Functional documents
-
The version 1.6 of the Business Description Document for the ECMS aims to introduce the functions and properties of the ECMS and to provide support to ECMS actors (Counterparties, CSDs and TPAs). The document explains the different functionalities available to external agents (counterparties, CSDs and TPAs) and provides information on communication between the ECMS and those groups of users. Further technical information is available to ECMS actors on the ECB website.
Download
-
The ECMS message usage guide describes how the ECMS communicates in A2A mode using ISO 20022 messages. It explains which schemata, attributes, business roles and annotations are relevant in this context. Furthermore, it informs how to get access to the ECMS group in MyStandards in order to view the content of necessary messages in more detail.
External link
-
The Catalogue of Messages provides a detailed description of the entire set of ISO 20022 messages used by the ECMS. It allows the reader finding the necessary information related to messaging which is needed to establish a functioning system of A2A-communication between ECMS and the ECMS Actors.
Note: The “Credit Claim Files” are only relevant for credit claims managed in the ECMS. For counterparties of the Bundesbank, this only applies to the cross-border use of credit claims via the CCBM. The domestic use of credit claims will be managed in MACCs.
Further information on MACCs can be found in the section:
External link
-
The ECMS assigns predefined roles to users (counterparties, central securities depositories (CSD) and triparty agents (TPA). The business functions users are allowed to perform depend on the roles assigned to them and the respective data scope. A role consists of a number of rights that determine which functionality in the ECMS the user has access to. Each right relates to a business function for which the individual user either has read-only authorisation or which he can actively manage (execution). The system configuration in U2A mode provides a two-eyes principle and four-eyes principle for verification. In A2A mode this is done granularly according to business function in a two-eyes principle.
External links
The ECMS Roles & Access right matrix file describes the screens that can be accessed according to the role in the ECMS GUI. This document can be downloaded under the following section:
-
This document describes how ESMIG and the ECMS verify that an A2A message sender is entitled to perform the instruction described by the message and therefore prevent the processing of a message/file built and sent by an actor not allowed to perform the action.
External link
-
When the ECMS processes received instructions it assigns them different status codes depending on the process stage reached (e.g. matched). This document provides an overview of the various instructions (e.g. mobilisation of marketable assets) and the relevant status codes assigned by the ECMS. The ECMS sends corresponding A2A messages to inform about the status achieved in each case. U2A users can view the status of instructions via the ECMS GUI.
External link
-
When the ECMS processes instructions sent to the ECMS, business rules are used to perform different validations. This document provides counterparties, CSDs and TPAs with a comprehensive list of the business rules in the ECMS and the corresponding reply text fields that may be sent to the sender of the message or file.
External link
-
This document aims to describe the functionalities that allow a third party to act on behalf of a counterparty or provide connection to the ECMS to a counterparty.
External link
-
The user handbook for the monetary policy counterparties intend to support the use of future graphical user interfaces (GUI) in the ECMS. It contains detailed information on all GUI screens and step-by-step instructions on typical workflows in the ECMS.
External link