkeys
Biometric authentication
WhatsApp OTP
SMS OTP
Email OTP
Magic links
Authenticator apps (TOTP)
Push notifications
Palm Biometrics
Contactless payments & identity verification
Fraud Controls
Rules and Policies Engine
Step-up Authentication
No Code Rule Creation
Risk Alerts
User Observability
Audit Trails
Use Cases
Financial services
Account takeovers (ATO)
Marketplace
Go passwordless
e-Commerce
Solutions
By Use Case
Account takeovers (ATO)
Go passwordless
Call center
SMS cost optimization
Existing apps
QR code payments
Step-up MFA
Palm Biometric Payments
View all Use Cases
By Industry
Financial services
Marketplace
e-Commerce
FinTech
Crypto
Healthcare
View all Industries
By Integration (identity provider)
Amazon Cognito
Azure AD B2C
Duende IdentityServer
Keycloak
Auth0
NextAuth.js
Custom identity provider
By Role
Engineers
PricingAboutDocsBlog
Schedule a call
Try Authsignal
AUS Flag

Authsignal secures millions of passkey transactions out of our hosted Sydney region.

AUS Flag

Authsignal secures millions of passkey transactions out of our hosted Sydney region.

Join us today!
Right icon
Blog
/
Current article
BSP Circular 1213
Philippine banking
SMS OTP
Risk based authentication

BSP Circular 1213: Philippine banks must replace SMS OTPs by June 2026

Ashutosh Bhadauriya
⬤
March 17, 2026
Share
BSP Circular 1213: Philippine Banks Must Replace SMS OTPs by June 2026

The Bangko Sentral ng Pilipinas, the country's central bank, has set June 30, 2026, as the deadline for financial institutions to stop using SMS OTPs for high-risk banking transactions. Deputy Governor Elmore Capule has confirmed the central bank is holding the date firm: "As of now we are not extending it, so they have to catch up."

Under the Anti-Financial Account Scamming Act (AFASA), banks that fail to put adequate authentication controls in place are required to reimburse customers for funds lost to scams. Banks that comply get liability protection.

‍

Why the BSP is moving away from SMS OTPs

SMS OTPs travel over the telecom network, which the bank has no control over. SIM swap fraud lets attackers receive OTP messages intended for the account holder. Phishing pages harvest codes in real time. Smishing tricks users into reading the code aloud over the phone. Each of these attacks works because the authentication factor has to leave the bank's systems and pass through a channel anyone can potentially intercept.

BSP Circular 1213 requires institutions to "transition away from interceptable authentication mechanisms" for financial transactions and high-risk activities. The coverage extends beyond login. Adding a new payee, updating registered contact details, initiating large transfers - any high-risk transaction or critical account change falls under the mandate.

‍

What the BSP is actually requiring

The regulation goes beyond a mandate to adopt biometrics. The BSP has published specific guidelines on server-side biometric authentication, which it recognises as an acceptable control for covered transactions.

The difference between server-side and device-side biometrics matters here. Device-side biometrics, the fingerprint or face scan that unlocks a banking app, rely on whatever is happening on the user's phone. If the device is compromised, that check can be bypassed. Server-side biometrics validate the user's identity against templates stored in the bank's own backend, so the check happens independently of the device's state.

The guidelines also acknowledge the security tradeoff that comes with centralising biometric data. A database of biometric templates is a high-value target for attackers. Banks are required to store templates as encrypted mathematical representations rather than raw images, and to encrypt data both at rest and in transit. Liveness and deepfake detection are mandatory. Biometrics also has to be layered with other controls rather than used alone, and banks are required to monitor false acceptance rates, false rejection rates, and algorithmic bias across different user groups.

The BSP also requires banks to think about users who may struggle with biometric authentication: elderly customers with worn fingerprints, people with certain disabilities, users on lower-end devices. Solutions have to work for these cases while maintaining the security standard.

‍

The liability provision

Before AFASA(Anti-financial account scamming act), liability for digital banking fraud was often contested. The law changes that. Banks with adequate risk management systems and strong authentication are protected from liability when scams occur despite those controls. Banks without adequate controls are required to reimburse customers directly.

The BSP also clarified that OTPs retain one permitted use: confirming the existence or ownership of a registered mobile number. OTPs remain in the toolkit, just not as a way to authorise transactions.

‍

What compliance actually involves

Circular 1213 sets the fraud management baseline. Institutions handling complex electronic services, or with average monthly transaction volumes above PHP 75 million, are required to have real-time fraud detection covering behavioral anomalies, geolocation, blacklist screening, and device change events. This infrastructure has to be in place alongside the authentication changes, and the authentication side requires phishing-resistant mechanisms for anything classified as high-risk. Methods that can be socially engineered out of a user, including SMS codes, fall outside that definition.Biometrics alone does not satisfy the requirement either. The BSP is explicit that authentication has to be layered: biometrics combined with device binding, behavioral signals, and transaction risk scoring. Banks using third-party biometrics vendors also carry obligations under the circular. The circular requires due diligence on the vendor's security architecture, explicit data protection clauses in contracts, and independent audits on an ongoing basis.

‍

Where Authsignal fits

Authsignal's platform handles adaptive, risk-based authentication. Financial institutions can configure authentication to scale with transaction risk, so a balance check and a large transfer to a new payee go through different flows. The platform supports passkeys, biometric-backed authenticators, in-app push confirmations, and a no-code rules engine that can be tuned to each institution's risk profile. Given that the BSP mandate is risk-tiered by design, that configurability is where the compliance work actually happens.

Get in touch with if you're figuring out what the transition looks like for your stack, we've helped banks across the region move off SMS OTPs without rebuilding their identity layer.

Question icon
Have a question?
Talk to an expert
NewsletterDemo PasskeysView docs
BSP Circular 1213
Philippine banking
SMS OTP
Risk based authentication

You might also like

How to add push authentication to your app with Authsignal and React Native
Push authentication
React native
Node.js
Multi-factor authentication
Guides

How to add push authentication to your app with Authsignal and React Native

March 27, 2026
How to add adaptive MFA and passkeys to any web app with Authsignal and Lambda@Edge
AWS
Authentication
Security

How to add adaptive MFA and passkeys to any web app with Authsignal and Lambda@Edge

March 10, 2026
The real cost of building authentication in-house
Build vs. Buy
Authentication

The real cost of building authentication in-house

April 1, 2026

Secure your customers’ accounts today with Authsignal

Passkey demoCreate free account

Authsignal delivers passwordless and multi-factor authentication as a service. Focused on powering mid-market and enterprise businesses to rapidly deploy optimized good customer flows that enable a flexible and risk-based approach to authentication.

AICPA SOCFido Certified
LinkedInTwitter
Passwordless / multi-factor authentication (MFA)
Pre-built UI (low code)UI components (customizable)Custom UI (flexible)
Why Authsignal?
Drop-in authentication
Risk-based authentication PasskeysBiometric authenticationWhatsApp OTPSMS OTPEmail OTPMagic linksAuthenticator apps (TOTP)Push authenticationPalm biometricsDigital Credential Verification API
Rules and policies engine
User observability
Industries
Financial services
Marketplace
e-Commerce
FinTech
Crypto
View all industries
Teams
Engineers
Use cases
Account takeovers (ATO)
Go passwordless
Call center
SMS cost optimization
Existing apps
View all use cases
Identity providers (IDPs)
Amazon Cognito
Auth0
Azure AD B2C
Custom identity provider
Duende IdentityServer
Keycloak
NextAuth.js
Integrations
ASP.NET
C#
Java
Node.js
Open ID Connect (OIDC)
PHP
Python
React
Ruby
Ruby on Rails
Compare
Twilio Verify vs AuthsignalAuth0 vs AuthsignalAWS Cognito vs Authsignal + AWS Cognito
Resources
BlogDeveloper docsFree Figma mobile passkeys templateFree Figma desktop passkeys templateFree Figma webapp passkeys template
Company
About usWhy AuthsignalCareersPress releasesPartnersContact us
What is
SMS OTP
Risk Based Authentication
IP Spoofing
Passwordless authentication
Multi-Factor Authentication (MFA)
United States
+1 214 974-4877
Ireland
+353 12 676529
Australia
+61 387 715 810
New Zealand
+64 275 491 983
© 2026 Authsignal - All Rights Reserved
Terms of servicePrivacy policySecuritySystem statusCookies