The Security List Request (x) message is used to return a list of securities from the counterparty that match criteria provided on the request
Subscription for security status can be optionally specified by including the SubscriptionRequestType (263) field on the message.
SecurityListRequestType (559) specifies the criteria of the request:
| Tag | Field Name | FIXML | Req'd | Comments | |||
|---|---|---|---|---|---|---|---|
| <Standard Message Header> | Y | MsgType = x | |||||
| 320 | SecurityReqID | @ReqID | Y | ||||
| 559 | SecurityListRequestType | @ListReqTyp | Y | Type of Security List Request (x) being made | |||
| <Instrument> | N | Instrument of the requested Security | |||||
| <Instrument Extension> | N | ||||||
| <Financing Details> | N | ||||||
| 711 | NoUnderlyings | Undly | N | Number of underlyings | |||
| => | <Underlying Instrument> | C | Must be provided if Number of underlyings > 0 | ||||
| 555 | NoLegs | Leg | N | Number of legs that make up the Security | |||
| => | <Instrument Leg> | C | Required if NoLegs (555) > 0 | ||||
| 15 | Currency | @Ccy | N | ||||
| 58 | Text | @Txt | N | Comment, instructions, or other identifying information. | |||
| 354 | EncodedTextLen | @EncTxtLen | C | Must be set if EncodedText (355) field is specified and must immediately precede it. | |||
| 355 | EncodedText | @EncTxt | C | Encoded (non-ASCII characters) representation of the Text (58) field in the encoded format specified via the MessageEncoding (347) field. | |||
| 336 | TradingSessionID | @SesID | N | Optional Trading Session Identifier to specify a particular trading session for which you want to obtain a list of securities that are tradeable. | |||
| 625 | TradingSessionSubID | @SesSub | N | ||||
| 263 | SubscriptionRequestType | @SubReqTyp | N | Subscribe or unsubscribe for security status to security specified in request. | |||
| <Standard Message Trailer> | Y | ||||||
© 2026.
EPAM Systems. All Rights Reserved.
All material contained within the website is copyright of EPAM Systems, Inc. No material contained herein can be copied or otherwise used without the express permission of the copyright holder.