Payment Institution License in Europe

A payment institution license in Europe allows a non-bank firm to provide regulated payment services under Directive (EU) 2015/2366 (PSD2). It is usually the right route for payment gateways, merchant acquiring models, remittance businesses, payment initiation services and some IBAN-based payment flows that do not involve issuing redeemable electronic money. In 2026, the licensing analysis cannot stop at PSD2: applicants are also assessed through the lenses of DORA, AML governance, safeguarding mechanics, outsourcing controls, GDPR and jurisdiction-specific substance expectations.

A payment institution license in Europe allows a non-bank firm to provide regulated payment services under Directive (EU) 2015/2366 (PSD2). It is usually the right route for payment gateways, merchant acquiring models, remittance businesses, payment initiation services and some IBAN-based payment flows that do not involve issuing redeemable electronic money. Read more Hide In 2026, the licensing analysis cannot stop at PSD2: applicants are also assessed through the lenses of DORA, AML governance, safeguarding mechanics, outsourcing controls, GDPR and jurisdiction-specific substance expectations.

This page is an informational summary, not legal, tax or regulatory advice. Licensing outcomes, timelines, governance expectations and post-authorization obligations vary by Member State, business model, risk profile and supervisory practice. "Europe" on this page refers primarily to the EU/EEA licensing framework; the UK FCA regime is separate and does not provide EU passporting.

Disclaimer This page is an informational summary, not legal, tax or regulatory advice. Licensing outcomes, timelines, governance expectations and post-authorization obligations vary by Member State, business model, risk profile and supervisory practice. "Europe" on this page refers primarily to the EU/EEA licensing framework; the UK FCA regime is separate and does not provide EU passporting.
Payment institution license in Europe 2025

EMI Snapshot

Core authorization thresholds, timeline reality and the practical review lens in one block.

At a Glance

Core legal basis
PSD2 is the main authorization framework for payment institutions. Relevant applicants also need to align with Commission Delegated Regulation (EU) 2018/389 on SCA and secure communication, Regulation (EU) 2022/2554 (DORA), GDPR and the EU AML architecture.
Initial capital baseline
The harmonized PSD2 starting thresholds for payment institutions are €20,000, €50,000 or €125,000 depending on the payment services provided. These figures are only the entry point; own funds, substance and operating budget usually matter more for feasibility.
When PI is usually enough
A PI route is commonly used for money remittance, merchant acquiring, payment execution, PISP and AISP models. If the product stores client value as redeemable e-money, an EMI analysis is usually required instead.
Realistic timing
A practical end-to-end timeline is often 6-12+ months, including pre-assessment, document drafting, completeness review, supervisory Q&A and operational readiness. The statutory review clock in many jurisdictions becomes meaningful only after the file is accepted as complete.
2026 supervisory reality
Regulators now test not only legal documents but also whether the applicant can operate safely on day one: safeguarding account access, DORA-ready ICT governance, outsourcing control, sanctions screening and credible local decision-making are frequent pressure points.

Mini Timeline

Week 1-4
Model qualification and jurisdiction screening

The first gating issue is whether the product is truly a PI model under PSD2 or drifts into EMI, banking, consumer credit or MiCA territory.

Month 2-3
Application pack drafting

The program of operations, safeguarding design, AML framework, financial projections, governance map and ICT architecture are built into one coherent supervisory narrative.

Month 4-8+
Regulator review and Q&A

Most delays arise from weak management evidence, unclear outsourcing control, unrealistic revenue assumptions or insufficient explanation of safeguarding and transaction flows.

Post-approval
Operational launch and passporting

Authorization does not remove the need for banking partner onboarding, audit setup, complaints handling, incident reporting and host-state conduct compliance.

Quick Assessment

  • Does the product hold client value that is redeemable at par, which may indicate an EMI rather than a PI model?
  • Can the founders evidence two credible effective managers if the target jurisdiction expects that supervisory setup?
  • Is there a realistic safeguarding banking path, not only a theoretical policy?
  • Can the applicant support DORA-grade ICT governance, incident handling and third-party risk documentation at filing stage?
  • Do the three-year projections show enough capital runway if own funds requirements increase with payment volume?
Start with a PI/EMI qualification review
PSD2 scope

What a payment institution license in Europe allows you to do

A payment institution license authorizes a non-bank firm to provide the regulated payment services listed in Annex I of PSD2, subject to the permissions granted by the national competent authority. In practical terms, this route is used for payment execution, merchant acquiring, remittance, payment initiation and account information services. It is not a banking license and it does not allow deposit-taking.

The key boundary is product architecture. If you execute payments without issuing redeemable stored value, a PI license Europe route may be sufficient. If you issue electronic money, operate a stored-value wallet or hold balances that function as e-money, the analysis usually shifts toward an EMI framework under Directive 2009/110/EC.

Can Do

Permitted Activities

  • Provide payment account operations and payment transaction execution where permitted by the license scope and local implementation.
  • Offer merchant acquiring and payment gateway structures linked to card or account-to-account payment flows.
  • Provide money remittance services under the PSD2 framework.
  • Act as a PISP for payment initiation and as an AISP for account information, subject to authorization scope and technical readiness.
  • Passport authorized services across the EEA through notification procedures, subject to host-state conduct rules.
  • Use agents or outsourced providers where legally permitted and properly controlled.
Cannot Do

Out-of-Scope Activities

  • Accept deposits or other repayable funds from the public as a credit institution would.
  • Issue electronic money unless separately authorized as an EMI.
  • Assume that holding client funds for payment execution is equivalent to unrestricted balance-holding or deposit business.
  • Outsource core control functions in a way that leaves the licensed entity without real oversight, records access or decision-making substance.
  • Treat passporting as a waiver from local consumer, marketing, complaints or language rules in host states.
Decision matrix

Payment institution vs EMI vs specialized bank: the licensing decision matrix

The right license depends on whether the product executes payments, issues electronic money or performs banking activities. Founders often over-focus on headline capital and under-focus on redemption mechanics, safeguarding burden, prudential scaling and future product roadmap. That is a costly mistake.

A useful rule is simple: if the business model involves stored, redeemable client value, especially wallet balances usable for future payments, an EMI assessment is usually unavoidable. If the model only initiates, transmits or executes payments without issuing e-money, a payment institution license in Europe may be enough. If the strategy includes deposit-taking or broader lending funded by repayable public funds, the analysis moves into the banking regime.

Parameter PI EMI Specialized Bank
Primary legal basis PSD2 EMD2 plus relevant PSD2 payment services rules National banking law plus CRR/CRD framework
Initial capital baseline €20,000 / €50,000 / €125,000 depending on services €350,000 Often €5 million+ baseline under banking regime, subject to jurisdiction and model
Can issue electronic money No Yes May do so if permitted under banking authorization and product structure
Can hold client funds for payment services Yes, but only within the payment-services framework and subject to safeguarding Yes, with safeguarding and e-money redemption obligations Yes, under banking and depositor-protection framework rather than PSD2-style safeguarding
Typical product fit Remittance, acquiring, payment gateway, PISP, AISP, some IBAN/payment execution models Wallets, stored-value accounts, app balances, card-linked e-money products Deposit products, lending platforms with banking perimeter, broader treasury and balance-sheet models
Safeguarding Required for relevant client funds Required for funds received in exchange for e-money Different prudential and depositor-protection architecture
Passporting across EEA Yes, subject to notification Yes, subject to notification Possible under separate banking passporting logic where applicable
Common founder mistake Using PI for a wallet that is economically e-money Applying for EMI too early when a narrower PI or partner model would suffice Assuming a banking route is a faster substitute for EMI or PI
Parameter
Primary legal basis
PI
PSD2
EMI
EMD2 plus relevant PSD2 payment services rules
Specialized Bank
National banking law plus CRR/CRD framework
Parameter
Initial capital baseline
PI
€20,000 / €50,000 / €125,000 depending on services
EMI
€350,000
Specialized Bank
Often €5 million+ baseline under banking regime, subject to jurisdiction and model
Parameter
Can issue electronic money
PI
No
EMI
Yes
Specialized Bank
May do so if permitted under banking authorization and product structure
Parameter
Can hold client funds for payment services
PI
Yes, but only within the payment-services framework and subject to safeguarding
EMI
Yes, with safeguarding and e-money redemption obligations
Specialized Bank
Yes, under banking and depositor-protection framework rather than PSD2-style safeguarding
Parameter
Typical product fit
PI
Remittance, acquiring, payment gateway, PISP, AISP, some IBAN/payment execution models
EMI
Wallets, stored-value accounts, app balances, card-linked e-money products
Specialized Bank
Deposit products, lending platforms with banking perimeter, broader treasury and balance-sheet models
Parameter
Safeguarding
PI
Required for relevant client funds
EMI
Required for funds received in exchange for e-money
Specialized Bank
Different prudential and depositor-protection architecture
Parameter
Passporting across EEA
PI
Yes, subject to notification
EMI
Yes, subject to notification
Specialized Bank
Possible under separate banking passporting logic where applicable
Parameter
Common founder mistake
PI
Using PI for a wallet that is economically e-money
EMI
Applying for EMI too early when a narrower PI or partner model would suffice
Specialized Bank
Assuming a banking route is a faster substitute for EMI or PI
PSD2, DORA, AML, MiCA

Legal framework for a payment institution license in Europe in 2026

A PI authorization in Europe is still granted under the current PSD2 regime, but the real compliance perimeter in 2026 is wider. A credible application must map the business model against PSD2, the RTS on SCA and secure communication, DORA, GDPR, national AML rules implementing the EU AML package and, where crypto rails or tokenized money are involved, the interaction with MiCA.

The practical point is that regulators no longer treat ICT, outsourcing and AML as annex topics. They are core authorization pillars. An applicant that cannot evidence ICT asset inventory, incident escalation, sanctions controls, outsourcing registers and a workable safeguarding flow is often viewed as not operationally ready, even if the legal structure is formally correct.

The licensing authority is the relevant national competent authority, such as the Bank of Lithuania, Central Bank of Ireland, Central Bank of Cyprus, MFSA, CSSF, De Nederlandsche Bank or BaFin. The ECB is not the direct licensing authority for standard PI authorizations.

Framework Why It Matters Operational Impact
Directive (EU) 2015/2366 (PSD2) PSD2 defines the payment services perimeter, authorization logic, safeguarding principles, passporting mechanics and prudential framework for payment institutions. The program of operations, service mapping, agent model, customer journey and own funds methodology must align with the PSD2 service category actually used.
Directive 2009/110/EC (EMD2) EMD2 matters whenever the product may amount to issuing electronic money rather than only executing payments. Wallets, stored balances, redeemability features and app-value mechanics must be analyzed early to avoid filing under the wrong regime.
Commission Delegated Regulation (EU) 2018/389 The RTS on SCA and secure communication sets the core security framework for authentication and open-banking communication. Applicants need a defensible SCA logic, fraud controls, API security posture and exception handling model.
Regulation (EU) 2022/2554 (DORA) DORA has applied since 17 January 2025 and reshaped ICT governance expectations for financial entities, including many payment institutions. Applicants should prepare ICT risk management, incident classification, third-party risk controls, a register of ICT providers, business continuity and documented exit strategies.
EU AML package and AMLA architecture AML supervision in 2026 is more integrated and more data-driven, especially for cross-border and higher-risk business models. The licensing pack should show customer risk scoring, sanctions screening, UBO verification, transaction monitoring, escalation logic and MLRO reporting lines.
Regulation (EU) 2023/1114 (MiCA) MiCA becomes relevant if the payment product interfaces with crypto-asset services, stablecoin flows or electronic money tokens. A PI license does not replace a MiCA analysis. If the model touches EMT issuance, custody or crypto-asset services, perimeter mapping is essential.
PSD3 and proposed Payment Services Regulation (PSR) These proposals matter for strategic planning even before full transition, because product architecture built today should not require expensive redesign later. Future-proofing now usually means stronger fraud controls, better customer disclosures, cleaner API governance and more robust data and complaints architecture.
Framework
Directive (EU) 2015/2366 (PSD2)
Why It Matters
PSD2 defines the payment services perimeter, authorization logic, safeguarding principles, passporting mechanics and prudential framework for payment institutions.
Operational Impact
The program of operations, service mapping, agent model, customer journey and own funds methodology must align with the PSD2 service category actually used.
Framework
Directive 2009/110/EC (EMD2)
Why It Matters
EMD2 matters whenever the product may amount to issuing electronic money rather than only executing payments.
Operational Impact
Wallets, stored balances, redeemability features and app-value mechanics must be analyzed early to avoid filing under the wrong regime.
Framework
Commission Delegated Regulation (EU) 2018/389
Why It Matters
The RTS on SCA and secure communication sets the core security framework for authentication and open-banking communication.
Operational Impact
Applicants need a defensible SCA logic, fraud controls, API security posture and exception handling model.
Framework
Regulation (EU) 2022/2554 (DORA)
Why It Matters
DORA has applied since 17 January 2025 and reshaped ICT governance expectations for financial entities, including many payment institutions.
Operational Impact
Applicants should prepare ICT risk management, incident classification, third-party risk controls, a register of ICT providers, business continuity and documented exit strategies.
Framework
EU AML package and AMLA architecture
Why It Matters
AML supervision in 2026 is more integrated and more data-driven, especially for cross-border and higher-risk business models.
Operational Impact
The licensing pack should show customer risk scoring, sanctions screening, UBO verification, transaction monitoring, escalation logic and MLRO reporting lines.
Framework
Regulation (EU) 2023/1114 (MiCA)
Why It Matters
MiCA becomes relevant if the payment product interfaces with crypto-asset services, stablecoin flows or electronic money tokens.
Operational Impact
A PI license does not replace a MiCA analysis. If the model touches EMT issuance, custody or crypto-asset services, perimeter mapping is essential.
Framework
PSD3 and proposed Payment Services Regulation (PSR)
Why It Matters
These proposals matter for strategic planning even before full transition, because product architecture built today should not require expensive redesign later.
Operational Impact
Future-proofing now usually means stronger fraud controls, better customer disclosures, cleaner API governance and more robust data and complaints architecture.
Governance and real presence

Eligibility, governance and substance: what regulators actually expect

Substance means real management, real control and real accountability in the licensing jurisdiction. It is not satisfied by a local address alone. Supervisors typically test whether the applicant has credible effective managers, clear board oversight, defensible outsourcing boundaries, local access to records and enough in-house competence to challenge service providers.

The most common founder error is to treat governance as a paper exercise. In practice, regulators compare the proposed management team against the risk profile of the business model. A cross-border acquiring or remittance applicant serving higher-risk sectors will usually face deeper scrutiny than a narrow domestic PISP model. The same formal structure can therefore be acceptable in one case and insufficient in another.

A lean startup can still meet governance expectations if it scales the three lines of defence proportionately. What usually fails is not small size but the absence of clear accountability, weak management seniority or a structure where all critical knowledge sits with external vendors.

Area Regulatory Expectation Evidence Pack
Shareholders and UBOs Controllers must pass fit-and-proper and source-of-funds scrutiny. Complex ownership chains, nominee layers or opaque funding sources increase friction. Group chart, UBO declarations, source-of-funds records, criminal record extracts where required and explanations of shareholder strategic role.
Effective management Many jurisdictions commonly expect at least two effective managers, although wording and intensity vary by country and business model. CVs, time-commitment statements, employment or service arrangements, role allocation matrix and evidence of payments, AML, risk or operations experience.
Local presence A real office, records access and meaningful local management availability are often expected, especially where the applicant wants to passport broadly. Lease or office arrangement, local governance calendar, board minutes process, document retention setup and regulator access protocol.
Control functions Compliance, AML, risk and, where proportionate, internal audit must be allocated clearly. Outsourced support does not remove internal accountability. Three-lines-of-defence map, reporting lines, committee structure, terms of reference and conflict-of-interest policy.
Outsourcing Critical or important functions may be outsourced only if the licensed entity retains control, audit rights, exit capability and concentration-risk awareness. Outsourcing register, SLA clauses, sub-outsourcing controls, BCP/DR links, access rights for the regulator and exit plan summary.
Financial resilience The applicant must show that capital at authorization is not the last cash available. Supervisors look for runway, stress capacity and recapitalization logic. Three-year projections, downside scenarios, shareholder support letters where appropriate and own-funds monitoring methodology.
Area
Shareholders and UBOs
Regulatory Expectation
Controllers must pass fit-and-proper and source-of-funds scrutiny. Complex ownership chains, nominee layers or opaque funding sources increase friction.
Evidence Pack
Group chart, UBO declarations, source-of-funds records, criminal record extracts where required and explanations of shareholder strategic role.
Area
Effective management
Regulatory Expectation
Many jurisdictions commonly expect at least two effective managers, although wording and intensity vary by country and business model.
Evidence Pack
CVs, time-commitment statements, employment or service arrangements, role allocation matrix and evidence of payments, AML, risk or operations experience.
Area
Local presence
Regulatory Expectation
A real office, records access and meaningful local management availability are often expected, especially where the applicant wants to passport broadly.
Evidence Pack
Lease or office arrangement, local governance calendar, board minutes process, document retention setup and regulator access protocol.
Area
Control functions
Regulatory Expectation
Compliance, AML, risk and, where proportionate, internal audit must be allocated clearly. Outsourced support does not remove internal accountability.
Evidence Pack
Three-lines-of-defence map, reporting lines, committee structure, terms of reference and conflict-of-interest policy.
Area
Outsourcing
Regulatory Expectation
Critical or important functions may be outsourced only if the licensed entity retains control, audit rights, exit capability and concentration-risk awareness.
Evidence Pack
Outsourcing register, SLA clauses, sub-outsourcing controls, BCP/DR links, access rights for the regulator and exit plan summary.
Area
Financial resilience
Regulatory Expectation
The applicant must show that capital at authorization is not the last cash available. Supervisors look for runway, stress capacity and recapitalization logic.
Evidence Pack
Three-year projections, downside scenarios, shareholder support letters where appropriate and own-funds monitoring methodology.
Application pack

Documents typically required for a payment institution application

A complete application pack must explain the business model as an operating system, not as a marketing deck. Regulators usually expect the legal, financial, AML, safeguarding and ICT documents to tell the same story. Inconsistent files are a standard cause of follow-up questions.

The exact checklist varies by jurisdiction, but the core pack below is common across serious EU payment institution license applications.

Document Purpose Owner
Program of operations Maps the PSD2 services, transaction flows, customer segments, geographies, channels, counterparties and operational model. Legal and business
Business plan and three-year financial projections Shows revenue logic, cost base, capital adequacy, stress scenarios, break-even assumptions and own-funds sustainability. Finance
Safeguarding policy Explains how client funds are identified, segregated, reconciled, protected and monitored, including fallback handling for breaks and shortfalls. Finance and operations
AML/CTF policy suite Covers customer due diligence, sanctions and PEP screening, transaction monitoring, escalation, STR/SAR handling, record-keeping and training. Compliance and MLRO
Governance and internal control framework Defines board oversight, management responsibilities, three lines of defence, conflicts management and committee structure. Board and compliance
Outsourcing policy and register Identifies critical providers, control measures, audit rights, sub-outsourcing limits, concentration risk and exit planning. Operations and legal
ICT architecture and security documentation Shows system landscape, data flows, access control, encryption, logging, incident response, resilience testing and third-party dependencies. IT and security
Fit-and-proper pack for shareholders and managers Supports suitability, integrity, competence and time commitment of controllers and key function holders. Corporate and HR
Recovery and business continuity framework Explains how critical services continue during incidents and how customer harm is minimized. Risk and IT
Data protection and GDPR controls summary Shows lawful processing basis, retention, access governance, breach escalation and interaction with operational resilience controls. Legal and DPO
Document
Program of operations
Purpose
Maps the PSD2 services, transaction flows, customer segments, geographies, channels, counterparties and operational model.
Owner
Legal and business
Document
Business plan and three-year financial projections
Purpose
Shows revenue logic, cost base, capital adequacy, stress scenarios, break-even assumptions and own-funds sustainability.
Owner
Finance
Document
Safeguarding policy
Purpose
Explains how client funds are identified, segregated, reconciled, protected and monitored, including fallback handling for breaks and shortfalls.
Owner
Finance and operations
Document
AML/CTF policy suite
Purpose
Covers customer due diligence, sanctions and PEP screening, transaction monitoring, escalation, STR/SAR handling, record-keeping and training.
Owner
Compliance and MLRO
Document
Governance and internal control framework
Purpose
Defines board oversight, management responsibilities, three lines of defence, conflicts management and committee structure.
Owner
Board and compliance
Document
Outsourcing policy and register
Purpose
Identifies critical providers, control measures, audit rights, sub-outsourcing limits, concentration risk and exit planning.
Owner
Operations and legal
Document
ICT architecture and security documentation
Purpose
Shows system landscape, data flows, access control, encryption, logging, incident response, resilience testing and third-party dependencies.
Owner
IT and security
Document
Fit-and-proper pack for shareholders and managers
Purpose
Supports suitability, integrity, competence and time commitment of controllers and key function holders.
Owner
Corporate and HR
Document
Recovery and business continuity framework
Purpose
Explains how critical services continue during incidents and how customer harm is minimized.
Owner
Risk and IT
Document
Data protection and GDPR controls summary
Purpose
Shows lawful processing basis, retention, access governance, breach escalation and interaction with operational resilience controls.
Owner
Legal and DPO
Authorization steps

Step-by-step process to obtain a payment institution license in Europe

A workable PI licensing process starts with perimeter analysis and ends only when the firm is operationally ready to launch. In practice, the sequence is qualification, jurisdiction selection, application drafting, filing, supervisory Q&A, authorization and post-license implementation. The most important timing nuance is that formal review periods often become meaningful only after the authority accepts the file as complete.

1
1-3 weeks

1. Business model qualification

Confirm whether the product falls under PSD2 payment services, whether any element points to EMI, consumer credit, card scheme dependency, MiCA or local licensing overlays, and whether a direct license is economically justified.

2
1-3 weeks

2. Jurisdiction selection

Compare countries by substance expectations, regulator responsiveness, safeguarding bank access, talent pool, outsourcing tolerance, cost base and passporting strategy rather than headline speed alone.

3
2-6 weeks

3. Pre-application structuring

Build the legal entity, governance map, shareholder structure, management appointments and high-level ICT and safeguarding design. Many applicants should start banking-partner outreach at this stage rather than after filing.

4
6-12 weeks

4. Application pack preparation

Draft the program of operations, financial model, AML framework, safeguarding policy, outsourcing register, ICT controls and fit-and-proper documentation into one consistent file set.

5
1-2 months

5. Filing and completeness review

Submit the pack to the national competent authority and address initial completeness questions. Weakness at this stage can delay the start of substantive review.

6
3-9+ months

6. Supervisory review and Q&A

Respond to detailed questions on risk appetite, safeguarding mechanics, management seniority, outsourcing, customer journey, fraud controls and financial assumptions.

7
1-3 months after approval

7. Authorization and operational launch

Finalize operational controls, safeguarding account arrangements, complaints handling, reporting calendar, audit support and, if relevant, passporting notifications.

First-year budget

Timeline and cost: what a realistic first-year PI budget looks like

The minimum capital for a payment institution is not the same as the total budget required to launch and survive the first year. Founders often budget for the statutory threshold and underestimate governance, compliance, audit, IT security, local management and banking-partner onboarding.

For a lean payment institution launch in Europe, the first-year budget is usually driven by six variables: service scope, jurisdiction, local substance, AML intensity, ICT complexity and whether the firm must build direct safeguarding and banking relationships from scratch. The figures below are illustrative market ranges, not official fees and not legal or accounting advice.

Cost Bucket Low Estimate High Estimate What Drives Cost
Initial capital €20,000 €125,000 This is the PSD2 entry threshold depending on service type. It does not cover operating losses, hiring or implementation.
Legal and regulatory preparation €25,000 €90,000+ Varies with jurisdiction, complexity, quality of first draft data from founders and whether the model includes acquiring, agents or cross-border rollout.
Local substance and management €40,000 €180,000+ Usually includes directors, office, governance support and local operating presence. Cost rises sharply in higher-cost jurisdictions.
Compliance, MLRO and risk setup €35,000 €150,000+ A narrow domestic model can stay leaner; cross-border or higher-risk sectors need more robust staffing and tooling.
ICT, security and DORA implementation €30,000 €200,000+ Includes security controls, logging, IAM, incident processes, vendor governance and, where relevant, API and SCA implementation.
Audit, accounting and reporting €10,000 €60,000+ Depends on jurisdiction, reporting complexity and whether the group structure requires additional assurance work.
Banking and safeguarding onboarding €5,000 €50,000+ The hidden cost is time. KYB remediation, legal review and transaction-flow clarifications can consume management bandwidth before launch.
Cost Bucket
Initial capital
Low Estimate
€20,000
High Estimate
€125,000
What Drives Cost
This is the PSD2 entry threshold depending on service type. It does not cover operating losses, hiring or implementation.
Cost Bucket
Legal and regulatory preparation
Low Estimate
€25,000
High Estimate
€90,000+
What Drives Cost
Varies with jurisdiction, complexity, quality of first draft data from founders and whether the model includes acquiring, agents or cross-border rollout.
Cost Bucket
Local substance and management
Low Estimate
€40,000
High Estimate
€180,000+
What Drives Cost
Usually includes directors, office, governance support and local operating presence. Cost rises sharply in higher-cost jurisdictions.
Cost Bucket
Compliance, MLRO and risk setup
Low Estimate
€35,000
High Estimate
€150,000+
What Drives Cost
A narrow domestic model can stay leaner; cross-border or higher-risk sectors need more robust staffing and tooling.
Cost Bucket
ICT, security and DORA implementation
Low Estimate
€30,000
High Estimate
€200,000+
What Drives Cost
Includes security controls, logging, IAM, incident processes, vendor governance and, where relevant, API and SCA implementation.
Cost Bucket
Audit, accounting and reporting
Low Estimate
€10,000
High Estimate
€60,000+
What Drives Cost
Depends on jurisdiction, reporting complexity and whether the group structure requires additional assurance work.
Cost Bucket
Banking and safeguarding onboarding
Low Estimate
€5,000
High Estimate
€50,000+
What Drives Cost
The hidden cost is time. KYB remediation, legal review and transaction-flow clarifications can consume management bandwidth before launch.
The most expensive mistake is to treat licensing as a one-off legal project. In reality, a payment institution is a supervised operating model. A lean single-country PI can be materially cheaper than an EMI, but a cross-border PI with acquiring, agents or higher-risk sectors can still require a substantial first-year budget. Related internal resources may include accounting support in target jurisdictions, for example Lithuania, Ireland or Malta, and banking setup support via business bank account opening.
Client funds protection

Safeguarding of client funds: how regulators test the model in practice

Safeguarding is the operational core of a payment institution that receives client funds in connection with payment services. The legal rule is simple in principle: relevant client funds must be protected, usually through segregation in a separate account with a credit institution or through an insurance/guarantee equivalent where available. The practical challenge is much harder.

Regulators increasingly test the full safeguarding chain: when funds are received, when they become subject to safeguarding, how they are identified in the ledger, how daily reconciliation works, how breaks are escalated, how mixed funds are prevented or corrected, and whether the safeguarding account provider is realistic. A policy that does not explain the reconciliation waterfall is usually treated as incomplete.

Control Stack

Operational Controls That Must Exist Before Launch

Clear definition of which funds are relevant client funds and at what point safeguarding is triggered.
Segregated safeguarding account structure with legal and operational separation from own funds.
Daily internal and external reconciliation, including break identification and escalation thresholds.
Documented treatment of mixed funds, rejected payments, chargebacks, fees and returned transactions.
Named owners for safeguarding operations, finance review and compliance oversight.
Fallback process if the safeguarding bank relationship is delayed, restricted or terminated.
Insolvency-remoteness logic explained in customer funds documentation and account structuring.
ICT and outsourcing controls

ICT, DORA and outsourcing controls for PI applicants

In 2026, ICT governance is part of the licensing perimeter, not a post-approval project. Since DORA has applied from 17 January 2025, payment institutions are expected to show a structured ICT risk management framework, incident handling capability, third-party oversight and operational resilience planning proportionate to their size and model.

The highest-value licensing insight is this: regulators usually worry less about whether a startup outsources technology and more about whether the startup can control it. A fully outsourced stack can still fail the review if the applicant lacks asset inventory, audit rights, change governance, subcontracting visibility or an exit plan for critical providers.

A DORA-ready application pack usually includes an ICT risk policy, incident response procedure, business continuity and disaster recovery framework, outsourcing register, critical-provider contract checklist and management reporting template. If the model includes card data, PCI DSS may also become operationally relevant even though it is not a PSD2 licensing rule.

Area Control Owner
ICT governance framework Maintain policies covering asset inventory, access management, vulnerability management, logging, patching, encryption, backup, resilience and change control. IT lead and management body
Incident management Define incident taxonomy, severity thresholds, escalation tree, customer-impact assessment, evidence retention and regulatory reporting workflow. Security and compliance
Third-party ICT register Keep a current register of ICT providers, services, criticality, data touched, subcontracting chain, concentration risk and exit dependencies. Vendor management and risk
Critical outsourcing Use contracts with audit rights, access rights for the regulator, data location clarity, security obligations, incident notification clauses and tested exit arrangements. Legal and operations
Business continuity and disaster recovery Document recovery objectives, fallback channels, backup integrity, dependency mapping and communications plan for service disruption. IT and risk
Open banking and SCA security Align authentication and communication controls with the RTS on SCA and secure communication. OAuth 2.0 and OpenID Connect are common implementation patterns, but the law is technology-neutral. Product and security
Data protection overlap Ensure GDPR governance aligns with ICT controls, especially around access logs, retention, incident response and processor oversight. DPO and security
Area
ICT governance framework
Control
Maintain policies covering asset inventory, access management, vulnerability management, logging, patching, encryption, backup, resilience and change control.
Owner
IT lead and management body
Area
Incident management
Control
Define incident taxonomy, severity thresholds, escalation tree, customer-impact assessment, evidence retention and regulatory reporting workflow.
Owner
Security and compliance
Area
Third-party ICT register
Control
Keep a current register of ICT providers, services, criticality, data touched, subcontracting chain, concentration risk and exit dependencies.
Owner
Vendor management and risk
Area
Critical outsourcing
Control
Use contracts with audit rights, access rights for the regulator, data location clarity, security obligations, incident notification clauses and tested exit arrangements.
Owner
Legal and operations
Area
Business continuity and disaster recovery
Control
Document recovery objectives, fallback channels, backup integrity, dependency mapping and communications plan for service disruption.
Owner
IT and risk
Area
Open banking and SCA security
Control
Align authentication and communication controls with the RTS on SCA and secure communication. OAuth 2.0 and OpenID Connect are common implementation patterns, but the law is technology-neutral.
Owner
Product and security
Area
Data protection overlap
Control
Ensure GDPR governance aligns with ICT controls, especially around access logs, retention, incident response and processor oversight.
Owner
DPO and security
EEA expansion

Passporting across the EEA: what it allows and what it does not

An authorized payment institution can generally expand across the EEA through passporting, either by providing services cross-border or by establishing a branch, subject to notification procedures. This is one of the main strategic advantages of obtaining a payment institution license in Europe.

The passport is not a universal operating waiver. Host states may still apply local conduct, consumer, marketing, complaints, AML-reporting interface and language-related requirements. The operational question is therefore not only whether the service can be passported, but whether the firm can support local customer disclosures, complaints handling, fraud operations and agent oversight in each target market.

A practical market-entry choice is often between cross-border services, a branch or an agent network. The right route depends on customer acquisition channel, complaint volumes, local language needs, merchant support intensity and whether the business can supervise third parties effectively.

Topic Details Risk Note
Freedom to provide services This route is usually lighter than a branch and suits centralized operating models serving customers cross-border from the home state. It does not remove host-state conduct obligations or practical expectations around customer support and complaints.
Branch passporting A branch may be appropriate where the firm needs local staff, deeper market presence or stronger commercial infrastructure in a host state. Branches increase substance, governance and reporting complexity and may trigger more detailed supervisory engagement.
Agents Agents can support local distribution, onboarding or service delivery where permitted by the model and jurisdiction. The licensed PI retains compliance responsibility. Weak agent oversight is a recurring enforcement risk.
Local marketing and disclosures Customer-facing materials, terms and complaints channels often need adaptation to local rules and language expectations. Founders often underestimate the operational burden of multilingual disclosures and complaint handling.
AML and sanctions operations Cross-border growth changes the risk profile, especially where higher-risk corridors, merchants or customer types are added. A passport does not solve correspondent-like risk, sanctions exposure or transaction-monitoring calibration.
Topic
Freedom to provide services
Details
This route is usually lighter than a branch and suits centralized operating models serving customers cross-border from the home state.
Risk Note
It does not remove host-state conduct obligations or practical expectations around customer support and complaints.
Topic
Branch passporting
Details
A branch may be appropriate where the firm needs local staff, deeper market presence or stronger commercial infrastructure in a host state.
Risk Note
Branches increase substance, governance and reporting complexity and may trigger more detailed supervisory engagement.
Topic
Agents
Details
Agents can support local distribution, onboarding or service delivery where permitted by the model and jurisdiction.
Risk Note
The licensed PI retains compliance responsibility. Weak agent oversight is a recurring enforcement risk.
Topic
Local marketing and disclosures
Details
Customer-facing materials, terms and complaints channels often need adaptation to local rules and language expectations.
Risk Note
Founders often underestimate the operational burden of multilingual disclosures and complaint handling.
Topic
AML and sanctions operations
Details
Cross-border growth changes the risk profile, especially where higher-risk corridors, merchants or customer types are added.
Risk Note
A passport does not solve correspondent-like risk, sanctions exposure or transaction-monitoring calibration.
Why applications fail

Main rejection and delay risks in PI authorization

Most failed applications do not fail because the founders chose the wrong template. They fail because the regulator does not believe the applicant can operate the model safely. The decisive issues are usually management credibility, safeguarding realism, AML depth, outsourcing control and consistency across the file.

A strong application answers the regulator’s likely objections before they are asked. That means showing how the business will work on day one, under stress and after expansion, not only in the base-case commercial plan.

The product is framed as a PI model but includes wallet or stored-value features that look like e-money issuance.

High risk

Legal risk: Authorization may be delayed, re-scoped or refused because the applicant is seeking the wrong license type.

Mitigation: Map the product against PSD2 and EMD2 at the start, including redemption rights, balance mechanics and customer terms.

Management team lacks sufficient payments, AML or operational seniority.

High risk

Legal risk: The authority may conclude that the applicant cannot manage the licensed activity prudently.

Mitigation: Strengthen effective management, clarify role allocation and evidence actual time commitment and local availability.

Safeguarding is described in generic terms without reconciliation logic or banking-partner evidence.

High risk

Legal risk: The file may be treated as incomplete or operationally weak.

Mitigation: Provide a transaction-flow diagram, reconciliation steps, exception handling and realistic safeguarding account strategy.

AML framework relies on templates and outsourced vendors without internal ownership.

High risk

Legal risk: The regulator may view the AML function as non-credible, especially for cross-border or higher-risk sectors.

Mitigation: Show MLRO accountability, risk assessment methodology, monitoring scenarios, sanctions controls and escalation governance.

Critical outsourcing leaves the entity with little real control over technology or operations.

Medium risk

Legal risk: This can breach outsourcing expectations and undermine substance.

Mitigation: Use a full outsourcing register, audit rights, sub-outsourcing controls, exit plan and internal challenge capability.

Financial projections ignore capital strain, slow revenue ramp or higher compliance costs.

Medium risk

Legal risk: The business may be viewed as not financially sound or undercapitalized for its growth path.

Mitigation: Model downside cases, delayed launch, higher fraud loss assumptions and recapitalization triggers.

Crypto-adjacent flows are included without perimeter analysis under MiCA and AML risk escalation.

Medium risk

Legal risk: The authority may question whether the applicant understands its regulatory perimeter and risk exposure.

Mitigation: Separate payment activity from crypto-asset services and document MiCA, sanctions and EDD implications where relevant.

Own license or partner model

Alternatives to getting your own license: white-label, agency and hybrid models

Not every fintech should apply for its own payment institution license immediately. A direct license gives control, margin retention and passporting value, but it also creates fixed compliance cost, governance burden and execution risk. For pre-seed or early commercial validation, a partner model can be the better strategic move.

The right question is not only “Can we get licensed?” but also “Should we get licensed now?” If the product still depends on frequent pivots, uncertain unit economics or a sponsor’s infrastructure, a phased approach often preserves cash and shortens time to market.

Option Advantages Limitations Best For
Own PI license Maximum regulatory control over the payment stack, direct passporting potential, stronger enterprise credibility and better long-term margin capture. Longer time to market, higher fixed compliance cost, heavier governance and DORA burden, and direct supervisory accountability. Scale-ups with validated payment flows, committed capital and a roadmap that does not require e-money issuance.
White-label or sponsor model Fast launch, lower upfront regulatory burden and access to existing safeguarding, compliance and scheme infrastructure. Lower control, dependency on partner risk appetite, margin sharing, product constraints and weaker long-term defensibility. Early-stage founders testing distribution, pricing or product-market fit.
Agent model Can support market entry under an existing licensed principal while preserving some commercial autonomy. The principal controls perimeter, onboarding standards and often branding or product boundaries; cross-border scaling can be uneven. Distribution-led models that need speed but can operate within a principal's compliance framework.
Hybrid build-now, license-later route Allows the company to validate volumes and operational data while preparing for a future own-license application. Requires careful contract design, migration planning, data portability and customer communication when moving to the licensed model. Founders who expect to license later but want to delay fixed cost until economics are proven.
Option
Own PI license
Advantages
Maximum regulatory control over the payment stack, direct passporting potential, stronger enterprise credibility and better long-term margin capture.
Limitations
Longer time to market, higher fixed compliance cost, heavier governance and DORA burden, and direct supervisory accountability.
Best For
Scale-ups with validated payment flows, committed capital and a roadmap that does not require e-money issuance.
Option
White-label or sponsor model
Advantages
Fast launch, lower upfront regulatory burden and access to existing safeguarding, compliance and scheme infrastructure.
Limitations
Lower control, dependency on partner risk appetite, margin sharing, product constraints and weaker long-term defensibility.
Best For
Early-stage founders testing distribution, pricing or product-market fit.
Option
Agent model
Advantages
Can support market entry under an existing licensed principal while preserving some commercial autonomy.
Limitations
The principal controls perimeter, onboarding standards and often branding or product boundaries; cross-border scaling can be uneven.
Best For
Distribution-led models that need speed but can operate within a principal's compliance framework.
Option
Hybrid build-now, license-later route
Advantages
Allows the company to validate volumes and operational data while preparing for a future own-license application.
Limitations
Requires careful contract design, migration planning, data portability and customer communication when moving to the licensed model.
Best For
Founders who expect to license later but want to delay fixed cost until economics are proven.
FAQ

Frequently asked questions about a payment institution license in Europe

These answers summarize the issues founders, CFOs and compliance leads ask most often when comparing a PI route with EMI, bank or partner models.

How much capital is required for a payment institution license in Europe? +

The harmonized PSD2 initial capital thresholds are €20,000, €50,000 or €125,000 depending on the payment services provided. That is only the starting point. The firm must also maintain adequate own funds under the prudential framework, and the real launch budget is usually much higher once governance, AML, ICT, audit and local substance are included.

How long does PI authorization usually take in 2026? +

A realistic end-to-end range is often 6-12+ months, depending on jurisdiction, file quality and business-model complexity. Pre-application work alone can take several weeks. The practical review clock often starts only after the authority considers the application complete, so weak first submissions materially extend the process.

What services can a payment institution provide under PSD2? +

A PI can provide regulated payment services under Annex I of PSD2, including payment execution, money remittance, merchant acquiring, payment initiation and account information services, depending on the authorization scope granted. The license does not allow deposit-taking and does not authorize e-money issuance unless the firm is separately licensed as an EMI.

What is the difference between a PI and an EMI? +

The core difference is e-money issuance. A payment institution executes payment services. An electronic money institution can issue electronic money and also provide payment services. If your product stores redeemable client value, wallet balances or app money that functions as e-money, an EMI analysis is usually required. The EMI initial capital baseline is €350,000.

Can a PI issue IBANs and cards? +

Sometimes yes in operational terms, but the legal answer depends on how the product is structured. A PI may support payment accounts, IBAN-linked functionality or card-based payment flows if the licensed service scope and partner setup allow it. If the product involves stored redeemable value rather than pure payment execution, the model may cross into EMI territory.

Can a PI hold client funds? +

Yes, but only within the payment-services framework and subject to safeguarding. Client funds relevant to payment services must be protected, usually through segregation in a safeguarding account or another legally permitted mechanism. A PI cannot treat those funds as deposits and cannot use them as a bank would.

How are own funds calculated for a payment institution? +

Beyond initial capital, payment institutions are subject to ongoing own-funds requirements under the PSD2 prudential framework, commonly referred to as Methods A, B and C depending on the model and national application. In practice, growth in payment volume can increase capital needs, which is why three-year forecasts and recapitalization planning matter at licensing stage.

Does DORA apply to payment institutions? +

Yes, DORA has applied from 17 January 2025 and is highly relevant to many payment institutions. Applicants should be ready to show ICT risk management, incident handling, third-party ICT oversight, business continuity, a register of ICT providers and stronger outsourcing controls. In 2026, regulators increasingly expect this to be visible already in the application pack.

Can a PI passport services across the EEA? +

Yes, an authorized PI can generally passport services across the EEA through notification procedures, either on a cross-border basis or through a branch. Passporting does not eliminate host-state conduct rules, local complaints expectations, language issues or AML operational challenges, so expansion still requires country-by-country execution planning.

Which country is best for a payment institution license in Europe? +

There is no universally best jurisdiction. The right choice depends on service model, target markets, safeguarding bank access, management location, AML risk profile, outsourcing reliance, cost base and regulator fit. Commonly compared jurisdictions include Lithuania, Ireland, Cyprus, Malta, Luxembourg and the Netherlands, but the best answer is model-specific rather than marketing-driven.

Can a crypto-related business obtain a PI license? +

Sometimes, but only if the payment activity is clearly separable from crypto-asset services and the applicant can explain the perimeter under PSD2, MiCA and AML rules. Crypto-adjacent flows usually trigger deeper scrutiny on sanctions, source of funds, transaction monitoring and counterparty risk. A PI license is not a substitute for a required MiCA or other crypto authorization.

Is a small PI regime available everywhere in Europe? +

No uniform answer applies across all European jurisdictions. Small or exempt payment institution regimes depend on national implementation and usually come with narrower permissions and limited or no passporting benefit. For cross-border fintech models, founders should verify early whether the local regime actually supports the intended scale and geography.

Need a Practical Readout?

Choose the licensing path that fits the product, not the headline capital

A payment institution license in Europe is the right route when the business executes regulated payment services under PSD2 without crossing into e-money issuance or banking. The real decision turns on five variables: product perimeter, jurisdiction fit, capital runway, safeguarding feasibility and whether the team can support AML, governance and DORA-grade ICT controls from day one. If the model is still evolving, a white-label or agent route may be strategically better than filing too early. For related topics, see our pages on electronic money license in Europe, PISP license in Europe, MiCA license in Europe and business bank account opening.

Phone +372 56 966 260 Email info@rue.ee Hours Mon-Fri, 9:00-18:00 CET
Confidential - No obligation - Response within 24 hours