...
Table of Content Zone | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| |||||||||||||||||||||||||
PSP Certificate registrationAn authorization of PSP has to be approved /rejected by National Competent Authority (NCA) that is responsible for payment services in their country. Following are the steps of PSP certificate registration.
Certificate validation and revocationWSO2 Open Banking solution uses two types of certificates. Namely, Certificates for Website Authentication (QWAC) and Certificates for Electronic Seals (QsealC) that are trusted certificates by ensuring the validity against certificate status services. Certificate status services are Online Certificate Status Protocol (OCSP) and Certificate Revocation List (CRL) provided by the TSP. Arevocation can happen through a qualified TSP or a revocation request can originate from the NCA, which has authorized or registered the payment service provider. Below diagram shows how the TSP revokes certificate. Certificates for Website Authentication (QWAC)QWAC is used to secure communication by identifying and authenticating the communicating parties. Parties involved in the communication who are identified and authenticated by QWAC:
QWAC must be used to establish a secure TLS channel and protect the communication (in the transport layer) from potential attackers on the network. QWAC ensures the person or the system connecting to the website. But it cannot prove the legally assumed evidence of a transaction to the third party.
| wum_update | wum_update | The WSO2 Open Banking validates roles of TPP (Third Party Providers) according to the PSD2. During an API call, this validation restricts TPPs accessing APIs if the roles are not mentioned in eiDAS QWAC (Transport layer certificate). The validation checks following aspects of the eiDAS QWAC.
Tip |
---|
This update is effective for the WSO2 Open Banking API Manager instance from 2.6.0 and onwards. To utilise for 1.2.0 version, download |
Step 2
Add the following configurations to the velocity-template.xml
file in <WSO2_OBAM_HOME>/repository/resources/api_templates/velocity_template.xml in order to enable ClientCertValidationHandler.
Code Block |
---|
<handler class="com.wso2.finance.open.banking.gateway.berlin.ClientCertValidationHandler"> <property name="certificateAsHeader" value="true"/> <property name="psd2Role" value="$apiObj.additionalProperties.get('psd2Role')"/> </handler> |
Step 3
Go to the API Publisher at https://<WSO2_OBAM_HOST>:9443/publisher.
- Click Edit on the existing API.
- Go to the Manage tab.
- Select API Propeties and enter values under property: psd2Role. See the table below to find the TPP roles for the respective APIs.
API | psd2Role parameter value |
---|---|
Accounts and Transactions API | AISP |
Payments Initiation API | PISP |
Funds Confirmation API | PIISP |
Step 4
Restart the WSO2 Open Banking API Manager instance and try API calls with the certificates.
Note | ||
---|---|---|
If you want to enable certificate revocation check, add the following configuration in the
|
Certificates for Electronic Seals (QsealC)
QsealCs is used to provide evidence with legal assumption of authenticity (including identification and authentication of the source) and integrity of a transaction. QsealC ensures the application layer security to protect the data or messages from potential attackers during or after the communication. The receiver of the sealed data can determine who sealed the data. This can also be proven to a third party even after the communication has ended. The evidence of the transaction can be provided by QsealC with legal assumption and can protect the authenticity and integrity of data when relayed through third parties.
A certificate can be either for website authentication or electronic seals, but not both. Therefore, these two types of certificates are not interchangeable. The following diagram elaborates on the flow followed by WSO2 on extracting the certificate through the request header and invoking the URLs provided in the certificate extension for CRL and OCSP. Confirm the validity of a certificateby analyzing the response status. The information about OCSP and CRL are included in the certificate as extensions.
...