/
Pre-Production Environment Specific Configuration

This space is deprecated and no longer supported. Please use the latest available version here.

Pre-Production Environment Specific Configuration

This form is for information only. The information will be gathered using the API Hub Service Desk

 

1.0 Purpose

This form should be used to gather and share environment specific configuration details for the LFI’s Pre-Production environment.

2.0 Pre-Production Domain Names

Section

Question

Answer

Additional Information to be Supplied to Ozone

Provided by

Section

Question

Answer

Additional Information to be Supplied to Ozone

Provided by

Domain Names

TPP facing Domain Name

Ozone will allocate a domain name for your pre-production environment based on your BIC.

<Link TBC>

 

Ozone

Domain Names

LFI Facing Domain Name

Ozone will allocate a domain name for hh and cm for your pre-production environment based on your BIC.

<Link TBC>

 

Ozone

Domain Names

Ozone Connect Base URL

LFI to specify the base url on which Ozone Connect is hosted

<Link TBC>

 

LFI

Domain Name

Authorisation URL

The OIDC auth URL for the LFI.

There can be only one auth URI for an instance.

The auth uri must follow the stipulations placed by FAPI 2.0 (e.g. https only, no query parameters)

<Link TBC>

 

LFI

 

 

3.0 Pre-Production Certificates

3.1 Ozone Held Transport & Signing Private keys

The table below sets out the steps for each certificate where Ozone holds the Transport & Signing Private keys.

Section

Certificate

Steps

Additional Information to be Supplied Ozone & LFI

Section

Certificate

Steps

Additional Information to be Supplied Ozone & LFI

Transport Server Certificate

S1

This is the certificates that is deployed onto the API Hub servers to identify an LFI's instance to the TPPs.

 

These steps are repeated for S1 S3 C4 Sig2 Sig3

  1. Ozone to generate private keys for the certificates

  2. Ozone to generate CSRs and hand over to LFI

  3. LFI to generate certificates on OFTF Sandbox directory

  4. LFI to provide JWKS URL and KID

Ozone Insert CSR
LFI to Insert JWKS URL LFI to Insert KID

Transport Server Certificate

S3

The certificate is used by Ozone’s cm and hh servers to identify themselves to the LFI

Ozone Insert CSR

Transport Client Certificate

C4

This certificate is used by Ozone to identify itself to the LFI when it calls Ozone Connect APIs from the tenant

Signing Certificate

Sig2

Used by the API Hub to sign responses sent to the TPP.

This includes signed messages from the resource server and the signature on the id_token.

The TPP will use the public key in the JWKS to verify the signature

Signing Certificate

Sig3

Used by the API Hub to sign requests and responses sent to the the LFI.

This is used to sign the jwt-auth header for:

  • Ozone Connect requests

  • hh responses

  • cm responses

API Hub will use the public key in the JWKS to verify the signature

Transport Server Certificate

S2

This certificate is used by Ozone servers that publish endpoints or pages that may be consumed in web browsers.

Process fully managed by Ozone

 

3.2 Pre-Production LFI Held Transport & Signing Private keys

The table below sets out the steps for each certificate where the LFI holds the Transport & Signing Private keys.

Section

Certificate

Steps

Additional Information to be Supplied by LFI

Section

Certificate

Steps

Additional Information to be Supplied by LFI

Transport Client Certificate

C3

This certificate is used by Ozone to recognise the LFI when it calls the hh and cm

These steps are repeated for C3 S4 Sig4

  1. LFIto generate private key for the certificate

  2. LFI to generate CSR

  3. LFI to generate the certificate from OFTF Sandbox directory

  4. LFIto provide JWKS URL and KID

Transport Server Certificate

S4

The certificate is used by the LFI to identify its Ozone Connect service to API Hub.

Signing Certificate

Sig4

Used by the LFI to sign requests and responses sent to API Hub.

This is used to sign the jwt-auth header for:

  • Ozone Connect responses

  • hh requests

  • cm requests

LFI will use the public key in the JWKS to verify the signature.

3.3 Pre-Production LFI Held Encryption Private key

The table below sets out the steps for LFI to generate the encryption private key.

Section

Certificate

Steps

Additional Information to be Supplied by LFI

Section

Certificate

Steps

Additional Information to be Supplied by LFI

Encryption Key

Enc1

Used by the TPP to encrypt PII sent to the API Hub that can only be read by the LFI

The PII payloads are signed using the LFI's public key in the JWKS

The LFI decrypts them using their private key

  1. LFI to generate private key for the certificate

  2. LFI to generate CSR

  3. LFI will generate the certificate from OFTF Sandbox directory

  4. LFIto provide JWKS URL and KID

 

© Ozone Financial Technology Limited 2024-2025
Ozone Non Commercial Software EULA