Most SaaS and marketplace founders embedding payments, lending, or wallets pick their bank partner the way they pick a payment processor — by price card, brand recognition, and the warmth of the first sales call. Two years later they discover the partner cannot produce a customer-account-level statement, requires governance the founding team cannot staff, won't underwrite half their target verticals, prices reserves at a level that destroys unit economics, and shows no sign of being AMLR-aligned by mid-2027. Switching costs at that point are catastrophic.

The bank partner is not a vendor. It is the substrate the embedded-finance product compounds on top of. Every API limitation becomes a customer-facing limitation. Every governance gap becomes an audit finding. Every regulatory gap becomes an existential risk when the supervisor asks the partner — not the SaaS — what controls are in place. The right framing is to evaluate the bank partner the way you would evaluate a co-founder: the trade-offs are structural, durable, and very hard to reverse.

This article codifies the five embedded-finance bank-partner capabilities SaaS and marketplace founders should evaluate in 2026 — sub-ledger reporting at customer-account granularity, sponsor-bank programme governance compatible with the SaaS's compliance maturity, Tier-1 vs Tier-2 acceptance posture for the underlying customer base, reserve-vs-funding capital efficiency, and MiCA / PSD3 / DORA forward-readiness. Each one compounds across the lifetime of the partnership; missing any one leaves a structural defect the SaaS will pay for in every cohort that follows.

Why bank-partner selection matters more than vendor selection

In a normal SaaS stack you choose vendors and you can swap them. The CRM, the analytics platform, the auth provider — none of them is so deeply wired into the product that switching takes longer than a quarter. Embedded finance breaks that pattern. The bank partner is wired into the customer-facing money-movement product, into the regulatory perimeter, into the unit economics, and into the substrate the SaaS reports against in audit. A wrong choice is a multi-year correction.

There is a second asymmetry. The bank partner's deficiencies do not show up evenly over time — they show up at the worst possible moments. At customer escalations. At the first regulatory inspection. At the SaaS's Series B fundraise when the diligence team asks for a chain-of-liability map. At a fraud event when the partner's reporting can't reconstruct the transaction graph. The selection criteria need to anticipate those moments — not the steady state.

The five capabilities below are arranged in the order most SaaS founders should evaluate them. The first three are product and risk fit. The fourth is unit economics. The fifth is the structural-durability test that decides whether the relationship still works in two years.

The five capabilities

Capability 1 — Sub-ledger reporting at customer-account granularity

The single most under-evaluated capability. The SaaS embedding payments wants to show its end-customers their own balance, transaction history, statement, and reconciliations — without operating its own ledger. The bank partner's API surface decides whether that is possible cleanly, possible only with significant SaaS-side ledger work, or not possible at all.

The strong-signal partner exposes a sub-account model — every end-customer has an addressable account-of-record on the partner's books, with API endpoints for balance, transaction list, and statement generation at that granularity. The weak-signal partner lumps all flows into a single pooled account and expects the SaaS to maintain its own ledger to slice the activity per end-customer. The first model compounds; the second model creates a permanent reconciliation burden the SaaS pays in engineering, in support, and in audit.

Test it concretely: ask the prospective partner for a sample API response that returns the last 50 transactions of a single end-customer sub-account, with balances, timestamps, and counter-party detail. If the answer is "you'd query the pooled account and filter by your own metadata," the partner does not have sub-account granularity. If the answer is a clean, indexed, addressable response, you have a partner whose product compounds with yours.

Capability 2 — Programme governance compatibility

Sponsor-bank programme governance is the framework of policies, controls, attestations, MI returns, audit cooperation, and incident reporting the bank requires the SaaS to operate. Under PSD2¹[1] — and the EBA outsourcing guidelines that sit on top of it — the bank cannot delegate the regulatory perimeter to the SaaS. The SaaS instead operates inside a programme defined and supervised by the bank.

The mistake is matching the wrong governance maturity to the wrong stage. An early-stage SaaS without a CISO, MLRO, or full risk function should not sign with a sponsor that requires the governance maturity of a 200-person bank-partnership team. The partnership will collapse not because of any single failure but because the SaaS is permanently unable to satisfy the cadence of attestations and MI returns. Conversely, a Series-C SaaS with a real second-line should not pick a sponsor whose governance is so loose it cannot defend the partnership in inspection.

The right framing is governance match, not governance maximum. Ask: what is the cadence of MI returns? What controls must the SaaS evidence in onboarding? What is the model for AML decisions — partner-led, SaaS-led, or shared? What is the audit-cooperation expectation if the bank's regulator inspects? If the answers exceed what the SaaS can staff in 12 months, the partnership will fail before it starts.

Capability 3 — Tier-1 vs Tier-2 acceptance posture

Banks have radically different acceptance postures depending on the SaaS's underlying customer base. A Tier-1 EU bank sponsor will accept blue-chip B2B SaaS, regulated counterparties, and low-risk geographies — and will refuse SMB marketplaces serving high-risk verticals or higher-risk geographies. A Tier-2 specialist sponsor may accept the SMB book — but at higher pricing, more reserves, and tighter MI cadence. The question is not which is better; the question is which matches the SaaS's actual customer geography and vertical mix.

The diagnostic is to walk the prospective partner through the SaaS's actual customer-base distribution by vertical, geography, transaction-size profile, and counterparty-risk profile. Then ask: which of these segments would the partner refuse to underwrite? The honest partner will name them. The dishonest partner will say "we look at it case-by-case" — which usually means the SaaS will discover the refusal at onboarding, after the engineering integration has already shipped.

Two SaaS in the same vertical will often need different partner archetypes. A B2B invoicing SaaS serving regulated counterparties in Northern Europe needs the Tier-1 sponsor's institutional reputation. A B2B invoicing SaaS serving freelancers and micro-SMBs across Southern Europe and CEE needs a Tier-2 specialist that has deliberately built underwriting for that book. Neither is the wrong customer base; they need different sponsors.

Capability 4 — Reserve-vs-funding capital efficiency

Bank partners price the SaaS programme along two dimensions: reserve requirements the SaaS must hold against potential charge-back, fraud, and operational tail-risk; and funded balances the SaaS uses to pre-position liquidity for customer flows. Under EMD2² the safeguarding requirements set the floor; the bank partner sets the rest. Pricing differences between partners on these two lines item are the single largest driver of programme economics.

A 5% reserve requirement on a programme processing €500M annually is €25M of working capital trapped — capital the SaaS cannot deploy into product, growth, or its own balance sheet. A partner that prices the same programme at 1.5% reserves frees €17.5M for productive use. The headline transaction fee is dwarfed by the capital structure of the relationship.

Ask every prospective partner to model the all-in cost at three points along the SaaS's growth curve — Year-1, Year-3, Year-5. Insist on reserve and funded-balance pricing alongside the per-transaction fee. The cheapest partner on a per-transaction basis is frequently the most expensive partner on capital efficiency — because the model is structured to compensate for it.

Capability 5 — MiCA / PSD3 / DORA forward-readiness

The 2026 regulatory landscape is moving in three directions simultaneously, and the bank partner's posture against each one decides whether the relationship survives mid-decade. DORA³[3] is enforcing third-party-ICT risk discipline on every regulated financial entity — including bank partners — and the SaaS sits squarely inside that perimeter. PSD3 will reset payment-services architecture (with explicit safeguarding-diversification expectations). MiCA will continue tightening the boundary between regulated and unregulated crypto-asset flows.

And underneath all three sits the AMLR[4]. The bank partner who isn't AMLR-aligned by mid-2027 will become a structural problem — supervisors will treat AMLR as the baseline, and a partner whose KYC, monitoring, and reporting infrastructure has not been re-engineered to that baseline will face escalating supervisory friction. The SaaS will inherit the friction in the form of slower onboarding, more refused customers, and rising operating cost.

Ask: where is the partner on its DORA implementation roadmap? Has it published a PSD3 readiness statement to its programme partners? What is its AMLR transition plan, with milestones? A partner that cannot answer these in concrete terms is a partner that has not yet engaged with the next regulatory cycle — and the SaaS will spend the next two years carrying the consequences.

The five capabilities — strong-signal vs weak-signal indicators.

CapabilityStrong-signal indicatorWeak-signal indicator
Sub-ledger reportingAddressable per-customer sub-account; clean balance/txn API at customer granularityPooled account; SaaS must maintain own ledger to slice activity
Programme governanceDefined cadence, written controls, governance scaled to SaaS cohortAd-hoc requirements; expectations exceed what the SaaS can staff in 12 months
Acceptance postureHonest enumeration of refused segments up front'Case-by-case' answers; refusals discovered at onboarding
Capital efficiencyReserve and funded-balance pricing modelled across growth curveHeadline per-transaction price only; capital structure opaque
Forward-readinessConcrete DORA / PSD3 / AMLR roadmap with milestones'We're working on it'; no published readiness statement

SaaS cohort × bank-partner archetype matrix

Different SaaS cohorts compound on different partner archetypes. The mismatches that destroy programmes are usually predictable in advance — a Series-A SaaS picking the partner archetype suited to a Series-D programme, or a scale-stage SaaS still partnered with the archetype it picked in pre-seed. The matrix below maps the typical good fits.

Bank-partner archetype by SaaS cohort — typical good fits.

SaaS cohortBest-fit partner archetypeRationale
Pre-seed / seed (€0–€2M ARR)BaaS aggregator (sponsor-bank-backed)Lower governance overhead; standardised contract; faster to live
Series A / B (€2–€20M ARR)Specialist EMI or PI sponsorDirect sponsor relationship; better unit economics; governance still manageable
Scale (€20–€100M ARR)Tier-2 sponsor bank, often two of themDiversification; supervisor-grade governance; capital efficiency
Late-stage (€100M+ ARR)Tier-1 sponsor bank + secondary specialistInstitutional reputation + redundancy + AMLR-alignment baseline
Pre-IPO / regulated entitySelf-licence (EMI / PI / CASP) + correspondent banksDirect supervisory relationship; full perimeter ownership

How to evaluate Capability 5 (the regulatory-forward-readiness test)

This is the capability most SaaS founders skip — and the one that distinguishes a partner that survives mid-decade from one that quietly de-risks the SaaS off its book in 2027. The evaluation is concrete, not theoretical.

  • DORA: ask for the third-party-ICT risk register entry the partner expects the SaaS to occupy, the incident-reporting cadence, and the resilience-testing programme. A partner that cannot produce these in 2026 will not be DORA-compliant in 2027.

  • PSD3: ask whether the partner anticipates safeguarding diversification across multiple credit institutions, and how the SaaS programme would map to that architecture. The answer reveals whether the partner is operating to PSD2 alone or already preparing for PSD3.

  • AMLR: ask for the partner's transition plan, milestones for re-engineering KYC and monitoring infrastructure, and the cooperation model with the new EU AML supervisor. A partner without milestones will face escalating supervisory friction the SaaS will inherit.

  • MiCA: if the SaaS touches any crypto-asset flow — even tangentially via merchant categories — ask the partner where the perimeter sits and what flows would trigger termination of the relationship.

The honest partner answers in concrete terms. The partner with no roadmap deflects to "we'll handle that when we get there". The partnerships that fail in 2027–2028 are overwhelmingly the ones where the SaaS accepted that deflection in 2025–2026.

When SaaS embeds vs when SaaS authorises directly

There is a recurring question at scale: when does the SaaS stop embedding through a sponsor and become its own regulated entity? The answer is rarely about volume alone. It is about whether the constraints of operating inside someone else's perimeter have started to cost more than the burden of holding the perimeter directly.

The signals that direct authorisation has become the right answer: the SaaS is processing volumes where reserve costs alone exceed the all-in cost of an EMI licence; the SaaS's customer base requires acceptance the sponsor cannot deliver; the SaaS's governance maturity now exceeds the sponsor's; the SaaS's product needs API-level capabilities the sponsor cannot build. At that point the SaaS should consider taking its own EMI, PI, or CASP licence in an EEA jurisdiction, with the original sponsor often becoming a correspondent bank.

The transition is rarely sudden. Mature embedded-finance SaaS typically operate a hybrid model — direct licence in their primary geography, sponsor relationships in geographies where direct authorisation is uneconomic. The five capabilities apply equally in either model; what changes is who holds the perimeter.

Frequently Asked Questions

How many bank partners should an embedded-finance SaaS have?

At pre-seed and seed, one is typically right — the operational overhead of running two integrations is unjustified at low volume. From Series A onwards, building toward two bank partners is the structural baseline; PSD3's safeguarding-diversification direction will reinforce this. By scale stage, two partners is non-negotiable, with a third often added for resilience or geographic coverage.

How long does it take to switch bank partners?

Realistically 9–18 months for a working programme, including diligence, contracting, integration, customer-fund migration, and decommissioning the prior relationship. This is precisely why the original selection matters — the cost of being wrong is measured in years of engineering and customer-experience disruption, not weeks.

Should embedded-finance SaaS use a BaaS aggregator or go direct to a sponsor bank?

BaaS aggregators offer faster time to live, lower governance overhead, and standardised contracts — at the cost of higher unit economics and one more counterparty in the chain of liability. For pre-seed and seed SaaS, the trade-off usually favours the aggregator. From Series A onwards, the unit-economics gap typically dominates and the direct sponsor relationship becomes the right answer.

How does AMLR change the selection criteria?

AMLR makes Capability 5 dispositive. By mid-2027, the bank partner who has not re-engineered KYC, monitoring, and reporting infrastructure to AMLR baseline will face escalating supervisory friction. SaaS programmes inside that partner will see slower onboarding, higher refused-customer rates, and rising operating cost. The SaaS that did not test for AMLR readiness in 2026 will be re-platforming in 2027.

What is the single biggest mistake SaaS founders make in bank-partner selection?

Optimising for the headline per-transaction price. The five capabilities — sub-ledger granularity, governance compatibility, acceptance posture, capital efficiency, and forward-readiness — each individually have more impact on the lifetime economics of the partnership than the headline rate. Founders who pick on price alone overwhelmingly find themselves re-platforming inside 24 months.

Book a free regulatory bankability assessment. We respond within 24 hours.

Book Assessment

Embedded finance compounds the strengths and weaknesses of the bank partner across every customer cohort the SaaS ever onboards. Pick the partner whose sub-ledger granularity, governance posture, acceptance, capital structure, and forward-readiness compound with — rather than against — the product you are building. Then re-test the five capabilities annually against the regulatory direction of travel. The selection that was right at Series A is rarely the selection that will be right at Series C.

Footnotes & Citations

  1. Directive (EU) 2015/2366 of the European Parliament and of the Council on payment services in the internal market (PSD2), OJ L 337, 23.12.2015.

  2. Directive 2009/110/EC of the European Parliament and of the Council on the taking up, pursuit and prudential supervision of the business of electronic money institutions (EMD2), OJ L 267, 10.10.2009.

  3. Regulation (EU) 2022/2554 of the European Parliament and of the Council on digital operational resilience for the financial sector (DORA), OJ L 333, 27.12.2022.

  4. Regulation (EU) 2024/1624 of the European Parliament and of the Council on the prevention of the use of the financial system for the purposes of money laundering or terrorist financing (AMLR), OJ L 19.6.2024.

ShareLinkedIn
Take the next step
Related reading

Continue with related resources