This article is new for Identity Manager 5.0.1.

Descriptor overview

The engine’s descriptors are the following:

Descriptor

Description

encryptedFields

Encryption and decryption of fields in the Identity Manager database

configZipEncrypter

Encryption of the configuration files

configZipSigner

Signing and validation of the configuration files

objectHistorySigner

Signing and verification of the object history

signEmailDescriptor

Signing of emails

hermodDeviceEnc

Creation of device encryption certificates that are used in Smart ID messaging

SelfServiceJWTSigner

Authentication of Smart ID Self-Service users to the Identity Manager backend

ContentProviderJWSSigner

Creation of JWS signatures used for Smart ID messaging content provider API

idopteAuthentication

Initial handshake with Idopte client-side middleware

insideClientAuth

Authentication to the IN Groupe Inside Server

att_*

Attestation for provisioning to Smart ID Mobile / Desktop Apps

(arbitrary name)

Decryption of PIN blobs from pre-personalized smart-cards created with the Personal Desktop Client

Each descriptor is described in detail in the sections below, including requirements how it shall be bootstrapped.

Certain descriptors are used for optional features. If a certain feature (for example email signing) is not used in a given deployment, then you may configure the descriptor in question with a placeholder. Any PKCS#12 file containing a self-signed keypair will be sufficient in this case.

EncryptedFields

Descriptor included in default configuration.

Correct bootstrapping is required for productive use.

Only dev- and test systems may use placeholders (for example created with bootstrap.zip package or the corresponding docker container).

Use case

Encryption and decryption of fields in the Identity Manager database

Configured in the following applications

Configured in these special-case tools

Storage

Versioning

Not supported, always uses version 1

Supported asymClipher values

For HSM:

For PKCS#12:

General requirements

Key requirements

Supported types

Certificate requirements

ConfigZipEncrypter

Descriptor included in default configuration.

Correct bootstrapping may be required for productive use, depending on the use case.

Dev- and test systems may use placeholders (for example created with bootstrap.zip package or the corresponding docker container).

Use case

Encryption of the configuration files

Configured in the following applications

Storage

Versioning

Not supported, always uses version 1

Supported asymClipher values

For HSM:

For PKCS#12:

You cannot reconfigure the asymCipher after exporting an encrypted ZIP, as config import of such a ZIP will fail.

General requirements

Key requirements

Supported types

Certificate requirements

ConfigZipSigner

Descriptor included in default configuration.

Correct bootstrapping may be required for productive use, depending on the use case.

Dev- and test systems may use placeholders (for example created with bootstrap.zip package or the corresponding docker container).

Use case

Signing and validation of the configuration files

Configured in the following applications

Storage

Versioning

Possible, but unnecessary. (It is sufficient that the certificate that signed the old configs is trusted via the IDM truststore.)

Supported digest value

(Selecting SHA-384 or SHA-512 only affects MANIFEST.MF, other parts use SHA-256 always.)

General requirements

Key requirements

Supported types

Certificate requirements

ObjectHistorySigner

Descriptor included in default configuration.

Correct bootstrapping may be required for productive use, depending on the use case.

Dev- and test systems may use placeholders (for example created with bootstrap.zip package or the corresponding docker container).

Use case

Signing and verification of the object history

Configured in the following applications

Configured in these special-case tools

Storage

Versioning

Supported (signatures created with old versions can still be verified)

Supported digest values

Changing the digest after history entries have been written requires a new version of the descriptor or startup will fail.

General requirements

Key requirements

Supported types

Certificate requirements

SignEmailDescriptor

Descriptor included in default configuration.

Correct bootstrapping may be required for productive use, depending on the use case.

Dev- and test systems may use placeholders (for example created with bootstrap.zip package or the corresponding docker container).

Use case

Send signed emails from IDM

Required

When email signing is configured

Configured in the following application

Storage

Versioning

Supported, but unnecessary

Supported algorithm values

For RSA keys only:

For ECC keys only:

General requirements

Key requirements

Supported types

Certificate requirements

hermodDeviceEnc

Descriptor included in default configuration.

Bootstrapping required for technical reasons, but with relaxed security requirements compared to other use cases.

Use case

Generate dummy certificate for transient key-pairs generated on a target device when provisioning Smart ID Mobile/Desktop App profiles (the certificates themselves are merely used as transport container for the key-usage parameter)

Configured in the following application

Storage

Versioning

Possible, but unnecessary

Supported algorithm values

For RSA keys only:

For ECC keys only:

General requirements

Key requirements

Supported types

Certificate requirements

SelfServiceJWTSigner

Descriptor included in default configuration.

Correct bootstrapping is required for productive use.

Only dev- and test systems may use placeholders (for example created with bootstrap.zip package or the corresponding docker container).

Use case

Authentication of Smart ID Self-Service users to the Identity Manager backend

Configured in the following applications

Storage

Versioning

Possible, but unnecessary.

General requirements

Key requirements

Supported types

Certificate requirements

ContentProviderJWSSigner

Descriptor included in default configuration.

Correct bootstrapping may be required for productive use, depending on the use case.

Dev- and test systems may use placeholders (for example created with bootstrap.zip package or the corresponding docker container).

Use case

Signing content for Visual ID provisioning to Smart ID Mobile App

Configured in the following applications

Storage

Versioning

Possible, but unnecessary.

General requirements

Key requirements

Supported types

Certificate requirements

Misc Attestation Key Descriptors (att_…)

Descriptors included in default configuration.

Correct bootstrapping may be required for productive use, depending on the use case.

Replacement of the default certificates is optional.

Default descriptor names

Use case

Configured in the following applications

Storage

Versioning

Supported

General requirements

Key requirements

Supported types

Certificate requirements

idopteAuthentication

Descriptor not present by default, can be ignored unless the Idopte middleware is used for PKI card production.

Use case

Initial handshake with Idopte client-side middleware, see Encoding using Idopte middleware in Identity Manager

Configured in the following application

Storage

Versioning

Not supported (always uses the default (that is, highest) version

Supported algorithm values

General requirements

Key requirements

Supported types

Certificate requirements

insideClientAuth

Descriptor not present by default, can be skipped unless the Idopte middleware is used for PKI card production.

Use case

Authenticate to the IN Groupe Inside Server, which performs certain cryptographic operations on behalf of IDM when using the Idopte middleware (see Encoding using Idopte middleware in Identity Manager)

Configured in the following applications

Storage

Versioning

Not needed

General requirements

Key requirements

Supported types

Certificate requirements

Pin-Blob Decryption Descriptors

Descriptors not present by default, can be skipped unless pin-blobs from pre-personalized cards (using Personal Desktop Client/KGS) have to be decrypted.

Descriptor names

Can be any descriptor listed in the pinBlobDecryptor.keyDescriptorNames property of system.properties (or its docker counterpart)

Use case

Decrypting pin-blobs from pre-personalized cards to for example print pin letters for them (see Encodings using Personal Desktop Client middleware in Identity Manager (section "Read encrypted PINs")

Configured in the following applications

Storage

Versioning

Not needed

Supported algorithm values

General requirements

Key requirements

Supported types

Certificate requirements

Additional information

For more information, see Encrypt configuration files in Identity Manager.