Security
Services in the RNIF Adapter
The RNIF adapter provides measures to enforce the following security aspects, authentication, authorization, confidentiality and message integrity.
The RNIF Adapter therefore provides the following services:
HTTPs (HTTP over Secure Socket Layer) Transport for messages
· Signing Service
· Signature Validation Service
Non-Repudiation Service
Confidentiality is ensured by selecting the HTTPs protocol for the exchange of messages.
Authentication is the act of making sure that the sender of a RosettaNet business message is the same sender claiming to send the message. During authorization, you also make sure that the sender of the message is permitted or authorized to send the subject message to the receiving partner.
A sender authenticates its identity with respect to the receiver by digitally signing a message. The signature encompasses the service header and the payload. The receiver of the message validates the authenticity of the message by verifying the signature to be valid and the subject of the signer to match the expected identity of the sender. If the identity of the sender is authenticated, the existence check against a matching receiver agreement provides for authorization. A digital signature is created using the private key, which must be maintained in the J2EE Keystore.
For signature validation of inbound messages, the public key certificate of a partner needs to be maintained, depending on the trust model in use.
In the hierarchical trust model, the identity of the sender is authenticated by validating the signature and the issuer chain of the signer’s certificate and additional checking of the subject name of the issuer against the expected partner’s identity. The RNIF Adapter currently supports only certificates that are issued by the root certifying authority.
In the direct trust model, the identity of the sender is authenticated by verifying the signature to be valid and by additional comparison of the signer’s public key certificate against the locally maintained, expected public key certificate of the partner. Therefore the direct trust model requires offline exchange of public key certificates, which can be self-signed or issued by a Certification Authority.
Message Integrity is ensured by digital signatures that encompass a digest of the headers and payload of the message (action or signal message).
Non-Repudiation for inbound business action messages provides measures that allow proving to a third party that a partner has in fact sent a particular business action message. This means that the partner cannot deny having sent this message. The RNIF Adapter stores the inbound action in the message security archive along with the relevant agreement parameters and the certificates pertaining to the agreement.