FAQs
Skip information indexTechnical issues
Although access to one's own data is generally allowed in the inbox, additionally, there is also the possibility of authorizing a different user to have access by proxy, by proxy or, where appropriate, by succession. Authorization is generally carried out through general procedures or through the specific inbox procedure (“CONBANENT001”). In both cases, the authorized user will be able to access any of the messages of the authorizing user, regardless of the type of message.
Financial Entities must request the inbox process from the NIFs of their representative entities/authorized entities and search the Headquarters Inbox with the NIF of the principal corresponding to each requirement.