You need to make the keystore available to both IDM Administrator (for configuring processes with the created attestation keys) and IDM Operator.
- Copy the created keystore to a location where IDM can access it.
- Edit the sign and encrypt engine's configuration and create a new key entry referencing the keystore.
- Create a new descriptor entry referencing this key entry. The name of the descriptor must be exactly the same as it is named in the Mobile or Personal App, prepended with the string "att_". The key name is denoted "kid" in the key material, so in the example above you need to set it to "att_attestation_key_id"
In order to use new keys for an existing descriptor, please create a new descriptor/key entry with an incremented version. Signatures will be validated against all versions of the key, until a valid one is found. This is useful in case some clients still have the old keys.
A sample descriptor configuration looks like this:
<?xml version="1.0" encoding="UTF-8"?>
<engineSignEncrypt>
<descriptors>
<descriptor name="att_attestation_key_id" version="1">
<type algorithm="SHA256withRSA" size="" result="" key="attestationKey_old" />
</descriptor>
<descriptor name="att_attestation_key_id" version="2">
<type algorithm="SHA256withRSA" size="" result="" key="attestationKey_current" />
</descriptor>
</descriptors>
<keys>
<key name="attestationKey_old">
<type name="pkcs12" locationValue="classpath:attKeyOld.p12" pin="1234"/>
</key>
<key name="attestationKey_current">
<type name="pkcs12" locationValue="classpath:attKeyCurrent.p12" pin="1234"/>
</key>
</keys>
</engineSignEncrypt>