Skip to content

Latest commit

 

History

History
38 lines (21 loc) · 2.86 KB

File metadata and controls

38 lines (21 loc) · 2.86 KB

Certificate Management

Certificates play an important part in the CDR ecosystem to establish trust between participants and protect communications. DigiCert is the Certificate Authority (CA) for the CDR and the ACCC is responsible for provisioning DigiCert certificates to participants during the on-boarding process.

For more information, consult the Certificate Management section of the Consumer Data Standards.

The Mock Data Recipient will mimic the behaviour of a data recipient in the CDR ecosystem and therefore will use certificates in its interactions. However, the use of DigiCert for this purpose is not feasible or scalable so an alternative approach is adopted.

There are 3 areas where certificates are used within the Mock Data Recipient:

  • mTLS
  • TLS
  • JWKS

mTLS

Mutual Transport Layer Security is used extensively within the CDR ecosystem. Data Recipients are provisioned client certificates and will present that certificate when interacting with a Data Holder for consumer data sharing and with the Register when discovering Data Holder Brands and request an SSA. Data Holders are issued a server certificate for their side of the interaction. All participants need to validate the certificates presented during the establishment of a mTLS session.

The client certificate used by the Mock Data Recipient for mTLS connections is available at mtls\client.pfx and has the password of #M0ckDataRecipient#.

Certificate Authority

A self-signed Root CA has been provisioned to handle certificate provisioning and to be used in the certificate validation processes. The client certificate/s for the mock data recipient is generated from the self-signed Root CA.

Consult the CertificateManagement section of the Mock Register for more information.

TLS

Endpoints that are not protected by mTLS are protected by TLS. The server certificate used for TLS communication can be provisioned by the CDR CA, or alternatively participants can used a trusted third party CA.

For the Mock Data Recipient, a self-signed TLS certificate is used. The self-signed certificate is issued by the Mock CDR CA, like the mTLS certificates are.

The TLS certificate for the Mock Data Recipient is available at tls\mock-data-recipient.pfx and has the password of #M0ckDataRecipient#.

JWKS

When the Mock Data Recipient makes a private key jwt request, the client assertion JWT is signed by a certificate. The public key of this certificate is available via the Mock Data Recipient's JWKS endpoint for validation by other participants.

The JWKS certificate for the Mock Data Recipient is available at jwks\jwks.pfx and has the password of #M0ckDataRecipient#.