Skip to content

Security

person
System Administrators only

Security tab

The Security section is used for setting up and maintaining digital certificates that are used for verification of connections with external parties and signing messages.

Warning

Note that server certificate related tasks that allow authentication of ActiveAccess server to external clients such as browsers and directory servers have been delegated to the ActiveAccess container. This is the application/web server which is used to run ActiveAccess server. Please consult with your application server documentation for setting up and installing SSL server certificates.

Security has the following sub menu options:

  • Issuer Certificate - for setting up and maintaining the issuers' signing certificates that are used to sign PARes messages.

  • AHS Certificate - for setting up and maintaining client certificates used for connections to the authentication history server.

  • CAAS Certificate - for setting up and maintaining CAAS certificates used for connections to the remote CAAS server.

  • SDK Certificate - for setting up and maintaining SDK signing certificates that are used to sign ACSSignedContent in ARes.

  • Directory Server Certificate - for setting up and maintaining client certificates used for connections to the Directory Server to send RReq.

  • OOB Certificate - for setting up and maintaining client certificates used for connections to the RESTful OOB adapters.

  • Risk Certificate - for setting up and maintaining client certificates used for connections to the RESTful RBA adapters.

  • Decoupled Authenticator Certificate - for setting up and maintaining client certificates used for connections to the RESTful Decoupled Authenticator adapters.

  • CA Certificate - for setting up and maintaining trusted certificates. ActiveAccess uses CA certificates to validate server certificates in outbound connections to external servers such as authentication history server.

Issuer Certificate

Security > Issuer Certificate

This section is used to setup and maintain issuers' signing certificates. Issuer certificates are used to sign PARes messages. The issuer certificates must be issued by the certificate authority designated by the 3-D Secure provider for this purpose.

The following fields and links are displayed:

  • Currently installed certificates list

  • Create Certificate Request for creating new certificate requests for issuers or groups

  • Install Certificate for installation of signed certificates

  • Delete Selected Certificates remove selected certificates.

The following fields and links are displayed for each issuer:

  • Owner, either a group or an issuer, and links to the Group Details page or the Issuer Details page

  • Owner Type - Shows whether the owner is a group or an issuer

  • Provider - 3-D Secure provider of the certificate. The certificate is only used for 3-D Secure transactions, which belong to the same provider. Provider link enables certificate to be downloaded for viewing.

  • Certificate Information - Certificate details such as Common Name (CN), Organization (O), Organization Unit (OU), Location (L), State (ST) and Country (C)

  • Validity - Shows the validity period of the certificate

  • Status - The status of a certificate can either be Valid, Expired or Not signed. You need to reapply for certificates before they expire. A certificate status is shown as not signed if the certificate is not signed by a trusted certificate authority.

  • Issuer - The certificate authority (CA) who issued the certificate

  • Signature Algorithm – The hash algorithm used to sign the certificate.

Create Certificate Request

Security > Issuer Certificate > Certificate Request

Use this section to create a certificate signing request (CSR) that can be sent to a designated certificate authority (CA) to obtain a signed certificate. The certificate used in signing PARes message must be signed by an appropriate CA which is designated by the scheme. You need a separately signed certificate for each supported scheme. The CSR is created in standard PKCS#10 format.

Use the following fields to create a CSR:

  • Each scheme may have certain requirements regarding the format and content of CSR fields that need to be entered here. Please contact the scheme for information regarding creating a CSR. Please note that some fields may not be required by a scheme and that the following explanations are generic.

    • Select whether the CSR is for an Issuer or an Issuer Group and select the organization from the list

    • Select an authentication Provider (scheme) from the list

    • If the RSA Signing key is inactive, the Alias list is displayed and you will be required to select an Alias. The RSA Signing key that is created with the PCIDSS Key Retiring Utility or through Issuers > Key Management will remain inactive until a certificate request is created and signed by card schemes, then installed for the specified Alias

    • The Key size will be displayed once a provider and a key type (and alias, if available) have been selected. The key size is based on the size of the RSA Signing Key of the provider for each issuer.

    • Select the Hash Algorithm to be used to create the certificate request from the list. Defaults to SHA1.

    • Common Name - a descriptive name for the certificate, for example 'Any Bank Signing Certificate'

    • Organization name - for example 'Any Bank'

    • Organizational Unit - the name of the department within the organization to which this certificate belongs, for example 'Card Services'

    • City - for example 'Sydney'

    • Province full name - for example 'New South Wales'

    • Two-letter country code - for example AU for 'Australia.'

Install Certificate

Security > Issuer Certificate > Install Certificate

Use this section to install a certificate which is signed by the CA. The signed certificate must correspond to a previously created CSR for the same issuer and must be in standard PKCS#7 format.

Use the following fields to install a signed certificate:

  • Select the appropriate radio button to indicate whether the Issuer or the Issuer Group was previously used for creating the CSR.

  • Select an authentication Provider (scheme) from the drop sdown list. Select the provider whose CA has signed the certificate.

  • If the RSA Signing key is inactive, the Alias list is displayed and you will be required to select an Alias. The RSA Signing key that is created with the PCIDSS Key Retiring Utility or through Issuers > Key Management will remain inactive until a certificate request is created and signed by card schemes, then installed for the specified Alias.

  • Use the Certificate content (file) field to locate the PKCS#7 file that contains the signed certificate or copy and paste the signed CSR (if in base64 text format) in the Certificate content field.

AHS Certificate

Security > AHS Certificate

This section is used to set up and maintain SSL client certificates which are used to authenticate ActiveAccess to the authentication history server. Note that not all 3‑D Secure providers may require an authentication history server. Check with the 3‑D Secure provider regarding creating AHS client certificates and the designated CA for signing the certificates.

The following fields and links are displayed:

  • Currently installed certificates list

  • Create Certificate Request links to the AHS Certificate Request page for creating a new AHS client certificate request

  • Install Certificate links to the Install AHS Certificate page for installation of the signed AHS client certificate

  • Delete Selected Certificates link used with the Select checkbox to remove selected certificates and associated private keys

  • Import Certificate links to the Import AHS Certificate page for direct installation of a signed AHS client certificate which contains a private key as well as a public key.

The following fields and links are displayed for each provider:

  • Owner - the 3-D Secure provider and links to the Export AHS Certificate page. The certificate is only used for 3-D Secure transactions which belong to the same provider.

  • Certificate Information - Certificate details such as Common Name (CN), Organization (O), Organization Unit (OU), Location (L), State (ST) and Country (C)

  • Validity - Shows the validity period of the certificate

  • Status - The status of a certificate can either be Valid, Expired or Not signed. You need to reapply for certificates before they expire. A certificate status is shown as not signed if the certificate is not signed by a trusted certificate authority.

  • Issuer - The certificate authority (CA) that issued the certificate

  • Signature Algorithm - The hash algorithm used to sign the certificate.

Create Certificate Request

Security > AHS Certificate > AHS Certificate Request

Use this section to create a certificate signing request (CSR) that can be sent to a designated certificate authority (CA) to obtain a signed certificate. The certificate is used in connection to the authentication history server designated by the 3-D Secure provided and must be signed by a CA approved by the respective 3-D Secure provider. The CSR is created in standard PKCS#10 format.

Use the following fields to create a CSR:

  • Each scheme may have certain requirements regarding the format and content of CSR fields that need to be entered here. Please contact the scheme for information regarding creating a CSR. Please note that some fields may not be required by a scheme and that the following explanations are generic.

    • Provider (scheme)

    • Common Name - a descriptive name for the certificate for example 'Any Bank AHS Client Certificate'.

    • Organization - the name of your organization for example 'Any Bank'.

    • Organization Unit - the name of the department within the organization to which this certificate belong for example 'Card Services'.

    • City - for example 'Sydney'.

    • Province - enter the state or province full name for example 'New South Wales'.

    • Two-letter country code for example AU for 'Australia'.

    • Key size ,defaults to 1024.

    • Hash Algorithm used to create the certificate request, defaults to SHA1.

Install AHS Certificate

Security > AHS Certificate > Install AHS Certificate

Use this section to install a certificate which is signed by the CA. The signed certificate must correspond to a previously created CSR for the same provider and must be in standard PKCS#7 format.

Use the following fields to install a signed certificate:

  • Provider (scheme) - Select the provider whose CA has signed the certificate.

  • Click the Choose File / Browse… button adjacent to Certificate content (file), to locate and select the PKCS#7 file that contains the signed certificate or copy and paste the signed CSR (base64 text format) into the Certificate content text box.

Export AHS Certificate

Security > AHS Certificate > Export AHS Certificate

Use this section to export the SSL client certificate in a number of formats including PKCS#12 which allows you to export both private and public keys.

Use the following fields to export a certificate:

  • Provider (scheme).

  • Type, the options are:

    • KeyStore - to export both private and public keys

    • Certificate - to export the public key in DER binary encoded X509 format

    • Certificate path - to export the entire certificate chain in P7B format.

  • If the export type selected is KeyStore, select from the Format list:

    • PFX to export in standard PKCS#12 format

    • JKS to export in the Java KeyStore format used by the Java Keytool and most Java-based applications.

  • If the export type selected is KeyStore, enter a File password to protect the private key.

Import AHS Certificate

Security > AHS Certificate > Import AHS Certificate

The 3-D Secure provider may issue an SSL certificate which contains both the public and private key and is already signed. You may install this type of certificate using the import functionality provided in this section.

Use the following fields to import a certificate:

  • Provider (scheme) .

  • Select the certificate Format. Supported formats are JKS to export in the Java KeyStore format used by the Java Keytool and most Java-based applications or PFX to export in standard PKCS#12 format.

  • Click the Choose File / Browse… button to locate and select the File

  • Enter the File password which is used to protect the private key.

CAAS Certificate

Security > CAAS Certificate

This section is used to set up and maintain SSL client certificates which are used to authenticate ActiveAccess to the CAAS server. Note that the CAAS server may use mutual SSL authentication to verify the client, which in this case is ActiveAccess. Check with the CAAS server provider for more details.

The following fields and links are displayed:

  • Currently installed certificates list

  • Create Certificate Request for creating a new CAAS client certificate request

  • Install Certificate for installation of the signed CAAS client certificate

  • Delete Selected Certificates link used with the Select checkbox to remove selected certificates and associated private keys

  • Import Certificate for direct installation of a signed CAAS client certificate that contains a private key as well as a public key.

The following fields and links are displayed for each provider:

  • Certificate Information links to the Export CAAS Certificate page. The Certificate Information contains certificate details such as Common Name (CN), Organization (O), Organization Unit (OU), Location (L), State (ST) and Country (C)

  • Validity - Shows the validity period of the certificate

  • Status - The status of a certificate can either be Valid, Expired or Not signed. You need to reapply for certificates before they expire. A certificate status is shown as not signed if the certificate is not signed by a trusted certificate authority.

  • Issuer - The certificate authority (CA) that issued the certificate

  • Signature Algorithm - The hash algorithm used to sign the certificate.

Create Certificate Request

Security > CAAS Certificate > CAAS Certificate Request

Use this section to create a certificate signing request (CSR) that can be sent to a designated certificate authority (CA) to obtain a signed certificate. The certificate is used in connection to the authentication history server designated by the 3-D Secure provided and must be signed by a CA approved by the respective 3-D Secure provider. The CSR is created in standard PKCS#10 format.

Use the following fields to create a CSR:

  • Each scheme may have certain requirements regarding the format and content of CSR fields that need to be entered here. Please contact the scheme for information regarding creating a CSR. Please note that some fields may not be required by a scheme and that the following explanations are generic.

    • Common Name - a descriptive name for the certificate for example 'caas-client'.

    • Organization - the name of your organization for example 'Internet Widgits Pty Ltd'.

    • Organization Unit - the name of the department within the organization to which this certificate belong for example 'Caas Services'.

    • City for example 'Sydney'.

    • Province - enter the full name of the state or province, for example 'New South Wales'.

    • Two-letter country code, for example AU for 'Australia'.

    • Select a Key size from the list. Defaults to 1024.

    • Select the Hash Algorithm to be used to create the certificate request from the list. Defaults to SHA1.

Install CAAS Certificate

Security > CAAS Certificate > Install CAAS Certificate

Use this section to install a certificate which is signed by the CA. The signed certificate must correspond to a previously created CSR for the same provider and must be in standard PKCS#7 format.

Use the following fields to install a signed certificate:

  • Click the Choose File / Browse… button adjacent to Certificate content (file), to locate and select the PKCS#7 file that contains the signed certificate or copy and paste the signed CSR (base64 text format) into the Certificate content text box.

Export CAAS Certificate

Security > CAAS Certificate > Export CAAS Certificate

Use this section to export the SSL client certificate in a number of formats including PKCS#12 which allows you to export both private and public keys.

Use the following fields to export a certificate:

  • Select the export Type from the list. The options are:

    • KeyStore - to export both private and public keys

    • Certificate - to export the public key in DER binary encoded X509 format

    • Certificate path - to export the entire certificate chain in P7B format.

  • If the export type selected is KeyStore, select from the Format drop down list:

    • PFX to export in standard PKCS#12 format

    • JKS to export in the Java KeyStore format used by the Java Keytool and most Java-based applications.

  • If the export type selected is KeyStore, enter a File password to protect the private key.

Import CAAS Certificate

Security > CAAS Certificate > Import CAAS Certificate

The CAAS server operator may issue an SSL certificate which contains both the public and private key and is already signed. You may install this type of certificate using the import functionality provided in this section.

Use the following fields to import a certificate:

  • Select the certificate Format. Supported formats are JKS to export in the Java KeyStore format used by the Java Keytool and most Java-based applications or PFX to export in standard PKCS#12 format.

  • Click the Choose File / Browse… button to locate and select the File

  • Enter the File password which is used to protect the private key.

SDK Certificate

New_Section

Security > SDK Certificate dc_changed.png

This section is used to set up and maintain SDK signing certificates which are used to sign the ACSSignedContent of ARes to the SDK via DS Server.

The following fields and links are displayed:

  • Currently installed certificates list

  • Create Certificate Request for creating a new SDK client certificate request

  • Install Certificate for installation of the signed SDK client certificate

  • Delete Selected Certificates link used with the Select checkbox to remove selected certificates and associated private keys.

  • Import Certificate for direct installation of a signed SDK client certificate that contains a private key as well as a public key.

The following fields and links are displayed for each issuer or group:

  • Owner - Either a group or an issuer

  • Owner type - Shows whether the owner is a group or an issuer

  • Provider - The 3-D Secure provider as a link to the the Export SDK Certificate page.

  • Certificate Information Contains certificate details such as Common Name (CN), Organization (O), Organization Unit (OU), Location (L), State (ST) and Country (C)

  • Validity - Shows the validity period of the certificate

  • Status - The status of a certificate can either be Valid, Expired or Not signed. You need to reapply for certificates before they expire. A certificate status is shown as not signed if the certificate is not signed by a trusted certificate authority.

  • Issuer - The certificate authority (CA) who issued the certificate

  • Signature Algorithm - The hash algorithm used to sign the certificate.

  • Key type - he cryptographic key algorithm (RSA or EC) used for signing the certificate.

Create Certificate Request

Security > SDK Certificate > SDK Certificate Request

Use this section to create a certificate signing request (CSR) that can be sent to a designated certificate authority (CA) to obtain a signed certificate. The certificate is used in connection to the authentication history server designated by the 3-D Secure provided and must be signed by a CA approved by the respective 3-D Secure provider. The CSR is created in standard PKCS#10 format.

Use the following fields to create a CSR:

  • Each scheme may have certain requirements regarding the format and content of CSR fields that need to be entered here. Please contact the scheme for information regarding creating a CSR. Please note that some fields may not be required by a scheme and that the following explanations are generic.

    • Select whether the CSR is for an Issuer or an Issuer Group

    • Select an authentication Provider (scheme) from the list

    • Common Name - a descriptive name for the certificate for example 'sdk-client'.

    • Organization - the name of your organization for example 'Internet Widgits Pty Ltd'.

    • Organization Unit - the name of the department within the organization to which this certificate belong for example 'SDK Services'.

    • City for example 'Sydney'.

    • Province - enter the full name of the state or province, for example 'New South Wales'.

    • Two-letter country code, for example AU for 'Australia'.

    • Select a Key type from the list. Defaults to RSA. SDK certificates can be generated either RSA or EC

    • Select a Key size from the list. The available key sizes depend on the selected key type.

      • If RSA is selected, the supported sizes are 2048 (default), 3072, and 4096
      • If EC is selected, the supported sizes are 256 (default), 384, and 521.
    • Select the Hash Algorithm to be used to create the certificate request from the list. Defaults to SHA1.

Install SDK Certificate

Security > SDK Certificate > Install SDK Certificate

Use this section to install a certificate which is signed by the CA. The signed certificate must correspond to a previously created CSR for the same provider and must be in standard PKCS#7 format.

Use the following fields to install a signed certificate:

  • Select the appropriate radio button to indicate whether the Issuer or the Issuer Group was previously used for creating the CSR.

  • Select the Provider (scheme) whose CA has signed the certificate.

  • Click the Choose File / Browse… button adjacent to Certificate content (file), to locate and select the PKCS#7 file that contains the signed certificate or copy and paste the signed CSR (base64 text format) into the Certificate content text box.

Export SDK Certificate

Security > SDK Certificate > Export SDK Certificate

Use this section to export the SSL client certificate in a number of formats including PKCS#12 which allows you to export both private and public keys.

Use the following fields to export a certificate:

  • Issuer or the Issuer Group

  • Provider (scheme)

  • Select the export Type from the list. The options are:

    • KeyStore - to export both private and public keys

    • Certificate - to export the public key in DER binary encoded X509 format

    • Certificate path - to export the entire certificate chain in P7B format.

  • If the export type selected is KeyStore, select from the Format drop down list:

    • PFX to export in standard PKCS#12 format

    • JKS to export in the Java KeyStore format used by the Java Keytool and most Java-based applications.

  • If the export type selected is KeyStore, enter a File password to protect the private key.

Import SDK Certificate

Security > SDK Certificate > Import SDK Certificate

The SDK server operator may issue an SSL certificate which contains both the public and private key and is already signed. You may install this type of certificate using the import functionality provided in this section.

Use the following fields to import a certificate:

  • Select the appropriate radio button to indicate whether the Issuer or the Issuer Group.

  • Select the Provider (scheme) whose CA has signed the certificate.

  • Select the certificate Format. Supported formats are JKS to export in the Java KeyStore format used by the Java Keytool and most Java-based applications or PFX to export in standard PKCS#12 format.

  • Click the Choose File / Browse… button to locate and select the File

  • Enter the File password which is used to protect the private key.

Directory Server Certificate dc_changed.png

Security > Directory Server Certificate

This section is used to set up and maintain client certificates used for connections to the Directory Server to send RReq.

The following fields and links are displayed:

  • Currently installed certificates list

  • Create Certificate Request links to the Directory Server Certificate Request page for creating a new Directory Server certificate request

  • Install Certificate links to the Install Directory Server Certificate page for installation of the signed Directory Server certificate

  • Delete Selected Certificates link used with the Select checkbox to remove selected certificates and associated private keys

  • Import Certificate links to the Import Directory Server Certificate page for direct installation of a signed Directory Server certificate which contains a private key as well as a public key.

The following fields and links are displayed for each provider:

  • Owenr - Either a group or an issuer name

  • Owenr type - Shows whether the owner is a group or an issuer

  • Provider - The 3-D Secure provider and links to the the Export Directory Server Certificate page.

  • Certificate Information - Certificate details such as Common Name (CN), Organization (O), Organizational Unit (OU), Location (L), State (ST) and Country (C), Key size, Hash algorithm.

  • Validity - Shows the validity period of the certificate

  • Status - The status of a certificate can either be Valid, Expired or Not signed. You need to reapply for certificates before they expire. A certificate status is shown as not signed if the certificate is not signed by a trusted certificate authority.

  • Issuer - The certificate authority (CA) that issued the certificate

  • Signature Algorithm - The hash algorithm used to sign the certificate.

Create Certificate Request

Security > Directory Server Certificate > Directory Server Certificate Request

Use this section to create a certificate signing request (CSR) that can be sent to a designated certificate authority (CA) to obtain a signed certificate. The certificate is used in connection to the authentication history server designated by the 3-D Secure provided and must be signed by a CA approved by the respective 3-D Secure provider. The CSR is created in standard PKCS#10 format.

Use the following fields to create a CSR:

  • Each scheme may have certain requirements regarding the format and content of CSR fields that need to be entered here. Please contact the scheme for information regarding creating a CSR. Please note that some fields may not be required by a scheme and that the following explanations are generic.

    • Select whether the CSR is for an Issuer or an **Issuer Group **

    • Select an authentication Provider (scheme) from the list

    • Common Name - a descriptive name for the certificate for example 'Any Bank Directory Server Certificate'.

    • Organization - the name of your organization for example 'Any Bank'.

    • Organizational Unit - the name of the department within the organization to which this certificate belong for example 'Card Services'.

    • City - for example 'Sydney'.

    • Province - enter the state or province full name for example 'New South Wales'.

    • Two-letter country code for example AU for 'Australia'.

    • Key size ,defaults to 1024.

    • Hash Algorithm used to create the certificate request, defaults to SHA1.

Install Directory Server Certificate

Security > Directory Server Certificate > Install Directory Server Certificate

Use this section to install a certificate which is signed by the CA. The signed certificate must correspond to a previously created CSR for the same provider and must be in standard PKCS#7 format.

Use the following fields to install a signed certificate:

  • Select the appropriate radio button to indicate whether the Issuer or the Issuer Group was previously used for creating the CSR.

  • Provider (scheme) - Select the provider whose CA has signed the certificate.

  • Click the Choose File / Browse… button adjacent to Certificate content (file), to locate and select the PKCS#7 file that contains the signed certificate or copy and paste the signed CSR (base64 text format) into the Certificate content text box.

Export Directory Server Certificate

Security > Directory Server Certificate > Export Directory Server Certificate

Use this section to export the SSL client certificate in a number of formats including PKCS#12 which allows you to export both private and public keys.

Use the following fields to export a certificate:

  • Issuer or the Issuer Group.

  • Provider (scheme).

  • Type, the options are:

    • KeyStore - to export both private and public keys

    • Certificate - to export the public key in DER binary encoded X509 format

    • Certificate path - to export the entire certificate chain in P7B format.

  • If the export type selected is KeyStore, select from the Format list:

    • PFX to export in standard PKCS#12 format

    • JKS to export in the Java KeyStore format used by the Java Keytool and most Java-based applications.

  • If the export type selected is KeyStore, enter a File password to protect the private key.

Import Directory Server Certificate

Security > Directory Server Certificate > Import Directory Server Certificate

The 3-D Secure provider may issue an SSL certificate which contains both the public and private key and is already signed. You may install this type of certificate using the import functionality provided in this section.

Use the following fields to import a certificate:

  • Select the appropriate radio button to indicate whether the Issuer or the Issuer Group.

  • Provider (scheme) .

  • Select the certificate Type Supported formats are JKS to export in the Java KeyStore format used by the Java Keytool and most Java-based applications or PFX to export in standard PKCS#12 format.

  • Click the Choose File / Browse… button to locate and select the File

  • Enter the File password which is used to protect the private key.

OOB Certificate

Security > OOB Certificate

This section is used to set up and maintain client certificates used for connections to the RESTful OOB adapters.

The following fields and links are displayed:

  • Currently installed certificates list

  • Create Certificate Request links to the OOB Adapter Connector Certificate Request page for creating a new OOB adapter connector certificate request

  • Install Certificate links to the Install OOB Adapter Connector Certificate page for installation of the signed OOB adapter connector certificate

  • Delete Selected Certificates link used with the Select checkbox to remove selected certificates and associated private keys

  • Import Certificate links to the Import OOB Adapter Connector Certificate page for direct installation of a signed OOB adapter connector certificate which contains a private key as well as a public key.

The following fields and links are displayed for each provider:

  • OOB adapter connector name - links to the Export OOB Adapter Connector Certificate page.

  • Certificate Information - Certificate details such as Common Name (CN), Organization (O), Organizational Unit (OU), Location (L), State (ST) and Country (C)

  • Validity - Shows the validity period of the certificate

  • Status - The status of a certificate can either be Valid, Expired or Not signed. You need to reapply for certificates before they expire. A certificate status is shown as not signed if the certificate is not signed by a trusted certificate authority.

  • Issuer - The certificate authority (CA) that issued the certificate

  • Signature Algorithm - The hash algorithm used to sign the certificate.

Create Certificate Request

Security > OOB Adapter Connector Certificate > OOB Adapter Connector Certificate Request

Use this section to create a certificate signing request (CSR) that can be sent to a designated certificate authority (CA) to obtain a signed certificate. The certificate is used in connection to the authentication history server designated by the 3-D Secure provided and must be signed by a CA approved by the respective 3-D Secure provider. The CSR is created in standard PKCS#10 format.

Use the following fields to create a CSR:

  • Each scheme may have certain requirements regarding the format and content of CSR fields that need to be entered here. Please contact the scheme for information regarding creating a CSR. Please note that some fields may not be required by a scheme and that the following explanations are generic.

    • OOB adapter connector - select from the list.

    • Common Name - a descriptive name for the certificate for example 'Any Bank OOB Adapter Connector Certificate'

    • Organization - the name of your organization for example 'Any Bank'

    • Organizational Unit - the name of the department within the organization to which this certificate belong for example 'Card Services'

    • City - for example 'Sydney'

    • Province - enter the state or province full name for example 'New South Wales'

    • Two-letter country code for example AU for 'Australia'

    • Key size ,defaults to 1024

    • Hash Algorithm used to create the certificate request, defaults to SHA1.

Install OOB Adapter Connector Certificate

Security > OOB Adapter Connector Certificate > Install OOB Adapter Connector Certificate

Use this section to install a certificate which is signed by the CA. The signed certificate must correspond to a previously created CSR for the same provider and must be in standard PKCS#7 format.

Use the following fields to install a signed certificate:

  • OOB adapter connector - select from the list

  • Click the Choose File / Browse… button adjacent to Certificate content (file), to locate and select the PKCS#7 file that contains the signed certificate or copy and paste the signed CSR (base64 text format) into the Certificate content text box.

Export OOB Adapter Connector Certificate

Security > OOB Adapter Connector Certificate > Export OOB Adapter Connector Certificate

Use this section to export the SSL client certificate in a number of formats including PKCS#12 which allows you to export both private and public keys.

Use the following fields to export a certificate:

  • OOB Adapter Connector - select from the list.

  • Type, the options are:

    • KeyStore - to export both private and public keys

    • Certificate - to export the public key in DER binary encoded X509 format

    • Certificate path - to export the entire certificate chain in P7B format.

  • If the export type selected is KeyStore, select from the Format list:

    • PFX to export in standard PKCS#12 format

    • JKS to export in the Java KeyStore format used by the Java Keytool and most Java-based applications.

  • If the export type selected is KeyStore, enter a File password to protect the private key.

Import OOB Adapter Connector Certificate

Security > OOB Adapter Connector Certificate > Import OOB Adapter Connector Certificate

The 3-D Secure provider may issue an SSL certificate which contains both the public and private key and is already signed. You may install this type of certificate using the import functionality provided in this section.

Use the following fields to import a certificate:

  • OOB Adapter Connector - select from the list.

  • Select the certificate Type Supported formats are JKS to export in the Java KeyStore format used by the Java Keytool and most Java-based applications or PFX to export in standard PKCS#12 format

  • Click the Choose File / Browse… button to locate and select the File

  • Enter the File password which is used to protect the private key.

Risk Certificate

Security > Risk Certificate

This section is used to set up and maintain client certificates used for connections to the RESTful RBA adapters.

The following fields and links are displayed:

  • Currently installed certificates list

  • Create Certificate Request links to the Risk Adapter Connector Certificate Request page for creating a new Risk adapter connector certificate request

  • Install Certificate links to the Install Risk Adapter Connector Certificate page for installation of the signed Risk adapter connector certificate

  • Delete Selected Certificates link used with the Select checkbox to remove selected certificates and associated private keys

  • Import Certificate links to the Import Risk Adapter Connector Certificate page for direct installation of a signed Risk adapter connector certificate which contains a private key as well as a public key.

The following fields and links are displayed for each provider:

  • Risk Adapter Connector name - links to the Export Risk Adapter Connector Certificate page

  • Certificate Information - Certificate details such as Common Name (CN), Organization (O), Organizational Unit (OU), Location (L), State (ST) and Country (C)

  • Validity - Shows the validity period of the certificate

  • Status - The status of a certificate can either be Valid, Expired or Not signed. You need to reapply for certificates before they expire. A certificate status is shown as not signed if the certificate is not signed by a trusted certificate authority.

  • Issuer - The certificate authority (CA) that issued the certificate

  • Signature Algorithm - The hash algorithm used to sign the certificate.

Create Risk Adapter Connector Certificate Request

Security > Risk Certificate > Risk Adapter Connector Certificate Request

Use this section to create a certificate signing request (CSR) that can be sent to a designated certificate authority (CA) to obtain a signed certificate. The certificate is used in connection to the authentication history server designated by the 3-D Secure provided and must be signed by a CA approved by the respective 3-D Secure provider. The CSR is created in standard PKCS#10 format.

Use the following fields to create a CSR:

  • Each scheme may have certain requirements regarding the format and content of CSR fields that need to be entered here. Please contact the scheme for information regarding creating a CSR. Please note that some fields may not be required by a scheme and that the following explanations are generic.

    • Risk adapter connector - select from the list.

    • Common Name - a descriptive name for the certificate for example 'Any Bank Risk Adapter Connector Certificate'

    • Organization - the name of your organization for example 'Any Bank'

    • Organizational Unit - the name of the department within the organization to which this certificate belong for example 'Card Services'

    • City - for example 'Sydney'

    • Province - enter the state or province full name for example 'New South Wales'

    • Two-letter country code for example AU for 'Australia'

    • Key size ,defaults to 1024

    • Hash Algorithm used to create the certificate request, defaults to SHA1.

Install Risk Adapter Connector Certificate

Security > Risk Certificate > Install Risk Adapter Connector Certificate

Use this section to install a certificate which is signed by the CA. The signed certificate must correspond to a previously created CSR for the same provider and must be in standard PKCS#7 format.

Use the following fields to install a signed certificate:

  • Risk adapter connector - select from the list

  • Click the Choose File / Browse… button adjacent to Certificate content (file), to locate and select the PKCS#7 file that contains the signed certificate or copy and paste the signed CSR (base64 text format) into the Certificate content text box.

Export Risk Adapter Connector Certificate

Security > Risk Certificate > Export Risk Adapter Connector Certificate

Use this section to export the SSL client certificate in a number of formats including PKCS#12 which allows you to export both private and public keys.

Use the following fields to export a certificate:

  • Risk adapter connector - select from the list

  • Type, the options are:

    • KeyStore - to export both private and public keys

    • Certificate - to export the public key in DER binary encoded X509 format

    • Certificate path - to export the entire certificate chain in P7B format.

  • If the export type selected is KeyStore, select from the Format list:

    • PFX to export in standard PKCS#12 format

    • JKS to export in the Java KeyStore format used by the Java Keytool and most Java-based applications.

  • If the export type selected is KeyStore, enter a File password to protect the private key.

Import Risk Adapter Connector Certificate

Security > Risk Adapter Connector Certificate > Import Risk Adapter Connector Certificate

The 3-D Secure provider may issue an SSL certificate which contains both the public and private key and is already signed. You may install this type of certificate using the import functionality provided in this section.

Use the following fields to import a certificate:

  • Risk adapter connector - select from the list

  • Select the certificate Type Supported formats are JKS to export in the Java KeyStore format used by the Java Keytool and most Java-based applications or PFX to export in standard PKCS#12 format

  • Click the Choose File / Browse… button to locate and select the File

  • Enter the File password which is used to protect the private key.

Decoupled Authenticator Certificate

Security > Decoupled Authenticator Certificate

This section is used to set up and maintain client certificates used for connections to the RESTful Decoupled Authenticator adapters.

The following fields and links are displayed:

  • Currently installed certificates list

  • Create Certificate Request links to the Decoupled Authenticator Adapter Connector Certificate Request page for creating a new Decoupled Authenticator adapter connector certificate request

  • Install Certificate links to the Install Decoupled Authenticator Adapter Connector Certificate page for installation of the signed Decoupled Authenticator adapter connector certificate

  • Delete Selected Certificates link used with the Select checkbox to remove selected certificates and associated private keys

  • Import Certificate links to the Import Decoupled Authenticator Adapter Connector Certificate page for direct installation of a signed Decoupled Authenticator adapter connector certificate which contains a private key as well as a public key.

The following fields and links are displayed for each provider:

  • Decoupled Authenticator Adapter Connector name - links to the Export Decoupled Authenticator Adapter Connector Certificate page

  • Certificate Information - Certificate details such as Common Name (CN), Organization (O), Organizational Unit (OU), Location (L), State (ST) and Country (C)

  • Validity - Shows the validity period of the certificate

  • Status - The status of a certificate can either be Valid, Expired or Not signed. You need to reapply for certificates before they expire. A certificate status is shown as not signed if the certificate is not signed by a trusted certificate authority.

  • Issuer - The certificate authority (CA) that issued the certificate

  • Signature Algorithm - The hash algorithm used to sign the certificate.

Create Decoupled Authenticator Adapter Connector Certificate Request

Security > Decoupled Authenticator Certificate > Decoupled Authenticator Adapter Connector Certificate Request

Use this section to create a certificate signing request (CSR) that can be sent to a designated certificate authority (CA) to obtain a signed certificate. The certificate is used in connection to the authentication history server designated by the 3-D Secure provided and must be signed by a CA approved by the respective 3-D Secure provider. The CSR is created in standard PKCS#10 format.

Use the following fields to create a CSR:

  • Each scheme may have certain requirements regarding the format and content of CSR fields that need to be entered here. Please contact the scheme for information regarding creating a CSR. Please note that some fields may not be required by a scheme and that the following explanations are generic.

    • Decoupled Authenticator adapter connector - select from the list.

    • Common Name - a descriptive name for the certificate for example 'Any Bank Decoupled Authenticator Adapter Connector Certificate'

    • Organization - the name of your organization for example 'Any Bank'

    • Organizational Unit - the name of the department within the organization to which this certificate belong for example 'Card Services'

    • City - for example 'Sydney'

    • Province - enter the state or province full name for example 'New South Wales'

    • Two-letter country code for example AU for 'Australia'

    • Key size ,defaults to 1024

    • Hash Algorithm used to create the certificate request, defaults to SHA1.

Install Decoupled Authenticator Adapter Connector Certificate

Security > Decoupled Authenticator Certificate > Install Decoupled Authenticator Adapter Connector Certificate

Use this section to install a certificate which is signed by the CA. The signed certificate must correspond to a previously created CSR for the same provider and must be in standard PKCS#7 format.

Use the following fields to install a signed certificate:

  • Decoupled Authenticator adapter connector - select from the list

  • Click the Choose File / Browse… button adjacent to Certificate content (file), to locate and select the PKCS#7 file that contains the signed certificate or copy and paste the signed CSR (base64 text format) into the Certificate content text box.

Export Decoupled Authenticator Adapter Connector Certificate

Security > Decoupled Authenticator Certificate > Export Decoupled Authenticator Adapter Connector Certificate

Use this section to export the SSL client certificate in a number of formats including PKCS#12 which allows you to export both private and public keys.

Use the following fields to export a certificate:

  • Decoupled Authenticator adapter connector - select from the list

  • Type, the options are:

    • KeyStore - to export both private and public keys

    • Certificate - to export the public key in DER binary encoded X509 format

    • Certificate path - to export the entire certificate chain in P7B format.

  • If the export type selected is KeyStore, select from the Format list:

    • PFX to export in standard PKCS#12 format

    • JKS to export in the Java KeyStore format used by the Java Keytool and most Java-based applications.

  • If the export type selected is KeyStore, enter a File password to protect the private key.

Import Decoupled AuthenticatorDecoupled Authenticator Adapter Connector Certificate

Security > Decoupled Authenticator Adapter Connector Certificate > Import Decoupled Authenticator Adapter Connector Certificate

The 3-D Secure provider may issue an SSL certificate which contains both the public and private key and is already signed. You may install this type of certificate using the import functionality provided in this section.

Use the following fields to import a certificate:

  • Decoupled Authenticator adapter connector - select from the list

  • Select the certificate Type Supported formats are JKS to export in the Java KeyStore format used by the Java Keytool and most Java-based applications or PFX to export in standard PKCS#12 format

  • Click the Choose File / Browse… button to locate and select the File

  • Enter the File password which is used to protect the private key.

CA Certificate

Security > CA Certificate

This section is used to set up and maintain trusted certificate authority certificates. ActiveAccess uses this list in order to validate the certificate chain of installed certificates and to authenticate remote connections to external SSL enable servers such as the authentication history server.

ActiveAccess is installed with the most recent CA certificates from 3-D Secure providers. However, you may need to maintain and add new certificates they may be introduced at a later time by the 3-D Secure provider or in order to test with non-production 3-D Secure systems that use a different CA.

The following fields and links are displayed:

  • Currently installed certificates list

  • Import CA Certificate links to the Import CA Certificate page for installation of trusted root certificates.

  • Delete Selected Certificates link used with the Select checkbox to remove selected certificates.

The following fields and links are displayed for each provider:

  • Owner - the 3-D Secure provider. Clicking on the link allows you to save the certificate in DER binary encoded X509 certificate format.

  • Type - displays the key type

  • Certificate Information - Certificate details such as Common Name (CN), Organization (O), Organizational Unit (OU), Location (L), State (ST) and Country (C)

  • Validity - Shows the validity period of the certificate

  • Status - The status of a certificate can either be Valid, Expired or Not signed. You need to reapply for certificates before they expire. A certificate status is shown as not signed if the certificate is not signed by a trusted certificate authority.

  • Issuer - The certificate authority (CA) that issued the certificate.

  • Signature Algorithm - The hash algorithm used to sign the certificate.

Import Certificate

Security > CA Certificate > Import CA Certificate

This section allows you to install additional trusted root certificates.

ActiveAccess is installed with the most recent CA certificates from 3-D Secure providers. However, you may need to maintain and add new certificates they may be introduced at a later time by the 3-D Secure provider or in order to test with non-production 3-D Secure systems that use a different CA.

Use the following fields to import a certificate:

  • Provider - select the scheme from the list

  • Key type - select the key type from the list

  • Click the Choose File / Browse… button to locate and select the File. ActiveAccess supports X509 certificates in DER encoded binary or based64 encoded formats.