This site contains the documentation that is relevant to older WSO2 product versions and offerings.
For the latest WSO2 documentation, visit https://wso2.com/documentation/.

eIDAS Implementation for Berlin

This document discusses how WSO2 Open Banking has implemented the Electronic Identification and Trust Services (eIDAS) Regulation for the NextGen PSD2 XS2A Framework.

Before you begin:

  • In order to try out the flows with the eIDAS approach, Third-Party Providers(TPPs) have to be registered in a Qualified Trust Service Provider (QTSP). 

    If you are testing the WSO2 Open Banking solution for UK compliance, you can use either of the following:

    • Original eIDAS certificates:
      • Qualified Website Authentication Certificate (QWAC)
      • Qualified e-Seal Certificate (QSealC)
  • In order to support eIDAS certificates in WSO2 Open Banking, you need to update the client trust stores. 

     Click here to see how it is done...

    In order to support QWAC and QSealC in WSO2 Open Banking, the client trust store must contain all the root certificates of the QTSPs in the EU region.

    • National Competent Authorities (NCAs) of each region maintains a list of QTSPs and QTSP certificates in their regions. The QTSP list and links to their QTSP certificates are aggregated to a single list named as List of Trust Lists (LoTL). 
    • You need to download all the QTSP certificates from LoTL and update the client trust store of WSO2 OB APIM. WSO2 Open Banking provides LoTL integrator, which is a separate tool to achieve this task. To get the LoTL integrator, you can contact the WSO2 Open Banking Support team via your support account or through the contact us form.
    • Once downloaded, follow the steps given below to run LoTL integrator:

      LoTL integrator requires a connection to each of the national trust lists hosted by NCAs in the EU region. Please make sure that the environment that you are running the tool has the required network-level access for each of the trust lists in the EU region.

      1. Create a copy of the client trust store in <WSO2_OB_APIM_HOME>/repository/resources/security/client-truststore.jks. When the tool asks for the path of the client trust store, provide the location to the copied client trust store.
      2. Extract the LoTL integrator and run the below command inside the directory of the LoTL integrator:

        java -jar custom-lotl-integrator-jar-with-dependencies.jar
      3. Provide the correct information when the tool asks for the path and password to the client trust store.
      4. Once you set up the client trust store successfully, replace the copy with the original client trust store. We encourage you to backup the original client trust store before the replacement.
      5. Restart the WSO2 OB APIM server.

TPP Validation Service

TPP validation service allows OBIE-registered Account Servicing Payment Service Providers (ASPSPs) to validate TPPs from the NCAs. This is done by validating QWAC or OBWAC. Follow the steps to enable this service:

This is available only as a WUM update effective from January 03, 2021 (01-03-2021). For more information on updating WSO2 Open Banking, see Updating WSO2 Products.

Prerequisites:

  1. Make sure you have uploaded QWAC or OBWAC as the transport certificate in  <WSO2_OB_APIM_HOME>/repository/resources/security/wso2carbon.jks. 
  2. Update <WSO2_OB_APIM_HOME>/repository/resources/security/client-truststore.jks with the OBIE root, issuer certificates as mentioned here.
  1. Add the QSealC keypair corresponding to QWAC or OBSealC keypair corresponding to OBWAC  into a new JKS. For example, wso2carbon-signing.jks. 
  2. Place the JKS file in the <WSO2_OB_APIM_HOME>/repository/resources/security directory.
  3. Open the <WSO2_OB_APIM_HOME>/repository/conf/finance/open-banking.xml file:

    1. Add the following configs under the <CertificateManagement> section:

      • The SoftwareStatementId value needs to be configured according to the OBWAC/QWAC that has been configured in the <WSO2_OB_APIM_HOME>/repository/resources/security/wso2carbon.jks.
      • The OBIE service-related endpoints are for the OBIE sandbox environment.

        <TPPValidationService>
        	<CacheExpiry>3600</CacheExpiry>
        	<TPPValidationImplClass>com.wso2.finance.open.banking.gateway.service.obie.OBIECertValidationServiceImpl</TPPValidationImplClass>
        	<OBIE>
        		<SoftwareStatementId>ykNOgWd2RgnuoLRRyWBkaY</SoftwareStatementId>
        		<Scopes>
        			<Scope>ASPSPReadAccess</Scope>
        			<Scope>TPPReadAccess</Scope>
        			<Scope>AuthoritiesReadAccess</Scope>
        		</Scopes>
        		<TokenEndpoint>https://matls-sso.openbankingtest.org.uk/as/token.oauth2</TokenEndpoint>
        		<ValidationEndpoint>https://matls-dirapi.openbankingtest.org.uk/certificate/validate</ValidationEndpoint>
        		<RedirectEndpoint>https://matls-api.openbankingtest.org.uk/scim/v2/OBAccountPaymentServiceProviders</RedirectEndpoint>
        		<MemberState>GB</MemberState>
        	</OBIE>
        	<ScopeRegexPatterns>
        		<AISP>accounts+</AISP>
        		<PISP>payments+</PISP>
        		<CBPII>fundsconfirmations+</CBPII>
        	</ScopeRegexPatterns>
        </TPPValidationService>
    2. Configure the <SigningKeystore> tag with the file path of the JKS file that contains the OBSealC.

    3. Configure the <SigningCertificateAlias> and the <SigningCertificateKid> tags with the alias and KID value of the signing certificate (OBSealC):

      <Server>
      	<!-- alias the certificate is under -->
      	<SigningCertificateAlias>signing</SigningCertificateAlias>
      	<!-- KID value for primary signing certificate -->
      	<SigningCertificateKid>1pbTEt6v6_o0WpPFzmNXj6ediKw</SigningCertificateKid>
      	<SigningKeystore>
      		<Location>${carbon.home}/repository/resources/security/wso2carbon-signing.jks</Location>
      		<Password>wso2carbon</Password>
      		<KeyPassword>wso2carbon</KeyPassword>
      	</SigningKeystore>
      </Server>
  4. Open the <WSO2_OB_APIM_HOME>/repository/resources/api_templates/velocity_template.xml file:
    1. Add the following handler as the first handler:

      <handler class="com.wso2.finance.open.banking.gateway.common.APIPropertiesHandler">
      	<property name="xWso2ApiSpec" value='$apiObj.additionalProperties.get("ob-spec")'/>
      	<property name="xWso2ApiVersion" value='$apiObj.additionalProperties.get("ob-api-version")'/>
      	<property name="xWso2ApiType" value='$apiObj.additionalProperties.get("ob-api-type")'/>
      </handler>
    2. Add the TPP validation handler after the #if($apiObj.additionalProperties.get("ob-spec") == "berlin") configuration as follows:

      #if($apiObj.additionalProperties.get("ob-spec") == "berlin")
          ## TPP validation service handler
         <handler class="com.wso2.finance.open.banking.gateway.common.TPPValidationHandler"/>
  5. Republish your Accounts, Payments, and CoF APIs with the ob-spec, ob-api-version, and ob-api-type properties. For more information, see Deploying APIs for Berlin.
  6. Open each API xml file(Accounts, Payments, and CoF APIs) in <WSO2_OB_APIM_HOME>/repository/deployment/server/synapse-configs/default/api and make sure that both APIPropertiesHandler and TPPValidationHandler are available.
Integrating a Custom Certificate Validation Service

If you want to integrate a custom validation service rather than OBIE, you can configure as follows:

  1. Implement the following interface for the required certificate validation service.

    package com.wso2.finance.open.banking.gateway.service;
    public interface TPPValidationService {
        /**
         * Validate the status of a TPP
         *
         * @param peerCertificate Certificate of the TPP
         * @param requiredPSD2Roles Roles that are required to be validated with the TPP validation service according to
         * the current flow
         * @param metadata Metadata information
         * @return
         * @throws TPPValidationException
         */
        boolean validate(X509Certificate peerCertificate, List < PSD2RoleEnum > requiredPSD2Roles, Map < String, Object > metadata) throws TPPValidationException;
    
        /**
         * Get the cache key used for the caching the response. Implementation should return an appropriate ID that is
         * unique to the API flow.
         *
         * @param peerCertificate Certificate of the TPP
         * @param requiredPSD2Roles Roles that are required to be validated with the TPP validation service according to
         * the current flow
         * @param metadata Metadata information
         * @return
         * @throws TPPValidationException
         */
        String getCacheKey(X509Certificate peerCertificate, List < PSD2RoleEnum > requiredPSD2Roles, Map < String, Object > metadata) throws TPPValidationException;
    
    }
  2. Once implemented, build a JAR file for your custom certificate validation service.
  3. Place the above-created JAR file in the <WSO2_OB_APIM_HOME>/repository/components/dropins directory.
  4. Open the <WSO2_OB_APIM_HOME>/repository/conf/deployment.toml file and find the [open_banking.cert_mgt.tpp_validation_service] tag.
  5. Configure your TPP validation service using its Fully Qualified Name (FQN) as follows:

    [open_banking.cert_mgt.tpp_validation_service]
    cache_expiry=3600
    tpp_validation_impl_class=""
  6. Add the following tags below the [open_banking.cert_mgt.tpp_validation_service] configurations:

    [open_banking.cert_mgt.tpp_validation_service.scope_regex_patterns]
    aisp="accounts+"
    pisp="payments+"
    cbpii="fundsconfirmations+"
  7. Make sure you have the following handler as the first handler under the <Handlers> section in the <WSO2_OB_APIM_HOME>/repository/resources/api_templates/velocity_template.xml file. Otherwise add the handler.

    <handler class="com.wso2.finance.open.banking.gateway.common.APIPropertiesHandler">
    	<property name="xWso2ApiSpec" value='$apiObj.additionalProperties.get("ob-spec")'/>
    	<property name="xWso2ApiVersion" value='$apiObj.additionalProperties.get("ob-api-version")'/>
    	<property name="xWso2ApiType" value='$apiObj.additionalProperties.get("ob-api-type")'/>
    </handler>
  8. Add the TPPValidationHandler handler right after the #if($apiObj.additionalProperties.get("ob-spec") == "berlin") configuration in the <WSO2_OB_APIM_HOME>/repository/resources/api_templates/velocity_template.xml file.

    #if($apiObj.additionalProperties.get("ob-spec") == "berlin")
        ## TPP validation service handler
       <handler class="com.wso2.finance.open.banking.gateway.common.TPPValidationHandler"/>
  9. Republish your Accounts, Payments, and CoF APIs using publisher. Make sure that you have added the ob-spec, ob-api-version and ob-api-type properties before republishing the APIs.
  10. Open each API xml file (Accounts, Payments, and CoF APIs) in <WSO2_OB_APIM_HOME>/repository/deployment/server/synapse-configs/default/api directory and make sure that both APIPropertiesHandler and TPPValidationHandler are added under the <handlers> section.

Token generation

WSO2 Open Banking supports Private Key JSON Web Token (JWT) and MTLS as token authentication methods. 

Authentication methodDescription
Private Key JWT

Sign JWT using QSealC.

The signing certificate needs to be mentioned under software_jwks_endpoint of the SSA. 

MTLS

Initiate the access token request using the QWAC certificate as the certificate for mutual authentication. In the request header, mention the path to the public and private keys of the transport certificate. To find the sample request for the user-access token, see Accounts Information Service Provider Flow v1.3.6.

Thereby, the public key of the transport certificate provided for the token endpoint will be verified against the software_jwks_endpoint in the SSA.

The following diagram describes how the token generation is implemented in WSO2 Open Banking with accordance to eIDAS:

For more information about the token authentication methods used in WSO2 Open Banking, see API Security for Berlin.

API invocation

Account Information Service Provider, Payment Initiation Service Provider, and Card-Based Payment Instrument Issuer are roles for a TPP. This role is validated so that only a particular TPP is allowed to invoke an API. APIs are protected using MTLS, which uses the QWAC as the transport certificate in each of the requests. To see how MTLS affects in the API invocations, see API Security for Berlin.


Sources of Information