Operational information

​All coming customer affected changes for E-Ident.

Service maintenance with customer test DNS update

Time: 2022-05-05 09:00 - 15:00 CEST

Information

Update 6th May: Change has been rolled back and will be implemented on a later date, to be announced.
Nets will perform maintenance on the FTN/E-Ident, E-Signing and ID-Rights services in the customer test environment. The customer test platform will be upgraded through introduction of new servers. As a consequence of this upgrade the DNS will be updated to reflect new IP-addresses for our services when accessed from Internet. Details are described in the table below:

Service hostname
​Old IP address
​New IP address
​www.ident-preprod1.nets.eu
​91.102.27.93
​91.102.28.51
​www.sign-preprod1.nets.eu
​91.102.25.56
​91.102.28.52
order.sign-preprod1.nets.eu​91.102.25.55​​91.102.28.53
​order.id-rights-preprod1.nets.eu
​91.102.27.91
​91.102.28.54
Services in production will not be affected, only the customer test services.

Service maintenance on database servers

Time: 2022-06-05 00:00-02:00 CEST

Information

Nets will perform maintenance on the database servers used by the E-Ident service. During the service window there will be a short period of unavailability of about 5 to 10 minutes.

Required upgrade to use encrypted ID Token for FTN customers

Time: As soon as possible or the 15th September 2022 as the latest

Information

To be aligned with requirements to identity brokers from Traficom (Finnish Transport and Communications Agency), all FTN customers MUST use the OIDC protocol with encrypted ID Token in the communication with the FTN service. This means that several customers need to update their implementation with support for encrypted ID Tokens and a few customers need to change the implementation from SAML to OIDC. Below are links to documentation regarding both encrypted ID Tokens, and the OIDC protocol.

Documentation:

Customers are kindly requested to update their implementation now and in any case well before the deadline 15th September 2022. Please contact support to request update of your customer configuration and with other questions.

Frequently Asked Questions related to encrypted ID Token

Generate Public Key

Question 1: Is there any guide / example for us about how to generate and provide you with a public key?

Generation of an RSA public key should be done using your preferred encryption tool, and according to related documentation provided by said tool.

Here is an example on how you can generate a key-pair using the popular openssl command line tool:

openssl req -new -newkey rsa:2048 -keyout key.pem -pubkey -out pubreq.p10 -subj "/CN=MyKey"

The file key.pem will contain your password-protected private key that you must implement into your application. The file pubreq.p10 will contain both the public key and the CSR-request. The public key must be sent to us, and the CSR-request you can ignore.

Public Key Format

Question 2: In what format do you need encryption keys?

The public key must be provided for us in PEM format, as a JWK or as URL link to a JWKS on web.

Below is an example of a public key in PEM-format (base64-encoded ASN.1 binary):

-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA32frjzf3sUdKfHrwKWw5
6Kj1YXdQcQ+2BX4L5ZYFx1QztRcrQiz57yOtBBIsNCLmbLC0Gu+2dlKG4/FJVBcR
IOgXD+LQW2IUnV0AFR2N8EVlbilQvkKSA0FAAb+0D+v8Y6xcjlu5QJOLtOEY09cA
G3CseylRvNwnBJYwoainl7BEPAWjAAZ4FQV1PYrVFG7+YeyE33DH0FXG4VWOCvvC
b537PZwbisTkXfDslJZg+v+KTyPCQUt7ZUwKJ3b+WoxdEhKOaI3Dt/A/N3oQhZrX
+miH7MclhmOzNhayYCghyUks7CdPgy1fdRvhziFkwJ3chh3jhkJ4KEBnj0uVCrfS
XwIDAQAB
-----END PUBLIC KEY-----

Below is the same public key as above, but now formatted as a JWK (JSON Web Key):

{
  "kty": "RSA",
  "n": "32frjzf3sUdKfHrwKWw56Kj1YXdQcQ-2BX4L5ZYFx1QztRcrQiz57yOtBBIsNCLmbLC0Gu-2dlKG4_FJVBcRIOgXD-LQW2IUnV0AFR2N8EVlbilQvkKSA0FAAb-0D-v8Y6xcjlu5QJOLtOEY09cAG3CseylRvNwnBJYwoainl7BEPAWjAAZ4FQV1PYrVFG7-YeyE33DH0FXG4VWOCvvCb537PZwbisTkXfDslJZg-v-KTyPCQUt7ZUwKJ3b-WoxdEhKOaI3Dt_A_N3oQhZrX-miH7MclhmOzNhayYCghyUks7CdPgy1fdRvhziFkwJ3chh3jhkJ4KEBnj0uVCrfSXw",
  "e": "AQAB"
}

A public key may also be added to a JWKS (JSON Web Key Set) on a publicly available web site. In this case, you must send us the URL, and we will register and use the URL to retrieve the public key. The advantage of publishing the key on your own web, is the fact that you may later update the key on your side, without involving us.

Key for test and prod

Question 3Can we have a separate key for test and production?

Yes, we recommend that you create separate key-pairs for customer test and production.


Startup in test 

Question 4Could we enable encryption in test environment now?

Yes, you can start with customer test now, and later enable encryption in production.