Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Next »

For secure communication between the CoreOne Web Services and the end devices, an SSL certificate is required that corresponds to the CoreOne Web Services. In other words, the subject alternative name of the certificte must match the URL of the Web. If the CoreOne Web Services and the CoreOne Applications Services are installed on the same system, the same certificate can be used.

For each connection between the CoreOne Application Services and the CoreOne System Connectors / CoreOne Secure Router, a seperate certificate is required per server, which supports “Server Authentication” and “ Client Authentication”. In addition, the corresponding public certificate must be available on the other side.

Als Beispiel:

URL

Service

Certificate

Subject Alternativ Name

https://demo.itsense.ch

CoreOne Suite Web

CoreOne Suite Web

demo.itsense.ch oder *itsense.ch

https://openid.itsense.ch

CoreOne Suite Auth

CoreOne Suite Auth

openid.itsense.ch oder *itsense.ch

https://api.itsense.ch

CoreOne Suite API

CoreOne Suite API

api.itsense.ch oder *itsense.ch

https://portal.itsense.ch

CoreOne Suite Self Service Portal

CoreOne Suite Self Service Portal

portal.itsense.ch oder *itsense.ch

COS WEB < - > COS APP

Internes Zerifikat

IAM.Genreal

  1. COS WEB < - >Endgerät (SSL certificate for UI)

  2. COS Token Signing (For signing the Tokens)

  3. COS AUTH < - > Endgerät (SSL certificate for OpenID)

  4. COS WEB < - > COS APP (Internal communication)

  5. COS APP < - > COS RT (Internal communication)

  6. COS RT < - > COS SC / COS RT (Internal communication)

COS APP → COS RT → COS SC

Token Signing (Optional) 

A certificate with which the private key can be exported is required for Token signing.

  • No labels