Configuration - from end of installation
Configuration - ActiveAccess ¶
The purpose of this section is to provide an overview of the steps required in order to configure the system for testing purposes. This requires you to set up at least one issuer, create test cards and upload the authentication and enrolment pages.
Creating a New Issuer¶
Login to the Administration server using an account with system admin access (such as administrator)
Use the Issuer Management section and create an issuer. The system creates an issuer and displays a 19-digit Issuer ID. Make a note of the Issuer ID for future use.
Note
At this stage the new issuer is not registered.
- Send the Issuer ID and Issuer Name to GPayments and request an ActiveAccess license key. Once you receive the license key for the issuer, copy the contents of the license key into the Issuer Details page. Apply the changes and make sure that the message License key is valid is displayed.
The Administration server creates a set of cryptographic keys for the issuer in the HSM local to the administration server. If ActiveAccess is installed on a separate server, and as such uses its own hardware security module, these keys need to be transferred to that server's HSM.
Export the following keys to the ActiveAccess HSM:
RSAVbV< Issuer_ID >_pub
RSAVbV< Issuer_ID >_pri
RSAMSC< Issuer_ID >_pub
RSAMSC< Issuer_ID >_pri
RSAJCB< Issuer_ID >_pub
RSAJCB< Issuer_ID >_pri
RSASK< Issuer_ID >_pub
RSASK< Issuer_ID >_pri
RSADC< Issuer_ID >_pub
RSADC< Issuer_ID >_pri
RSADEVICE< Issuer_ID >_pub
RSADEVICE< Issuer_ID >_pri
SPA< Issuer_ID >
VbVA< Issuer_ID >
VbVB< Issuer_ID >
JCBA< Issuer_ID >
JCBB< Issuer_ID >
MSCA< Issuer_ID >
MSCB< Issuer_ID >
SKA< Issuer_ID >
SKB<< Issuer_ID >
DCA< Issuer_ID >
DCB< Issuer_ID >
Card< Issuer_ID >
Where < Issuer_ID > is the actual Issuer ID provided in the previous steps.
Info
For further information on key export and import, please see section 0 - Key Transfer.
Note
If you have enabled the Use parent keys option, the only key generated for the issuer is Card< Issuer_ID >
If the enrolment server or registration servers have been set-up on a different machine to administration server, these keys need to be transferred to their server HSM.
Export the following keys to the enrolment or registration server HSM:
Card < Issuer_ID >
Where < Issuer_ID > is the actual Issuer ID provided in the previous steps.
Info
For further information on key export and import, please see section 0 - Key Transfer.
- Use the Certificates Details section to create a certificate request for the issuer.
Note
Skip this step if you have enabled the Use parent certificate, public and encryption keys option.
Send the certificate request to the appropriate Mastercard, Visa, JCB, American Express or Diners Club International certificate authority for signing.
Import the signed certificate back to the system using the Certificates Details section (the certificate must be in p7b format and include all the certificates in the certification path)
Note
Skip this step if you have enabled the Use parent certificate, public and encryption keys option.
- Upload the issuer public key certificate using the Public & Encryption Key Management function in the administration server.
Note
Skip this step if you have enabled the Use parent certificate, public and encryption keys option.
- Upload the authentication and enrolment pages (if applicable) for the issuer using the Custom Pages function in the administration server.
Creating a New Issuer Group¶
Login to the Administration server using an account with system admin access (such as administrator)
Use the Group Management section to create an issuer group.
Administration server creates a set of cryptographic keys for the issuer group in the HSM local to the administration server. If ActiveAccess is installed on a separate server, and as such uses its own hardware security module, these keys need to be transferred to that server's HSM.
Export the following keys to the ActiveAccess HSM:
RSAVbV< Group_ID >_pub
RSAVbV< Group_ID >_pri
RSAMSC< Group_ID >_pub
RSAMSC< Group_ID >_pri
RSAJCB< Group_ID >_pub
RSAJCB< Group_ID >_pri
RSASK< Group_ID >_pub
RSASK< Group_ID >_pri
RSADC< Group_ID >_pub
RSADC< Group_ID >_pri
RSADEVICE< Group_ID >_pub
RSADEVICE< Group_ID >_pri
SPA< Group_ID >
VbVA< Group_ID >
VbVB< Group_ID >
JCBA< Group_ID >
JCBB< Group_ID >
MSCA< Group_ID >
MSCB< Group_ID >
SKA< Group_ID >
SKB< Group_ID >
DCA< Group_ID >
DCB< Group_ID >
Where < Group_ID > is the group's unique identifier as displayed in the issuer group details page.
Note
Skip this step if you have enabled the Use parent certificate, public and encryption keys option.
Info
For further information on key export and import, please see section 0 - Key Transfer.
- Use the Certificate Details section to create a certificate request for the group.
Note
Skip this step if you have enabled the Use parent certificate, public and encryption keys option.
- Send the certificate request to the appropriate Mastercard, Visa, JCB, American Express, or Diners Club International certificate authority for signing.
Note
Skip this step if you have enabled the Use parent certificate, public and encryption keys option.
- Import the signed certificate back to the system using the Certificate Details section (the certificate must be in p7b format and include all the certificates in the certification path)
Note
Skip this step if you have enabled the Use parent certificate, public and encryption keys option.
- Upload the group public key certificate using the Public & Encryption Key Management function in the administration server.
Note
Skip this step if you have enabled the Use parent certificate, public and encryption keys option.
Configuring an Issuer for ActiveDevice¶
To activate device authentication for an issuer:
Login to the Administration server using an account with system admin access (such as administrator)
Use System Management > Issuer Management to find issuer's account and access issuer details
Install a license key with ActiveDevice functionality enabled. If an appropriate license key is installed the license status shows Device authentication enabled.
Note
Contact GPayments if you don't have a license key with the ActiveDevice option enabled.
Create and install an issuer signing certificate for ActiveDevice, make sure that the CA is in the ActiveDevice's trusted CA list (in ActiveAccess)
Click on the ActiveDevice settings link. Select the appropriate token type for the issuer (e.g. VASCO) and apply the changes.
Upload two-factor authentication pages customised for this issuer. Use Issuer > Custom Pages > Upload File to locate and upload the two-factor custom pages. If testing you can use the sample two-factor pages which can be found in the
/pkg/Custom Pages/Samples/ directory.