Skip to end of metadata
Go to start of metadata

You are viewing an old version of this content. View the current version.

Compare with Current View Version History

« Previous Version 4 Next »

 MENU

1. Transport Certificates

Cert Name

Description

Issuer

Private Key held by

CSR generated by

Certificate Generated by

Actions required by LFI

C1

Identifies the TPP to API Hub

OFTF

TPP

TPP

TPP

None

S2

Identifies non mtls API Hub endpoints to TPP

Lets Encrypt

API Hub

NA
(uses ACME protocol)

API Hub

None

S1

Identifies mtls API Hub endpoints to TPP

OFTF

API Hub

API Hub

LFI

Yes

API Hub will provide a CSR and the LFI should use the OFTF to produce the certificate

C4

Identifies API Hub to LFI’s API Hub Connect endpoint

OFTF

API Hub

API Hub

API Hub

None

S3

Identifies cm and hh endpoints to LFI

OFTF

API Hub

API Hub

LFI

Yes

API Hub will provide a CSR and the LFI should use the OFTF to produce the certificate

S4

Identifies LFI’s API Hub Connect endpoint to API Hub

OFTF

LFI

LFI

LFI

Yes

Scripts are available in the OFTF to assist with CSR generation if requested

The subject of the C3 certificate should be provided to API Hub.

API Hub will limit access to certificates issued by OFTF AND having that specific subject

C3

Identifies LFI to the cm and hh endpoints

OFTF

LFI

LFI

LFI

Yes

Item

Description

Issuer

Private Key Held By

CSR Generated by

Certificate Generated by

Action required by LFI

JWKS

Sig1

Used by the TPP to sign requests sent to the API Hub

(e.g. for signing the private-key-jwt, par request object etc)

API Hub will use the public key in the OFTF JWKS to verify the signature

OFTF

TPP

TPP

TPP

None

TPP’s JWKS identified by the jwks_url for the client.

Hosted in OFTF

Sig2

Used by the API Hub to sign responses sent to the TPP

This includes signed messages from the resource server and the signature on the id_token.

The TPP will use the public key in the JWKS to verify the signature

OFTF

API Hub

API Hub

LFI

Yes

LFI’s JWKS identified by the jwks_url in the API Hub’s well-known endpoint.

Hosted in OFTF

Sig3

Used by the API Hub to sign requests sent to the the LFI

API Hub will use the public key in the JWKS to verify the signature

OFTF

API Hub

API Hub

API Hub

None

API Hub’s JWKS hosted in OFTF

Only required if one of these conditions is true:

  • The LFI requires JWT Auth for Application Layer Authentication to API Hub Connect

  • The LFI uses Client Credentials Grant for Application Layer Authentication to API Hub Connect and client authentication is set to private_key_jwt

Sig4

Used by the LFI to sign requests sent to API Hub

LFI will use the public key in the JWKS to verify the signature

OFTF

LFI

API Hub (to assist LFI)

LFI

Yes

LFI’s JWKS hosted in OFTF

Only required if the LFI requires JWT Auth for Application Layer Authentication to CM and HH

2. Encryption Keys & Certs

Item

Description

Issuer

Private Key Held By

CSR Generated by

Certificate Generated by

Action required by LFI

JWKS

Enc1

Used by the TPP to encrypt PII sent to the API Hub that can only be read by the LFI

The PII payloads are encrypted using the LFI’s public key in the JWKS

The LFI decrypts them using their private key

OFTF

LFI

LFI

LFI

Yes

LFI’s JWKS identified by the jwks_url in the API Hub’s well-known endpoint

Hosted in LFI’s JWKS on OFTF

API Hub can provide scripts to generate the CSR if requested by the LFI

3. Creating certificates

Further information will be shared via the API Hub service desk, including CSRs. For more detailed information please see the example form Pre-Production Environment Specific Configuration

These steps are repeated for S1 S3 Sig2 - where the private keys is held by the API Hub

  1. API Hub to generate private keys for the certificates

  2. API Hub to generate CSRs and hand over to LFI

  3. LFI to generate certificates on the OFTF directory*

  4. LFI to provide JWKS URL and KID

These steps are repeated for C3 S4 - where the private key is held by the LFI

  1. LFIto generate private key for the certificate

  2. LFI to generate CSR

  3. LFI to generate the certificate from the OFTF directory*

  4. LFIto provide JWKS URL and KID

These steps are repeated for Sig3 and C4-where the private keys is held by the API Hub

  1. API Hub to generate private keys for the certificates

  2. API Hub to generate CSRs

  3. API Hub to generate certificates on OFTF directory*

  4. API Hubto provide JWKS URL and KID to the LFI

Environment Considerations

  • OFTF Sandbox is used to issue certificates in the pre-production environment.

  • OFTF Production is used to issue certificates in the production environment.

Certificate Generation for S1 & Sig2 (Private Key Held by API Hub)

These certificates are used for communications between TPPs and the API Hub and should be created at the Organisation level.

  1. API Hub generates private keys for the certificates.

  2. API Hub generates Certificate Signing Requests (CSRs) and provides them to the LFI.

    1. S1 will contain the appropriate Subject Alternative Names (SANs) used for domain validation.

  3. LFI uses the appropriate OFTF directory (Sandbox or Prod) to generate the certificates under the Organisation Certificates section.

  4. LFI provides the JWKS URL and KID. The JWKS and KID is managed by the OFTF and will be automatically created when the certificates are signed.

Certificate Generation for C3, S4 & Sig4 (Private Key Held by LFI)

These certificates are used by the LFI for communication to the API Hub

  1. LFI generates the private key for the certificate.

  2. LFI generates the CSR.

  3. LFI generates the certificate using the OFTF directory.

  4. LFI provides the JWKS URL and KID.

*The OFTF Sandbox is used for signing certificates for the pre-production environment and the OFTF Production is used for signing certificates for the Production environment.

  • No labels