Skip to content

Commit bcfe643

Browse files
authored
Merge pull request AuthorizeNet#259 from lilithmm/patch-1
Added Transaction Hash Upgrade note; minor edits.
2 parents 2d796c1 + 6abecf8 commit bcfe643

File tree

1 file changed

+37
-40
lines changed

1 file changed

+37
-40
lines changed

README.md

Lines changed: 37 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -12,30 +12,29 @@
1212
* An Authorize.Net account (see _Registration & Configuration_ section below)
1313

1414
### Migrating from older versions
15-
Since August 2018, the Authorize.Net API has been reorganized to be more merchant focused. AuthorizeNetAIM, AuthorizeNetARB, AuthorizeNetCIM, Reporting and AuthorizeNetSIM classes have all been deprecated in favor of `net\authorize\api` . To see the full list of mapping of new features corresponding to the deprecated features, you can see [MIGRATING.md](MIGRATING.md).
15+
Since August 2018, the Authorize.Net API has been reorganized to be more merchant focused. AuthorizeNetAIM, AuthorizeNetARB, AuthorizeNetCIM, Reporting and AuthorizeNetSIM classes have all been deprecated in favor of `net\authorize\api`. To see the full list of mapping of new features corresponding to the deprecated features, see [MIGRATING.md](MIGRATING.md).
1616

1717
### Contribution
18-
- If you need information or clarification about any Authorize.Net features, please create an issue for it. Also you can search in the [Authorize.Net developer community](https://community.developer.authorize.net/).
19-
- Before creating pull requests, please read [CONTRIBUTING.md](CONTRIBUTING.md)
18+
- If you need information or clarification about Authorize.Net features, create an issue with your question. You can also search the [Authorize.Net developer community](https://community.developer.authorize.net/) for discussions related to your question.
19+
- Before creating pull requests, read [the contributors guide](CONTRIBUTING.md).
2020

2121
### TLS 1.2
22-
The Authorize.Net APIs only support connections using the TLS 1.2 security protocol. It's important to make sure you have new enough versions of all required components to support TLS 1.2. Additionally, it's very important to keep these components up to date going forward to mitigate the risk of any security flaws that may be discovered in your system or any libraries it uses.
22+
The Authorize.Net API only support connections using the TLS 1.2 security protocol. Make sure to upgrade all required components to support TLS 1.2. Keep these components up to date to mitigate the risk of new security flaws.
2323

2424

2525
## Installation
2626
To install the AuthorizeNet .NET SDK, run the following command in the Package Manager Console:
2727

2828
`PM> Install-Package AuthorizeNet`
2929

30-
3130
## Registration & Configuration
32-
Use of this SDK and the Authorize.Net APIs requires having an account on our system. You can find these details in the Settings section.
33-
If you don't currently have a production Authorize.Net account and need a sandbox account for testing, you can easily sign up for one [here](https://developer.authorize.net/sandbox/).
31+
Use of this SDK and the Authorize.Net APIs requires having an account on the Authorize.Net system. You can find these details in the Settings section.
32+
If you don't currently have a production Authorize.Net account, [sign up for a sandbox account](https://developer.authorize.net/sandbox/).
3433

3534
### Authentication
36-
To authenticate with the Authorize.Net API you will need to use your account's API Login ID and Transaction Key. If you don't have these values, you can obtain them from our Merchant Interface site. Access the Merchant Interface for production accounts at (https://account.authorize.net/) or sandbox accounts at (https://sandbox.authorize.net).
35+
To authenticate with the Authorize.Net API, use your account's API Login ID and Transaction Key. If you don't have these credentials, obtain them from the Merchant Interface. For production accounts, the Merchant Interface is located at (https://account.authorize.net/), and for sandbox accounts, at (https://sandbox.authorize.net).
3736

38-
Once you have your keys simply load them into the appropriate variables in your code, as per the below sample code dealing with the authentication part of the API request.
37+
After you have your credentials, load them into the appropriate variables in your code. The below sample code shows how to set the credentials as part of the API request.
3938

4039
#### To set your API credentials for an API request:
4140
```csharp
@@ -47,10 +46,10 @@ ApiOperationBase<ANetApiRequest, ANetApiResponse>.MerchantAuthentication = new m
4746
};
4847
```
4948

50-
You should never include your Login ID and Transaction Key directly in a file that's in a publically accessible portion of your website. A better practice would be to define these in a constants file, and then reference those constants in the appropriate place in your code.
49+
Never include your API Login ID and Transaction Key directly in a file in a publically accessible portion of your website. As a best practice, define the API Login ID and Transaction Key in a constants file, and then reference those constants in your code.
5150

5251
### Switching between the sandbox environment and the production environment
53-
Authorize.Net maintains a complete sandbox environment for testing and development purposes. This sandbox environment is an exact duplicate of our production environment with the transaction authorization and settlement process simulated. By default, this SDK is configured to communicate with the sandbox environment. To switch to the production environment, set the appropriate environment constant using ApiOperationBase `RunEnvironment` method. For example:
52+
Authorize.Net maintains a complete sandbox environment for testing and development purposes. The sandbox environment is an exact duplicate of our production environment, with simulated transaction authorization and settlement. By default, this SDK is configured to use the sandbox environment. To switch to the production environment, set the appropriate environment constant using ApiOperationBase `RunEnvironment` method. For example:
5453
```csharp
5554
// For PRODUCTION use
5655
ApiOperationBase<ANetApiRequest, ANetApiResponse>.RunEnvironment = AuthorizeNet.Environment.PRODUCTION;
@@ -60,28 +59,27 @@ API credentials are different for each environment, so be sure to switch to the
6059

6160

6261
## SDK Usage Examples and Sample Code
63-
To get started using this SDK, it's highly recommended to download our sample code repository:
62+
When using this SDK, downloading the Authorize.Net sample code repository is recommended.
6463
* [Authorize.Net C# Sample Code Repository (on GitHub)](https://github.com/AuthorizeNet/sample-code-csharp)
6564

66-
In that respository, we have comprehensive sample code for all common uses of our API:
65+
The respository contains comprehensive sample code for common uses of the Authorize.Net API.
6766

68-
Additionally, you can find details and examples of how our API is structured in our API Reference Guide:
67+
The API Reference contains details and examples of the structure and formatting of the Authorize.Net API.
6968
* [Developer Center API Reference](http://developer.authorize.net/api/reference/index.html)
7069

71-
The API Reference Guide provides examples of what information is needed for a particular request and how that information would be formatted. Using those examples, you can easily determine what methods would be necessary to include that information in a request using this SDK.
72-
70+
Use the examples in the API Reference to determine which methods and information to include in an API request using this SDK.
7371

7472
## Create a Chase Pay Transaction
7573

7674
Use this method to authorize and capture a payment using a tokenized credit card number issued by Chase Pay. Chase Pay transactions are only available to merchants using the Paymentech processor.
7775

7876
The following information is required in the request:
79-
- The **payment token**,
80-
- The **expiration date**,
81-
- The **cryptogram** received from the token provider,
82-
- The **tokenRequestorName**,
83-
- The **tokenRequestorId**, and
84-
- The **tokenRequestorEci**.
77+
- **payment token**
78+
- **expiration date**
79+
- **cryptogram** received from the token provider
80+
- **tokenRequestorName**
81+
- **tokenRequestorId**
82+
- **tokenRequestorEci**
8583

8684
When using the SDK to submit Chase Pay transactions, consider the following points:
8785
- `tokenRequesterName` must be populated with **`”CHASE_PAY”`**
@@ -92,22 +90,19 @@ When using the SDK to submit Chase Pay transactions, consider the following poin
9290
## Building & Testing the SDK
9391

9492
### Running the SDK Tests
95-
All the tests can be run against a stub backend using the USELOCAL run configuration.
96-
97-
Get a sandbox account at https://developer.authorize.net/sandbox/
98-
Update app.config in the AuthorizeNetTest folder to run all the tests against your sandbox account
93+
Run the tests against a stub backend by using the USELOCAL run configuration.
9994

100-
For reporting tests, go to https://sandbox.authorize.net/ under Account tab->Transaction Details API and enable it.
95+
Update app.config in the AuthorizeNetTest folder to run all the tests against your sandbox account.
10196

10297
### Testing Guide
103-
For additional help in testing your own code, Authorize.Net maintains a [comprehensive testing guide](http://developer.authorize.net/hello_world/testing_guide/) that includes test credit card numbers to use and special triggers to generate certain responses from the sandbox environment.
98+
For additional help in testing your code, Authorize.Net maintains a [comprehensive testing guide](http://developer.authorize.net/hello_world/testing_guide/) that includes test credit card numbers to use and special triggers to generate certain responses from the sandbox environment.
10499

105100
## Logging Sensitive Data
106101
A new sensitive data logger has been introduced with the Authorize.Net .NET SDK, which is an enhancement on the existing logging framework.
107102

108103
The logger uses `System.Diagnostics` namespace in .NET Framework. No external libraries need to be installed along with the application to use the logger.
109104

110-
The logger can be enabled by providing the following configuration in the `app.config/web.config` files of your application. The log levels supported are `'Verbose','Information','Warning'` and `'Error'`.
105+
Enable the logger by providing the following configuration in the `app.config/web.config` files of your application. The log levels supported are `'Verbose','Information','Warning'` and `'Error'`.
111106

112107
If you have previously enabled logging in your application, configurations will need to be updated as below:
113108
```
@@ -137,19 +132,19 @@ If you have previously enabled logging in your application, configurations will
137132
```
138133
As of now, two types of listeners, viz. `TextListener` and `ConsoleListener` are supported with the logger. The corresponding listener types `AuthorizeNet.Util.SensitiveDataTextLogger` and `AuthorizeNet.Util.SensitiveDataConsoleLogger` mask the sensitive data before logging into log file and console respectively.
139134

140-
The list of sensitive fields which can be masked during logging are:
141-
* Card Number,
142-
* Card Code,
143-
* Expiration Date,
144-
* Name on Account,
145-
* Transaction Key, and
146-
* Account Number.
135+
The sensitive fields that are masked during logging are:
136+
* Card Number
137+
* Card Code
138+
* Expiration Date
139+
* Transaction Key
140+
* Account Number
141+
* Name on Account
147142

148-
There is a list of regular expressions which the SensitiveFilterLayout uses to mask credit card numbers while logging.
143+
There is also a list of regular expressions which the sensitive logger uses to mask credit card numbers while logging.
149144

150-
Further information on the sensitive data logging and regular expressions can be found at this [location](https://github.com/AuthorizeNet/sdk-dotnet/blob/master/Authorize.NET/Util/SensitiveDataConfigType.cs).
145+
More information on the regular espressions used during sensitive data logging [can be found here](https://github.com/AuthorizeNet/sdk-dotnet/blob/master/Authorize.NET/Util/SensitiveDataConfigType.cs).
151146

152-
If you don't want to mask any sensitive data, you can use the default `TextWriterTraceListener` and `ConsoleTraceListener`.
147+
To unmask sensitive data, use the default `TextWriterTraceListener` and `ConsoleTraceListener`.
153148
```
154149
<configuration>
155150
<system.diagnostics>
@@ -177,6 +172,8 @@ If you don't want to mask any sensitive data, you can use the default `TextWrite
177172
```
178173
`AnetDotNetSdkTrace` should be used as the source name, as it is being used by the TraceSource inside logger framework code.
179174

175+
### Transaction Hash Upgrade
176+
Authorize.Net is phasing out the MD5 based `transHash` element in favor of the SHA-512 based `transHashSHA2`. The setting in the Merchant Interface which controlled the MD5 Hash option is no longer available, and the `transHash` element will stop returning values at a later date to be determined. For information on how to use `transHashSHA2`, see the [Transaction Hash Upgrade Guide](https://developer.authorize.net/support/hash_upgrade/).
180177

181178
## License
182-
This repository is distributed under a proprietary license. See the provided [`LICENSE.txt`](/LICENSE.txt) file.
179+
This repository is distributed under a proprietary license. See the provided [`LICENSE.txt`](/LICENSE.txt) file.

0 commit comments

Comments
 (0)