Info |
---|
This article is valid for Smart ID Identity Manager 24.R1 or later. |
...
use case: signing content for Visual ID provisioning to Smart ID Mobile App
configured in this application:
Identity Manager Operator (see Set up visual ID layout in Identity Manager)
storage: pkcs12, HSM (recommended)
versioning: possible, but unnecessary
general requirements:
placeholder allowed only if Visual ID is not used
if the certificate configured here is not trusted by the end-user (mobile-) device, then Visual ID provisioning will fail
forgery of Visual ID possible if placeholder key is used and also trusted by the end-user device
key requirements:
supported types:
RSA 2048
RSA 3072
RSA 4096 (recommended)
certificate requirements:
must not be self-signed!
key usage is not checked (recommended for informational purposes: set digitalSignature)
issuing CA cert must to be trusted by the app onto which to provision Visual IDs
validity: at your discretion (make sure you do not forget to renew before the expiry date!), validity is checked on the SDK side
versioning not needed (always uses the default (i.e. highest) version)
...
use-case: authenticate to the IN Groupe Inside Server, which performs certain cryptographic operations on behalf of IDM when using the Idopte middleware (see Encoding using Idopte middleware in Identity Manager)
configured in this application:
Identity Manager Operator
general requirements:
descriptor can be omitted entirely (not even a placeholder needed) if Idopte middleware is not used, otherwise correct certificate and keypair is required
PKI card encoding via the Idopte middleware will fail if missing or configured incorrectly
algorithm attribute not used
(we only use certificate and private key from the descriptor)
versioning: not needed
storage: pkcs12
key requirements:
supported types:
RSA 2048
RSA 3072
RSA 4096 (recommended)
certificate requirements:
validity DOES matter, connection to Inside server will fail when expired
unsure if self-signed certs would work (recommend to use CA) Maybe remove “unsure“ from public documentation
must be trusted by Inside server
key usage: digitalSignature
...