...
The use cases the engine handles include :
...
encryption and decryption of fields in the Identity Manager database
...
, signing, verification and encryption of the object history
...
Signing and validation of the configuration files (descriptor “configZipSigner“)
...
Encryption of the configuration files (descriptor “configZipEncrypter“)
...
Signing of emails (descriptor “signEmailDescriptor“)
...
Creation of device encryption certificates that are used in Smart ID messaging (descriptor “hermodDeviceEnc“)
...
Creation of JWS signatures used for Smart ID messaging content provider API (descriptor “ContentProviderJWSSigner“)
...
Authentication of Smart ID Self-Service users to the Identity Manager backend (descriptor “SelfServiceJWTSigner“)
...
Decryption of PIN blobs from pre-personalized smart-cards created with the Personal Desktop Client
...
and many more.
The sign and encrypt engine provides a consistent configuration of keys and certificates for both signing and encryption. You can define algorithms and parameters and reference keys from an HSM (for most use-cases) or from PKCS#12 files (for all use cases).
...