A fintech founder evaluating Banking-as-a-Service in Europe in 2026 typically begins with the wrong question: "which BaaS provider should I use?" The vendor list is long and the marketing material is interchangeable. Pricing decks converge. Reference customers overlap. After three months of provider calls the founder has a spreadsheet of fees, integration timelines, and feature matrices — and no clearer view of which architecture actually fits the business.

The right question is upstream of the vendor list. Choosing BaaS in Europe is an architectural decision, not a vendor selection. There are exactly three patterns in production use across the EEA — call it the BaaS sponsor-stack framework. Each pattern places the regulated perimeter in a different counterparty, distributes redundancy differently, exposes the fintech to different supervisory expectations, and produces a different unit-economic profile.

Pattern 1 is sponsor-bank-direct issuance, with the sponsor bank as the regulated issuer and the fintech as agent. Pattern 2 is BaaS aggregator middleware, with a licensed EMI/PI sitting between the fintech and a panel of sponsor banks. Pattern 3 is the hybrid model — the fintech holds its own EMI or PI and uses BaaS only for transaction-banking primitives. This article codifies the framework, compares the three patterns on the four dimensions that actually matter, and lays out the migration paths a fintech follows as it scales from launch through €50M+ revenue.

Why "which BaaS vendor" is the wrong question

BaaS providers are not interchangeable, but the differences that matter operationally are not the differences that show up on a feature matrix. Fee per IBAN, FX spread, and webhook latency are real — but they are second-order. The first-order question is who holds the licence, who carries the safeguarding obligation, and who the supervisor walks into when there is a problem.

Under EMD2¹[1] and PSD2, the regulated activity sits with the licence holder — issuance of electronic money, execution of payment transactions, IBAN issuance, safeguarding of customer funds. Whoever holds the licence carries the customer-facing perimeter and the supervisory exposure that goes with it. The fintech's structural choice is which counterparty in the stack owns that perimeter.

Vendor selection within an architecture is straightforward — due diligence on capital, governance, sponsor-bank panel, integration quality. But choosing the wrong architecture is not solvable by switching vendors. A fintech that picked a BaaS aggregator when it should have built on its own EMI does not fix the problem by moving to a different aggregator; it has to re-architect.

This is why the framework comes before the shortlist. Pin the architectural pattern first; then run a vendor selection inside that pattern.

The three architectural patterns

Pattern 1 — Sponsor-bank-direct issuance

In Pattern 1 the sponsor bank is the direct issuer of the customer-facing product — IBAN, card, payment account — and the fintech operates as an agent or technical service provider on top. The fintech holds no payments licence in its own right. The bank holds the regulated function and the customer-facing perimeter. End-customers contract with the bank; the fintech provides the user interface, onboarding flow, and product wrapping.

This is the cleanest regulatory perimeter available — and the thinnest fintech control. The bank approves the product, the marketing, the customer terms, the AML calibration, and any change to the user journey. Speed-to-market depends on a single counterparty's release cadence. Brand strategy is constrained: most Pattern 1 deployments are co-branded or white-labelled with bank disclosures prominent on the customer-facing surface.

The trade-off: Pattern 1 minimises the fintech's licensing burden, prudential capital, and supervisory contact, at the cost of product velocity, brand control, and concentration risk on a single sponsor. Right for early-stage fintechs (pre-Series A), embedded-finance plays where the bank's brand is acceptable, and verticals where regulatory burden would otherwise dominate.

Pattern 2 — BaaS aggregator middleware

In Pattern 2 a licensed BaaS aggregator — itself an EU EMI or PI — sits between the fintech and a panel of sponsor banks. The aggregator holds the customer-facing licence, performs the safeguarding, runs the AML core, and orchestrates rail selection across multiple bank back-ends. The fintech contracts with the aggregator only and is exposed to the bank panel through the aggregator's contracts.

Pattern 2 is the most common architecture in the EEA in 2026 and the default for fintechs in the €5M–€50M revenue band. It offers faster time-to-market than direct issuance because the aggregator's product is pre-built, the customer terms are reusable, and the integration is one API rather than one per bank. It offers better redundancy than Pattern 1 because rail failures inside the aggregator's panel can be re-routed without breaking the fintech's customer experience.

The dominant risk in Pattern 2 is concentration at the aggregator itself. The fintech has diversified its sponsor-bank exposure but introduced a new single point of failure — the aggregator's licence, governance, capital, and continuity. When the aggregator wobbles (regulatory action, capital event, ownership change, sponsor-bank exit) the fintech's entire customer-facing rail wobbles with it. The mature mitigation is a two-aggregator architecture with active-active or active-warm posture across two distinct providers — expensive, but increasingly required by sophisticated investors and risk committees.

Pattern 3 — Hybrid (own EMI/PI + BaaS for transaction-banking)

In Pattern 3 the fintech holds its own EMI or PI licence — the customer-facing perimeter sits inside the fintech itself — and uses a BaaS layer only for the transaction-banking primitives the fintech does not want to build directly: card-issuing infrastructure, IBAN range procurement, FX execution, scheme connectivity, sometimes specific sponsor-bank correspondent relationships.

This is the highest regulatory burden and the highest control. The fintech runs its own AML programme, holds its own safeguarding accounts, files its own regulatory returns, carries its own prudential capital (€350,000 minimum for an EMI under EMD2; tiered scales for PIs), and is the supervised entity in its own right. The BaaS provider is a vendor under outsourcing rules, not the licence-holder.

The EBA outsourcing guidelines²[2] govern the relationship: documented exit plan, substitutability assessment, audit rights, sub-outsourcing chain disclosure, BCP testing. In Pattern 3 the fintech itself owns these obligations rather than relying on the aggregator's posture. Right for fintechs at scale (typically €50M+ revenue) where licence cost amortises, brand independence is strategic, and the cost of aggregator concentration exceeds the cost of running a regulated entity.

The three BaaS architectural patterns compared on perimeter, control, cost, time-to-market, and scale fit.

DimensionPattern 1 — Sponsor-bank-directPattern 2 — BaaS aggregatorPattern 3 — Hybrid (own EMI + BaaS)
Regulatory perimeter holderSponsor bankBaaS aggregator (EMI/PI)Fintech itself (own EMI/PI)
Customer-facing brandWhite-label / co-brandCo-brand or full brandFull brand
Time-to-market3–6 months2–4 months12–18 months (incl. licensing)
Year-1 all-in cost (indicative)€80k–€250k€150k–€500k€600k–€1.5M
Prudential capital on fintechNoneNone€350k+ (EMI) / tiered (PI)
Redundancy profileSingle sponsor (concentration)Bank panel inside aggregatorOwn + BaaS backup; multi-rail by design
Right for cohortPre-Series A; embedded finance€5M–€50M revenue band€50M+ revenue; brand-led; multi-product

The four decision dimensions

The framework reduces the choice to four dimensions. Score the business honestly on each one and the right pattern usually falls out.

1. Regulatory perimeter — who holds the licence

The most consequential dimension. Whoever holds the customer-facing licence holds the regulator's attention. In Pattern 1 the sponsor bank is the regulated entity for the customer-facing product; in Pattern 2 the aggregator is; in Pattern 3 the fintech itself is. Each shifts where the supervisory inspection lands, where AML governance ultimately sits, and which entity carries reputational risk in a public incident.

Founders should not pick a pattern primarily to avoid supervision — Patterns 1 and 2 do not exempt the fintech from oversight, they relocate the primary point of contact. EBA outsourcing guidelines and DORA both ensure that the fintech remains accountable for the customer outcome regardless of where the licence sits.

2. Redundancy requirement

Pattern 1 is single-sponsor by construction; Pattern 2 distributes across a panel inside one aggregator; Pattern 3 supports own-licence-plus-BaaS-backup as a deliberate multi-rail architecture. The right answer depends on the cost of an outage in customer-facing rails — for a B2C neobank with payroll inflows on day-of-month, single-sponsor concentration is not survivable. For a niche B2B treasury product with low transaction frequency, it may be tolerable.

Under DORA³[3], regulated entities must demonstrate ICT third-party-risk management with documented exit and substitution plans. A Pattern 2 fintech needs an answer for "what happens if your aggregator fails" — and that answer increasingly has to be a contracted second aggregator with at least quarterly failover testing.

3. Brand strategy

Pattern 1 is white-label or co-brand; the bank's name is on the customer-facing disclosures. Pattern 2 supports co-brand ("powered by …") or near-full-brand depending on the aggregator's contractual flexibility. Pattern 3 is full brand — the fintech is the regulated counterparty and customer-facing terms reference no third party as the issuer. Brand strategy alone can force Pattern 3 for fintechs whose differentiation is built on customer trust and brand independence (digital-bank challengers, premium B2B propositions).

4. Unit economics

Three components dominate: per-transaction fees, sponsor-bank capital float, and licensing overhead. Pattern 1 minimises licensing overhead and shifts the economic margin to the sponsor bank; per-transaction fees are typically high. Pattern 2 introduces an aggregator margin but bundles the licensing infrastructure cost. Pattern 3 carries the highest fixed cost (own licence + capital + compliance team) but the lowest marginal cost per transaction at scale.

The cross-over is roughly €30M–€50M annual revenue — below that, Pattern 2's bundled licensing infrastructure is cheaper than running it in-house; above that, the fixed cost of Pattern 3 is amortised across enough volume to make the lower marginal cost dominate.

When each pattern is right

Decision rules in plain language. Pick Pattern 1 if you are pre-Series A, embedded-finance native (your end-customer never thinks about the bank), and your priority is launching in 90 days with no licensing burden. The single-sponsor concentration is acceptable because product-market fit is a higher-priority risk than rail redundancy at this stage.

Pick Pattern 2 if you are in the €5M–€50M revenue band, building a brand-led product but not yet at the scale that justifies own-licence economics, and you need flexibility across rails without the burden of negotiating multiple sponsor-bank contracts directly. Pattern 2 is the default for most growth-stage EU fintechs and the assumption from which other patterns are deviations.

Pick Pattern 3 if you are at €50M+ revenue, brand independence is strategic, you have a multi-product roadmap that benefits from holding the regulated rails in-house, and the fixed cost of an EMI/PI licence amortises across enough volume to lower your marginal economics. Pattern 3 is also right earlier than €50M when institutional customers require own-licence as a procurement criterion — increasingly common in B2B treasury, payroll, and platform-payments verticals.

Decision framework — pick a pattern by cohort and use case.

Cohort / use caseRecommended patternWhy
Pre-Series A consumer fintechPattern 1Speed to launch; licensing burden would dominate; embedded-finance branding tolerable
Embedded finance in non-financial appPattern 1End-customer never identifies the bank; sponsor-bank brand is invisible
Series A/B B2C neobank, €5–€30M revenuePattern 2Need rail diversity; brand-led product; own-licence economics not yet justified
B2B SaaS adding embedded paymentsPattern 2Aggregator orchestration cheaper than direct bank integration; brand independence less critical
Crypto-adjacent fintech (CASP-aware customer base)Pattern 2 → 3Aggregator panel reduces concentration; migrate to own EMI when sponsor-bank panel begins to filter
B2B treasury / payroll, institutional buyersPattern 3Own-licence often a procurement requirement; brand independence strategic
Multi-product fintech at €50M+Pattern 3Fixed licence cost amortises; multi-rail by design; aggregator concentration unacceptable
Two-aggregator (active-active) variantPattern 2 with redundancyDORA-grade resilience without own licence; expensive but increasingly required by sophisticated investors

PSD3 implications for each pattern

The transition from PSD2[4] to PSD3 / PSR tightens several expectations that map directly to the framework. The merger of EMI and PI regimes under PSD3 reduces the gap between Patterns 2 and 3 — own-licence becomes structurally simpler. Mandatory diversification of safeguarding accounts above thresholds raises the cost of single-sponsor concentration. Strengthened outsourcing oversight raises the substance bar for any fintech relying on a BaaS provider for the customer-facing perimeter.

For Pattern 1: the sponsor bank's diversification expectations rise; the fintech-as-agent model remains viable but the sponsor bank's onboarding diligence sharpens. For Pattern 2: aggregator concentration becomes a more visible regulatory concern; expect supervisors to ask Pattern 2 fintechs about their second-aggregator posture during routine inspections. For Pattern 3: the regulatory burden converges with PSD3's higher own-licence substance expectations, but the lower aggregator dependency becomes a structural advantage.

Migration paths between patterns

The framework is not static. Most successful European fintechs migrate through the patterns as they scale — typically Pattern 1 → Pattern 2 → Pattern 3 — and the migration plan is part of the original architecture decision. Designing Pattern 1 with no consideration of the Pattern 2 migration path produces re-platforming pain at exactly the moment the business cannot afford it.

Pattern 1 → Pattern 2

Trigger: the single-sponsor concentration becomes intolerable, or the brand-control limits constrain product velocity. Mechanics: select a Pattern 2 aggregator, contract in parallel, migrate customer cohorts in waves with explicit consent and IBAN re-issuance, decommission the Pattern 1 relationship after the last cohort migrates. Realistic duration: 6–12 months depending on customer base and the original sponsor's exit cooperation.

Pattern 2 → Pattern 3

Trigger: revenue at the cross-over point, brand strategy demanding own-licence, or aggregator concentration risk no longer acceptable. Mechanics: file the EMI or PI authorisation in chosen home state (typically Lithuania, Ireland, or the Netherlands), build the compliance and risk function to inspection grade, run the aggregator and own-licence in parallel during the licensing process, and migrate the customer book to own-licence rails after authorisation. Realistic duration: 18–24 months end-to-end including licensing.

Pattern 1 → Pattern 3 (skipping Pattern 2)

Rare but possible. Typically driven by an institutional customer cohort or M&A scenario that compresses the migration timeline. Operationally harder than the two-step path because the fintech does not gain Pattern 2's intermediate operational maturity before assuming Pattern 3's regulatory load. Not recommended unless external factors compel it.

Frequently Asked Questions

Is Pattern 2 always the safe default?

It is the most common pattern but not the safe default in every case. For embedded-finance use cases where the end-customer never identifies the bank, Pattern 1 is structurally simpler and cheaper. For fintechs with institutional B2B buyers who require own-licence as a procurement criterion, Pattern 3 may be the only viable choice from launch. The safe default is whichever pattern matches the four-dimension profile honestly assessed.

How much does an own-EMI licence actually cost in 2026?

All-in Year-1 cost in Lithuania, Ireland, or the Netherlands typically lands in the €600k–€1.5M range — covering minimum prudential capital (€350k for a small EMI), licensing legal and consulting fees (€150k–€350k), in-house compliance and risk hires (€200k–€500k), audit and external assurance (€50k–€100k), and infrastructure for safeguarding and reporting (€50k–€150k). Year 2 onwards drops to the recurring run-rate, but the licence is a permanent fixed cost regardless of volume.

Can I run Patterns 2 and 3 simultaneously?

Yes — and most Pattern 3 fintechs do. The own EMI/PI carries the principal customer-facing rails; a BaaS provider remains in place for specific functions (card issuing, particular currency rails, geographic redundancy). The architectural distinction is which counterparty holds the customer-facing licence; the operational reality is usually a hybrid even within Pattern 3.

What's the right time to start the Pattern 2 → Pattern 3 migration?

Start the licence application 18–24 months before you need the live licence. The application is gated by regulator capacity, governance hire-in (Heads of Compliance, MLRO, Heads of Risk all required at substance), and a credible 3-year financial plan. Fintechs that wait until the aggregator concentration becomes painful are 18 months away from a solution; fintechs that begin in advance complete the migration on their own timeline.

Does DORA apply differently across the three patterns?

DORA applies to the regulated financial entity. In Pattern 1 the sponsor bank is the DORA-regulated entity; the fintech is downstream as a service provider with contractual flow-down. In Pattern 2 the aggregator is the DORA-regulated entity. In Pattern 3 the fintech itself is the regulated entity and carries DORA obligations directly — including ICT third-party-risk management of the BaaS providers it uses for transaction-banking. The substance is identical; the locus of obligation differs.

Book a free regulatory bankability assessment. We respond within 24 hours.

Book Assessment

The BaaS sponsor-stack framework is not a recommendation in favour of any one pattern. It is the discipline of forcing the architectural question before the vendor question — and of revisiting the answer as the business crosses the cohort thresholds where one pattern stops fitting and the next one starts. Founders who make the framework explicit in their original build decision migrate cleanly; founders who treat BaaS as a vendor selection re-architect under pressure. Choose the pattern; then choose the vendor.

Footnotes & Citations

  1. Directive 2009/110/EC of the European Parliament and of the Council on the taking up, pursuit and prudential supervision of the business of electronic money institutions (EMD2), OJ L 267, 10.10.2009.

  2. European Banking Authority — Guidelines on outsourcing arrangements (EBA/GL/2019/02), establishing third-party-risk substance bar applicable to BaaS/EMI partnerships across the EEA.

  3. Regulation (EU) 2022/2554 on digital operational resilience for the financial sector (DORA), OJ L 333, 27.12.2022. Application date 17 January 2025.

  4. Directive (EU) 2015/2366 of the European Parliament and of the Council on payment services in the internal market (PSD2), OJ L 337, 23.12.2015.

ShareLinkedIn
Take the next step
Related reading

Continue with related resources