You can add a counterparty VASP to interact with by clicking on the 'Add VASP' button on the top right of the 'Counterparty VASP' page.

Add Vasp Button

This will prompt a modal on which you can select which protocol you will use to interact with the counterparty VASP.


Under the TRP tab, we see the following input data fields:

Add Vasp TRP

The registered legal name associated with the LEI of the counterparty VASP. This should be provided by the counterparty VASP you wish to operate with.


The VASP LEI (Legal Entity Identifier) field is the unique identifier of your counterparty VASP. The LEI registry is public, so you can search the counterparty you want to operate with in the Global Legal Entity Identifier Foundation (GLEIF) website or directly communicate with the counterparty VASP to request this information.


The URL your counterparty VASP decides to use to construct Travel Address. One example of this would be Your counterparty VASP should provide this.

Signing Public Key (optional)

This field adds a layer of security by using public/private keys to encrypt TRP messages. The counterparty VASP should provide this Public Signing Key. You must ensure your counterparty has your Public Signing Key field added for this to work. You can find this in the Configure your VASP page under the TRP tab and share it with the counterparty VASP that you wish to establish this extra layer of security.

Approve Transactions from This VASP Automatically

This checkbox input allows you to activate auto-approval. This means the whole TRP flow process will automatically approve any transaction coming from the particular counterparty VASP being configured.

Add VASP Email

As a fallback method, you can use Email; this is very simple to set up but comes with numerous drawbacks. Under the Email tab, we see the following input data fields:

Add Vasp Email


The name of the counterparty VASP the email is associated with.


The email address of the counterparty VASP you wish to operate with. One example of this would be

Other Protocols

Upon request, other protocols can be easily configured.