Nexus' software components have new names:

Nexus PRIME -> Smart ID Identity Manager
Nexus Certificate Manager -> Smart ID Certificate Manager
Nexus Hybrid Access Gateway -> Smart ID Digital Access component
Nexus Personal -> Smart ID clients

Go to Nexus homepage for overviews of Nexus' solutions, customer cases, news and more.


Skip to end of metadata
Go to start of metadata

This article describes how to connect Smart ID Identity Manager to the Smart ID Digital Access component Extension Programming Interface (XPI), to enable provisioning of users and Smart ID Mobile App profiles. 

Expand/Collapse All

Prerequisites

 Prerequisites

Step-by-step instruction

 Only for demo use cases: Create Digital Access server certificate

To be able to use the Digital Access XPI interface, an SSL server certificates needs to be provided. For demo use cases it’s sufficient to create a self-signed certificate including private keys. Skip these steps if a real server certificate exists.

  1. Use the java keytool command to create a self-signed certificate including private keys:

    Example: java keytool command
    keytool -genkey -keyalg RSA -alias selfsigned -keystore hag.local.jks -storepass <password> -validity 1080 -keysize 2048
  2. To use the Digital Access server certificate, a p12 container is required with the corresponding certificate. Use the created jks container to transform to p12:

    Example: Transform to P12
    keytool -importkeystore -srckeystore hag.local.jks -destkeystore hag.local.p12 -deststoretype PKCS12 -srcalias selfsigned -deststorepass <password> -destkeypass <password>
  3. Extract the certificate:

    Example: Extract certificate
    openssl pkcs12 -in hag.local.p12 -nokeys -out hag.local.pem


  4. Extract the key:

    Example: Extract key
    openssl pkcs12 -in hag.local.p12 -nodes -nocerts -out key.pem


 Install server certificate

To install the server certificate in Digital Access component:

  1. Log in to Digital Access Admin and go to Manage System > Certificates.
  2. In the section Server Certificates, click Add Server Certificate… 
  3. Fill out the required information, for example:

    Example: Add server certificate in Digital Access component

    Display name: hag.local

    Certificate: hag.local.pem

    Key: key.pem

    Click ? for more information.

  4. Click Next > to finish the wizard.
 Trust server certificate

The server certificate needs to be added to the trust store, to make the Identity Manager server trust the certificate during the XPI call.

  1. Add the certificate to the cacerts file of the Java version that the Identity Manager server runs with.

    Make sure to use the right Java version.

    Example: Trust server certificate
    keytool -import -v -trustcacerts -alias selfsigned -file hag.local.pem -keystore 
    "<path to Java>\lib\security\cacerts"

    The default password of the the cacerts keystore is changeit.

 Create password authentication method

An Authentication Method of type Password must be set up, so that Identity Manager can authenticate against Digital Access XPI.

  1. Log in to Digital Access Admin and go to Manage System > Authentication Method.
  2. Click Add Authentication Method…
  3. Check Nexus Password

  4. Click Next >.
  5. Enter a Display Name, that is, the name to identify the method for example on the portal.

  6. If the password authentication method is only to be used for XPI authentication, uncheck Visible in authentication menu.

  7. In the following form, add the default authentication method server, by clicking Add Authentication Method Server... and then Next >.

  8. Click Next > until the wizard is finished and the password authentication method is created.

 Define XPI user

To authenticate to the XPI with username and password, a delegated administrator must be defined. The user must be in the already connected user storage. See Add user storage in Digital Access for more information.

To assign the delegated administrator role to a user:

  1. Log in to Digital Access Admin and go to Manage System > Delegated Management.
  2. Click Super Administrator and go to the tab Administrators.
  3. Register the user by clicking Add Administrator… Type in the username from the user storage and click Search.
  4. Go to Manage Account and Storage > User Accounts. to define the password for the user account.
  5. In User ID, enter the user name, or a part of it with wildcards, for example xpi*. Click Search to search for the user and click the corresponding user in the search results.

  6. On the tab PortWise Authentication, check Enable PortWise Password for the user account.

  7. Provide a password of the user for authentication to the XPI, in either of the following ways:

    1. Enter a password in Password and Verify Password.

      OR

    2. Check Use password from User storage. to use the LDAP password.

 Enable XPI in Digital Access component

For Identity Manager to get access to Digital Access component over the XPI, the XPI must be enabled.

To enable the Digital Access XPI:

  1. Log in to Digital Access Admin and go to Manage System > Policy Services.
  2. Click the link to the configured Registered Policy Services.
  3. Go to the section XPI:REST and WS. Check Enable XPI:WS.
  4. Enter the following information:
    1. In Host, enter the IP address or DNS name of the Digital Access appliance.
    2. In Server Certificate, select the certificate that was added before, for example hag.local.
 Enter Digital Access XPI credentials in Identity Manager

To enter the Digital Access XPI credentials in Identity Manager:

  1. Open Identity Manager operator UI, and go to Admin > Configure System Properties > HAG Settings.
  2. Enter the following data:
    1. In User and Password, enter the details of the user that was set up as Super Administrator in Digital Access.
    2. In Authentication Method ID, enter the ID of the authentication method from Digital Access.

      In this example from Digital Access, the Authentication Method ID is 4:
       
  3. Click Save.
 Configure Digital Access provisioning in Identity Manager

To define which data should be provision from Identity Manager to Digital Access, the settings in the Digital Access provisioning task must be adapted. For more information, see provisionUserToHagParameterizedTask in Standard service tasks in Identity Manager.

The task is used in the Identity Manager processes that provision the data to Digital Access. There are processes available in the Base configuration package (BIM), called BaseProcActivateAndProvisionUserToHag and BaseProcDeactivateAndProvisionUserToHag.

To adapt the settings in the Digital Access provisioning task, do the following for each process:

  1. Open the process, for example BaseProcActivateAndProvisionUserToHag.
  2. Click the edit icon on the corresponding task. The available parameters are displayed.
  3. Enter parameter values:
    1. In hagUrl, provide the host and port information.
      Since Identity Manager is communicating with Digital Access over HTTPS we need to make sure the configured host provides a corresponding SSL certificate. See Install Server Certificate and Trust Server Certificate above.
    2. Adapt the other fields to reflect the Identity Manager configuration. For more information on the parameters, see provisionUserToHagParameterizedTask in Standard service tasks in Identity Manager