Signing Services

The Signing Service and the optional Signable Material Retriever (SMR) are services that form part of Corda Enterprise Network Manager, alongside the Identity Operator and Network Map. They act as a bridge between the main CENM services and PKI/HSM infrastructure, enabling a network operator to verify and sign incoming requests and changes to the network.

As mentioned in the CENM service documentation (Identity Manager Service and Network Map Service), the main CENM services can be configured with an integrated local signer that will automatically sign all unsigned data using a provided key. While this is convenient, it is intended for use within for development and testing environments, and should not be used in production environments. Instead, large and important changes to the network should go through a series of checks before being approved and signed, ideally with a network operator manually verifying and signing new CSRs, CRLs and Network Parameter changes. The Signing Service provides this behaviour, with HSM integration enabling the signing of any particular data to require authentication from multiple users.

CENM’s Signing Service supports the following HSMs (see CENM support matrix for more information):

  • Utimaco
  • Gemalto Luna
  • Securosys PrimusX
  • Azure Key Vault
  • AWS CloudHSM

The verification and signing of data is done via the set of user configured signing tasks within the service, with each task being configured with:

  • Data type: CSR, CRL, Network Map or Network Parameters
  • Data source: the CENM service to retrieve unsigned data and persist signed data (e.g. a network’s Identity Manager)
  • Signing key: the key that should be used to sign the data (e.g. a particular key within a HSM using keycard authentication)

Once the service has been configured with this set of signing tasks, an execution of a given signing task will:

  • Retrieve unsigned data from the data source
  • Signing it using the provided key, requesting manual authentication if required.
  • Persist the signed data back to the data source.

Each signing task is configured independently from one another, meaning different keys can (and should) be used to sign different data types or data from different sources. The independence of each signing task also means that the Signing Service is not constrained to a given network. For a given signing task, as long as the Signing Service can reach the configured data source and access the configured signing key (or HSM) then the task can be executed. Therefore one Signing Service can be used to manage several networks/sub-zones.

Due to security concerns, the Signing Service should be hosted on private premises, not in a cloud environment. As mentioned above, the only communication requirements are outgoing connections to the CENM services as data sources or outgoing connection to SMR service configured as data source which then connects to CENM services (Identity Manager and Network Maps), and outgoing connections to the HSMs for the configured signing keys. The overall flow of communication can be seen in the below diagram:

Signing Service communication

Once the Signing Service has been configured, it can be run via the command:

java -jar signer-<VERSION>.jar --config-file <CONFIG_FILE>

Optional parameter:

--working-dir=<DIR>

This will set the working directory to the specified folder. The service will look for files in that folder. This means certificates, config files etc. should be under the working directory. If not specified it will default to the current working directory (the directory from which the service has been started).

On success you should see a message similar to:

2019-01-01T12:34:56,789 [main] INFO - Binding Shell SSHD server on port <SSH PORT>

The service can then be accessed via ssh, either locally on the machine or from another machine within the same secure, closed network that the service is being run on.

Once the configured service is up and running, a user can execute a signing task via the interactive shell via the run signer name: <SIGNING_TASK_ALIAS> command. This will execute the task, prompting the user for signing key authentication, if required, and verification of the changes.

A user can see what signing tasks are available by executing the view signers command within the shell. This will output all tasks that can be run along with their schedule, if applicable.

To verify that all configured CENM data sources or a single SMR service data source are reachable by the Signing Service, a health check can be performed by running the run clientHealthCheck. This will iteratively run through each service, sending a simple ping message and verifying a successful response. Any unsuccessful connection attempts will be displayed to the console. This method is especially useful after the initial setup to verify that the Signing and CENM services have been configured correctly.

The configuration for the Signing Service consists of the following sections:

The Signing Service is interacted with via the shell, which is configured at the top level of the config file. This shell is similar to the interactive shell available in other ENM services and is configured in a similar way. See Shell Configuration for more information on how to configure the shell.

If using the Signing Service with a HSM then, due to the proprietary nature of the HSM libraries, the appropriate Jars need to be provided separately and referenced within the configuration file. The libraries that are required will depend on the HSM that is being used.

An example configuration block for a Signing Service integrating with a Utimaco HSM is:

hsmLibraries = [
    {
        type = UTIMACO_HSM
        jars = ["/path/to/CryptoServerJCE.jar"]
    }
]

Some HSMs (e.g. Gemalto Luna, AWS CloudHSM) also require shared libraries to be provided. An example configuration block for this is:

hsmLibraries = [
    {
        type = GEMALTO_HSM
        jars = ["/path/to/LunaProvider.jar"]
        sharedLibDir = "/path/to/shared-libraries/dir/"
    }
]

See the Example Signing Service Configuration section below for examples of these config blocks being used in a complete file.

To keep inline with the other HSMs, the Azure Key Vault client jar needs to provided as above. Unlike the other HSMs, there are many dependent libraries. The top-level dependencies are azure-keyvault and adal4j, however these both have transitive dependencies that need to be included. That is, either all jars need to be provided separately (via a comma-separated list) or an uber jar needs to be provided.

The gradle script below will build an uber jar. First copy the following text in to a new file called build.gradle anywhere on your file system. Please do not change any of your existing build.gradle files.

plugins {
  id 'com.github.johnrengelman.shadow' version '4.0.4'
  id 'java'
}

repositories {
    jcenter()
}

dependencies {
    compile 'com.microsoft.azure:azure-keyvault:1.2.1'
    compile 'com.microsoft.azure:adal4j:1.6.4'
}

shadowJar {
    archiveName = 'azure-keyvault-with-deps.jar'
}

Then if gradle is on the path run the following command.

gradle shadowJar

or if gradle is not on the path but gradlew is in the current directory then run the following command.

./gradlew shadowJar

This will create a jar called azure-keyvault-with-deps.jar which can be referenced in the config.

Signing keys that use a HSM require a certificate store to be defined also, containing all certificates to build the entire certificate chain from the signing key back to the root. If a global certificate store is used containing all required certificates for different signing keys then repetition in the configuration can occur - hence a top level global certificate store can be configured that will be used by any signing key that does not have its own certificate store configured. Please note that the globalCertificateStore property will not be used in case of an AWS HSM.

...
globalCertificateStore = {
    file = "path/to/certificate/store.jks"
    password = "example-password"
}
...

The signing keys that are used across all signing task need to be configured. As, potentially, one signing key could be reused across several signing tasks these are configured in the form of a map of human-readable aliases (referenced by the signing task configuration) to signing keys.

A signing key can reside in either a local java key store or a HSM. For HSM signing keys, authentication must be performed against the HSM before the keys can be accessed. The credentials for this can optionally be included in the configuration, allowing for any signing tasks using that key to be executed automatically on a schedule. Due to the decreased security with this approach, it is not recommended to include all authentication credentials within a production environment configuration.

More detailed descriptions of how to configure a signing key can be found in the

section below.

For each signing task, the data source for getting the unsigned data and persisting the signed data needs to be defined. Similarly to the signing keys above, one data source could potentially be used across multiple signing tasks, hence they are configured as a map of human-readable aliases (referenced by the signing task configuration) to ENM service locations.

For all CA related signing tasks (CSRs and CRLs), global data source for getting the unsigned data and persisting the signed data needs to be defined. This is ENM location of CA related part of Signable Material Retriever Service.

For all non CA related signing tasks (Network Maps and Network Parameters), global data source for getting the unsigned data and persisting the signed data needs to be defined. This is ENM location of non CA related part of Signable Material Retriever Service.

This configuration section defines each signing task that can be run via the service. Each task is defined by adding an entry to the signers configuration map, keyed by the human-readable alias for the task (used when interacting with the service via shell). The value for the entry consists of the configuration options specific to that task such as the signing key and data source that is uses (using the previously defined aliases in the signingKeys and serviceLocations configuration parameters, or in materialManagementTasks when SMR Service is used), data type specific options such as the CSR validity period as well as schedule if applicable.

Each signing task maps to exactly one of four possibly data types:

  • CSR data - signing approved but unsigned Certificate Signing Requests
  • CRL data - building and signing new Certificate Revocation Lists using newly approved Certificate Revocation Requests
  • Network Map - building and signing a new Network Map
  • Network Parameters - signing new Network Parameters and Network Parameter Updates

A signing task can be configured to automatically run on a set schedule, providing no manual user input is required. That is, the signing key that is configured for the task requires no user input to authenticate (e.g. keyfile or username/password provided in configuration file). This behaviour can be useful for testing and toy environments, as well as automating the signing of lower risk changes such as Network Map changes.

An appropriate signing task can be scheduled via the schedule config block within the signing task configuration:

...
"Example Signing Task" = {
    ...
    schedule {
        interval = 1hour
    }
}
...

The interval parameter can either take a number, interpreted as the number of milliseconds between each execution, or a string consisting of a number followed by the units suffix as above. The possible unit suffixes are:

  • ns, nano, nanos, nanosecond, nanoseconds
  • us, micro, micros, microsecond, microseconds
  • ms, milli, millis, millisecond, milliseconds
  • s, second, seconds
  • m, minute, minutes
  • h, hour, hours
  • d, day, days

Listed below are the steps involved in signing an example Network Parameter update. The steps involved in signing other data types are very similar.

  • A network operator issues a Network Parameter update via the appropriate Network Map Service. At this point, as the update is unsigned, it will not be broadcast to the network.

The parameter update is ready to be signed.

  • A privileged user accesses the Signing Service via ssh and runs the pre-configured Network Parameter signing task for the given Network Map Service.
  • A connection to the Network Map or Signable Material Retriever service is established and the unsigned Network Parameter update is fetched and displayed to the user.
  • The user confirms that the changes are correct and should be signed.
  • A connection to the appropriate HSM is created, and the user is prompted for their authentication credentials. The exact format of this authentication will depend on the configured signing key that the signing task uses.
  • Once the user has been successfully authenticated and their privileges are strong enough, then the signing process commences using the configured signing key. If their privileges are not sufficient then the signing task will prompt for another user to be authenticated, repeating this process until the configured HSM authentication threshold has been exceeded.
  • The Network Parameter update is signed then persisted back to the appropriate Network Map Service or Signable Material Retriever service. When the Network Map is next updated and signed, the newly signed parameter update will be included and therefore broadcast to the network participants.

The steps involved in signing other data types are very similar to above, mainly differing in the unsigned information that is retrieved from the corresponding CENM service:

Network Map: The latest unsigned network map is fetched from the appropriate Network Map or Signable Material Retriever service. This will include all network participants (new and current) that have a valid, non-revoked certificate signed by the network’s Identity Manager, as well as the signed Network Parameters (active and pending update if applicable). If the Network Map has not changed since it was last signed then the signing process will finish.

Certificate Signing Request (CSR): All approved but unsigned CSRs are fetched from the appropriate Identity Manager or Signable Material Retriever and displayed to the user. They can then select all or a subset of these to sign.

Certificate Revocation List (CRL): All approved but unsigned Certificate Revocation Requests (CRRs) are fetched from the appropriate Identity Manager or Signable Material Retriever and displayed to the user. They can then select all or a subset of these to sign, which are then included in the latest signed CRL.

The configuration file for the Signing Service should include the following parameters (optional arguments are marked as such where appropriate):

  • shell: The configuration for the services integrated shell.

  • hsmLibraries: List of configurations for any third party HSM libraries.

  • type: The HSM type for the library (UTIMACO_HSM, GEMALTO_HSM, SECUROSYS_HSM, AZURE_KEY_VAULT_HSM or AMAZON_CLOUD_HSM).

  • jars: List of paths for the HSM Jars.

  • sharedLibDir: Optional path to the shared library directory.

  • globalCertificateStore: (Optional) Certificate store that will be used for any signers that don’t have their own certificate store defined. Should contain all certificates to build the entire certificate chain from the signing key back to the root.

  • file: Certificate store file location.

  • password: Certificate store password.

  • signingKeys: Map of human-readable aliases (string) to signing key configurations. Should contain all signing keys that are used within the signing processes defined in the signers map. See the signing key map entry example below for the expected format.

  • serviceLocations: Map of human-readable aliases (string) to ENM service location configurations. Should contain all services that are used within the signing processes defined in the signers map. See the service location map entry example below for the expected format.

  • caSmrLocation: (Optional, use instead of CA related serviceLocations) CA part of Signable Material Retriever ENM service location configuration.

  • nonCaSmrLocation: (Optional, use instead of non CA related serviceLocations) Non CA part of Signable Material Retriever ENM service location configuration.

  • signers: Map of human-readable aliases (string) to signing task configuration. Defines the tasks that can be run by a user via the interactive shell. Each signing task should refer to exactly one signing key and one service location using the alias defined in the above maps. See the signers map entry example below for the expected format.

Signing Key Map Entry Example heading-link-icon

Each entry in the signingKeys map should be keyed on the user-defined, human-readable alias. This can be any string and is used only within the config to map the signing keys to each signing task that use it.

A signing key can come from two sources - a local Java key store or a HSM.

  • alias: Alias of the signing key within the key store

  • type: The signing key type - LOCAL in this case

  • keyStore: File path of the local key store

  • password: Password to access the key store

If the signing key is within a Utimaco HSM then the HSM connection details needs to be included in the configuration as well as a list of authentication credentials. The setup of the HSM determines the authentication thresholds are required to access the keys so this should be checked with the appropriate security engineer. Note that the credentials that can be omitted from the configuration and input at runtime are given below.

  • alias: Alias of the signing key within the HSM

  • type: The signing key type - UTIMACO_HSM in this case

  • keyStore: Configuration of the HSM key store.

  • host: Host name (or IP address) of the HSM device.

  • port: Port number of the HSM device.

  • users: List of user authentication configurations. Each entry in the list should have the following format:

  • username: HSM username. This can be omitted from the configuration and input at runtime.

  • mode: One of the 3 possible authentication modes: PASSWORD - User’s password as set-up in the HSM. CARD_READER - Smart card reader authentication. KEY_FILE - Key file based authentication.

  • password: Only relevant if mode is PASSWORD or KEY_FILE. Specifies either the password credential for the associated user or the password to the key file, depending on the selected mode. This can be omitted from the configuration and input at runtime.

  • keyFilePath: Only relevant if mode is KEY_FILE. Key file path.

  • device: Only relevant if mode is CARD_READER. Specifies the connection string to the card reader device. Default value: “:cs2:auto:USB0”.

  • group: Key group (string) of the signing key. This is the Utimaco HSM name spacing concept. See Utimaco docs for more details.

  • specifier: Key specifier (string) of the signing key. This is the legacy Utimaco HSM name spacing concept. See Utimaco docs for more details.

  • authThreshold: Authentication threshold required to access the signing key within the HSM. This value corresponds to the summation of permission values of all logged-in users. Setting this provides a way to ensure use of the signing key (and therefore execution of the signing task) can only be achieved once X out of Y privileged HSM users authenticated. Defaults to 1.

  • certificateStore: (Optional if using globalCertificateStore) Certificate store containing all certificates required to build the entire certificate chain from the signing key back to the root. This is required as the signing keys within the HSM do not contain their full certificate chains.

  • file: Certificate store file location.

  • password: Certificate store password.

If the signing key is within a Gemalto HSM then the configuration is simpler than the Utimaco example. This is due to a lot of the connection logic being within the Java provider library which has to be installed and setup prior to running the Signing Service (see Gemalto documentation for this). A partition should have been previously set up within the HSM along with a crypto officer role.

  • alias: Alias of the signing key within the HSM

  • type: The signing key type - GEMALTO_HSM in this case

  • credentials: Connection credentials for the HSM.

  • keyStore: Slot or partition of the HSM. E.g. “tokenlabel:<EXAMPLE_PARTITION_NAME>”

  • password: Password for the keyStore. E.g. the corresponding crypto officer role’s password. This can be omitted from the configuration and input at runtime.

  • certificateStore: (Optional if using globalCertificateStore) Certificate store containing all certificates required to build the entire certificate chain from the signing key back to the root. This is required as the signing keys within the HSM do not contain their full certificate chains.

  • file: Certificate store file location.

  • password: Certificate store password.

First of all AWS CloudHSM requires a UNIX client running on the machine. It will use that to connect to the HSM. For detailed documentation about setting up the client please visit Amazon’s Getting Started with AWS CloudHSM. After the client is installed the shared library should be under the folder /opt/cloudhsm/lib so this should be used when configuring the hsmLibraries property in the config. The jar can be found under /opt/cloudhsm/java/cloudhsm-<version>.jar by default.

  • alias: Alias of the signing key within the HSM

  • type: The signing key type - AMAZON_CLOUD_HSM in this case

  • credentialsAmazon: The credentials for logging in to the HSM.

  • partition: Partition for the HSM. This can be found in the AWS console.

  • userName: An existing CU type user in the HSM.

  • password: Password for the given CU account.

  • localCertificateStore: must be used.

  • file: The location of the local certificate store. This will be created if it does not exist. The local certificate store should contain the entire certificate chain from the signing key back to the root, because currently globalCertificateStore property is not in effect for AWS HSM.

  • password: The password for the local certificate store

Service Location Map Entry Example heading-link-icon

Each entry in the serviceLocations map should be keyed on the user-defined, human-readable alias. This can be any string and is used only within the config to map the service locations to each signing task that use it.

  • enmService: The connection details for the CENM service that acts as the data source

  • host: Host name (or IP address) that the CENM service is running on

  • port: Port that the CENM service is listening on (for inter-ENM communication)

  • verbose: Boolean representing whether debug information for the IPC between the Signer and the remote service should be displayed.

  • ssl: (Optional) SSL Information for connection with the CENM service.

  • keyStore: Key store configuration for the Signing Service SSL key pair.

  • location: Location on the file system of the keystore containing the SSL public / private keypair of the Signing Service.

  • password: password for the keyStore

  • keyPassword: (Optional) Password for the keypair, can be omitted if the same as the keystore.

  • trustStore: Trust store configuration for the SSL PKI root of trust.

  • location: Location on the file system of the keystore containing the SSL PKI root of trust.

  • password: password for the trust root keystore.

When Signing Service connects to CA part of SMR Service instead of directly to CA related CENM Service Locations, then caSmrLocation replaces CA related inputs of serviceLocations.

When Signing Service connects to non CA part of SMR Service instead of directly to non CA related CENM Service Locations, then nonCaSmrLocation replaces non CA related inputs of serviceLocations.

  • caSmrLocation: The connection details for the CA part of SMR service that acts as the data source

  • host: Host name (or IP address) that the CA part of SMR service is running on

  • port: Port that the CA part of SMR service is listening on (for inter-ENM communication)

  • verbose: Boolean representing whether debug information for the IPC between the Signer and the remote service should be displayed.

  • ssl: (Optional) SSL Information for connection with the CA part of SMR service.

  • keyStore: Key store configuration for the Signing Service SSL key pair.

  • location: Location on the file system of the keystore containing the SSL public / private keypair of the Signing Service.

  • password: password for the keyStore

  • keyPassword: (Optional) Password for the keypair, can be omitted if the same as the keystore.

  • trustStore: Trust store configuration for the SSL PKI root of trust.

  • location: Location on the file system of the keystore containing the SSL PKI root of trust.

  • password: password for the trust root keystore.

  • nonCaSmrLocation: Same as per caSmrLocation, just for the non CA part of the SMR service

Signers Map Entry Example heading-link-icon

Each entry in the signers map should be keyed on the user-defined, human-readable alias. This can be any string and is used by the user when viewing and invoking the signing task from within the interactive shell.

Each signing task should use exactly one signing key and service location, and be configured for exactly one data type.

  • type: The data type for the signing task. Should be one of CSR, CRL, NETWORK_MAP or NETWORK_PARAMETERS.

  • signingKeyAlias: The alias for the signing key used by the signing task. Should refer to one of the aliases in the signingKeys map defined above.

  • serviceLocationAlias: (Use when serviceLocations are specified) The alias for the service location used by the signing task. Should refer to one of the aliases in the serviceLocations map defined above.

  • crlDistributionPoint: Relevant only if type is CRL or CSR (optional for CSR). The endpoint that the CRL is hosted on.

  • updatePeriod: Relevant only if type is CRL. This represents the millisecond duration between CRL updates and is baked into the generated CRL via the nextUpdate X509 field. For users of this CRL, this defines two key pieces of information:

  • When the next CRL should be available, which is used by some libraries for cache invalidation.

  • When the current CRL has expired and is therefore obsolete.

To ensure that the transition from an old CRL to a new one, this value should always be set to a time period much larger than the original planned update period. For example, if the schedule parameter below has been set to generate a new CRL every 2 hours, then a updatePeriod value would be at least day or multiple days.

If the CRL signing task is being run manually then a sufficiently large enough value should be set here to allow for breakdowns or delays in the process. A value of 6 months (with signing being performed every 3 months) is suggested for manual signing scenarios.

  • validDays: Relevant only if type is CSR. The number of days that a certificate is valid for, counted from the time of signing. It is highly important that this is set to something sufficiently large enough (e.g 7300 which represents 20 years) as nodes with expired certificates will not be able to communicate across the network.

  • schedule: (Optional) The scheduled for automated execution of the signing task. Note that this can only be set on tasks that are linked to signing keys that require no manual user authentication. That is, either a local key store or HSM signing key using PASSWORD or KEY_FILE authentication with the password preconfigured.

  • interval: The duration interval between signing executions. Either a number representing the millisecond duration or a string duration with unit suffix. See above scheduling signing tasks section on accepted format.

Below are two example configuration files, one using signing keys from local key stores and the other using signing keys from a HSM. If desired, any combination of local/HSM signing keys can be included within the configuration file.

shell = {
  sshdPort = 20003
  user = "testuser"
  password = "example-password"
}

#############################################
# All individual keys used in signing tasks #
#############################################
signingKeys = {
    "IdentityManagerLocal" = {
        alias = "example-key-alias-2"
        type = LOCAL
        password = "example-key-password-2"
        keyStore {
            file = "exampleKeyStore.jks"
            password = "example-password"
        }
    },
    "NetworkMapLocal" = {
        alias = "example-key-alias"
        type = LOCAL
        password = "example-key-password"
        keyStore {
            file = "exampleKeyStore.jks"
            password = "example-password"
        }
    }
}

##########################################################
# All ENM service endpoints for fetching/persisting data #
##########################################################
serviceLocations = {
    "identity-manager" = {
        host = localhost
        port = 5050
        verbose = true
    },
    "network-map" = {
        host = localhost
        port = 5053
        verbose = true
    },
    "revocation" = {
        host = localhost
        port = 5051
        verbose = true
    }
}

###################################################
# Signing tasks to be run (manually or scheduled) #
###################################################
signers = {
    "Example CSR Signer" = {
        type = CSR
        signingKeyAlias = "IdentityManagerLocal"
        serviceLocationAlias = "identity-manager"
        crlDistributionPoint = "http://localhost:10000/certificate-revocation-list/doorman"
        validDays = 7300 # 20 year certificate expiry
        schedule {
            interval = 1minute
        }
    },
    "Example CRL Signer" = {
        type = CRL
        signingKeyAlias = "IdentityManagerLocal"
        serviceLocationAlias = "revocation"
        crlDistributionPoint = "http://localhost:10000/certificate-revocation-list/doorman"
        updatePeriod = 86400000 # 1 day CRL expiry
        schedule {
            interval = 60minute
        }
    },
    "Example Network Map Signer" = {
        type = NETWORK_MAP
        signingKeyAlias = "NetworkMapLocal"
        serviceLocationAlias = "network-map"
        schedule {
            interval = 1minute
        }
    },
    "Example Network Parameters Signer" = {
        type = NETWORK_PARAMETERS
        signingKeyAlias = "NetworkMapLocal"
        serviceLocationAlias = "network-map"
        schedule {
            interval = 10minute
        }
    }
}
shell = {
  sshdPort = 20003
  user = "testuser"
  password = "example-password"
}

#############################
# Proprietary HSM libraries #
#############################
hsmLibraries = [
  {
    type = UTIMACO_HSM
    jars = ["/path/to/CryptoServerJCE.jar"]
  },
  {
    type = GEMALTO_HSM
    jars = ["/path/to/LunaProvider.jar"]
    sharedLibDir = "/path/to/shared-libraries/dir/"
  },
  {
    type = SECUROSYS_HSM
    jars = ["/path/to/primusX.jar"]
  },
  {
    type = AZURE_KEY_VAULT_HSM
    jars = ["/path/to/akvLibraries.jar"]
  },
  {
      type = AMAZON_CLOUD_HSM
      jars = ["/opt/cloudhsm/java/cloudhsm-3.0.0.jar"]
      sharedLibDir = "/opt/cloudhsm/lib"
  }
]

####################################################
# Optional default certificate store for any HSM   #
# signing keys without a certificate store defined #
####################################################
globalCertificateStore = {
  file = "exampleGlobalCertificateStore.jks"
  password = "example-password"
}

#############################################
# All individual keys used in signing tasks #
#############################################
signingKeys = {
    "CSRUtimacoHsmSigningKey" = {
        alias = "example-csr-key-alias"
        type = UTIMACO_HSM
        group = "example-hsm-group"
        specifier = 1
        keyStore {
            host = "192.168.0.1"
            port = "3001"
            users = [{
                mode = CARD_READER
            }]
        }
    },
    "CRLUtimacoHsmSigningKey" = {
        alias = "example-crl-key-alias"
        type = UTIMACO_HSM
        group = "example-hsm-group"
        specifier = 1
        keyStore {
            # Example using a different HSM to above key
            host = "192.168.0.2"
            port = "3002"
            # username and password omitted, user will be prompted during task execution
            users = [{
                mode = PASSWORD
            }]
        },
        # Using a unique, non-global certificateStore
        certificateStore = {
            file = "exampleCertificateStore.jks"
            password = "example-password"
        }
    },
    "NetworkMapUtimacoHsmSigningKey" = {
        alias = "example-map-key-alias"
        type = UTIMACO_HSM
        group = "example-hsm-group"
        specifier = 1
        keyStore {
            host = "192.168.0.1"
            port = "3001"
            users = [{
                mode = KEY_FILE
                keyFilePath = example-key-file
                password = "test-password"
            }]
        }
    },
    "NetworkParametersUtimacoHsmSigningKey" = {
        alias = "example-parameter-key-alias"
        type = UTIMACO_HSM
        group = "example-hsm-group"
        specifier = 1
        keyStore {
            host = "192.168.0.1"
            port = "3001"
            users = [{
                mode = CARD_READER
            }]
        }
    },
    "ExampleGemaltoHsmSigningKey" = {
        alias = "example-parameter-key-alias"
        type = GEMALTO_HSM
        credentials {
            keyStore = "tokenlabel:example-partition-name"
            password = "example-crypto-office-password" # this can be omitted and input at runtime
        }
    },
    "ExampleSecurosysHsmSigningKey" = {
        alias = "example-parameter-key-alias"
        type = SECUROSYS_HSM
        keyStore {
            host = "127.0.0.1"
            port = 1234
        }
        credentials = [{
            username = "example-username" # this can be omitted and input at runtime
            password = "example-password" # this can be omitted and input at runtime
        }]
    },
    "ExampleAzureKeyVaultHsmSigningKey" = {
        alias = "example-parameter-key-alias"
        type = AZURE_KEY_VAULT_HSM
        keyStore {
            keyVaultUrl = "http://example.com"
            protection = SOFTWARE
        }
        credentials {
            keyStorePath = "path/to/keystore"
            keyStorePassword = "example-password"
            keyStoreAlias = "example-alias"
            clientId = "12345-abcde-54321"
        }
    },
    "ExampleAwsCloudHsmSigningKey" = {
        alias = "example-parameter-key-alias"
        type = AMAZON_CLOUD_HSM
        credentialsAmazon {
            partition = "example-partition"
            userName = "example-user"
            password = "example-password"
        }
        localCertificateStore = {
            file = "exampleCertificateStore.jks"
            password = "password"
        }
    }
}

##########################################################
# All ENM service endpoints for fetching/persisting data #
##########################################################
caSmrLocation = {
    host = localhost
    port = 5010
    verbose = true
    # note that this SSL configuration could use different keys to the other locations if desired
    ssl {
        keyStore {
            location = exampleSslKeyStore.jks
            password = "password"
        }
        trustStore {
            location = exampleSslTrustStore.jks
            password = "trustpass"
        }
    }
}

nonCaSmrLocation = {
    host = localhost
    port = 5011
    verbose = true
    # note that this SSL configuration could use different keys to the other locations if desired
    ssl {
        keyStore {
            location = exampleSslKeyStore.jks
            password = "password"
        }
        trustStore {
            location = exampleSslTrustStore.jks
            password = "trustpass"
        }
    }
}

###################################################
# Signing tasks to be run (manually or scheduled) #
###################################################
signers = {
    "Example CSR Signer" = {
        type = CSR
        signingKeyAlias = "CSRUtimacoHsmSigningKey"
        crlDistributionPoint = "http://localhost:10000/certificate-revocation-list/doorman"
        validDays = 7300 # 20 year certificate expiry
    },
    "Example CRL Signer" = {
        type = CRL
        signingKeyAlias = "CRLUtimacoHsmSigningKey"
        crlDistributionPoint = "http://localhost:10000/certificate-revocation-list/doorman"
        updatePeriod = 5184000000 # 60 day CRL expiry
    },
    "Example Network Map Signer" = {
        type = NETWORK_MAP
        signingKeyAlias = "NetworkMapUtimacoHsmSigningKey"
        schedule {
            interval = 1minute
        }
    },
    "Example Network Parameter Signer" = {
        type = NETWORK_PARAMETERS
        signingKeyAlias = "NetworkParametersUtimacoHsmSigningKey"
    }
}
shell = {
  sshdPort = 20003
  user = "testuser"
  password = "example-password"
}

#############################################
# All individual keys used in signing tasks #
#############################################
signingKeys = {
    "IdentityManagerLocal" = {
        alias = "example-key-alias-2"
        type = LOCAL
        password = "example-key-password-2"
        keyStore {
            file = "exampleKeyStore.jks"
            password = "example-password"
        }
    },
    "NetworkMapLocal" = {
        alias = "example-key-alias"
        type = LOCAL
        password = "example-key-password"
        keyStore {
            file = "exampleKeyStore.jks"
            password = "example-password"
        }
    }
}

##########################################################
# All ENM service endpoints for fetching/persisting data #
##########################################################
caSmrLocation = {
    host = localhost
    port = 5010
    verbose = true
    ssl = {
        keyStore = {
            location = "exampleKeyStore.jks"
            password = "example-password"
        }
        trustStore = {
            location = "exampleCertificateStore.jks"
            password = "example-password"
        }
    }
}

nonCaSmrLocation = {
    host = localhost
    port = 5011
    verbose = true
    ssl = {
        keyStore = {
            location = "exampleKeyStore.jks"
            password = "example-password"
        }
        trustStore = {
            location = "exampleCertificateStore.jks"
            password = "example-password"
        }
    }
}
###################################################
# Signing tasks to be run (manually or scheduled) #
###################################################
signers = {
    "Example CSR Signer" = {
        type = CSR
        signingKeyAlias = "IdentityManagerLocal"
        crlDistributionPoint = "http://localhost:10000/certificate-revocation-list/doorman"
        validDays = 7300 # 20 year certificate expiry
        schedule {
            interval = 1minute
        }
    },
    "Example CRL Signer" = {
        type = CRL
        signingKeyAlias = "IdentityManagerLocal"
        crlDistributionPoint = "http://localhost:10000/certificate-revocation-list/doorman"
        updatePeriod = 86400000 # 1 day CRL expiry
        schedule {
            interval = 60minute
        }
    },
    "Example Network Map Signer" = {
        type = NETWORK_MAP
        signingKeyAlias = "NetworkMapLocal"
        schedule {
            interval = 1minute
        }
    },
    "Example Network Parameters Signer" = {
        type = NETWORK_PARAMETERS
        signingKeyAlias = "NetworkMapLocal"
        schedule {
            interval = 10minute
        }
    }
}

The Signable Material Retriever service is an optional service which acts as a bridge between other CENM services and one or more Signing Services. It delegates signing to a plugin, which routes work either to the CENM Signing Service, or to a third party service. Third party integration plugins are not provided as part of CENM.

Once the Signable Material Retriever has been configured, it can be run via the command:

java -jar smr-<VERSION>.jar --config-file <CONFIG_FILE>

Optional parameter:

--working-dir=<DIR>

This will set the working directory to the specified folder. The service will look for files in that folder. This means certificates, config files etc. should be under the working directory. If not specified it will default to the current working directory (the directory from which the service has been started).

On success you should see a message similar to:

Plugin started
SMR Service started

The configuration of the SMR service consists of the following two components:

For each material management task, the data source for getting the unsigned data and persisting signed data must be defined. One data source could be potentially used across multiple material management tasks, hence they are configured as a map of human-readable aliases (referenced by the material management task configuration) to ENM service locations.

Configuration parameters are same as in Service Location Map Entry Example

Each material management task is configured as a map of human-readable aliases (exactly the same as in singing tasks configuration of Signing Service) to Material Management Task configuration.

Here are configuration parameters:

  • type: The data type for the signing task. Should be one of CSR, CRL, NETWORK_MAP or NETWORK_PARAMETERS.

  • location: The alias for the service location used by the material management task. Should refer to one of the aliases in the serviceLocations map defined above.

  • schedule: The schedule for automated execution of the material management task.

  • interval: The duration interval between signing executions. Either a number representing the millisecond duration or a string duration with unit suffix. See below scheduling signing tasks section on accepted format.

  • pluginJar: The absolute path to signing plugin JAR file

  • pluginClass: The class that will be loaded from plugin JAR file and will be its entry point from SMR

Here is example of complete SMR configuration:

serviceLocations = {
    "identity-manager" = {
        host = localhost
        port = 5051
        verbose = true
        ssl = {
            keyStore = {
                location = "./certificates/corda-ssl-signer-keys.jks"
                password = password
            }
            trustStore = {
                location = "./certificates/corda-ssl-trust-store.jks"
                password = trustpass
            }
        }
    },
    "network-map" = {
        host = localhost
        port = 5050
        verbose = true
        ssl = {
            keyStore = {
                location = "./certificates/corda-ssl-signer-keys.jks"
                password = password
            }
            trustStore = {
                location = "./certificates/corda-ssl-trust-store.jks"
                password = trustpass
            }
        }
    },
    "revocation" = {
        host = localhost
        port = 5052
        verbose = true
        ssl = {
            keyStore = {
                location = "./certificates/corda-ssl-signer-keys.jks"
                password = password
            }
            trustStore = {
                location = "./certificates/corda-ssl-trust-store.jks"
                password = trustpass
            }
        }
    }
}

materialManagementTasks = {
    # Assuming Signer Service configuration contains alias "CSR" in "signers" map.
    "CSR" = {
        type = CSR
        location = "identity-manager"
        schedule = {
            interval = 10s
        }
        pluginJar = "plugin/smr-default-plugin-ca-1.2.0.jar"
        pluginClass = "com.r3.enm.smrplugins.defaultplugin.ca.CASMRSigningPlugin"
    }
    # Assuming Signer Service configuration contains alias "CRL" in "signers" map.
    "CRL" = {
        type = CRL
        location = "revocation"
        schedule = {
            interval = 10s
        }
        pluginJar = "plugin/smr-default-plugin-ca-1.2.0.jar"
        pluginClass = "com.r3.enm.smrplugins.defaultplugin.ca.CASMRSigningPlugin"
    }
    # Assuming Signer Service configuration contains alias "NetMap" in "signers" map.
    "NetMap" = {
        type = NETWORK_MAP
        location = "network-map"
        schedule = {
            interval = 10s
        }
        pluginJar = "plugin/smr-default-plugin-nonca-1.2.0.jar"
        pluginClass = "com.r3.enm.smrplugins.defaultplugin.nonca.NonCASMRSigningPlugin"
    }
    # Assuming Signer Service configuration contains alias "Params" in "signers" map.
    "Params" = {
        type = NETWORK_PARAMETERS
        location = "network-map"
        schedule = {
            interval = 10s
        }
        pluginJar = "plugin/smr-default-plugin-nonca-1.2.0.jar"
        pluginClass = "com.r3.enm.smrplugins.defaultplugin.nonca.NonCASMRSigningPlugin"
    }
}

As mentioned before, we enable possibility of writing custom plugin to support external Signing infrastructures. A plugin class must implement CASigningPlugin or NonCASigningPlugin interface depending on type of signable material type it will handle.

Both interfaces extend common StartablePlugin interface containing a single method start(). The method is run by SMR service upon the service start-up and it’s intended to contain plugin’s initialization code (e.g. a database connection initialization).

public interface StartablePlugin {
    /**
     * Starts the handles plugin's initialization.
     */
    void start();
}

Each signable material submission plugin method must return it’s status:


/**
 * A plugin submission must return the signing status of signable material passed.
 * [SigningStatus.COMPLETED] means signing infrastructure has done the successful signing of the material
 * [SigningStatus.PENDING] means signing infrastructure hasn't done a signing of the material yet or it has failed doing so
 */
public enum SigningStatus {PENDING, COMPLETED}

This type of plugin handles Certificate Signing Requests (CSR) and Certificate Revocation List (CRL) signing. A plugin class must implement following methods with predefined input and output parameters:


/**
 * This is the interface which each CA SMR plugin must implement. This is basically the entry point of external Signing
 * Service communication. Each submission request method retrieves signable material and retrieves response containing
 * a signing status (PENDING, COMPLETED) and supporting data to be stored in CENM services.
 */
public interface CASigningPlugin extends StartablePlugin {

    /**
     * Handle retrieved Certificate Signing Requests (CSR) retrieved from SMR.
     *
     * @param csr the signing request to route.
     * @return a response describing the status of the request.
     */
    CSRResponse submitCSR(CertificateSigningRequest csr);

    /**
     * Handle retrieved CRL and CRRs retrieved from SMR.
     *
     * @param crl     the signing request to route.
     * @param newCRRs the set of new revocation requests in this batch.
     * @return a response describing the status of the request.
     */
    CRLResponse submitCRL(@Nullable X509CRL crl, Set<CertificateRevocationRequest> newCRRs);
}

CSR submission method output:

/**
 * Signable Material Retriever (SMR) service response containing the status of a certificate signing requests (CSR).
 */
public final class CSRResponse {

    /**
     * Returns material's signing status.
     */
    @Nonnull
    public final SigningStatus getStatus();

    /**
     * Returns signed certificate signing request (CSR).
     */
    @Nullable
    public final CSRSigningData getCsrSigningData();

    /**
     * Constructs a response with CRL request status. with the specified data.
     *
     * @param status         Signing status, should be non null otherwise a {@link IllegalArgumentException} is thrown.
     * @param csrSigningData Signed Certificate Request.
     */
    public CSRResponse(@Nonnull SigningStatus status, @Nullable CSRSigningData csrSigningData);
}

/**
 * Signed certificate signing request (CSR).
 */
public final class CSRSigningData {

    /**
     * Returns a certificate path generated for associated signed certificate.
     */
    @Nonnull
    public final CertPath getCertPath();

    /**
     * Returns signers' names of entities performing actual signing.
     */
    @Nonnull
    public final String getSigners();

    /**
     * Constructs a signed CSR with the specified data.
     * Both parameters should be not null otherwise {@link IllegalArgumentException} is thrown.
     *
     * @param certPath Certificate path generated for associated signed certificate
     * @param signers  Names of entities performing actual signing.
     */
    public CSRSigningData(@Nonnull CertPath certPath, @Nonnull String signers);
}

CRL submission method output:

/**
 * Signable Material Retriever (SMR) service response containing the status
 * of a certificate revocation list (CRL) request.
 */
public final class CRLResponse {

    /**
     * Returns material's signing status.
     */
    @Nonnull
    public final SigningStatus getStatus();

    /**
     * Returns signed certificate revocation list (CRL).
     */
    @Nullable
    public final CRLSigningData getCrlSigningData();

    /**
     * Constructs a response with the specified status and signed CRL.
     *
     * @param status         Signing status, should be non null otherwise a {@link IllegalArgumentException} is thrown.
     * @param crlSigningData Signed Certificate Revocation List (CRL).
     */
    public CRLResponse(@Nonnull SigningStatus status, @Nullable CRLSigningData crlSigningData);
}

/**
 * Signed certificate revocation list (CRL).
 */
public final class CRLSigningData {

    /**
     * Returns a newly created signed Certificate Revocation List (CRL).
     */
    @Nonnull
    public final X509CRL getCrl();

    /**
     * Returns names of entities performing actual signing.
     */
    @Nonnull
    public final String getSigners();

    /**
     * Returns a specific time at which signing was executed.
     */
    @Nonnull
    public final Instant getRevocationTime();

    /**
     * Return set of the revocation requests.
     */
    @Nonnull
    public final Set<CertificateRevocationRequest> getRevokedRequests()

    /**
     * Constructs a signed CRL with the specified data.
     * All parameters should be not null otherwise {@link IllegalArgumentException} is thrown.
     *
     * @param crl             Newly created signed Certificate Revocation List (CRL)
     * @param signers         Names of entities performing actual signing
     * @param revocationTime  Specific time at which signing was executed
     * @param revokedRequests Set of all the revocation requests inside the list
     */
    public CRLSigningData(
        @Nonnull X509CRL crl,
        @Nonnull String signers,
        @Nonnull Instant revocationTime,
        @Nonnull Set<CertificateRevocationRequest> revokedRequests
    );
}

This type of plugin handles Network Map and Network Parameters signing. A plugin class must implement following methods with predefined input and output parameters:


/**
 * This is the interface which each non-CA SMR plugin must implement. This is basically the entry point of external Signing
 * Service communication. Each submission request method retrieves signable material and retrieves response containing a
 * singing status (PENDING, COMPLETED) and supporting data to be stored in CENM services.
 */
public interface NonCASigningPlugin extends StartablePlugin {

    /**
     * Handle routing network map to a signing backend.
     *
     * @param signerName name of the back-end signer to route this request to. Must be the signer for
     *                   the subzone the network map is associated with.
     * @return a response describing the status of the request.
     */
    NetworkMapResponse submitNetworkMap(NetworkMap networkMap, String signerName);

    /**
     * Handle routing network parameters to a signing backend.
     *
     * @param signerName name of the back-end signer to route this request to. Must be the signer for
     *                   the subzone the network parameters are associated with.
     * @return a response describing the status of the request.
     */
    NetworkParametersResponse submitNetworkParameters(UnsignedNetworkParametersData networkParametersData,
                                                      String signerName);
}

Network Map submission method output:

/**
 * Signable Material Retriever (SMR) service response containing the status of a Network Map signing request.
 */
public final class NetworkMapResponse {

    /**
     * Returns material's signing status.
     */
    @Nonnull
    public final SigningStatus getStatus();

    /**
     * Returns signed Network Map
     */
    @Nullable
    public final NMSigningData getNmSigningData();

    /**
     * Constructs a response object.
     *
     * @param status        Signing status, should be non null otherwise a {@link IllegalArgumentException} is thrown.
     * @param nmSigningData
     */
    public NetworkMapResponse(@Nonnull SigningStatus status, @Nullable NMSigningData nmSigningData);
}

Network Parameters submission method output:

/**
 * Signable Material Retriever (SMR) service response containing the status of a Network Parameters signing request.
 */
public final class NetworkParametersResponse {

    /**
     * Returns material's signing status.
     */
    @Nonnull
    public final SigningStatus getStatus();

    /**
     * Returns signed Network Parameters
     */
    @Nullable
    public final NMSigningData getNmSigningData();

    /**
     * Constructs a response object.
     * All parameters should be not null otherwise {@link IllegalArgumentException} is thrown.
     *
     * @param status        Signing status, should be non null otherwise a {@link IllegalArgumentException} is thrown.
     * @param nmSigningData
     */
    public NetworkParametersResponse(@Nonnull SigningStatus status, @Nullable NMSigningData nmSigningData);
}

Both responses use same signature data:

/**
 * Signed Network Map or Network Parameters
 */
public final class NMSigningData {

    /**
     * Returns signed material's certificate
     */
    @Nonnull
    public final X509Certificate getSignerCertificate();

    /**
     * Returns list of all the parent certificates of the material
     */
    @Nonnull
    public final List<X509Certificate> getParentCertsChain();

    /**
     * Returns raw signature
     */
    @Nonnull
    public final byte[] getSignature();

    /**
     * Constructs an object.
     * All parameters should be not null otherwise {@link IllegalArgumentException} is thrown.
     *
     * @param signerCertificate Signed material's certificate
     * @param parentCertsChain  List of all the parent certificates of the material
     * @param signature         Raw signature
     */
    public NMSigningData(
        @Nonnull X509Certificate signerCertificate,
        @Nonnull List<X509Certificate> parentCertsChain,
        @Nonnull byte[] signature
    );
}

SMR ships with plugins for the CENM provided Signing Service. The only requirement is to provide the plugins’ JAR paths, classes to instantiate and configurations.

The CA plugin class name to configure is always com.r3.enm.smrplugins.defaultplugin.ca.CASMRSigningPlugin.

This default plugin also has its own simple configuration which defines the port the SMR will bind to for the Signing Service to connect to.

Here is example CA default plugin’s configuration:

enmListener = {
    port = 5010
}

The non CA plugin class name to configure is always com.r3.enm.smrplugins.defaultplugin.nonca.NonCASMRSigningPlugin.

This default plugin also has its own simple configuration which defines the port the SMR will bind to for the Signing Service to connect to.

Here is example non CA default plugin’s configuration:

enmListener = {
    port = 5011
}

See EJBCA Sample Plugin for sample open source CA implementation.

Was this page helpful?

Thanks for your feedback!

Chat with us

Chat with us on our #docs channel on slack. You can also join a lot of other slack channels there and have access to 1-on-1 communication with members of the R3 team and the online community.

Propose documentation improvements directly

Help us to improve the docs by contributing directly. It's simple - just fork this repository and raise a PR of your own - R3's Technical Writers will review it and apply the relevant suggestions.

We're sorry this page wasn't helpful. Let us know how we can make it better!

Chat with us

Chat with us on our #docs channel on slack. You can also join a lot of other slack channels there and have access to 1-on-1 communication with members of the R3 team and the online community.

Create an issue

Create a new GitHub issue in this repository - submit technical feedback, draw attention to a potential documentation bug, or share ideas for improvement and general feedback.

Propose documentation improvements directly

Help us to improve the docs by contributing directly. It's simple - just fork this repository and raise a PR of your own - R3's Technical Writers will review it and apply the relevant suggestions.