This article describes how to ensure that card encoding works properly, when an authenticating reverse proxy, such as Smart ID Digital Access component, is used in front of Smart ID Identity Manager. Certain Identity Manager endpoints must be allowed, as is described below.
Example setup
In the following examples, it is assumed that you access Identity Manager Operator via the following external URL of the reverse proxy:
...which then connects to the internal Identity Manager server:
|
To enable Card SDK to download the JPKIEncoder, you must allow the download endpoints for JAR files:
|
The CA connectors of Identity Manager use a session ID cookie embedded in the cardjob to allow the JPKIEncoder to authenticate any CA requests it has to make. The reverse proxy's authentication layer must allow the CA connector cookies without authentication. Calls will still be authenticated, via Identity Manager itself.
|