...
...
...
...
...
...
...
...
...
...
...
...
...
...
Disclaimer
This document is presently in draft form and has been developed to facilitate discussions among the Open Finance United Arab Emirates (OPF-UAE) Work Groups and relevant stakeholders. It is anticipated to undergo substantial updates and revisions to refine its content and recommendations fully. Therefore, it should not be considered as final or ready for implementation as an official specification at this stage.
Version: beta.12
Objective
Specify the set of necessary certificates required by participating organizations in the Open Finance UAE Ecosystem to ensure interoperability for authentication, confidentiality, integrity and non-repudiation among participants, as well as for users and consumers of these entities. The audience of this specification are the entities participating in Open Finance UAE that will issue certificates to authenticate themselves with other entities, as well as offer their customers a secure authentication channel.
...
Table of Contents
Table of Content Zone | ||||||
---|---|---|---|---|---|---|
| ||||||
1. ScopeThis document specifies the types of certificates required for:
|
...
|
...
|
...
|
...
|
...
|
...
2. IntroductionThe Open Finance UAE ecosystem makes use of chains of certificates and the TLS protocol to guarantee the confidentiality, authentication and integrity of the communication channel used by the APIs of the participating organisations, as well as the customers of each of the participants. The certificates used by Open Finance UAE are also required to authenticate applications through the |
...
OAuth client authentication method. in addition to being used to perform the payload signature using JWS. Another important attribution of certificates is to present a secure channel to the end user in the act of authentication and use of services provided by the participating organisations. 3. Certificate FormatAll the Certificates used on the Open Finance UAE ecosystem must be issued by the Ecosystem Trust Framework |
...
. The certificate issuing and revocation processes |
...
, the practices, |
...
availability, |
...
and values can be found on the Open Finance UAE Certificate Practice Statement < Include Link Once Issued >. 3.1 Certificate TypesThe Open Finance UAE Ecosystem supports four types of certificates, differentiated by their use cases: two are designed for digital signatures and the other two are for mutual TLS (mTLS) authentication. 3.1.1 Server Certificates:
|
...
|
...
|
...
|
...
|
...
|
...
|
...
|
...
|
...
|
...
|
...
|
...
|
...
|
...
|
...
3.2.2 Client Certificates:
|
...
|
...
|
...
|
...
|
...
|
...
|
...
|
...
|
...
|
...
|
...
|
...
|
Issuing and Root C.A. Production
The Production Trust Framework will use the following issuers to issue certificates.
Distinguished Name : C=AE, O=Open Finance UAE, OU=Open Finance UAE Production Trust Framework, CN= Open Finance UAE Production Root CA - G1
< Include Link to Intermediate CA JWKS once issued >.
< Include Link to intermediate CA OCSP responder and CRL list >
The following root certificate authority will be used on the Trust Framework :
Distinguished Name : C=AE, O=Open Finance UAE, OU=Open Finance UAE Production Trust Framework, CN= Open Finance UAE Production Issuing CA - G1
< Include Link to Root CA JWKS once issued >.
All intermediate and root issuers will use the following algorithms:
Key Algorithms: RSA 4096 bits ;
Message Digest: SHA 256 bits
Issuing and Root C.A. Sandbox
The Sandbox Trust Framework will use the following issuers to issue certificates.
Distinguished Name : C=AE, O=Open Finance UAE, OU=Open Finance UAE Sandbox Trust Framework, CN= Open Finance UAE Sandbox Root CA - G1
< Include Link to Intermediate CA JWKS once issued >.
< Include Link to intermediate CA OCSP responder and CRL list >
The following root certificate authority will be used on the Trust Framework :
Distinguished Name : C=AE, O=Open Finance UAE, OU=Open Finance UAE Sandbox Trust Framework, CN= Open Finance UAE Sandbox Issuing CA - G1
< Include Link to Root CA JWKS once issued >.
All intermediate and root issuers will use the following algorithms:
Key Algorithms: RSA 4096 bits ;
Message Digest: SHA 256 bits
...
3.2 Certificate Validity PeriodAll Certificates issued by the Open Finance Trust Framework have a validity period of 13 months. Certificates should be replaced at least one month before the end of their validity period to ensure continuity of services. 4. Certificate Subject DN4.1 Server CertificatesThe Following Fields will be included on |
...
all of the |
...
SERVER CERTIFICATES certificate subject distinguished name:
4.1.1 Example SubjectDN for |
...
Server Certificate :An Organisation Raidiam, registered on the Trust Framework with Code :
|
...
4.2 Client CertificatesThe Following Fields will be included on |
...
all of the |
...
CLIENT CERTIFICATES certificate subject distinguished name:
Besides the mandatory Subject DN fields listed above, the Client Transport Certificate can also incorporate the X509v3 Subject Alternative Name field. To include these fields, they must be added to the CSR before it is uploaded to the Trust Framework. 4.2.1 Example SubjectDN for |
...
Client Certificate :A Software Statement with Code :
5. Root C.A Issuers5.1 Production EnvironmentThe Production Trust Framework will use the following issuers to issue certificates. Distinguished Name : C=AE, O=Open Finance UAE, OU=Open Finance UAE Production Trust Framework, CN= Open Finance UAE Production Root CA - G1 < Include Link to Intermediate CA JWKS once issued >. < Include Link to intermediate CA OCSP responder and CRL list > The following root certificate authority will be used on the Trust Framework : Distinguished Name : C=AE, O=Open Finance UAE, OU=Open Finance UAE Production Trust Framework, CN= Open Finance UAE Production Issuing CA - G1 < Include Link to Root CA JWKS once issued >. All intermediate and root issuers will use the following algorithms:
5.2 Sandbox EnvironmentThe Sandbox Trust Framework will use the following issuers to issue certificates. Distinguished Name : C=AE, O=Open Finance UAE, OU=Open Finance UAE Sandbox Trust Framework, CN= Open Finance UAE Sandbox Root CA - G1 < Include Link to Intermediate CA JWKS once issued >. < Include Link to intermediate CA OCSP responder and CRL list > The following root certificate authority will be used on the Trust Framework : Distinguished Name : C=AE, O=Open Finance UAE, OU=Open Finance UAE Sandbox Trust Framework, CN= Open Finance UAE Sandbox Issuing CA - G1 < Include Link to Root CA JWKS once issued >. All intermediate and root issuers will use the following algorithms:
6. Trust Framework Certificate GenerationCertificates will be issued directly within the Trust Framework (TF) application. This process involves submitting a Certificate Signing Request (CSR) in the standard PKCS#10 format, which will then be validated by the TF Registration Authority (RA). Upon validation, the CSR will be signed by the TF Certificate Authority (CA), and the resulting certificate will be accessible via the TF Application and its keystores. The TF RA will compare the CSR fields against the corresponding information registered in the Trust Framework for the organization. The table below outlines the Directory API values that will be matched with the CSR:
6.1 AlgorithmsAll the leaf/end-entity certificates issued by the Trust Framework will have the following characteristics:
6.2 Key Usage and Extended Key Usage Attributes :The following values are to be expected on the four supported certificate types.
|
...
7. Cache and Validation Policies7.1 Certificate Status Verification |
To maintain security and trust the following validation and cache policies are to be undertaken by organisations:
7.1.1 mTLS Certificate Revocation Status Validation:Certificates used for mTLS must be validated via OCSP or CRL without caching the status for more than 15 minutes. 7.1.2 Signature Public Key ValidationPublic Keys used for payload signature validation must also not be cached for over 15 minutes, necessitating validation within key stores at least every 15 minutes. |