This site contains the documentation that is relevant to older WSO2 product versions and offerings.
For the latest WSO2 documentation, visit https://wso2.com/documentation/.
Setting Up Servers
Preparing the servers
Start the server for each machine where an instance of WSO2 Open Banking is running. Follow the steps below to prepare, and start the servers.
- Install JDK 1.8 or later in all nodes used for the setup.
In the environment variables, update the
JAVA_HOME
andPATH
variables. For instance, you can do this by adding the following to the~/.bashrc
file in Linux or Mac:export JAVA_HOME="<JDK_LOCATION>" export PATH=$PATH:$JAVA_HOME/bin
Set up the WSO2 Update Manager (WUM).
WUM is a simple command-line tool that connects to the WSO2 update service, determines which updates are new and relevant, and downloads them. You can get the latest version of the WSO2 Open Banking product packs through WUM.
License
WSO2 Open Banking is not distributed under the Apache Community License and is only available under the WSO2 Software License. You need a WSO2 subscription to install and update the WSO2 Open Banking solution via WUM. Contact us to find out how you can access a free evaluation copy...
Follow the guidelines provided in the Download WUM page to download, and install WUM in your environment. For more information on how to use WUM, see the /wiki/spaces/updates/pages/16318500.
Add the necessary product packs using the commands given below:
wum add wso2-obam-1.3.0 wum add wso2-obkm-1.3.0
Update the product packs using the commands given below:
wum update wso2-obam-1.3.0 wum update wso2-obkm-1.3.0
Additionally, download and update the other instances of WSO2 Open Banking product.
wum add wso2ei-6.4.0 wum update wso2ei-6.4.0 wum add wso2am-analytics-2.6.0 wum update wso2am-analytics-2.6.0 wum add wso2-obbi-1.3.0 wum update wso2-obbi-1.3.0
The product packs reside in the
<WUM_HOME>/products/<Product_Name>/<version>/full
directory as<Product_name-<version>+<timestamp>.full.zip
. Copy the product packs to a preferred location in each node, and extract them.
WSO2 Updates Manager (WUM) is deprecated and will be unavailable from July 2021 onwards. WSO2 Updates is the new tool to include the solution and security improvements that are released by WSO2 Open Banking, on top of a released version. For more information, see WSO2 Updates.
This document refers to the file paths of the product packs for the Key Manager, API Manager, API Manager Analytics, and Enterprise Integrator as
<wso2-obkm>
,<wso2-obam>
,<wso2am-analytics>
, and<wso2ei>
respectively.Open the ports, as described below.
WSO2 Open Banking consists of six instances that run in different machines/servers. It is mandatory to open the ports of each server to allow a successful data flow. The six instances mentioned below specify the ports that need to be opened.Instance/Product Port Usage WSO2_OBAM 9443 HTTPS servlet transport
(The default URL of the management console is
https://localhost:9443/carbon
)8243 NIO/PT transport HTTPS port.
WSO2_OBKM 9446 HTTPS servlet transport
(The default URL of the management console is
https://localhost:9443/carbon
)WSO2_AM_Analytics 9444 HTTPS servlet transport 7612 Thrift TCP port to receive events from clients 7712 Thrift SSL port for secure transport where the client is authenticated WSO2_EI_Integrator 9447 HTTPS servlet transport 8247 NIO/PT transport HTTPS port. WSO2_EI_BPS 9445 HTTPS servlet transport
(The default URL of the management console is
https://localhost:9443/carbon
)WSO2_OBBI_Worker 9448 HTTPS netty transport 7616 Thrift TCP port to receive events from clients
7716 Thrift SSL port for secure transport where the client is authenticated WSO2_OBBI_Dashboard 9449 HTTPS netty transport
Exchanging the certificates
Updating keystore:
If you are using the default keystores available in the solution, update them by removing any unnecessary or expired Root CA Certificates.
- The keystores are available in
<WSO2_OB_KM_HOME>/repository/resources/security/wso2carbon.jks
and<WSO2_OB_APIM_HOME>/repository/resources/security/wso2carbon.jks
. List and identify problematic certificates:
keytool -list -v -keystore wso2carbon.jks
Remove the certificates using the alias:
keytool -delete -alias <alias_to_remove> -keystore wso2carbon.jks
- For Open Banking UK and Open Banking Berlin:
- For the eIDAS regulation, remove all the existing Root CA Certificates as you only need the qualified certificates from the eIDAS Qualified Trusted Service Providers (QTSPs). See eIDAS Implementation for PSD2 Compliance, for more information.
In order to enable secure communication, we need to install the certificates of each component in others. This will facilitate a Secure Socket Layer (SSL). Follow the steps below to implement this.
Generate a key against the keystore of a particular server. For example, server A with an alias and common name that is equal to the hostname.
keytool -genkey -alias <<keystore_alias>> -keyalg RSA -keysize 2048 -validity 3650 -keystore <<keystore_path>> -storepass <<keystore_password>> -keypass <<key password>> -noprompt
Export the public cert of the newly generated key pair.
keytool -export -alias <<cert_alias>> -file <<certificate_path>> -keystore <<keystore path>>
Import the public cert of Server A to the client truststores of all the servers including Server A.
keytool -import -trustcacerts -alias <<cert_alias>> -file <<certificate_path>> -keystore <<trustore_path>> -storepass <<keystore_password>> -noprompt
Repeat the above steps for all the servers.
- If there is an Active Directory/LDAP configured in your deployment, add the AD certificate to the client-truststore of all the servers.
- If there is an enterprise integrator (EI) instance in your deployment, and if it is connected to a backend, i.e., core banking system (CBS) through a secure connection (ex: SSL), add your backend's certificate to the client-truststore of the EI server.