Show TOC Start of Content Area

Background documentation Security Services in the CIDX Adapter  Locate the document in its SAP Library structure

The CIDX adapter provides measures to enforce the following security aspects, authentication, authorization, confidentiality and message integrity.

The CIDX Adapter therefore provides the following services:

For Confidentiality

·        HTTPs Transport for messages

For Authentication and Authorization and Message Integrity

·        Signing Service

·        Signature Validation

For Accountability

·        Non-Repudiation Service

 

Confidentiality

Confidentiality is ensured by selecting the HTTPs protocol for the exchange of messages.

Authentication and Authorization

Authentication is the act of making sure that the sender of a Chem eStandard message is the same sender claiming to send the message. During authorization, you also make sure that the sender of the message is permitted or authorized to send the subject message to the receiving partner.

A sender authenticates its identity with respect to the receiver by digitally signing a message. The signature encompasses the service header and the payload. The receiver of the message validates the authenticity of the message by verifying the signature to be valid and the subject of the signer to match the expected identity of the sender. If the identity of the sender is authenticated, the existence check against a matching receiver agreement provides for authorization. A digital signature is created using the private key, which must be maintained in the J2EE Keystore.

 

For signature validation of inbound messages, the public key certificate of a partner needs to be maintained, depending on the trust model in use.

In the hierarchical trust model, the identity of the sender is authenticated by validating the signature and the issuer chain of the signer’s certificate and additional checking of the subject name of the issuer against the expected partner’s identity. The CIDX Adapter currently supports only certificates that are issued by the root certifying authority.

In the direct trust model, the identity of the sender is authenticated by verifying the signature to be valid and by additional comparison of the signer’s public key certificate against the locally maintained, expected public key certificate of the partner. Therefore the direct trust model requires offline exchange of public key certificates, which can be self-signed or issued by a Certification Authority.

Message Integrity is ensured by digital signatures that encompass a digest of the headers and payload of the message (action or signal message).

Accountability

Non-Repudiation of Receipt Acknowledgement for outbound business action messages provides measures that allow proving to a third party that a partner has acknowledged the receipt of a particular message. This means that the partner cannot deny having received that message. This option requires the business action messages and the business signal to be digitally signed. The CIDX Adapter stores the outbound action and the inbound signal in the message security archive along with the relevant agreement parameters and the certificates pertaining to the agreement.

Non-Repudiation of Origin and Content for inbound business action messages provides measures that allow proving to a third party that a partner has in fact sent a particular business action message. This means that the partner cannot deny having sent this message. The CIDX Adapter stores the inbound action in the message security archive along with the relevant agreement parameters and the certificates pertaining to the agreement.

 

 

End of Content Area