The first gating issue is whether the product is truly a PI model under PSD2 or drifts into EMI, banking, consumer credit or MiCA territory.
A payment institution license in Europe allows a non-bank firm to provide regulated payment services under Directive (EU) 2015/2366 (PSD2). It is usually the right route for payment gateways, merchant acquiring models, remittance businesses, payment initiation services and some IBAN-based payment flows that do not involve issuing redeemable electronic money. In 2026, the licensing analysis cannot stop at PSD2: applicants are also assessed through the lenses of DORA, AML governance, safeguarding mechanics, outsourcing controls, GDPR and jurisdiction-specific substance expectations.
This page is an informational summary, not legal, tax or regulatory advice. Licensing outcomes, timelines, governance expectations and post-authorization obligations vary by Member State, business model, risk profile and supervisory practice. "Europe" on this page refers primarily to the EU/EEA licensing framework; the UK FCA regime is separate and does not provide EU passporting.
Core authorization thresholds, timeline reality and the practical review lens in one block.
The first gating issue is whether the product is truly a PI model under PSD2 or drifts into EMI, banking, consumer credit or MiCA territory.
The program of operations, safeguarding design, AML framework, financial projections, governance map and ICT architecture are built into one coherent supervisory narrative.
Most delays arise from weak management evidence, unclear outsourcing control, unrealistic revenue assumptions or insufficient explanation of safeguarding and transaction flows.
Authorization does not remove the need for banking partner onboarding, audit setup, complaints handling, incident reporting and host-state conduct compliance.
A payment institution license authorizes a non-bank firm to provide the regulated payment services listed in Annex I of PSD2, subject to the permissions granted by the national competent authority. In practical terms, this route is used for payment execution, merchant acquiring, remittance, payment initiation and account information services. It is not a banking license and it does not allow deposit-taking.
The key boundary is product architecture. If you execute payments without issuing redeemable stored value, a PI license Europe route may be sufficient. If you issue electronic money, operate a stored-value wallet or hold balances that function as e-money, the analysis usually shifts toward an EMI framework under Directive 2009/110/EC.
The right license depends on whether the product executes payments, issues electronic money or performs banking activities. Founders often over-focus on headline capital and under-focus on redemption mechanics, safeguarding burden, prudential scaling and future product roadmap. That is a costly mistake.
A useful rule is simple: if the business model involves stored, redeemable client value, especially wallet balances usable for future payments, an EMI assessment is usually unavoidable. If the model only initiates, transmits or executes payments without issuing e-money, a payment institution license in Europe may be enough. If the strategy includes deposit-taking or broader lending funded by repayable public funds, the analysis moves into the banking regime.
| Parameter | PI | EMI | Specialized Bank |
|---|---|---|---|
| Primary legal basis | PSD2 | EMD2 plus relevant PSD2 payment services rules | National banking law plus CRR/CRD framework |
| Initial capital baseline | €20,000 / €50,000 / €125,000 depending on services | €350,000 | Often €5 million+ baseline under banking regime, subject to jurisdiction and model |
| Can issue electronic money | No | Yes | May do so if permitted under banking authorization and product structure |
| Can hold client funds for payment services | Yes, but only within the payment-services framework and subject to safeguarding | Yes, with safeguarding and e-money redemption obligations | Yes, under banking and depositor-protection framework rather than PSD2-style safeguarding |
| Typical product fit | Remittance, acquiring, payment gateway, PISP, AISP, some IBAN/payment execution models | Wallets, stored-value accounts, app balances, card-linked e-money products | Deposit products, lending platforms with banking perimeter, broader treasury and balance-sheet models |
| Safeguarding | Required for relevant client funds | Required for funds received in exchange for e-money | Different prudential and depositor-protection architecture |
| Passporting across EEA | Yes, subject to notification | Yes, subject to notification | Possible under separate banking passporting logic where applicable |
| Common founder mistake | Using PI for a wallet that is economically e-money | Applying for EMI too early when a narrower PI or partner model would suffice | Assuming a banking route is a faster substitute for EMI or PI |
A PI authorization in Europe is still granted under the current PSD2 regime, but the real compliance perimeter in 2026 is wider. A credible application must map the business model against PSD2, the RTS on SCA and secure communication, DORA, GDPR, national AML rules implementing the EU AML package and, where crypto rails or tokenized money are involved, the interaction with MiCA.
The practical point is that regulators no longer treat ICT, outsourcing and AML as annex topics. They are core authorization pillars. An applicant that cannot evidence ICT asset inventory, incident escalation, sanctions controls, outsourcing registers and a workable safeguarding flow is often viewed as not operationally ready, even if the legal structure is formally correct.
The licensing authority is the relevant national competent authority, such as the Bank of Lithuania, Central Bank of Ireland, Central Bank of Cyprus, MFSA, CSSF, De Nederlandsche Bank or BaFin. The ECB is not the direct licensing authority for standard PI authorizations.
| Framework | Why It Matters | Operational Impact |
|---|---|---|
| Directive (EU) 2015/2366 (PSD2) | PSD2 defines the payment services perimeter, authorization logic, safeguarding principles, passporting mechanics and prudential framework for payment institutions. | The program of operations, service mapping, agent model, customer journey and own funds methodology must align with the PSD2 service category actually used. |
| Directive 2009/110/EC (EMD2) | EMD2 matters whenever the product may amount to issuing electronic money rather than only executing payments. | Wallets, stored balances, redeemability features and app-value mechanics must be analyzed early to avoid filing under the wrong regime. |
| Commission Delegated Regulation (EU) 2018/389 | The RTS on SCA and secure communication sets the core security framework for authentication and open-banking communication. | Applicants need a defensible SCA logic, fraud controls, API security posture and exception handling model. |
| Regulation (EU) 2022/2554 (DORA) | DORA has applied since 17 January 2025 and reshaped ICT governance expectations for financial entities, including many payment institutions. | Applicants should prepare ICT risk management, incident classification, third-party risk controls, a register of ICT providers, business continuity and documented exit strategies. |
| EU AML package and AMLA architecture | AML supervision in 2026 is more integrated and more data-driven, especially for cross-border and higher-risk business models. | The licensing pack should show customer risk scoring, sanctions screening, UBO verification, transaction monitoring, escalation logic and MLRO reporting lines. |
| Regulation (EU) 2023/1114 (MiCA) | MiCA becomes relevant if the payment product interfaces with crypto-asset services, stablecoin flows or electronic money tokens. | A PI license does not replace a MiCA analysis. If the model touches EMT issuance, custody or crypto-asset services, perimeter mapping is essential. |
| PSD3 and proposed Payment Services Regulation (PSR) | These proposals matter for strategic planning even before full transition, because product architecture built today should not require expensive redesign later. | Future-proofing now usually means stronger fraud controls, better customer disclosures, cleaner API governance and more robust data and complaints architecture. |
Substance means real management, real control and real accountability in the licensing jurisdiction. It is not satisfied by a local address alone. Supervisors typically test whether the applicant has credible effective managers, clear board oversight, defensible outsourcing boundaries, local access to records and enough in-house competence to challenge service providers.
The most common founder error is to treat governance as a paper exercise. In practice, regulators compare the proposed management team against the risk profile of the business model. A cross-border acquiring or remittance applicant serving higher-risk sectors will usually face deeper scrutiny than a narrow domestic PISP model. The same formal structure can therefore be acceptable in one case and insufficient in another.
A lean startup can still meet governance expectations if it scales the three lines of defence proportionately. What usually fails is not small size but the absence of clear accountability, weak management seniority or a structure where all critical knowledge sits with external vendors.
| Area | Regulatory Expectation | Evidence Pack |
|---|---|---|
| Shareholders and UBOs | Controllers must pass fit-and-proper and source-of-funds scrutiny. Complex ownership chains, nominee layers or opaque funding sources increase friction. | Group chart, UBO declarations, source-of-funds records, criminal record extracts where required and explanations of shareholder strategic role. |
| Effective management | Many jurisdictions commonly expect at least two effective managers, although wording and intensity vary by country and business model. | CVs, time-commitment statements, employment or service arrangements, role allocation matrix and evidence of payments, AML, risk or operations experience. |
| Local presence | A real office, records access and meaningful local management availability are often expected, especially where the applicant wants to passport broadly. | Lease or office arrangement, local governance calendar, board minutes process, document retention setup and regulator access protocol. |
| Control functions | Compliance, AML, risk and, where proportionate, internal audit must be allocated clearly. Outsourced support does not remove internal accountability. | Three-lines-of-defence map, reporting lines, committee structure, terms of reference and conflict-of-interest policy. |
| Outsourcing | Critical or important functions may be outsourced only if the licensed entity retains control, audit rights, exit capability and concentration-risk awareness. | Outsourcing register, SLA clauses, sub-outsourcing controls, BCP/DR links, access rights for the regulator and exit plan summary. |
| Financial resilience | The applicant must show that capital at authorization is not the last cash available. Supervisors look for runway, stress capacity and recapitalization logic. | Three-year projections, downside scenarios, shareholder support letters where appropriate and own-funds monitoring methodology. |
A complete application pack must explain the business model as an operating system, not as a marketing deck. Regulators usually expect the legal, financial, AML, safeguarding and ICT documents to tell the same story. Inconsistent files are a standard cause of follow-up questions.
The exact checklist varies by jurisdiction, but the core pack below is common across serious EU payment institution license applications.
| Document | Purpose | Owner |
|---|---|---|
| Program of operations | Maps the PSD2 services, transaction flows, customer segments, geographies, channels, counterparties and operational model. | Legal and business |
| Business plan and three-year financial projections | Shows revenue logic, cost base, capital adequacy, stress scenarios, break-even assumptions and own-funds sustainability. | Finance |
| Safeguarding policy | Explains how client funds are identified, segregated, reconciled, protected and monitored, including fallback handling for breaks and shortfalls. | Finance and operations |
| AML/CTF policy suite | Covers customer due diligence, sanctions and PEP screening, transaction monitoring, escalation, STR/SAR handling, record-keeping and training. | Compliance and MLRO |
| Governance and internal control framework | Defines board oversight, management responsibilities, three lines of defence, conflicts management and committee structure. | Board and compliance |
| Outsourcing policy and register | Identifies critical providers, control measures, audit rights, sub-outsourcing limits, concentration risk and exit planning. | Operations and legal |
| ICT architecture and security documentation | Shows system landscape, data flows, access control, encryption, logging, incident response, resilience testing and third-party dependencies. | IT and security |
| Fit-and-proper pack for shareholders and managers | Supports suitability, integrity, competence and time commitment of controllers and key function holders. | Corporate and HR |
| Recovery and business continuity framework | Explains how critical services continue during incidents and how customer harm is minimized. | Risk and IT |
| Data protection and GDPR controls summary | Shows lawful processing basis, retention, access governance, breach escalation and interaction with operational resilience controls. | Legal and DPO |
A workable PI licensing process starts with perimeter analysis and ends only when the firm is operationally ready to launch. In practice, the sequence is qualification, jurisdiction selection, application drafting, filing, supervisory Q&A, authorization and post-license implementation. The most important timing nuance is that formal review periods often become meaningful only after the authority accepts the file as complete.
Confirm whether the product falls under PSD2 payment services, whether any element points to EMI, consumer credit, card scheme dependency, MiCA or local licensing overlays, and whether a direct license is economically justified.
Compare countries by substance expectations, regulator responsiveness, safeguarding bank access, talent pool, outsourcing tolerance, cost base and passporting strategy rather than headline speed alone.
Build the legal entity, governance map, shareholder structure, management appointments and high-level ICT and safeguarding design. Many applicants should start banking-partner outreach at this stage rather than after filing.
Draft the program of operations, financial model, AML framework, safeguarding policy, outsourcing register, ICT controls and fit-and-proper documentation into one consistent file set.
Submit the pack to the national competent authority and address initial completeness questions. Weakness at this stage can delay the start of substantive review.
Respond to detailed questions on risk appetite, safeguarding mechanics, management seniority, outsourcing, customer journey, fraud controls and financial assumptions.
Finalize operational controls, safeguarding account arrangements, complaints handling, reporting calendar, audit support and, if relevant, passporting notifications.
The file should read like one operating model, not like disconnected policy appendices.
| Document | Purpose | Owner |
|---|---|---|
| Program of operations | Core narrative of what the firm will do and under which PSD2 permissions. | Legal and management |
| Financial projections | Demonstrates viability, own funds planning and stress resilience. | Finance |
| AML framework | Shows onboarding, monitoring, escalation and MLRO governance. | Compliance |
| Safeguarding framework | Shows how client funds are protected operationally, not only legally. | Finance and operations |
| ICT and outsourcing pack | Shows DORA-ready governance, incident handling and third-party control. | IT and risk |
The minimum capital for a payment institution is not the same as the total budget required to launch and survive the first year. Founders often budget for the statutory threshold and underestimate governance, compliance, audit, IT security, local management and banking-partner onboarding.
For a lean payment institution launch in Europe, the first-year budget is usually driven by six variables: service scope, jurisdiction, local substance, AML intensity, ICT complexity and whether the firm must build direct safeguarding and banking relationships from scratch. The figures below are illustrative market ranges, not official fees and not legal or accounting advice.
| Cost Bucket | Low Estimate | High Estimate | What Drives Cost |
|---|---|---|---|
| Initial capital | €20,000 | €125,000 | This is the PSD2 entry threshold depending on service type. It does not cover operating losses, hiring or implementation. |
| Legal and regulatory preparation | €25,000 | €90,000+ | Varies with jurisdiction, complexity, quality of first draft data from founders and whether the model includes acquiring, agents or cross-border rollout. |
| Local substance and management | €40,000 | €180,000+ | Usually includes directors, office, governance support and local operating presence. Cost rises sharply in higher-cost jurisdictions. |
| Compliance, MLRO and risk setup | €35,000 | €150,000+ | A narrow domestic model can stay leaner; cross-border or higher-risk sectors need more robust staffing and tooling. |
| ICT, security and DORA implementation | €30,000 | €200,000+ | Includes security controls, logging, IAM, incident processes, vendor governance and, where relevant, API and SCA implementation. |
| Audit, accounting and reporting | €10,000 | €60,000+ | Depends on jurisdiction, reporting complexity and whether the group structure requires additional assurance work. |
| Banking and safeguarding onboarding | €5,000 | €50,000+ | The hidden cost is time. KYB remediation, legal review and transaction-flow clarifications can consume management bandwidth before launch. |
Safeguarding is the operational core of a payment institution that receives client funds in connection with payment services. The legal rule is simple in principle: relevant client funds must be protected, usually through segregation in a separate account with a credit institution or through an insurance/guarantee equivalent where available. The practical challenge is much harder.
Regulators increasingly test the full safeguarding chain: when funds are received, when they become subject to safeguarding, how they are identified in the ledger, how daily reconciliation works, how breaks are escalated, how mixed funds are prevented or corrected, and whether the safeguarding account provider is realistic. A policy that does not explain the reconciliation waterfall is usually treated as incomplete.
| Workflow Step | Control | Owner |
|---|---|---|
| Receipt of customer funds | Classify the incoming amount by product type, customer and transaction purpose. The ledger should distinguish operational receipts from safeguarded funds immediately. | Operations |
| Ledger allocation | Post funds to the correct client-funds ledger and prevent commingling with house funds. Fee extraction logic should be documented rather than manual. | Finance systems |
| Transfer to safeguarding account | Move relevant funds in line with the safeguarding model and timing rules adopted by the firm and required by the jurisdiction. | Treasury and finance |
| Daily reconciliation | Match internal records, bank balances and unsettled items; investigate breaks and document resolution steps with timestamps. | Finance |
| Exception management | Escalate shortfalls, stale items, failed transfers, returned funds and unusual patterns through defined incident and compliance channels. | Finance and compliance |
| Oversight and reporting | Board or management receives periodic MI on safeguarding exposures, reconciliation breaks, concentration risk and banking-partner dependency. | Management body |
In 2026, ICT governance is part of the licensing perimeter, not a post-approval project. Since DORA has applied from 17 January 2025, payment institutions are expected to show a structured ICT risk management framework, incident handling capability, third-party oversight and operational resilience planning proportionate to their size and model.
The highest-value licensing insight is this: regulators usually worry less about whether a startup outsources technology and more about whether the startup can control it. A fully outsourced stack can still fail the review if the applicant lacks asset inventory, audit rights, change governance, subcontracting visibility or an exit plan for critical providers.
A DORA-ready application pack usually includes an ICT risk policy, incident response procedure, business continuity and disaster recovery framework, outsourcing register, critical-provider contract checklist and management reporting template. If the model includes card data, PCI DSS may also become operationally relevant even though it is not a PSD2 licensing rule.
| Area | Control | Owner |
|---|---|---|
| ICT governance framework | Maintain policies covering asset inventory, access management, vulnerability management, logging, patching, encryption, backup, resilience and change control. | IT lead and management body |
| Incident management | Define incident taxonomy, severity thresholds, escalation tree, customer-impact assessment, evidence retention and regulatory reporting workflow. | Security and compliance |
| Third-party ICT register | Keep a current register of ICT providers, services, criticality, data touched, subcontracting chain, concentration risk and exit dependencies. | Vendor management and risk |
| Critical outsourcing | Use contracts with audit rights, access rights for the regulator, data location clarity, security obligations, incident notification clauses and tested exit arrangements. | Legal and operations |
| Business continuity and disaster recovery | Document recovery objectives, fallback channels, backup integrity, dependency mapping and communications plan for service disruption. | IT and risk |
| Open banking and SCA security | Align authentication and communication controls with the RTS on SCA and secure communication. OAuth 2.0 and OpenID Connect are common implementation patterns, but the law is technology-neutral. | Product and security |
| Data protection overlap | Ensure GDPR governance aligns with ICT controls, especially around access logs, retention, incident response and processor oversight. | DPO and security |
An authorized payment institution can generally expand across the EEA through passporting, either by providing services cross-border or by establishing a branch, subject to notification procedures. This is one of the main strategic advantages of obtaining a payment institution license in Europe.
The passport is not a universal operating waiver. Host states may still apply local conduct, consumer, marketing, complaints, AML-reporting interface and language-related requirements. The operational question is therefore not only whether the service can be passported, but whether the firm can support local customer disclosures, complaints handling, fraud operations and agent oversight in each target market.
A practical market-entry choice is often between cross-border services, a branch or an agent network. The right route depends on customer acquisition channel, complaint volumes, local language needs, merchant support intensity and whether the business can supervise third parties effectively.
| Topic | Details | Risk Note |
|---|---|---|
| Freedom to provide services | This route is usually lighter than a branch and suits centralized operating models serving customers cross-border from the home state. | It does not remove host-state conduct obligations or practical expectations around customer support and complaints. |
| Branch passporting | A branch may be appropriate where the firm needs local staff, deeper market presence or stronger commercial infrastructure in a host state. | Branches increase substance, governance and reporting complexity and may trigger more detailed supervisory engagement. |
| Agents | Agents can support local distribution, onboarding or service delivery where permitted by the model and jurisdiction. | The licensed PI retains compliance responsibility. Weak agent oversight is a recurring enforcement risk. |
| Local marketing and disclosures | Customer-facing materials, terms and complaints channels often need adaptation to local rules and language expectations. | Founders often underestimate the operational burden of multilingual disclosures and complaint handling. |
| AML and sanctions operations | Cross-border growth changes the risk profile, especially where higher-risk corridors, merchants or customer types are added. | A passport does not solve correspondent-like risk, sanctions exposure or transaction-monitoring calibration. |
Most failed applications do not fail because the founders chose the wrong template. They fail because the regulator does not believe the applicant can operate the model safely. The decisive issues are usually management credibility, safeguarding realism, AML depth, outsourcing control and consistency across the file.
A strong application answers the regulator’s likely objections before they are asked. That means showing how the business will work on day one, under stress and after expansion, not only in the base-case commercial plan.
Legal risk: Authorization may be delayed, re-scoped or refused because the applicant is seeking the wrong license type.
Mitigation: Map the product against PSD2 and EMD2 at the start, including redemption rights, balance mechanics and customer terms.
Legal risk: The authority may conclude that the applicant cannot manage the licensed activity prudently.
Mitigation: Strengthen effective management, clarify role allocation and evidence actual time commitment and local availability.
Legal risk: The file may be treated as incomplete or operationally weak.
Mitigation: Provide a transaction-flow diagram, reconciliation steps, exception handling and realistic safeguarding account strategy.
Legal risk: The regulator may view the AML function as non-credible, especially for cross-border or higher-risk sectors.
Mitigation: Show MLRO accountability, risk assessment methodology, monitoring scenarios, sanctions controls and escalation governance.
Legal risk: This can breach outsourcing expectations and undermine substance.
Mitigation: Use a full outsourcing register, audit rights, sub-outsourcing controls, exit plan and internal challenge capability.
Legal risk: The business may be viewed as not financially sound or undercapitalized for its growth path.
Mitigation: Model downside cases, delayed launch, higher fraud loss assumptions and recapitalization triggers.
Legal risk: The authority may question whether the applicant understands its regulatory perimeter and risk exposure.
Mitigation: Separate payment activity from crypto-asset services and document MiCA, sanctions and EDD implications where relevant.
Not every fintech should apply for its own payment institution license immediately. A direct license gives control, margin retention and passporting value, but it also creates fixed compliance cost, governance burden and execution risk. For pre-seed or early commercial validation, a partner model can be the better strategic move.
The right question is not only “Can we get licensed?” but also “Should we get licensed now?” If the product still depends on frequent pivots, uncertain unit economics or a sponsor’s infrastructure, a phased approach often preserves cash and shortens time to market.
| Option | Advantages | Limitations | Best For |
|---|---|---|---|
| Own PI license | Maximum regulatory control over the payment stack, direct passporting potential, stronger enterprise credibility and better long-term margin capture. | Longer time to market, higher fixed compliance cost, heavier governance and DORA burden, and direct supervisory accountability. | Scale-ups with validated payment flows, committed capital and a roadmap that does not require e-money issuance. |
| White-label or sponsor model | Fast launch, lower upfront regulatory burden and access to existing safeguarding, compliance and scheme infrastructure. | Lower control, dependency on partner risk appetite, margin sharing, product constraints and weaker long-term defensibility. | Early-stage founders testing distribution, pricing or product-market fit. |
| Agent model | Can support market entry under an existing licensed principal while preserving some commercial autonomy. | The principal controls perimeter, onboarding standards and often branding or product boundaries; cross-border scaling can be uneven. | Distribution-led models that need speed but can operate within a principal's compliance framework. |
| Hybrid build-now, license-later route | Allows the company to validate volumes and operational data while preparing for a future own-license application. | Requires careful contract design, migration planning, data portability and customer communication when moving to the licensed model. | Founders who expect to license later but want to delay fixed cost until economics are proven. |
These answers summarize the issues founders, CFOs and compliance leads ask most often when comparing a PI route with EMI, bank or partner models.
The harmonized PSD2 initial capital thresholds are €20,000, €50,000 or €125,000 depending on the payment services provided. That is only the starting point. The firm must also maintain adequate own funds under the prudential framework, and the real launch budget is usually much higher once governance, AML, ICT, audit and local substance are included.
A realistic end-to-end range is often 6-12+ months, depending on jurisdiction, file quality and business-model complexity. Pre-application work alone can take several weeks. The practical review clock often starts only after the authority considers the application complete, so weak first submissions materially extend the process.
A PI can provide regulated payment services under Annex I of PSD2, including payment execution, money remittance, merchant acquiring, payment initiation and account information services, depending on the authorization scope granted. The license does not allow deposit-taking and does not authorize e-money issuance unless the firm is separately licensed as an EMI.
The core difference is e-money issuance. A payment institution executes payment services. An electronic money institution can issue electronic money and also provide payment services. If your product stores redeemable client value, wallet balances or app money that functions as e-money, an EMI analysis is usually required. The EMI initial capital baseline is €350,000.
Sometimes yes in operational terms, but the legal answer depends on how the product is structured. A PI may support payment accounts, IBAN-linked functionality or card-based payment flows if the licensed service scope and partner setup allow it. If the product involves stored redeemable value rather than pure payment execution, the model may cross into EMI territory.
Yes, but only within the payment-services framework and subject to safeguarding. Client funds relevant to payment services must be protected, usually through segregation in a safeguarding account or another legally permitted mechanism. A PI cannot treat those funds as deposits and cannot use them as a bank would.
Beyond initial capital, payment institutions are subject to ongoing own-funds requirements under the PSD2 prudential framework, commonly referred to as Methods A, B and C depending on the model and national application. In practice, growth in payment volume can increase capital needs, which is why three-year forecasts and recapitalization planning matter at licensing stage.
Yes, DORA has applied from 17 January 2025 and is highly relevant to many payment institutions. Applicants should be ready to show ICT risk management, incident handling, third-party ICT oversight, business continuity, a register of ICT providers and stronger outsourcing controls. In 2026, regulators increasingly expect this to be visible already in the application pack.
Yes, an authorized PI can generally passport services across the EEA through notification procedures, either on a cross-border basis or through a branch. Passporting does not eliminate host-state conduct rules, local complaints expectations, language issues or AML operational challenges, so expansion still requires country-by-country execution planning.
There is no universally best jurisdiction. The right choice depends on service model, target markets, safeguarding bank access, management location, AML risk profile, outsourcing reliance, cost base and regulator fit. Commonly compared jurisdictions include Lithuania, Ireland, Cyprus, Malta, Luxembourg and the Netherlands, but the best answer is model-specific rather than marketing-driven.
Sometimes, but only if the payment activity is clearly separable from crypto-asset services and the applicant can explain the perimeter under PSD2, MiCA and AML rules. Crypto-adjacent flows usually trigger deeper scrutiny on sanctions, source of funds, transaction monitoring and counterparty risk. A PI license is not a substitute for a required MiCA or other crypto authorization.
No uniform answer applies across all European jurisdictions. Small or exempt payment institution regimes depend on national implementation and usually come with narrower permissions and limited or no passporting benefit. For cross-border fintech models, founders should verify early whether the local regime actually supports the intended scale and geography.
A payment institution license in Europe is the right route when the business executes regulated payment services under PSD2 without crossing into e-money issuance or banking. The real decision turns on five variables: product perimeter, jurisdiction fit, capital runway, safeguarding feasibility and whether the team can support AML, governance and DORA-grade ICT controls from day one. If the model is still evolving, a white-label or agent route may be strategically better than filing too early. For related topics, see our pages on electronic money license in Europe, PISP license in Europe, MiCA license in Europe and business bank account opening.