Glossary.

The dictionary of B2B trust. Master the concepts and regulations.

CSRD

ESG Compliance

Corporate Sustainability Reporting Directive. Forces large companies to audit the ESG impact of their entire subcontracting chain.

NIS 2

Cybersecurity

European directive imposing a very strict level of cyber security, including on suppliers in the software supply chain.

UBO

Compliance

Ultimate Beneficial Owner. In the context of Anti-Money Laundering (AML), the Orchestrator makes it possible to identify the natural person who ultimately controls the legal entity.

ViDA

Regulation

VAT in the Digital Age. European directive modernizing the VAT system to prevent intra-community fraud, introducing mandatory real-time electronic invoicing for all cross-border B2B transactions.

DPP

Regulation

Digital Product Passport. Key requirement of the European ESPR regulation to track and certify the environmental impact of each component throughout the supply chain.

API Fatigue

B2B Issue

Operational overload suffered by companies having to manually manage, configure, and maintain a large number of secret keys, portals, and different accesses to interconnect with their suppliers.

3-Step Dance

Adesio Engine

Exclusive Zero-Trust workflow including: 1. The Need to Know (strict request). 2. Selective Disclosure (partial consent at the pixel level). 3. The Intersection (authentication and API opening).

Selective Disclosure

Concept

Cryptographic mechanism allowing a company to prove certain statements (e.g., valid URSSAF compliance) without having to reveal its entire documentary file, adhering to Privacy By Design.

eIDAS 2.0

Regulation

European Union legal framework on electronic identification and trust services. Version 2.0 introduces the Digital Identity Wallet usable throughout the EU.

PSD2

Regulation

Second Payment Services Directive. Requires Strong Customer Authentication (SCA) and securely opens access to banking data via open APIs (Open Banking).

AML-CFT

Compliance

Anti-Money Laundering and Counter-Financing of Terrorism. Set of obligations requiring rigorous client identity verification (KYC) and transaction monitoring.

Chips Act

Regulation

European law on semiconductors aimed at guaranteeing supply security and EU technological resilience by rigorously securing supply chains.

AEO

Status

Authorized Economic Operator. European customs trust label granted to companies demonstrating financial solvency, strict customs compliance, and rigorous safety and security standards.

Legal Checks (URSSAF)

Legal Obligation

Any principal must verify the social regularity of its subcontractors (e.g., vigilance certificate) under penalty of being held jointly liable (fight against concealed work).

Universal Key

Adesio Technology

The digital corporate identity issued by Adesio. It is a living, unforgeable profile, generated by cryptographic corroboration (Registry + Bank) allowing the client to authenticate without begging for third-party API keys.

KeyRing

Adesio Technology

Centralized interface of the Adesio KeyRing platform allowing manual management and instant revocation of access tokens distributed to partners.

Zero-Trust

Architecture

IT security model considering that no entity is trustworthy by default, requiring systematic verification of identity and compliance at every interaction.