Table of Contents

Most UK neobank teams do not fail PSD2 and Open Banking because they do not understand the regulations.

They fail because their consent flows do not produce trust and evidence at the same time.

That shows up in two places that matter: user drop-off at the exact moment you ask for permissions, and partner or regulator pushback when you cannot prove what a user consented to, when they consented, and what access happened afterwards.

If you want the broader UK “FCA as gatekeeper” view, start here: (Why 73% of UK Neobanks Fail FCA Approval)

This article is a tactical deep dive into one part of that story: PSD2 consent UX, permissioning, re-consent, auditability, and user clarity. It does not cover Faster Payments or Bacs integration details.

Book a Call


Consent as a lifecycle

Scrutiny rarely focuses on UI polish. It focuses on whether you can demonstrate “explicit consent” and safe access behaviour in a way that is consistent, auditable, and understandable to a customer.

In UK terms, the underlying logic is simple: account access depends on explicit consent and secure interaction expectations, and the system must behave predictably over time, not just at the moment of connection. (FCA PSRs) (FCA Approach) (PSRs 2017)

Open Banking turns that into real-world user journeys, including the practical reality of renewal cycles that affect retention and support load. (Open Banking CX) (Open Banking 90 days)

When partners ask hard questions, they are usually asking one thing:

Can you prove that consent was informed, explicit, current, and correctly enforced across the whole access lifecycle?

That lifecycle includes capture, authorisation evidence, scope enforcement, ongoing governance, and revocation. Most teams build one part well and treat the rest as “later.” That is where the mistakes begin.


Mistake 1: Treating consent as compliance copy instead of a trust moment

The first failure pattern is human: the screen looks “legally safe” but feels unclear.

Users see a generic permissions screen with vague wording, unclear scope, and no confident sense of who is asking and what will happen next. That drives drop-off and sets up complaints later. It also raises partner concern because unclear consent UX often correlates with weak consent records.

Where it breaks most often

  • The third party is named but not explained in plain English.
  • Scope is buried behind “Learn more” instead of stated upfront.
  • Duration and renewal expectations are unclear, so users feel surprised later.

What to do instead

Make the consent screen answer five questions without forcing users into policy links:

  • Who is requesting access?
  • What data or actions are requested?
  • Why is it needed?
  • How long will access last?
  • How can the user stop it?

Open Banking guidance treats CX in these journeys as material to conversion and drop-off, so clarity is not cosmetic. (Open Banking CX) (Open Banking 90 days)


Mistake 2: Building a consent object with no real scope boundaries

Many teams store consent as a boolean and rely on tokens to represent permissions.

That is a compliance and engineering trap. Tokens are implementation details. Consent is a business object that must survive token refresh, bank behaviour differences, audits, and incident reviews.

What usually goes wrong

  • Scope is not stored in human-readable form, only implied by code.
  • Consent changes are not versioned, so you cannot show evolution over time.
  • Data pulls cannot be reconciled to “what was allowed” at that moment.

What good looks like

Define a consent object that is explicit and queryable. At minimum, it should capture:

  • consent ID, user identity context, and TPP identifiers
  • consent type (AISP, PISP, etc.)
  • fine-grained scopes and the accounts covered (including selection rules)
  • validity window and lifecycle status (active, revoked, expired, suspended)
  • version number (increment when scope changes)
  • evidence pointer (link to the consent event bundle)

This matters in UK scrutiny because the FCA’s approach guidance treats explicit consent and secure communication as foundational to account access models. (FCA Approach) (FCA PSRs)


Mistake 3: Treating renewal and re-authentication as an edge case

Teams build the initial connection flow, then treat renewal as something to solve later. Then renewal hits, users get confusing prompts, sessions break, and support cannot explain what happened.

In Open Banking, 90-day re-authentication dynamics are a known driver of drop-off and frustration. You do not need to debate every edge case to build a safe product. You need a lifecycle that anticipates renewal and stays clear under stress. (Open Banking 90 days) (90 Days Re-authentication)

Common failure signals

  • No pre-expiry messaging, so users experience renewal as a “breakage.”
  • The product keeps retrying background access after expiry, creating noise.
  • Support cannot view a clean timeline of consent state changes.

A simple renewal playbook

  • Notify early enough to avoid surprise, and explain why renewal exists.
  • Offer an in-product “renew now” path that preserves context.
  • At expiry, stop background access immediately and mark the consent state cleanly.
  • After expiry, avoid spam and avoid uncontrolled retries.

Evidence requirement

You should be able to show a timeline from consent issuance, through renewal prompts, to renewal or expiry, to access stop.


Mistake 4: Weak permissioning across accounts, devices, and sessions

Many consent flows work well in one happy-path scenario, then break across multi-device usage, multiple accounts, and repeated sessions.

Permissioning is not just “scope.” It is a state machine across identity, account selection, tokens, and background workers.

Where teams get burned

  • Consent is effectively tied to a session, not to a durable identity state.
  • Account selection is captured but not enforced consistently across access calls.
  • Revocation happens in UI, but background workers continue pulling data.

What to do instead

Build explicit boundaries:

  • consent is identity-bound, not session-bound
  • account selection becomes an enforceable rule
  • every access event links to a consent ID and identity
  • revocation propagates everywhere, including scheduled jobs
  • multiple consents have precedence rules that avoid inconsistent UX

A practical UX move that reduces complaints and support load: a “Connected accounts” view that shows which connections exist, last access time, and a one-tap revoke.


Mistake 5: An audit trail that cannot answer the question that matters

Teams often say “we have logs.” Under scrutiny, that usually means scattered system output.

The question partners care about is simple:

What data did you access, under what consent, and why?

What usually goes wrong

  • Consent capture events are not linked to access events.
  • Identifiers are inconsistent, so timelines are hard to reconstruct.
  • Operational actions (support or compliance changes) are missing from the trail.

Minimum audit bundle per consent

A single timeline view should be producible, including:

  • consent created (scope, accounts, purpose)
  • consent confirmed (authentication evidence pointer)
  • access events (timestamp + category + outcome)
  • token refresh events linked to the same consent
  • status changes (suspended, expired, revoked)
  • operational actions (support, complaints, manual updates)
  • user notifications (what you told the user and when)

This is how you demonstrate explicit consent and secure interaction expectations in practice. (FCA Approach) (FCA PSRs)


Mistake 6: Error handling that destroys trust and breaks evidence continuity

In Open Banking journeys, failures happen: bank downtime, token expiry, consent expiry, user revocation.

The problem is rarely the failure. The problem is that everything collapses into “Something went wrong,” and neither users nor support can understand what happened.

Open Banking API materials describe consent and token behaviour and imply the need for consistent handling across failure types. (Open Banking API profile) (Read-Write API Profile)

What usually goes wrong

  • One generic error message for multiple root causes.
  • Retries that spam banks and create noisy logs.
  • No consistent error taxonomy, so reporting is meaningless.

A practical fix

Classify failures into three user outcomes:

  • No action required (temporary bank issues): retry safely and explain.
  • User action required (re-auth or renewal): guide the user clearly.
  • Connection blocked (revoked or denied): stop access and explain options.

Also log: category, whether user action was required, what retries occurred, and when the system recovered or stopped. This protects trust and keeps audit timelines coherent.


A practical readiness checklist: what to ship before you call consent “done”

Use this as your internal definition of ready.

UX and clarity

  • Consent screen answers who, what, why, duration, and revocation clearly.
  • A “Manage permissions” route exists after onboarding.
  • Renewal prompts are clear and benefit-led.
  • Users can view connected accounts and last access time.

Consent lifecycle and permissioning

  • Consent object includes scope, status, validity window, and versioning.
  • Account selection rules are stored and enforced consistently.
  • Revocation stops access everywhere, including background jobs.
  • Multi-device and multi-session behaviour is stable and predictable.

Audit and evidence

  • A single consent timeline can be produced in one view.
  • Every access event links to consent ID and identity.
  • Error categories and outcomes are logged consistently.
  • Operational actions are included in the evidence bundle.

Operational readiness

  • Support can view and explain the consent timeline.
  • Complaints tie back to consent events and outcomes.
  • Incident playbooks include consent failures as a defined category.


Finamp approach: evidence-first consent flows without rebuilding later

Finamp supports UK teams building PSD2-aligned consent journeys by treating consent as a lifecycle with evidence, not a one-off UI step.

Teams use Finamp to implement consent objects with clear scope boundaries and lifecycle states, generate audit-friendly consent and access timelines that stand up in partner scrutiny, and design renewal flows that reduce drop-off while keeping access governance clean. Finamp also helps connect operational workflows such as support, complaints, and incident handling to consent evidence so issues become traceable outcomes rather than vague tickets.

If your consent flow is already built, we can pressure-test it using a partner-style evidence review: what you can prove today, what will be questioned, and what to fix before it turns into expensive rework.

Book a Call