Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 7 Next »

Introduction

The CoreOne Suite consists of multiple distributed services. To communicate between the services and to the end-user and to sign various things like tokens, certificates are used. So whenever you are planning on distributing a new service or a new installation, you will need to have some certificates ready. This page gives you a

For each connection between the CoreOne Application Services and the CoreOne System Connectors / CoreOne Secure Router, a separate certificate is required per server, which supports “Server Authentication” and “Client Authentication”. In addition, the corresponding public certificate must be available on the other side.

An example

URL

Service

Certificate

Subject Alternativ Name

https://demo.itsense.ch

CoreOne Web Services

CoreOne Web Services

demo.itsense.ch oder *itsense.ch

https://openid.itsense.ch

CoreOne Authentication Services

CoreOne Authentication Services

openid.itsense.ch oder *itsense.ch

https://api.itsense.ch

CoreOne API

CoreOne API

api.itsense.ch oder *itsense.ch

https://portal.itsense.ch

CoreOne Self Service Portal

CoreOne Self Service Portal

portal.itsense.ch oder *itsense.ch

COS WEB < - > COS APP

internal certificate

IAM.Genreal

  1. COS WEB <-> End user device (SSL certificate for UI)

  2. COS Token Signing (For signing the Tokens)

  3. COS AUTH < - > End user device(SSL certificate for OpenID)

  4. COS WEB < - > COS APP (Internal communication)

  5. COS APP < - > COS RT (Internal communication)

  6. COS RT < - > COS SC / COS RT (Internal communication)

Token Signing (Optional) 

A certificate with which the private key can be exported is required for Token signing.

  • No labels