|
Install |
Configure |
Get Started |
1. Documentation Contents
Here’s a summary of the contents you can find here about DomiSMP.
DomiSMP Contents
Describes how DomiSMP is implemented. |
|
Instructs on how deploy and configure DomiSMP on supported Databases and Webservers. |
|
Defines unequivocally the participant’s interface to the SMP component. |
|
List of properties available per configuration topic with their descriptions, possible and default values. |
|
2. About DomiSMP
DomiSMP is one eDelivery’s products. Besides DomiSMP we have Domibus and DomiSML.
eDelivery products helps public administrations exchange electronic data and documents with their counterparts, as well as businesses and citizens, in an interoperable, secure, reliable and trusted way.
By using this building block, every participant becomes a node in the network using standard transport protocols and security policies. eDelivery is based on a distributed model, allowing direct communication between participants without the need to set up bilateral channels.
Note
|
See also (European Comission’s) [Building Blocks] for a broader context of eDelivery. |
|
3. Architecture
|
Service metadata publishing (SMP) was introduced to eDelivery network by PEPPOL’s project, PEPPOL Transport Infrastructure Service Metadata Publishing. The purpose of the SMP is similar to an address book or business registry. eDelivery participants (message senders and receivers) use SMP to publish their transport/service capabilities and to discover partner’s transport/service capabilities as: delivery addresses, supported business processes and document types, etc.
The PEPPOL’s SMP specification was submitted as input to the (Business Document Exchange Technical Committee (OASIS BDXR TC) with the intent of defining a standardized and federated document transport infrastructure for business document exchange. It resulted into a new specification: OASIS Service Metadata Publishing Specification, OASIS SMP specification.
The eDelivery SMP profile, provides a set of implementation guidelines for the OASIS SMP specification.
-
It is designed to be used in eDelivery with the dynamic receiver (and sender) discovery functionality.
The eDelivery Service Metadata Publisher application (DomiSMP) is the sample implementation of the eDelivery SMP profile (thus OASIS SMP spec as well).
Purpose
This document is the Software Architecture Document of the DomiSMP application. It is intended to provide detailed information about the project:
-
An overview of the solution
-
A description of business and administration functions implemented in the DomiSMP
-
A description of the application architecture and its modules
-
An overview of code organization and code quality measurements
-
An overview of technical requirements
References
-
OASIS SMP Specification, version 1.0. This specification defines documents and REST binding of SMP public interface.
-
eDelivery SMP Profile, the eDelivery profile based on the OASIS SMP Specification.
-
eDelivery SMP Interface Description guide. Defines interface of eDelivery SMP – extends OASIS SMP specification.
-
eDelivery SML Administration guide (pdf), in the Documentation section of SML Software.Provides comprehensive details on eDelivery SML installation, configuration and maintenance.
-
eDelivery BDMSL (SML). Application offered by eDelivery in SaaS model. Facilitates write access to the DNS zone needed for dynamic discovery of Participants. Exposes SOAP interface that is consumed by SMP in order to (un)register participant DNS entries.
-
PEPPOL The Pan-European Public Procurement On-Line (PEPPOL) project was a pilot project funded jointly by the European Commission and the PEPPOL Consortium members. After successful completion of the project new organization OpenPEPPOL Association was established. The organization is now responsible for the governance and maintenance of the PEPPOL specifications.
-
OASIS Service Metadata Publishing (SMP) specification, version 2.0. This document describes the version 2.0 of the Oasis SMP standard.
-
OASIS ebCore Party Id Type TS, version 1.0. This document describes the OASIS ebCore Party Id Type.
Definitions
- Service Metadata Publisher (SMP)
-
REST service application providing set of CRUD operations for two web resources: ServiceGroup and ServiceMetadata.
SMP is eDelivery’s implementation of what’s defined in OASIS SMP Specification and in SMP’s Interface Document.
- Identifier
-
The identifier uniquely identifies DomiSMP entities such as resources and subresources. An identifier consists of a schema (namespace) and a value. An identifier has rules about how it is represented in the URL (concatenated format) and how it is written in the resource document.
See Identifiers, in the Functional View chapter. - ParticipantIdentifier
-
The ParticipantIdentifier is an entity that uniquely identifies receiver or sender (participants) in eDelivery process. Examples of identifiers are company registration and VAT numbers, DUNS numbers, GLN numbers, email addresses etc.
- Resource
-
The DomiSMP URL resource is associated with a specific Participant Identifier. The resource can be Service Group (see below) or any other document type supported by the DomiSMP extensions.
- ServiceGroup
-
The ServiceGroup contains list of services associated with a specific Participant Identifier that is handled by a Service Metadata Publisher.
ServiceGroup XML representation is defined by XML Schema attached to OASIS SMP Specification. - Subresource
-
The DomiSMP URL (sub)resource is the sub-document of the resource. The resource can be ServiceMetadata (see below or any other document type supported by the DomiSMP extensions).
- ServiceMetadata
-
The ServiceMetadata contains all necessary metadata (endpoint URLs, certificate for encryption, document types, etc.) about a specific service that a participant (service requester) needs to know in order to send a message to that service. ServiceMetadata XML representation is defined by an XML Schema included into OASIS SMP Specification.
- SignedServiceMetadata
-
ServiceMetadata signed by Service Metadata Publisher (SMP).
- DocumentIdentifier
-
represents document types in a service. It also contains scheme type which represents format of the identifier itself. XML representation is defined by an XML Schema included into OASIS SMP Specification as part of ServiceMetadata.
- BDMSL (SML)
-
Application offered by eDelivery in SaaS model. Facilitates write access to the DNS zone needed for dynamic discovery of Participants. Exposes a WSDL interface that is consumed by SMP in order to (un)register participants' DNS entries.
- Domain
-
The Domain indicates the purpose of the exchange network, such as the E-Invoice exchange, eHealth record exchange, etc.
If the domain network uses the delegated dynamic discovery service, the domain has its own DNS zone handled by the BDSML application. For eDelivery SML the domains are:-
acc.edelivery.tech.ec.europa.eu: acceptance domain for testing SMP instances and subdomains.
-
delivery.tech.ec.europa.eu: production domain.
-
- Group
-
The domain participant group. The Domain can have one or more groups where the Group admin is responsible for the particular group of participants for creating and deleting the domain resources. For example, the domain groups allow the Domain’s resources (e.g., service groups) to be segmented into different countries, regions, etc. and managed by the responsible group admin
- Subdomain
-
Subdomain defines business domains handled by BDSML application in particular DNS zone. Examples of subdomain (business domain) are: peppol, ehealth, generalerds and they are all in part of domain (DNS zone) edelivery.tech.ec.europa.eu domain.
- Dynamic Discovery
-
Dynamic Discovery is the process of discovering participants' service metadata.
3.1. Solution Overview
The eDelivery Service Metadata Publisher (DomiSMP) enables the participants of an eDelivery Messaging Infrastructure network to dynamically discover each other’s capabilities (Legal, Organisational, and Technical). For this to happen, each participant must publish into an SMP its capabilities and settings (including but not limited to):
-
business processes that the participant supports
-
the security setup (public key certificate)
-
the transport protocol (AS2 or AS4)
-
the location of the receiver’s access point
The SMP usually serves multiple participants to publish theirs exchange capabilities. But in eDelivery network/business domain can coexist in multiple SMPs. Because of this distributed architecture, each participant must have a unique ID in a particular subdomain.
Business Document Metadata Service Location (BDMSL), a central component, uses these IDs to create URLs that, when resolved, direct the eDelivery Access Points towards the specific SMP of the participant.
The SMP software component described in this document implements the OASIS Service Metadata Publishing eDelivery SMP profile based on the BDX SMP specifications.
3.2. Functional View
This section describes interactions, data flows and dependencies between SMP and other integrated applications in dynamic discovery process. All use cases refer to the SMP Interface Description guide, where they are presented with more interface-specific details.
The use cases
-
UC06 – GET ServiceGroup
-
UC07 – GET ServiceMetadata
are implementations of the service defined in OASIS SMP Specification. All other use cases cover administration/maintenance services which are not part of the specifications.
The use cases cover RESTful CRUD operations for following SMP business objects:
ServiceGroup, under relative URL:
/{ParticipantIdentifierScheme}::{ParticipantIdentifierValue}
ServiceMetadata, under relative URL:
/{ParticipantIdentifierScheme}::{ParticipantIdentifierValue}/services/{DocTypeIdentifierSche me}::{DocTypeIdentifierValue}
3.2.1. Identifiers
The identifier uniquely identifies DomiSMP entities such as resources
(e.g., ServiceGroups) and subresources (e.g., ServiceMetadata). The
identifiers are being used in the URL requests as part of the URL
request path segment, and also in the (sub)resource documents.
Example of the URL request (scheme:‘oasis:names:tc:ebcore:partyid-type:iso6523:0088’, value:‘4035811991021’
)
concatenated with single colon, :
.
http://my-app.example.eu/smp/urn:oasis:names:tc:ebcore:partyid-type:iso6523:0088:4035811991021
Example of the document element with the participant identifier split to scheme attribute and element value:
<ParticipantIdentifier scheme=”urn:oasis:names:tc:ebcore:partyid-type:iso6523:0088”>
4035811991021
</ParticipantIdentifier>
Identifiers encoding
According to the OASIS SMP Specification
and OASIS SMP v2.0 specification[http://docs.oasis-open.org/bdxr/bdx-smp/v2.0/csprd01/bdx-smp-v2.0-csprd01.html] above,
SMP deals with two types of identifiers: participant and document identifier. The OASIS
specification
prescribes that both are built out of scheme and
value, delimited by special character(s) such a double colon separator
::
or the single colon separator :
as defined in the OASIS ebCoreParty Id,
see SMP Administration Guide and
OASIS ebCore Party Id Type Technical, v1.
ServiceGroup identifier, from business perspective known as Participant Identifier
ServiceGroup identifier := {ParticipantIdentifierScheme}::{ParticipantIdentifier}
ServiceMetadata Identifier, from business perspective known as Document Type Identifier:
ServiceMetadata identifier := {DocTypeIdentifierScheme}::{DocTypeIdentifier}
All identifiers that are included in the URL of the REST request must be
URL-encoded (note also the double colon separator ::
).
Example: the participant identifier (ServiceGroup identifier) built out of:
-
ParticipantIdentifierScheme = "participant#domain#scheme"
-
ParticipantIdentifier = "participant#id"
must be encoded in the URL request as:
-
participant%23domain%23scheme%3A%3Aparticipant%23id
Also, in some cases (all PUT requests), the identifiers are present in the URL and in the XML body of the request. In these cases, only identifiers in URL must be URL-encoded.
ebCore party identifier
The eDelivery SMP has the feature to support handling participant identifiers as described in Use with eDelivery ebCore Party Identifiers, in the eDelivery SMP profile.
In this case, the
participant starts with the: urn:oasis:names:tc:ebcore:partyid-type:
following by the words: unregistered
or iso6523
All ebCore party identifiers in the REST request must be URL-encoded
using only one double colon separator :
, as in the example below:
-
urn:oasis:names:tc:ebcore:partyid-type:iso6523:0088:4035811991021
URL-encoded example:
-
urn%23oasis%23names%23tc%23ebcore%23partyid-type%23iso6523%230088%234035811991021
The eDelivery SMP has the option to serialize ebCore party Id to XML according to the OASIS SMP Specification as separate values, as in the example below:
<ParticipantIdentifier
scheme=”urn:oasis:names:tc:ebcore:partyid-type:iso6523:0088”>
4035811991021
</ParticipantIdentifier>
or according to the eDelivery SMP profile as concatenated value:
<ParticipantIdentifier>
urn:oasis:names:tc:ebcore:partyid-type:iso6523:0088:4035811991021
</ParticipantIdentifier>
See Configuration for more info on the configuration of this behaviour.
Identifier’s case sensitivity
SMP can handle identifiers (scheme and value) in case-sensitive or in a
case-insensitive way.
See Configuration for more info on the configuration
of this behaviour.
When the SMP is configured as case-insensitive the SMP normalizes the identifiers extracted from the requests. Identifiers within incoming requests are considered as case-insensitive and converted to lowercase. Further processing like the storage and querying in the database is performed using lowercase letters only. If the case sensitivity configuration is modified, the database records must be updated manually.
When the SMP is configured as case-sensitive, then Identifiers are not modified during the whole request processing.
3.2.2. BDMSL Integration
Creation or removal of ServiceGroup within SMP triggers a synchronous (un)registration of relevant record(s) in DNS. This process is required to allow Dynamic Discovery of SMPs to store Participant’s metadata.
Write access to DNS zone is facilitated by BDMSL (SML), a centralized application that exposes a SOAP interface for that purpose (see eDelivery BDMSL (SML)). SMP is a consumer of the SML services. SML authorization of SMP is based on mutual HTTPS authentication. Therefore, SMP client TLS certificate with private key needs to be configured on SMP side.
If SMP serves data in only one domain, then a single certificate is
needed. Otherwise, if the SMP is configured to work in multi-domain
mode, the System Administrator will need to set up one certificate per
subdomain.
See also Domain Multitenancy
and Configuration, for more details.
3.2.3. Domain Multitenancy
An SML subdomain can be considered as a set of an inter-network of eDelivery components: SML, SMPs and Access Points for a business domain. All these members communicate with each other within that subdomain and exchange messages according to the strict rules defined for that business domain. One network can be used to exchange invoices between participants, another one could exchange health information between hospitals and insurance companies, etc.
In most scenarios there will be multiple SMPs in a single business domain and each of them will handle ServiceMetadata sets of multiple participants from the same subdomain. The business domain authority can set its own SMP to administrate its participants and the SMP is used only in one domain. But an SMP could be used in more than one business domain at the same time. Because of SML restrictions such setup implies the following SMP functionality:
-
The SMP must use a different SMP ID and a different certificate to authenticate for a particular SML subdomain.
-
The SMP must be able to sign ServiceMetadata responses using a different certificate for each domain (one certificate per domain).
3.2.4. Roles
Roles are documented with more details in the SMP Interface Description guide. The table below explains their meaning from a functional perspective:
Role Alias | Description |
---|---|
Anonymous |
Any user that has not provided any authentication details.
This user can query for public resources e.g.: |
User |
User with the role can log in to the DomiSMP and has access and edit rights to resources according to memberships on resources, groups and domain. For example, user who is a member of the resource with Admin membership can perform administrative actions update service group extension data and add/update/delete service metadata for the service group. User who is member of the Group with Group Admin membership role is allowed to execute create and resource for the group. User who is member of the Domain with Domain Admin membership role, can create/delete groups for Domain and manage the domain memberships. |
System Admin |
System user who can administer domains, users, application properties, truststore and keystore on the DomiSMP. |
3.2.5. Domain, Group and Resources
The DomiSMP supports 3-layer security realms.
-
The most basic unit is the Resource. The Resource is identified by the unique ID, which is part of the URL of the resource as example:
An example of the Resource is the “Service Group” document from the Oasis SMP specification.
The user can be a Resource member with Admin or Viewer membership roles. If the user has an Admin membership role, it can modify resource document(s) and manage the resource memberships. If the user has role Viewer, it can view/read the Resource if the Resource has visibility set to: “Private”.
-
The Group is a cluster of resources managed by the dedicated group administrators. The group admin(s) can create and delete the resource, but only the resource admins can modify data/documents for the resource. The user can be a Group member with Admin or Viewer membership roles. With Admin group membership, the user can create and delete group resources. If the user has group role Viewer, it can view/read the Resources if the Group has visibility set to: “Private”.
-
The top layer is the Domain. It indicates the business purpose of the network of participants, such as invoice exchange, Health Records message exchanges, etc. The Domain usually has a domain owner who handles participant interoperability, defining message types, network authentication, and authorization methods such as Certificate PKI, Identity Service providers, etc. In DomiSMP 5.0, the user with a Domain Admin role can create domain groups and assign users to them.
3.2.6. Extensions
One of the main DomiSMP sample implementation purpose is enabling the
setup (and testing) of various network configurations. Designed with
flexibility in mind, DomiSMP allows the implementation of custom logic
of the document processing. To achieve this, developers can create
custom extensions. These extensions are packaged as JAR files and extend
one or more interface classes from the DomiSML module eu.europa.ec.edelivery:smp-spi
.
Example of how to include an extension in your custom extension project:
<dependency>
<groupId>eu.europa.ec.edelivery</groupId>
<artifactId>smp-spi</artifactId>
<version>$\{project.version}</version>
</dependency>
The extension JAR must be added to the DomiSMP extension library path
before starting up the application. The path where the extensions must
be deployed is defined with file property: smp.libraries.folder
.
An example:
Extension folder
path where SMP extensions are located. The Folder is loaded by the SMP classloader at startup.
smp.libraries.folder=/cef/test/smp/apache-tomcat-8.5.73/smp/ext-lib
DomiSMP 5.0.x supports two types of extensions:
- Resource Handling Extension
-
DomiSMP supports various document types via custom designed extension. This extension handles/processes the resource and sub resource documents.
- Payload Validation Extension
-
with this extension, users can validate payloads/documents according to specific rules. Users can develop custom security scanning of all payload uploaded to the DomiSMP.
In the next section we describe both extensions in more detail.
When the DomiSMP library is loaded by the class loader, the extension registrar searches for Spring beans that implement the “ExtensionInfo” interface. These beans provide essential information about the extensions.
- Identifier
-
The unique identifier represents the extension. If an extension is upgraded, its identifier must remain the same to ensure proper handling of existing extension data.
Example identifier: edelivery-oasis-smp-extension. - Name
-
The human-readable name of the extension. This name helps users understand the purpose and functionality of the extension.
-
Description: A brief description of the extension, providing purpose and extension details.
-
Version: The version number of the extension, indicating its release or revision.
-
ResourceTypes: List of resource handling extensions.
-
PayloadValidators: List of Payload validator extensions
-
import eu.europa.ec.smp.spi.resource.ResourceDefinitionSpi;
-
import java.util.List;
-
-
/ * DomiSMP extension information. When updating the extension it must have the same Name for DomiSMP to handle the upgrade correctly. /
public interface ExtensionInfo \{
String identifier();
String name();
String description();
String version();
List<ResourceDefinitionSpi> resourceTypes();
List<PayloadValidatorSpi> payloadValidators();
}
Resource Handling Extension
One of the most important purposes of DomiSMP is to allow users to publish various connectivity capability documents for serving or business message exchange. Examples of these documents include OASIS SMP 1.0 and OASIS SMP 2.0 documents, as well as ServiceGroup and ServiceMetadata documents, CPP from Oasis CPPA3, and any other text-based custom documents.
The resource extension enables the following tasks:
-
Automatic Document Generation: the extension automatically generates sample documents for an extension. For example, Oasis SMP 1.0 extension can generate sample document for ServiceGroup and ServiceMetadata which are used by the DomiSMP User interface when creating new resources.
-
Document Validation During Registration: when a new document is registered, the extension validates its structure, metadata, and content. This ensures that only valid documents are accepted and published on the DomiSMP.
-
Document Management: the extension can validate, modify, and update documents on read, store, and validate action.
When creating a resource handling extension, developers must implement the ResourceDefinitionSpi and optionally the SubresourceDefinitionSpi. These interfaces contain the resource definition such as identifier, version name, document mimetype, etc.
The ResourceDefinitionSpi
and SubresourceDefinitionSpi
contain the
resource handling extension metadata for the Resources/Subresources. To
process the document, the resource and subresource implementation must also
contain the implementation of the ResourceHandlerSpi
which handles the
document processing such as: generation of empty document, validation of
the document, and methods which are invoked while reading and storing
the document.
package eu.europa.ec.smp.spi.resource;
import eu.europa.ec.smp.spi.api.model.RequestData;
import eu.europa.ec.smp.spi.api.model.ResponseData;
import eu.europa.ec.smp.spi.exceptions.ResourceException;
import java.util.List;
/**
* The class implementing the ResourceHandlerSpi must support read transformation,
* store transformation, and validation methods for the particular resource type,
* such as Oasis SMP 1.0 document, CPP document, etc.
*
*
*/
public interface ResourceHandlerSpi {
/**
* Method get data from the resource in the input stream, and it writes
transformation of the data as they are returned to
*
* @param resourceData the resource data
* @param responseData the date object for setting the response
*/
void readResource(RequestData resourceData, ResponseData responseData)
throws ResourceException;
void storeResource(RequestData resourceData, ResponseData responseData)
throws ResourceException;
/** +
* Validate resource schema and data: if the resource is invalid, the error is thrown
* @param resourceData the resource data
*/
void validateResource(RequestData resourceData) throws ResourceException;
/**
* Validate resource schema and data: if resource is invalid, the error is thrown
* @param resourceData the resource data
*/
void generateResource(RequestData resourceData, ResponseData responseData, List<String> fields) throws ResourceException;
}
See Also
|
For more details, see in the DomiSMP code repository:
|
Payload Validation Extension
To increase security, the eDelivery SMP offers the possibility of registering custom extensions for security scanning/validations of all binary documents such as the certificates and the keystores. The certificates can be uploaded by the users when setting the user certificate for authentication. The keystores binaries can be uploaded by the System Administrators when managing the SMP keystore.
When the user loads one of the mentioned payloads, the eDelivery SMP
validation framework is activated. At this point, the payload binary
data is passed to all registered spring beans, which implement the
PayloadValidatorSpi
interface below.
PayloadValidatorSpi
interfacepackage eu.europa.ec.smp.spi;
import eu.europa.ec.smp.spi.exceptions.PayloadValidatorSpiException;
import java.io.InputStream;
/** *
* SMP Service provider interface (SPI) for uploaded payload validation.
* This SPI interface is intended to allow antivirus validation using third-party antivirus software.
*/
public interface PayloadValidatorSpi {
/**
* Validates the SMP payload. If the payload is invalid the method MUST
* throw PayloadValidatorSpiException
*
* @param payload The payload data to be validated
* @param mimeType The payload mime type
* @throws PayloadValidatorSpiException in case the validation does not pass
*/
void validatePayload(InputStream payload, String mimeType) throws
PayloadValidatorSpiException;
}
The implementers of the extension must implement the method validatePayload
for payload validation. In the event of malware detection,
the method MUST throw the PayloadValidatorSpiException
to terminate the future payload handling by the eDelivery SMP.
A simple example of the PayloadValidatorSpi
implementation can be
found in the SMP project module smp-examples/smp-spi-example/
.
See Souce Code Overview.
To register the extension in the eDelivery SMP, the interface implementation class must be
-
located under the java package eu.europa.ec.smp.spi,
-
tagged with spring bean annotation @Component or @Service,
as in the example below:
package eu.europa.ec.smp.spi.example;
import eu.europa.ec.smp.spi.exceptions.PayloadValidatorSpiException;
import org.springframework.stereotype.Service;
import java.io.InputStream;
`@Service
public class ExamplePayloadValidatorSpiImpl implements
PayloadValidatorSpi \{
public void validatePayload(InputStream payload, String mimeType) throws
PayloadValidatorSpiException \{
-
. .
}
}
To prepare the extension for the deployment in the eDelivery SMP, the code must be compiled and stored in the java archive file format known as the JAR.
In the eDelivery SMP, the property*libraries.folder*must be
configured in the*smp.config.properties*to point to the folder where
extension libraries are located. The SMP classloader loads the libraries
in the folder at the startup of the SMP and registers the PayloadValidatorSpi
beans.
3.3. Use Case Details
Here you can find a description of each Use Case.
3.3.1. UC01 Manage Administrators
UC01 Manage Administrators details
-
User (system admin) has rights to modify content of SMP configuration tables.
This use case does not involve SMP application, instead the user’s management is implemented as a simple manual SQL queries. Users and its roles are not cached by the SMP, so they can be used immediately after the corresponding SQL transaction is committed. Sample SQLs inserting users authenticated by password or certificate are presented below.
For more details on users, see also Data Layer and Security.
-- user authenticated with password (oracle dialect)
INSERT INTO SMP_USER (ID, USERNAME, ACTIVE, APPLICATION_ROLE, EMAIL, CREATED_ON, LAST_UPDATED_ON) VALUES (SMP_USER_SEQ.NEXTVAL, 'smp_admin', 1, 'SYSTEM_ADMIN', 'system@mail-example.local', sysdate, sysdate);
INSERT INTO SMP_CREDENTIAL (FK_USER_ID, CREDENTIAL_ACTIVE, CREDENTIAL_NAME, CREDENTIAL_VALUE, CREDENTIAL_TYPE, CREDENTIAL_TARGET, CREATED_ON, LAST_UPDATED_ON) VALUES ((SELECT id FROM SMP_USER WHERE USERNAME='smp_admin'),1,'smp_admin',
'$2a$10$olcGeWKGEoRia2DPuFqRNeca0IEdRSmOrljLz57BAjf1jlC9SohrS','USERNAME_PASSWORD','UI', sysdate, sysdate);
If the system administrator user is already configured, the system administrator can use the eDelivery SMP UI tool to further manage users.
Note
|
For invoking the PUT or DELETE Use cases described in
the sections below, credentials such as Access token or Client certificate
must be used for the authentication. See Security (DomiSMP Architecture). |
3.3.2. UC02 PUT ServiceGroup
UC02 PUT ServiceGroup details
PUT ServiceGroup (Create or Update):
-
The authenticated user has the role of "Admin SMP".
-
If the ServiceGroup is managed remotely, the "Resource Admin" must have been created before in the "Administrator" table.
-
If the SMP is serving multiple domains, the header field "Domain" must be populated and refer to one of the domains served by the SMP.
PUT ServiceGroup
is an idempotent create/update REST action.
+ NOTE: Idempotence is the property of certain operations in whereby they can be applied multiple times without changing the result beyond the initial application.
+ If the SMP is configured to be integrated with BDMSL, then additional synchronous request is performed to register the newly created Participant in the DNS. A sample request is presented below, with the following conventions:
Dark-grey HTTP headers are optional.
Identifiers present in the body of the request and in the URL marked in yellow must match.
Successful responses:
HTTP 200 (OK) – ServiceGroup was updated HTTP 201 (Created) – New ServiceGroup was created
HTTP/1.1
Accept-Encoding: gzip,deflate Content-Type: text/xml;charset=UTF-8 Authorization: Basic c21wX2FkbWluOmNoYW5nZWl0
ServiceGroup-Owner: anotherownerusername Domain: domain2 Content-Length: 284
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<ServiceGroup xmlns="http://docs.oasis-open.org/bdxr/ns/SMP/2016/05">
<ParticipantIdentifier scheme="participant-domain-scheme">
participant-id
</ParticipantIdentifier>
<ServiceMetadataReferenceCollection/>
</ServiceGroup>
The DomiSMP group administrator can also register a ServiceGroup with the DomiSMP UI tool for Service group management (see [1] on the picture below). The ServiceGroup is registered by activating/clicking the save button (see [3] on the picture below) after all the necessary data are entered.
If BDMSL integration is enabled and configured for the selected domain, the SML request is submitted when the ServiceGroup is created.
Specifying Owner User
Only the DomiSMP Group administrator has permission to register (or
delete) the ServiceGroup. The Group administrator usually creates a
ServiceGroup for the end-user with the "Resource Admin" role, which has
only the permission to update the ServiceGroup service metadata.
By default, the Admin of the ServiceGroup is the user who created the ServiceGroup. But this can be changed at creation time by setting the*ServiceGroup-Owner*HTTP header with a different owner’s identifier. The identifier of the service owner can be the username, the users access token identifier, or the certificate identifier.
Below are examples of HTTP header ServiceGroup-Owner:
ServiceGroup-Owner: anotherownerusername
Non-ASCII characters must be URL-encoded, i.e. user Żółty Jérôme should be encoded in this way:
ServiceGroup-Owner: %C5%BB%C3%B3%C5%82ty%20J%C3%A9r%C3%B4me
Users authenticated by certificate can become owners as well, i.e. user CN=new owner,O=EC,C=BE:000000000000100f should be encoded:
ServiceGroup-Owner: CN%3Dnew%20owner,O%3DEC,C%3DBE%3A000000000000100f
Specifying Domain
This feature is used only when the SMP is set up in multi-domain mode.
When creating new ServiceGroup the Domain HTTP header must be specified
in the PUT ServiceGroup request
Domain: domain2
See also Domain Multitenancy.
3.3.3. UC03 DELETE ServiceGroup
UC03 DELETE ServiceGroup details
-
The authenticated user has the role of "Admin SMP".
-
If the ServiceGroup is managed remotely, the "Resource Admin" must have been created before in the "Administrator" table.
-
If the SMP is serving multiple domains, the header field "Domain" must be populated and refer to one of the domains served by the SMP.
This action removes the specified ServiceGroup from SMP’s database including all related ServiceMetadata.
If the SMP is configured to integrate the BDMSL, then an additional synchronous request is issued in order to unregister the Participant from the DNS.
Successful responses:
HTTP 200 (OK) – ServiceGroup was removed
DELETE http://smp.eu/participant-domain-scheme%3A%3Aparticipant-id HTTP/1.1
Accept-Encoding: gzip,deflate
Authorization: Basic c21wX2FkbWluOmNoYW5nZWl0
Content-Length: 0
The Group Admin can delete a ServiceGroup with the DomiSMP UI tool for group administration [1] management. The ServiceGroup can be deleted by selecting the ServiceGroup row [2], clicking the Delete button (see [3] in the figure below).
If BDMSL integration is enabled and configured for the selected domain, the SML delete request is submitted when the ServiceGroup is deleted.
3.3.4. UC04 PUT ServiceMetadata
UC04 PUT ServiceMetadata details
Create or Update ServiceMetadata
.
-
The authenticated user has the role
Resource Admin
(orAdmin SMP
). -
The
Resource Admin
user initiating the request is linked to the specifiedServiceGroup
-
`Resource Admin’s certificate is valid.
-
The certificate information of the
Resource Admin
was previously stored in the configuration.
PUT ServiceMetadata
is an idempotent create/update REST action.
A sample request is presented below.
Note
|
Identifiers present in the body of the request and in the URL marked in yellow must match. |
ServiceMetadata
is processed and stored as the whole unaltered XML
document represented as string (including original whitespaces and
comments between nodes). ServiceMetadata can be signed by ServiceGroup
owner and e-signature can be placed in <Extension> node. To preserve
integrity of signed metadata, SMP does not perform any transformation,
canonicalization, or decomposing XML document into separate database
records. While querying for the metadata (UC07 – GET ServiceMetadata)
original XML document is returned.
-
HTTP
200
(OK) – ServiceMetadata was updated -
HTTP
201
(Created) – New ServiceMetadata was created
HTTP/1.1
Accept-Encoding: gzip,deflate
Content-Type: text/xml;charset=UTF-8
Authorization: Basic c21wX2FkbWluOmNoYW5nZWl0
Content-Length: 2152
<ServiceMetadata xmlns="http://docs.oasis-open.org/bdxr/ns/SMP/2016/05">
<ServiceInformation>
<ParticipantIdentifier
scheme="participant-domain-scheme">
participant-id
</ParticipantIdentifier>
<DocumentIdentifier scheme="doc-type-scheme">
doc-type-id
</DocumentIdentifier>
<ProcessList>
<Process>
<ProcessIdentifier scheme=”process-scheme">"process-id</ProcessIdentifier>
<ServiceEndpointList>
<Endpoint transportProfile="busdox-transport-start">
<EndpointURI>https://poland.pl/theService</EndpointURI>
<RequireBusinessLevelSignature>true </RequireBusinessLevelSignature>
<ServiceActivationDate>2003-01-01T00:00:00</ServiceActivationDate>
<ServiceExpirationDate>2020-05-01T00:00:00</ServiceExpirationDate>
<Certificate>SAMPLEBASE64ENCODEDCERT</Certificate>
<ServiceDescription>Sample description of invoicing service</ServiceDescription>
<TechnicalContactUrl>https://example.com </TechnicalContactUrl>
</Endpoint>
</ServiceEndpointList>
</Process>
</ProcessList>
</ServiceInformation>
</ServiceMetadata>
-
The Resource Admin, can register a
ServiceMetadata
with the DomiSMP UI tool for Service group management (see [1] in the picture below). -
To add
ServiceMetadata
, click first on the Edit Resources tool (see [1] in picture below), choose the resource and select tab Subresources [2]. -
Click Create [3] and enter the
ServiceMetadata
identifiers in the dialog and click on Create [4]. -
Once the record is created, click the edit button to enter the document editor for adding the ServiceMetadata XML (see the image below). To generate the ServiceMetadata click the button Generate [1] and then save button [3] below.
AQUI
3.3.5. UC05 DELETE ServiceMetadata
UC05 DELETE ServiceMetadata details
-
The
Resource Admin
initiating the request is linked to the specifiedServiceGroup
(or isAdmin SMP
). -
The authenticated user has the
Resource Admin
role. -
The referenced
ServiceMetadata
exists.
This action removes the specified ServiceMetadata
from the SMP’s
database. The SMP validates the request and deletes corresponding
records.
-
HTTP
200
(OK) – ServiceGroup was removed
DELETE
http://smp.eu/participant-domain-scheme%3A%3Aparticipant-id/services/doc-type-scheme%3A%3Adoc-type-id
HTTP/1.1
Accept-Encoding: gzip,deflate
Authorization: Basic c21wX2FkbWluOmNoYW5nZWl0
Content-Length: 0
-
The
Resource Admin
, can delete a ServiceMetadata in the Admin Console using the Editing the Resources tool (see [1] in picture below). -
To delete a
ServiceMetadata
, select the resource which contains theServiceMetadata
[2]. -
Then, in subresources table, select the service metadata for the deletion [3].
-
Finally, click the delete button [4].
ServiceMedatada
Delete Flow:3.3.6. UC06 GET ServiceGroup
UC06 GET ServiceGroup details
-
ServiceGroup exists.
The SMP retrieves the details of the specified ServiceGroup from its database including references to all associated ServiceMetadata and returns them in XML format.
HTTP/1.1
Accept-Encoding: gzip,deflate
Successful response: HTTP/1.1 200
Content-Type: text/xml;charset=UTF-8
Content-Length: 496
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<ServiceGroup xmlns="http://docs.oasis-open.org/bdxr/ns/SMP/2016/05">
<ParticipantIdentifier
scheme="participant-domain-scheme">participant-id</ParticipantIdentifier>
<ServiceMetadataReferenceCollection>
<ServiceMetadataReference
href="http://smp.eu/participant-domain-scheme%3A%3Aparticipant-id/services/doc-type-scheme%3A%3Adoc-type-id"/>
</ServiceMetadataReferenceCollection>
</ServiceGroup>
The URL references inside the <ServiceMetadataReferenceCollection>
node
refers to the same SMP and can be immediately used by the client to
retrieve ServiceMetadata details. Because SMP is usually deployed
behind a ReverseProxy, when the load balancer or the router redirects
the request to the backend system, it adds below listed X-Forwarded
parameters when constructing the URLs:
X-Forwarded-Host
-
identifies the original host requested by the client in theHostHTTP request header, since the host name and/or port of the reverse proxy (load balancer) may differ from the origin server handling the request.
X-Forwarded-Proto
-
identifies the originating protocol of an HTTP request, since a reverse proxy (or a load balancer) may communicate with a web server using HTTP even if the request to the reverse proxy is HTTPS.
The ReverseProxy can also hide application root context, for instance,
if the application is deployed on the server: http://localhost/smp/
.
Depending on the ReverseProxy configuration, the application can be
accessed from internet without root context: http://smp.eu/ or with root
context: http://smp.eu/smp/. To properly build the URL, the parameter
contextPath.output
must be set accordingly
See <<smp_arch_config, Configuration>.
3.3.7. UC07 GET ServiceMetadata
UC07 GET ServiceMetadata details
ServiceMetadata exists in the database.
Service returns details of specified ServiceMetadata from the database. ServiceMetadata is signed and wrapped into the SignedServiceMetadata node.
GET http://smp.eu/participant-domain-scheme%3A%3Aparticipant-id/services/doc-type-scheme%3A%3Adoc-type-id HTTP/1.1
Accept-Encoding: gzip,deflate
Successful sample response with SMP’s XMLDSIG signature marked in dark-grey:
HTTP/1.1 200
Content-Type: text/xml;charset=UTF-8
Content-Length: 4939
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<SignedServiceMetadata xmlns="http://docs.oasis-open.org/bdxr/ns/SMP/2016/05">
<ServiceMetadata>
<ServiceInformation>
<ParticipantIdentifier scheme="participant-domain-scheme">participant-id</ParticipantIdentifier>
<DocumentIdentifier scheme="doc-type-scheme">doc-type-id</DocumentIdentifier>
<ProcessList>
<Process>
<ProcessIdentifier scheme="cenbii-procid-ubl">urn:www.cenbii.eu:profile:bii04:ver1.0</ProcessIdentifier>
<ServiceEndpointList>
<Endpoint transportProfile="busdox-transport-start">
<EndpointURI>https://poland.pl/theService</EndpointURI>
<RequireBusinessLevelSignature>true </RequireBusinessLevelSignature>
<ServiceActivationDate>2003-01-01T00:00:00</ServiceActivationDate>
<ServiceExpirationDate>2020-05-01T00:00:00</ServiceExpirationDate>
<Certificate>BASE64ENCODEDSAMPLECERT</Certificate>
<ServiceDescription>Sample description of invoicing service</ServiceDescription>
<TechnicalContactUrl>https://example.com </TechnicalContactUrl>
</Endpoint>
</ServiceEndpointList>
</Process>
</ProcessList>
</ServiceInformation>
</ServiceMetadata>
<Signature xmlns="http://www.w3.org/2000/09/xmldsig">#
<SignedInfo>
<CanonicalizationMethod Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315"/>
<SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/>
<Reference URI="">
<Transforms>
<Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
</Transforms>
<DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/>
<DigestValue>BASE64SAMPLEDIGEST</DigestValue>
</Reference>
</SignedInfo>
<SignatureValue>BASE64SAMPLESIGNATUREVALUE</SignatureValue>
<KeyInfo>
<X509Data>
<X509SubjectName>Certificate subject name</X509SubjectName>
<X509Certificate>BASE64CERTUSEDFORSIGNING</X509Certificate>
</X509Data>
</KeyInfo>
</Signature>
</SignedServiceMetadata>
3.4. Implementation View
3.4.1. Source Code Overview
SMP is a Java REST application shipped and packaged as a .war
file.
The SMP project uses Maven 3 for its build process and dependency management.
Below is a description of SMP’s Maven project structure.
SMP Project Modules
Module | Description |
---|---|
|
Module contains OASIS SMP response schemas and administration API schemas. Module purpose is to generate java API classes from predefined XML schemas. Module also contains utility classes used for conversion and validation. This module is used by the SMP REST service implementation and can also be used for building SMP client. |
|
Parent POM contains dependency and plugin management used in sub-modules. |
|
Angular web fragment for UI. |
|
SMP core library. Covers database access and business logic. This module does not have any HTTP/REST dependencies. |
|
The module contains the default resource extensions for Oasis SMP 1.0 and Oasis SMP 2.0 standard. |
|
Module contains Soap UI tests for regression testing in the CI server. |
|
Module contains UI regression tests. |
|
REST interface over the core library. Defines REST binding, adds web-specific validations and security. Module also build SMP artefact for deploying to application server and package SMP setting examples, its output is WAR application and ZIP file smp_setup.zip with configuration files and Soap UI test project. |
|
Module contains files for building docker images for weblogic/oracle and mysql/tomcat setup. Project also contains compose files to start the setups. The main purpose of the module is to prepare the environment for API and UI integrational testing. |
|
The module contains SMP examples of API and SPI implementations. Currently, SPI payload validation example. |
3.4.2. Application Skeleton
The SMP application is built with SpringFramework, the context is set up by classes with @Configuration annotations which are organized hierarchically. List of configuration classes, sample classes defining dependencies, scanning rules in packages and importing another context configuration are presented below.
@Configuration @ComponentScan(basePackages = \{ "eu.europa.ec.edelivery.smp.validation", "eu.europa.ec.edelivery.smp.services", "eu.europa.ec.edelivery.smp.sml" "eu.europa.ec.edelivery.smp.conversion"})
@Import(DatabaseConfig.class) public class SmpAppConfig \{}
3.4.3. Layers Overview
Spring MVC
The top layer, implemented within the smp-webapp module, uses Spring MVC’s framework. Both resources (ServiceGroup, ServiceMetadata) have a dedicated Controller implementation. Each controller has 3 public methods (GET, PUT, and DELETE) which share the same URL defined by @RequestMapping annotation at the Controller class level.
A sample method definition, utilizing also metadata transferred in the request headers is presented below.
This layer is responsible for: REST binding, security validation, request data validation, forwarding request
to services layer and forwarding response back to the caller and for error handling.
See more details in the Security section.
@RestController @RequestMapping("/{serviceGroupId}") public class ServiceGroupController {
@PutMapping
@Secured("ROLE_SMP_ADMIN")
public ResponseEntity saveServiceGroup(
@PathVariable String serviceGroupId,
@RequestHeader(name = "ServiceGroup-Owner", required = false) String serviceGroupOwner,
@RequestHeader(name = "Domain", required = false) String domain,
@RequestBody String body) throws XmlInvalidAgainstSchemaException, UnsupportedEncodingException { /* . . . */ }
Business Services Layer
The business logic is implemented within the smp-server-library module. Business logic is implemented as ServiceGroup and ServiceMetadata Services. Module contains additional classes for Integration with BDMSL, signing messages and transaction handling with use of Spring @Transactional annotation and TransactionManager.
Because the SMP is a small application without need of polymorphism, the implementation does not use interface patterns for its services.
@Service
public class ServiceMetadataService {
@Transactional
public boolean saveServiceMetadata(ParticipantIdentifierType serviceGroupId, DocumentIdentifier documentId, String xmlContent) {
/* . . . */ }
BDMSL Integration
The BDMSL integration used by ServiceGroupService
is implemented by
BDMSLConnector
. Participant’s (un)registration is called synchronously
as the last action Service’s method to make sure that any potential
RuntimeException
causes rollback of the whole transaction, including
database changes.
To support multiple domains functionality BDMSLClientFactory
was introduced. Its responsibility
is to create and preconfigure client (BDMSLConnector
) to set up needed
HTTP headers, configure proxy, manage client X509 Certificate, for each
domain.
See also Domain Multitenancy.
Case Sensitivity Normalisation
Case Sensitivity Support
As functionally described in ebCore party identifier:
The eDelivery SMP has the feature to support handling participant
identifiers as described in
Use with eDelivery ebCore Party Identifiers,
in the eDelivery SMP profile.
In this case, the
participant starts with the: urn:oasis:names:tc:ebcore:partyid-type:
following by the words: unregistered
or iso6523
.
All ebCore party identifiers in the REST request must be URL-encoded
using only one double colon separator :
, as in the example below:
urn:oasis:names:tc:ebcore:partyid-type:iso6523:0088:4035811991021URL-encoded
example:
urn%23oasis%23names%23tc%23ebcore%23partyid-type%23iso6523%230088%234035811991021
The eDelivery SMP has the option to serialize ebCore party Id to XML according to the OASIS SMP Specification as separate values, as in the example below:
<ParticipantIdentifier scheme=”urn:oasis:names:tc:ebcore:partyid-type:iso6523:0088”>
4035811991021
</ParticipantIdentifier>
or according to the eDelivery SMP profile as concatenated value:
<ParticipantIdentifier>
urn:oasis:names:tc:ebcore:partyid-type:iso6523:0088:4035811991021
</ParticipantIdentifier>
See Configuration for more info on the configuration of this behaviour.
Identifier’s case sensitivity" and Configuration
is implemented by the CaseSensitivityNormalizer
bean.
Normalization is performed at the very beginning of each service method
processing. Also, by
separating this to a dedicated bean, normalization can be used as well
for permissions verification in connection with Spring Security’s
@PreAuthorize
annotation:
@PreAuthorize("hasAnyAuthority('ROLE_SMP_ADMIN', @caseSensitivityNormalizer.normalizeParticipantId(#serviceGroupId))")
Data Layer
The SMP stores data in a relational database. MySQL and Oracle DDL
scripts are released with the application in smp-setup.zip
file. The
database object relations are presented in the following figure:
Besides all the necessary metadata used by the DomiSMP business logic,
the database is also used to store XML documents in table (oracle: blob,
mysql: TEXT type). The Resources and Subresources store versions of the
document into the table SMP_DOCUMENT_VERSION
. The documents are stored
as a binary data because it could be electronically signed by Resource
owner. Decomposing and composing XML could compromise the xml signature.
When a user is querying for the resource/subresource, the original xml
is returned with a valid xml signature.
The Java data access layer is implemented within the
smp-server-library
module. DataSource, EntityManager
and
TransactionManager
are configured and registered into Spring context
in the DatabaseConfig
class.
Java classes located in eu.europa.ec.edelivery.smp.data.model
package
define the Model with the use of JPA2 annotations. All model classes
implement the BaseEntity
interface. Separate @Embeddable classes are
defined for all composite primary keys:
@Entity
@Table(name = "smp_service_group")
public class DBServiceGroup implements BaseEntity { @EmbeddedId
@Override
public DBServiceGroupId getId() { return serviceGroupId; }
/* . . . */
}
@Embeddable
public class DBServiceGroupId implements Serializable {
@Column(name = "businessIdentifierScheme", nullable = false, length = MAX_IDENTIFIER_SCHEME_LENGTH)
public String getBusinessIdentifierScheme() { return participantIdScheme; }
@Column(name = "businessIdentifier", nullable = false, length =
MAX_IDENTIFIER_VALUE_LENGTH)
public String getBusinessIdentifier() { return participantIdValue; }
/* . . . */
All DAO classes located in the eu.europa.ec.edelivery.smp.data.dao
package extend the BaseDao
generic abstract class that already
provides most common DAO operations (find, remove, etc.).
See some samples below:
@Repository
public class ServiceGroupDao extends BaseDao<DBServiceGroup> {}
public abstract class BaseDao<E extends BaseEntity> { @PersistenceContext
protected EntityManager em;
private final Class<E> entityClass;
public BaseDao() {
entityClass = (Class<E>) GenericTypeResolver.resolveTypeArgument(getClass(), BaseDao.class);
}
public E find(Object primaryKey) {
return em.find(entityClass, primaryKey);
}
Exception Handling
Detailed functional description of all errors that might occur is presented in the SMP Interface Description guide. This section presents a generalized view on error groups and focuses on implementation perspective.
eDelivery SMP utilizes HTTP error codes according to the best RESTful recommendations, i.e., given codes are always returned for:
-
200 (OK) or 201 (Created) – Successful responses
(Resource was created/updated/retrieved/deleted). -
4xx (Bad request) – Invalid or unauthenticated request.
-
5xx (Server Error) – SMP technical issue, could be related to configuration, internal networking, integration with BDMSL or DB, etc.
The OASIS SMP Specification
does not specify error messages, so eDelivery SMP introduces its own simple XSD with XML namespace:
ec:services:SMP:1.0
.
This one describes the structure of error response messages as the sample below:
<ErrorResponse xmlns="ec : services:SMP:1.0">
<BusinessCode>NOT_FOUND</BusinessCode>
<ErrorDescription>ServiceMetadata not found, ServiceGroupID: 'x ::y', DocumentID: 'a::b'</ErrorDescription>
<ErrorUniqueId>2018-03-27T15 :07 :35.470CEST :d3ba543a-7233-4e69-9f34- 655e3998cb3c</ErrorUniqueId>
</ErrorResponse>
Error Handling Mechanism Implementation
All classes for processing errors are located in package
eu.europa.ec.edelivery.smp.error
:
ErrorMappingControllerAdvice
All backend exceptions are mapped to REST responses within one single
class registered in Spring context with @RestControllerAdvice
and by
its many handler-methods annotated with @ExceptionHandler
. The class
uses ErrorResponseBuilder
and is responsible for:
-
mapping exceptions to HTTP response codes and
ErrorBusinessCodes
; -
logging user errors as WARN level and technical errors as ERROR level including
uniqueErrorId
for easier maintenance and debugging.
Class declaration, sample handler-method (one of many) and internally reused buildAndWarn
method:
@RestControllerAdvice
public class ErrorMappingControllerAdvice {
@ExceptionHandler(NotFoundException.class)
public ResponseEntity handleNotFoundException(NotFoundException ex) {
return buildAndWarn(NOT_FOUND, ErrorBusinessCode.NOT_FOUND, ex.getMessage(), ex);
}
/* . . . */
private ResponseEntity buildAndWarn(HttpStatus status, ErrorBusinessCode businessCode, String msg, Exception exception) {
/* . . . */ }
}
ErrorResponseBuilder
ErrorResponseBuilder
implementing builder pattern is responsible for
building Spring’s ResponseEntity
, based on provided HTTP status code,
ErrorBusinessCode
and text message. Produced response not only is
compliant with introduced dedicated XSD, but contains a uniqueErrorId
that in future problem investigation can be easily found out in log
files once user provides error message details.
Every uniqueErrorId
is built out of:
-
Timestamp – this information facilitates support and development by specifying when the error occurred and in which rolled log file more details can be found.
-
UUID – helps in uniquely locating the error stack trace.
2018-03-27T15:07:35.470CEST:d3ba543a-7233-4e69-9f34-655e3998cb3c
ErrorBusinessCode
ErrorBusinessCode
is a simple Enum
with given values, used by other
error-handling classes:
Business error code | Description |
---|---|
|
Bad request, XML document provided by the user does not pass schema validation |
|
Bad request, one of the request fields is wrong, e.g., specified Domain does not exist. |
|
Bad request, e.g., specified dates from-to are overlapped. |
|
Bad request, e.g., provided identifier format does not comply with OASIS SMP Specifications. |
|
Unauthorized ( |
|
Bad request, the requested resource does not exist ( |
|
Bad request, e.g., the newly created ServiceGroup cannot be owned by a user that does not exist. |
|
Technical problem on SMP or infrastructure side (BDMSL
integration, database etc). This error is always returned with |
SpringSecurityExceptionHandler
SpringSecurityExceptionHandler is a glue code that allows exceptions thrown by SpringSecurity to be processed by a common exception-handling mechanism. As a result, all security error responses follow the same pattern as other error responses.
SpringSecurity is implemented as a filter chain at the very beginning of the processing of HTTP requests.
3.5. Configuration
SMP configuration (database, keystore, authentication type …) is placed
in the property file smp.config.properties
. File with default values
is already included in deployment war package. To override custom values
the copy of smp.config.properties
with updated values must be placed
in the application server classpath. More details on configuring
classpath can be found in the SMP Administration Guide and in
Environment specific configuration.
When the SMP is used in multi-tenancy as described in
section Domain Multitenancy,
the configuration properties for domain (SMP ID,
BDMSL authentication data) are located in database table: SMP_DOMAIN
.
One record represents one domain, columns represent configuration
parameters which are applied for that specific domain.
See more about Domain configuring in the SMP Administration Guide.
Detailed configuration steps for Windows and UNIX systems are covered in the SMP Administration Guide. This section is focused explaining the motivation behind particular configuration rather than configuration steps themselves.
3.5.1. WebLogic
Classpath:
The SMP requires configuration file: smp.config.properties
to be
placed in the classpath. On weblogic server custom classpath folder
(for example, /conf_dir_path
) can be set by modifying CLASSPATH variable in
scripts setDomainEnv.sh
:
EXPORT CLASSPATH="$CLASSPATH$\{CLASSPATHSEP}/conf_dir_path"
Authentication:
WebLogic by default validates username/password (BasicAuth) credentials if such are present in any incoming request. Because SMP handles BasicAuth with SpringSecurity this feature must be turned off. This is achieved by changing enforce-valid-basic-auth-credentials property in config.xml file to false.
3.5.2. Tomcat
Classpath:
The SMP requires configuration file: smp.config.properties to be
placed in the classpath. On tomcat server custom classpath folder (e.g.
/conf_dir_path) can be set by modifying the starting scripts in the same
way as for WebLogic, or by adding this entry in context.xml
file:
<Resources
className="org.apache.catalina.webresources.StandardRoot"
cachingAllowed="true" cacheMaxSize="100000">
<PreResources
className="org.apache.catalina.webresources.DirResourceSet"
base="/conf_dir_path"
internalPath="/"
webAppMount="/WEB-INF/classes" />
</Resources>
3.5.3. Oracle
NLS_CHARACTERSET
must be set to AL32UTF8
, otherwise SMP will face issues
with non-ASCII characters.
3.5.4. MySql
Character set, collation and especially JDBC connection protocol encoding – all must be set to UTF-8, otherwise SMP will face issues with non-ASCII characters.
3.6. Security
The SMP is secured with the SpringSecurity. The spring security configuration is executed at the eDelivery startup in the following classes:
-
WSSecurityConfigurerAdapter.java
: class that handles the webservice endpoint security configuration; -
UISecurityConfigurerAdapter.java
: class that handles the UI endpoint security configuration; -
SMPCasConfigurer.java
: class that handles the UI Cas configuration.
3.6.1. Authentication
The Authentication Manager (id = smpAuthenticationManager
) utilizes two
Authentication One handles basic username/ password authentication and
the second is SpringSecurity implementation
PreAuthenticatedAuthenticationProvider
class configured to handle
X509Certificate
and BlueCoat
authentication. The pre-authenticated
scenarios take precedence over basic authentication. That means if a
client provided a valid certificate and also valid username and
password, then he is logged in using his certificate and
username/password is ignored.
Standard SpringSecurity mechanism is used to verify username and BCrypt hashed passwords using the SMPAuthenticationProvider. Username/Password authentication can be used for the UI authentication.
eDelivery SMP uses different credentials for UI and for WebService
authentication.
The access token is randomly generated access token id and access token
value. Together they are used as HTTP basic authentication when invoking
the web-services.
Client Certificate authentication can be used only for authentication when invoking the REST API services. The purpose of the certificate authentication is to support mutual 2-way TLS authentication for machine-to-machine integration.
SMP supports two types of Client Certificate authentications: X509 certificate authentication and Authentication behind Reverse Proxy. Both scenarios are performed in 2 steps:
-
Certificate details are extracted to the eDelivery-specific text format. This step is handled by two custom filters:
x509AuthFilter
andblueCoatReverseProxyAuthFilter
, separately for both scenarios. -
PreauthAuthProvider
verifies that if certificate-defined user exists in the database.
X509Certificate
and Certificates HTTP Client-Cert header are validated
with the following attributes:
-
Valid from: if “current date” is smaller than “valid from” date, then authentication is rejected
-
Valid to: if “current date” is greater than “certificates valid to” date, then authentication is rejected
-
Revocation List: certificates are validated by CRL which is downloaded and cached till the CRL “valid to” date. CRL URL endpoint is defined in
SMP_CERTIFICATE.CRL_URL
column and is used for HTTP Client-Cert authentication and for X509Certificate authentication. If the CRL is not reachable, SMP silently ignores the CRL verification, if the configuration attribute “smp.certificate.crl.force” is set to false. If the attribute is set to true, then Client is not authenticated due to technical issues. -
Truststore: If the SMP truststore is not empty, then formatted issuer or subject is verified if it exists in the truststore. If none of the values exists in the truststore, then certificate authentication is rejected.
Users that are authenticated by certificate are stored in the SMP_USER table, together with users authenticated by password. The USERNAME value of certificate authenticated users is a string value created from parts of certificate distinguish name (DN) and serial number by the following pattern (eDelivery format):
CN={common name},O={organisation},C={country}:{16-digit-zero-padded-hex-serial}
CN=CEF eDelivery,O=European Commission,C=BE:000000000000c41f
Application distinguished certificate authenticated users from password-authenticated user by an empty PASSWORD column.
Most eDelivery projects supporting client certificate authentication,
utilize the same client certificate text representation and BlueCoat
Client-Cert HTTP header patterns. For this reason, custom Java code
responsible for client certificate authentication has been extracted and
released within a separate JAR library; maven dependency gropuId/artifactId:
eu.europa.ec.edelivery/edelivery-springsecurity-2-way-ssl-auth.
The client X509 certificate authentication uses server’s (Tomcat or WebLogic) certificate authentication settings. After the request passes the server validation successfully, x509AuthFilter extract certificate details and then authentication proceeds in the way as described above.
The filter itself (class EDeliveryX509AuthenticationFilter) is a simple extension of SpringSecurity’s X509AuthenticationFilter class, which is a ready-to-use implementation handling java.security.cert.X509Certificate.
In this setup the basic certificate validation is configured in the BlueCoat reverse proxy. After certificate validation passed successfully, the BlueCoat reverse proxy adds a "Client-Cert" HTTP header and forwards the request to the SMP over HTTP(S). The spring filter blueCoatReverseProxyAuthFilter extracts the header, converts it from Bluecoat’s to the eDelivery format specified above and then authentication proceeds in the way as described above.
The filter itself (class BlueCoatAuthenticationFilter) is based on the SpringSecurity’s RequestHeaderAuthenticationFilter, dedicated for similar scenarios.
CAS authentication can be used only for the UI authentication, and it was made with intention to integrate with ECAS also called EU-Login. ECAS is based on the Central Authentication Service (CAS) version 2 developed at Yale University1. It is an authentication service to protect Web-based applications. SMP was tested only with ECAS, but it should also work with any CAS 2.0 implementation,
When the SMP does not find a service ticket granting access it redirects to EUs login page for user authentication. After user authenticates via the EU login, the response redirects the page back to the SMP UI page with granting ticket.
SMP validates ticket with ECAS. If validation is successful, the SMP authorize access to the user according to user authorization defined on SMP user configuration.
3.6.2. Authorization
Authorities and Roles
Authorities in SMP are organized into a two-dimensional space, with Roles as first dimension and Error! Reference source not found. as the second one.
Roles are documented with more details in the SMP Interface Description guide. The table below explains their meaning from the implementation perspective:
Role alias | Description |
---|---|
ROLE_ANONYMOUS |
Any user that has not provided any authentication details. |
ROLE_USER |
Any authenticated user existing in the database and who doesn’t have system admin permissions. Such user is supposed to be a member of the Domain, Group or Resource. |
ROLE_SYSTEM_ADMIN |
Role for UI enables administration of domains and users. |
ICD mentions "System Admin" role, but it’s rather a sysadmin, not the business role to be considered in SMP source code.
Authorities execution
Authorities' verification is very flexible thanks to loading all granted authorities to the security context.
The first level of verification is made on HTTP method level. GET is
allowed to everybody, while all modifying actions are allowed only to
authenticated users, which is configured in spring-security.xml
file:
<intercept-url method="PUT" access=" ! isAnonymous()" pattern="/*"/>
<intercept-url method="DELETE" access=" ! isAnonymous()" pattern="/*"/>
Once all granted authorities are present in the security context, they are validated at the business methods level with SpringSecurity’s annotations and Spring Expression Language (SpEL):
@Secured("ROLE_SMP_ADMIN")
-
action allowed only for Group Admin, or:
@PreAuthorize("hasAnyAuthority('ROLE_SMP_ADMIN',
@caseSensitivityNormalizer.normalizeParticipantId(#serviceGroupId))")
-
action allowed either for Group Admin or Resource admin owing the "serviceGroupId" provided as methods' parameter.
3.7. Quality
SMP quality is supervised by Code Reviews and Continuous Integration processes, which are out of the scope of this document. The quality measurement details presented below focus on technical and source-code point of view.
Unit tests
All utility classes that do not interact with many other classes, which
are mostly responsible for conversions, mappings, etc., are unit tested
with using Junit and Mockito libraries. Test class name pattern in this
case is: {testedClassName}Test.java
.
Tests are run at application build time.
Integration tests
Service classes that combine multiple application modules and in most of
the cases require database access are tested in classes with name
pattern: {testedClassName}IntegrationTest.java
.
Tests are executed with JUnit library and configured Spring test context. Also, database instance must be created and defined in maven project files with the following properties:
Property | Description |
---|---|
jdbc.driver |
Database Configuration: Driver
|
jdbc.url |
Database Configuration: url
jdbc:oracle:thin:@dbhost:dbport:smp_database or |
jdbc.password |
Database User/Password Configuration: User |
jdbc.password |
Database User/Password Configuration: Password |
target-database |
Target Database Backend type/Brand: For MySQL, use: MySQL For Oracle Database, use: Oracle |
jdbc.read-connections.max |
Database Configuration: Max Read Connection |
<properties>
<jdbc.driver>com.mysql.jdbc.Driver</jdbc.driver>
<jdbc.url>jdbc:mysql://localhost/smp</jdbc.url>
<jdbc.user>smp</jdbc.user>
<jdbc.password>smp</jdbc.password>
<target-database>MySQL</target-database>
<jdbc.read-connections.max>10</jdbc.read-connections.max>
</properties>
SoapUI integration tests
All functionalities are covered with SoapUI integration tests that run
REST requests against the SMP and in some cases access the database
directly with SQL statements. The SoapUI project can be found in
submodule smp-soapui-tests\soapui\SMP4.0-Generic-soapui-project.xml
file.
These tests are bound to maven build and can be activated at build
time with maven profile -Prun-soapui
switch.
Sonar source code statistics
Maven build is configured to collect standard Sonar code statistics (code test coverage, static code analysis, etc). Apart from that, code test coverage is gathered also when running SoapUI tests. This requires a manual installation of Jacoco Agent in JRE with J2EE container where the SMP is deployed and pointing to this agent when running a build by adding these attributes to maven run:
-DjacocoRemotePort=65000 –DjacocoRemoteAddress
Once build with SoapUI tests is done, statistics from all the sources
are gathered by sonar plugin by running mvn sonar:sonar
goal.
3.8. Technical Requirements
This section describes the minimum and recommended system requirements to operate the SMP component.
Hardware
Type | Minimum | Recommended |
---|---|---|
Processor |
1 CPU core |
4 CPU core |
Memory (RAM) |
2GB |
8GB or more |
Disk space |
5GB |
Depends on usage |
Recommended stack
-
Ubuntu 22.04 LTS 64 bits
-
Oracle Java EE 8
-
MySQL 8
Operating Systems and Software
Any operating system that is compliant with the supported JVM.
-
Oracle Java JRE 8/11
-
Apache Tomcat 9.x
-
Oracle WebLogic Server 12.2c or 14.1C
-
MySQL 8
-
Oracle Database 19c
n/a
|
4. Administration Guide
|
This guide provides information on how to:
-
Deploy and configure SMP on supported application servers and databases.
See Prerequisites and Relevant Resources. -
Perform relevant security configurations (certificates).
-
Consume the Soap UI to create, update and delete SMP Service Groups and Metadata and an alternative method to perform creation, update and deletions operations using Swagger UI.
This guide is intended for Administrators who are in charge of installing, managing and troubleshooting an eDelivery SMP.
4.1. Prerequisites and Relevant Resources
SMP requires:
-
one supported Java Runtime Environment (JRE)
-
one supported Webserver
-
one support Database Management Systems (DBMS)
Java Runtime Environment |
|
---|---|
JRE 8 or 11: |
|
Webservers |
|
Weblogic
Tomcat
|
|
Databases |
|
|
Note
|
For more information and installation details for third-party software, refer to their specific documentation. |
-
The DomiSMP artifacts can be downloaded from the eDelivery Digital Portal.
-
The source code of eDelivery DomiSMP is available from this public repository.
For visible URL, click here.
SMP Source Code Repository:
https://ec.europa.eu/digital-building-blocks/code/projects/EDELIVERY/repos/smp/browse
The scripts for creating or migrating the Oracle and MySQL databases can be found in
the smp-x-setup.zip
archive. This file is available for download, see Downloading the Source Code.
4.2. Deployment Overview
SMP Deployment Steps Overview
As mentioned in the prerequisites, the deployment of the SMP is only supported on Tomcat or WebLogic application servers.
The deployment of the SMP on both platforms is almost identical but minor platform specific changes will be documented in a dedicated section of this manual.
The deployment of the SMP is summarized in the following mandatory steps:
-
STEP1 Database Configuration
-
STEP2 Application Server Preparation (Weblogic and Tomcat) for SMP
-
STEP3 SMP Initial Configuration
-
STEP4 SMP .war file Deployment
Note
|
The environment variable, AS_HOME , refers to the application server
home folder where the SMP package is installed.
|
-
For Tomcat, it refers to
CATALINA_HOME
. -
For Oracle WebLogic, it refers to
DOMAIN_HOME
.
Note
|
The environment variable, SETUP_PATH , refers to the folder where the
deployment SMP package smp-4.x-setup.zip is extracted.
|
Folder structure
The following subdirectories must be created in the AS_HOME
directory.
The document describes the default folder settings and can be named or
created in a location other than the AS_HOME
directory.
AS_HOME/smp
-
the folder contains the basic SMP settings, and the folder must be configured as a classpath; see sections:
AS_HOME/logs
-
the purpose of the folder is to contain SMP logs.
AS_HOME/security
-
the previous versions of the SMP have security artifacts (truststore, keystore, etc.) under the
/smp
folder. We recommend creating a separate folder for a more transparent handling of the security artifacts. In case of setting SMP in an application server cluster, this folder must be shared among the cluster nodes.
The location of the folder must be set in the SMP application property:
smp.security.folder
.
Note
|
before DomiSMP 5.0 version, the application property’s name was configuration.dir .
|
4.3. STEP1 Creating the Database
This section describes the steps necessary to create the database,
tables and the SMP database user (dbuser
used for database connection
purpose).
It also includes the creation of an initial SMP user account that will be used by REST clients to connect to the SMP.
The SMP uses a direct connection to the database, which removes the need to configure a data source within WebLogic.
Tip
|
To find the script used for this step, see Database Scripts. |
4.3.1. MySQL
-
Open a command prompt and navigate to the
SETUP_PATH/sql-scripts
folder -
Execute the following MySQL commands:
mysql -h localhost -u root_user –-password=root_password -e \ "DROP SCHEMA IF EXISTS <smp_schema>; CREATE SCHEMA <smp_schema>; ALTER DATABASE <smp_schema> charset=utf8; CREATE USER smp_dbuser@localhost IDENTIFIED BY 'smp_password'; GRANT ALL ON <smp_schema>.* TO smp_dbuser@localhost;"
This creates a <smp_schema> and an <smp_dbuser> with all privileges to the <smp_schema>.
-
Execute the following command to create the required objects (tables, etc.) in the database:
mysql -h localhost -u <root_user> --password=<root_password> <smp_schema> < mysql5innodb.ddl
Script download: -
Execute the following command to fill initial test data:
mysql -h localhost -u root_user --password=root_password smp_schema < mysql5innodb-data.sql
4.3.2. Oracle Database
-
Navigate to
SETUP_PATH/sql-scripts
directory -
Execute the following commands :
sqlplus sys as sysdba (1)
Where:
-
Password is the one defined during the Oracle installation.
-
-
Once logged in Oracle:
CREATE USER <smp_dbuser> IDENTIFIED BY <smp_dbpassword>; GRANT ALL privileges TO <smp_dbuser>; connect <smp_dbuser> show user; (1) @oracle10g.ddl (2) @oracle10g-data.ddl (3) exit
-
Expected return:
<smp_dbuser>
. -
Run the scripts with the
@
sign from the location of the scripts. -
Fill initial test data.
-
4.4. STEP2 Configuring the Server
-
Weblogic/Oracle
-
Tomcat
4.4.1. Configuring WebLogic/Oracle
This section does not include the installation of a WebLogic application server. It is assumed that the WebLogic Server is installed, and a WebLogic domain is created with an administration server and a managed server on which the SMP will be deployed.
Hereafter the domain location will be referred as DOMAIN_HOME
(user-defined name).
In the examples below, we will use the following Domain and Server names:
-
Domain Name : SMPDOMAIN
-
Administration Server : AdminServer
-
SMP Managed Server : SMP_ManagedServer
As shown below:
To deploy the SMP on the WebLogic Application Server platform, two preliminary steps need to be completed:
-
Disabling the application basic Authentication on the Weblogic Server,
-
Configuring the Extra CLASSPATH for WebLogic,
-
Setup sun HTTP Handler.
This is described in the following two sections.
Disabling Authentication
By default, WebLogic performs its own basic authentication checks requests before passing the request to deployed application (e.g. eDelivery SMP). The eDelivery SMP has its own authentication mechanism that makes the WebLogic authentication redundant, and it is therefore important to disable the WebLogic Authentication to stop it from interfering with the SMP authentication.
To do so, edit the config.xml
file in SMPDOMAIN/config
by adding the
</security-configuration>
closing tag:
<enforce-valid-basic-auth-credentials>false</enforce-valid-basic-auth-credentials>
Here is an example:
<!-- ... -->
<enforce-valid-basic-auth-credentials>false</enforce-valid-basic-auth-credentials>
</security-configuration>
<!-- ... -->
Configuring Extra CLASSPATH
Here we describe how to set up the smp folder as a classpath on the WebLogic server. See also Deployment Overview).
Edit the WebLogic DOMAIN_HOME/bin/setDomainEnv.sh
.
Add the EXPORT CLASSPATH=${CLASSPATH}:${DOMAIN_HOME}/smp
statement
at the end of the CLASSPATH definition as shown below:
../
if [ "${PRE_CLASSPATH}" != "" ] ; then
fi
/..
../
If NOT "%PRE_CLASSPATH%"=="" (
set CLASSPATH=%PRE_CLASSPATH%;%CLASSPATH% )
set CLASSPATH=%CLASSPATH%;%DOMAIN_HOME%\smp /..
Configuring Sun HTTP handler
Edit the WebLogic DOMAIN_HOME/bin/setDomainEnv.sh
and add the following system parameter.
../
JAVA_OPTIONS=-DUseSunHttpHandler=true export JAVA_OPTIONS
/..
4.4.2. Configuring Tomcat
To deploy the SMP on Tomcat, the steps below need to be completed.
Configuring Extra CLASSPATH
The purpose of the section is to describe how to set up folder smp as a classpath on the Tomcat server.
See also Deployment Overview.
Edit the CATALINA_HOME/bin/setenv.sh
file.
#!/bin/sh
# Set CLASSPATH to include $CATALINA_HOME/smp
# where the smp ‘smp.config.properties’ is located export CLASSPATH=$CATALINA_HOME/smp
Edit the %CATALINA_HOME%/bin/setenv.bat
file.
REM Set CLASSPATH to include $CATALINA_HOME/smp
REM where the ‘smp.config.properties’ is located
set classpath=%classpath%;%catalina_home%\smp
JDBC Driver
The JDBC driver needs to be downloaded from the manufacturer website:
-
For Oracle Database : https://www.oracle.com/database/technologies/appdev/jdbc-downloads.html
-
For Mysql : https://www.mysql.com/products/connector/
The JDBC driver (.jar
file) must be copied to AS_HOME/lib
.
4.5. STEP3 Configuring SMP
4.5.1. SMP Configuration Resources
The SMP configuration is performed in two different locations, the:
-
smp.config.properties
file -
smp_configuration
table
Properties Overview
The DomiSMP 5.0.x configuration has two types of properties:
-
The system configuration properties: the properties are located in
smp.config.properties
file and define environment settings such as JDBC connection, logging configuration, SMP extension library folder, etc. Before the first eDelivery SMP startup, the mandatory database connection properties must be set. The complete system property list is described in SMP Configuration Properties. -
The SMP application properties: the property list with default values is stored at initial startup in the database table SMP_CONFIGURATION. System administrators can change most properties during the runtime without application restart. The complete application property list is described in section SMP Application Configuration Properties.
-
The
smp.config.properties
file must be copied to the CLASSPATH folder configured in -
You can set a different value for a property for SMP’s first startup. To do so, update the property in the
smp.config.properties
file.TipFind a sample smp.config.properties
file in the SMP Source Code Repository.
Multitenancy and Multidomain Support
The SMP is able to support multiple certificates in the same SMP. This is very useful in the Acceptance environment where multiple domains like ISA ITB, eHealth and others are hosted.
The SMP has the capability of keeping a relationship between a particular Service Group and its related domain.
As a result of this feature, the SMP Administration has the option, if need be, to define extra domains for newly created Service Groups meaning that the SMP can handle multiple domains environments.
Note
|
In normal circumstances, when any one SMP is used for only one domain, the domain used is then considered as the "domain by default" (or "default domain") for configuration purposes. The domain, in this case, does not need to be specified in the Service Group definitions or other configurations of the SMP as in previous versions of SMP. |
The SMP configuration is performed in two different locations: in the
smp.config.properties
file as well as in the smp_configuration
table. The following section describes the details of the parameters
that are included in the configuration.
4.5.2. Properties Configuration File
The eDelivery SMP configuration is performed via the smp.config.properties
file.
The initial eDelivery SMP configuration is performed via the smp.config.properties
file.
The file contains basic configuration for defining the database connection, logging file configuration and smp folder for deploying the extensions.
This file is delivered by default embedded within the SMP .war
file.
Sample of smp.config.properties
file
#
# Copyright 2018 European Commission | CEF eDelivery
#
# Licensed under the EUPL, Version 1.2 or - as soon they will be approved by
# the European Commission - subsequent versions of the EUPL (the "Licence");
# You may not use this work except in compliance with the Licence.
#
# You may obtain a copy of the Licence attached in file: LICENCE-EUPL-v1.2.pdf
#
# Unless required by applicable law or agreed to in writing, software
distributed under the Licence is distributed on an "AS IS" basis,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the Licence for the specific language governing permissions and
limitations under the Licence.
#
#
**************************************************************************
# Database connection can be achieved using custom datasource configuration
# or reusing application server datasource.
#
**************************************************************************
## set database hibernate dialect
# smp.database.hibernate.dialect=org.hibernate.dialect.Oracle10gDialect
smp.database.hibernate.dialect=org.hibernate.dialect.MySQL5InnoDBDialect
# *********************************
# Custom defined datasource
# *********************************
# mysql database example
smp.jdbc.driver = com.mysql.jdbc.Driver
smp.jdbc.url = jdbc:mysql://localhost:3306/smp
smp.jdbc.user = smp
smp.jdbc.password=secret123
# Oracle database example
# smp.jdbc.driver = oracle.jdbc.driver.OracleDriver
# smp.jdbc.url=jdbc:oracle:thin:@localhost:1521/xe
# smp.jdbc.user=smp
# smp.jdbc.password=secret123
# *********************************
# Datasource JNDI configuration alternative
# *********************************
# weblogic datasource JNDI example
# smp.datasource.jndi=jdbc/eDeliverySmpDs
# tomcat datasource JNDI example
# smp.datasource.jndi=java:comp/env/jdbc/eDeliverySmpDs
# *********************************
# Logging properties
# *********************************
# smp log folder
smp.log.folder=../logs/
# custom log4j configuration file
# smp.log.configuration.file=smp-logback.xml
# *********************************
# Extension folder
# *********************************
# path where SMP extensions are located. The Folder is loaded by the SMP classloader at startup.
smp.libraries.folder=/cef/test/smp/apache-tomcat-8.5.73/smp/ext-lib
SMP Configuration Properties
The WEB-INF/classes/smp.config.properties
file is used to configure
the initial SMP properties needed for the SMP startup.
SMP Configuration Properties List
Configuration Property | Description and Usage | Default | ||
---|---|---|---|---|
|
Configuration property file path. |
|
||
|
Init configuration property file path. |
|
||
|
Security folder for storing the keystore and the truststore. |
|
||
|
Database Configuration - Driver
|
|
||
|
Database Configuration - URL
|
|
||
|
Database User/Password Configuration - User |
|
||
|
Database User/password Configuration - Password |
|
||
|
If the data source is configured on the application server (*recommended), the property defines the JNDI name of the database connection. |
|
||
|
Print generated sql queries to logs. The property is effective only when |
|
||
|
Auto create/update database objects. The property is effective only when |
|
||
|
The provided logback.xml configuration defines logging file as
With the property we can define the folder for the logging files. |
|
||
|
Custom logback configuration file (filepath can be absolute or relative to smp configuration.dir). |
|
||
|
Path where SMP extensions are located. The folder is loaded by the SMP classloader at startup. |
|
||
|
The development mode uses semi-random generators for password and key generation. Setting the property value to ‘true‘ makes the first startup and access token generation faster. To ensure high security, this option MUST NOT be enabled in production. |
|
SMP Application Configuration
eDelivery SMP application configuration values are stored in the database table SMP_CONFIGURATION
.
If the table is empty (usually at first SMP startup), edelivery SMP populates the table at startup with all properties and default values.
When updating properties via the user interface, the property values are taken into account immediately if the
server starts in non-cluster mode (property: smp.cluster.enabled = false
).
Otherwise, each node refreshes the properties on all cluster nodes at the same time
in accordance with the property refreshes defined in the CRON expression via the
smp.property.refresh.cronJobExpression
property.
SMP Application Configuration Properties List
Configuration Property | Description and Usage | Default | ||
---|---|---|---|---|
|
The name of the DomiSMP instance is used in email notifications and alerts to specify which SMP instance generated the notifications. Usage: |
|
||
|
This property controls pattern of URLs produced by SMP in GET ServiceGroup responses. Usage: |
|
||
|
Allow encoded slashes in context path. Set to true if slashes are part of identifiers. Usage: |
|
||
|
Use (value true) or remove (value false) forwarded headers. There are security considerations for forwarded headers since an application cannot know if the headers were added by a proxy, as intended, or by a malicious client. Usage: |
|
||
|
How long (in seconds) should HSTS last in the browser cache (default one year). Usage: |
|
||
|
Content Security Policy (CSP)
Usage: |
- |
||
Configuration Property |
Description and Usage |
Default |
||
|
The http proxy host. Usage: |
- |
||
|
List of nor proxy hosts. Usage: Default: |
See Description |
||
|
Base64 encrypted password for Proxy. Usage: |
- |
||
|
The http proxy port. Usage: |
80 |
||
|
The proxy user. Usage: |
- |
||
Configuration Property |
Description and Usage |
Default |
||
|
Participant Identifier Schema of each PUT ServiceGroup request is validated against this schema. Usage: Default: |
See Description |
||
|
Error message for UI. Usage: Value Format: OR
Example: |
- |
||
|
Scheme for participant identifier is mandatory. Usage: |
|
||
Configuration Property |
Description and Usage |
Default |
||
|
Specifies the time, in seconds, between client requests before the SMP will invalidate session for ADMIN users (System). Usage: |
|
||
|
Specifies the time, in seconds, between client requests before the SMP will invalidate session for users (Service group, SMP Admin). Usage: |
|
||
|
Define if application is set in cluster. In not cluster environment, properties are updated on set Property. Usage: |
|
||
Configuration Property |
Description and Usage |
Default |
||
|
The URL address for resetting the password in DomiSMP. This URL can be used when DomiSMP is behind a reverse proxy. If the property value is not set, the reset URL is created using reverse proxy headers such as Host and X-Forwarded-Host. Usage: |
- |
||
|
The number of minutes for reset token to be valid. Usage: |
|
||
|
Password minimum complexity rules. Usage: Default: ^(?=.*[0-9])(?=.*[a-z])(?=.*[A-Z])(?=.*[~`!@#$%^&+=\-_<>.,?:;*/()|\[\]\{}'"\\]).\{16,32}$ |
See Description |
||
|
The error message shown to the user in case the password does not
follow the regex put in the Usage: Must have:
|
- |
||
|
Number of days password is valid. Usage: |
|
||
|
How many days before expiration should the UI warn users at login. Usage: |
|
||
|
Force change password at UI login if expired. Usage: |
|
||
Configuration Property |
Description and Usage |
Default |
||
|
Delay response in ms on invalid username or password. Usage: |
1000 |
||
|
Number of console login attempt before the user is deactivated. Usage: |
|
||
|
Time in seconds for a suspended user to be reactivated. Usage:
|
|
||
Configuration Property |
Description and Usage |
Default |
||
|
Number of days access token is valid. Usage: |
|
||
|
Number of accessToken login attempt before the accessToken is deactivated. Usage: |
|
||
|
Time in seconds for a suspended accessToken to be reactivated. Usage:
|
|
||
|
Delay in ms on invalid token id or token. Usage: |
|
||
|
Set list of '|' separated authentication types: PASSWORD|SSO. Usage: |
|
||
|
Set list of "|" separated application-automation authentication types (Web-Service integration). Usage: Default: TOKEN|CERTIFICATE |
See Description |
||
|
Authentication with external module as: reverse proxy. Authenticated data are sent to application using 'Client-Cert' HTTP header. Do not enable this feature without a properly configured reverse-proxy. Usage: |
|
||
|
Authentication with external module as: reverse proxy. Authenticated
certificate is sent to application using Usage: |
|
||
Configuration Property |
Description and Usage |
Default |
||
|
The SSO service provider label. Usage: |
|
||
|
The SSO CAS URL endpoint. Usage: Default: http://localhost:8080/cas/ |
See Description |
||
|
The CAS URL path for login. ${smp.sso.cas.url}/${smp.sso.cas.urlpath.login}. Usage: |
|
||
|
The URL is the callback URL belonging to the local SMP Security System.
If using RP,make sure it target SMP path Usage: |
See Description |
||
|
SMP relative path which triggers CAS authentication. Usage: Default: |
See Description |
||
|
Relative path for CAS user data. Complete URL is composed by parameters: ${smp.sso.cas.url}/${smp.sso.cas.smp.user.data.urlpath} Usage: Default: |
See Description |
||
|
The CAS URL path for login. Complete URL is composed of parameters: ${smp.sso.cas.url}/${smp.sso.cas.token.validation.urlpath} Usage: Default:
|
See Description |
||
|
The CAS token validation key:value properties separated with a pipe ( Usage: Default: acceptStrengths:BASIC,CLIENT_CERT|assuranceLevel:TOP |
See Description |
||
|
Pipe-separated ( Usage: Default: DIGIT_SMP|DIGIT_ADMIN |
See Description |
||
|
If the value is set to true, the user is automatically registered to DomiSMP the first time they use the external CAS. The CAS server provides the necessary user data, which is then mapped to the DomiSMP user entity according to the smp.sso.cas.registration.mapping. Usage: |
|
||
|
The value determines whether the CAS-automatically created user is activated immediately or if the System admin must activate the user before they can log in to DomiSMP. Usage: |
|
||
|
Pipe-separated ( Usage: Default: EMAIL:${email}|FULL_NAME:${firstName} ${lastName} |
See Description |
||
Configuration Property |
Description and Usage |
Default |
||
|
Email configuration: Email server. Usage: |
- |
||
|
Email configuration: SMTP mail port. Usage: |
|
||
|
Email configuration: SMTP mail protocol. Usage: |
smtp |
||
|
Email configuration: SMTP mail protocol; mail sender’s username. Usage: |
- |
||
|
Email configuration: _SMTP mail protocol; mail sender’s encrypted password. Usage: |
- |
||
|
Pipe-separated ( Usage: Example: mail.smtp.auth:true|mail.smtp.starttls.enable:true|mail.smtp.quitwait:false |
- |
||
Configuration Property |
Description and Usage |
Default |
||
|
Enable or disable notifications for user creation events. Usage: |
|
||
|
User creation event notification alert level. Usage: |
|
||
|
Enable or disable notifications when user data is changed. Usage: |
|
||
|
User update data event notification alert level. Usage: |
|
||
|
Enable/disable the login failure alert of the authentication module. Usage: |
|
||
|
Login failure alert level. Usage: |
|
||
|
Enable/disable the login suspended alert of the authentication module. Usage: |
|
||
|
Suspended login alert level. Usage: |
|
||
|
When should the account disabled alert be triggered. Usage:
|
|
||
Configuration Property |
Description and Usage |
Default |
||
|
Enable/disable the "Password about to expire" alert. Usage: |
|
||
|
Number of days before password expiration the system is to send alerts. Usage: |
|
||
|
Frequency in days for (re)sending the "Password about to expire" alert. Usage: |
|
||
|
"Password about to expire" alert’s level. Usage: |
|
||
Configuration Property |
Description and Usage |
Default |
||
|
Enable/disable the "Password expired" alert. Usage: |
|
||
|
Period in days after password expiration the system is to send "password expiration" alerts. Usage: |
|
||
|
Frequency in days between "Password expired" alerts. Usage: |
|
||
|
"Password expired" alert’s level. Usage: |
|
||
Configuration Property |
Description and Usage |
Default |
||
|
Enable/disable the "accessToken about to expire" alert. Usage: |
|
||
|
Number of days before password expiration the system is to send alerts. Usage: |
15 |
||
|
Frequency in days between alerts. Usage: |
|
||
|
AccessToken imminent expiration alert level. Usage: |
|
||
Configuration Property |
Description and Usage |
Default |
||
|
Enable/disable the accessToken expiration alert. Usage: |
|
||
|
Number of days after expiration as for how long the system should send alerts. Usage: |
|
||
|
Frequency in days between alerts. Usage: |
|
||
|
Access Token expiration alert level. Usage: |
|
||
Configuration Property |
Description and Usage |
Default |
||
|
Enable/disable the imminent certificate expiration alert. Usage: |
|
||
|
Number of days before expiration as for how long before expiration the system should send alerts. Usage: |
|
||
|
Frequency in days between alerts. Usage: |
|
||
|
Certificate imminent expiration alert level. Values: \{LOW, MEDIUM, HIGH} Usage: |
|
||
Configuration Property |
Description and Usage |
Default |
||
|
Enable/disable the certificate expiration alert. Usage: |
|
||
|
Number of days after expiration as for how long the system should send alerts. Usage: |
|
||
|
Frequency in days between alerts. Usage: |
|
||
|
Certificate expiration alert level. Usage: |
|
||
Configuration Property |
Description and Usage |
Default |
||
|
Property CRON expression for triggering alert messages. Usage: Default: |
See Description |
||
|
Which instance (hostname) to generates a report when Usage: |
|
||
|
Max alerts generated in a batch for the type. Usage: |
|
||
Configuration Property |
Description and Usage |
Default |
||
|
Alert send mail. Usage: Default: |
See Description |
||
|
Default domain code. Usage:
|
- |
||
Configuration Property |
Description and Usage |
Default |
||
|
Allowed user certificate types. Usage: Example: RSA|EC|Ed25519|Ed448
|
- |
||
|
Usage: |
|
||
|
Default domain code. If the domain cannot be determined from the request, the default domain is used. Usage: |
- |
||
|
Allowed user certificate types. Usage: Example: RSA|EC|Ed25519|Ed448
|
- |
4.5.3. Configuration Table
The smp_domain
table is used to support the multitenancy feature of the SMP.
Its parameters/fields are:
smp_domain
table fields
- SML_SMP_ID
-
This is the SMP ID that must match the SMP ID registered within the SML.
- SML_CLIENT_CERT_HEADER
-
The SMP’s certificate - needed only when accessing BDMSL directly through HTTP. The configured "Client-Cert" HTTP header will be added to each BDMSL request (bypassing SSL certificate verification made normally by SSL terminator).
- SML_CLIENT_KEY_ALIAS
-
This is the Domain scoped alias of the keystore private key used for authentication with the SML. The password is the same as
xmldsig.keystore.password
defined in the SMP configuration file. - SIGNATURE_KEY_ALIAS
-
This field points to the Domain scoped alias of the Keystore private key certificate, used by the SMP to sign GET Signed Service Metadata responses.
- SML_SUBDOMAIN
-
This is the informative identifier of SML domain code (eHealth, Peppol, etc). Since SML subdomain is part of DNS domain it must be a valid DNS domain part.
- DOMAIN_CODE
-
The unique domain code that is used as HTTP domain parameter when adding participants true REST service API to particular a domain. Domain code can be alphanumeric and up to 63 characters long.
Update the default single domain smp_domain table record:
UPDATE smp_domain SET SML_SMP_ID='SMP-MCB-ID14',
SML_CLIENT_KEY_ALIAS= 'smp_mock';
or
UPDATE smp_domain SET SML_SMP_ID='SMP-MCB-ID14',
SML_CLIENT_CERT_HEADER= 'serial=000000000000000000009A195D2DD88C&subject=CN=SMP_1000000000,O=DG-DIGIT,C=BE&validFrom=Oct 21 02:00:00 2014 CEST&validTo=Oct 21 01:59:59 2016 CEST&issuer=CN=Issuer
Common Name,OU=Issuer Organization Unit,O=Issuer Organization,C=BE'
WHERE domainId='default';
4.5.4. Database configuration
The eDelivery SMP database back-end configuration is performed within the eDelivery SMP configuration file (smp.config.properties file).
Depending on the selected database back-end, modify the smp.config.properties files as indicated below. SMP database’s connection can be configured in the properties file, or it can use application server datasource configuration by JNDI.
Oracle Database
-
Datasource configured from property file:
../
## Sample for Oracle
jdbc.driver=oracle.jdbc.driver.OracleDriver
jdbc.url=jdbc:oracle:thin:@[.mark]#localhost:1521/xe
jdbc.user=smp
jdbc.password=secret123
hibernate.dialect=org.hibernate.dialect.Oracle10gDialect
/..
* Datasource (connection pool) configured on the application server
using the JNDI (recommended):
../
hibernate.dialect=org.hibernate.dialect.Oracle10gDialect
# weblogic datasource JNDI example
# datasource.jndi=jdbc/edeliverySmpDS
# tomcat datasource JNDI example
datasource.jndi=java:comp/env/jdbc/edeliverySmpDS
MySQL
-
Datasource configured from property file:
../
# For mysql connector v8
jdbc.driver=com.mysql.cj.jdbc.Driver
# For mysql connector v5
jdbc.driver=com.mysql.jdbc.Driver
jdbc.url=jdbc:mysql://localhost:3306/smp
jdbc.user=smp
jdbc.password=secret123
hibernate.dialect=org.hibernate.dialect.MySQL5InnoDBDialect
/..
Datasource (connection pool) configured on the application server
using the JNDI (recommended)
../
hibernate.dialect=**org.hibernate.dialect.Oracle10gDialect
# weblogic datasource JNDI example
# datasource.jndi=**jdbc/edeliverySmpDS
# tomcat datasource JNDI example
datasource.jndi=**java:comp/env/jdbc/edeliverySmpDS
/..
4.5.5. SMP Keystore
eDelivery SMP uses keystore for storing keys for the two different purposes:
-
One mandatory key is used for signing the responses to GET requests (XMLDSIG response signing).
-
One optional key is used to authenticate SMP using 2-way-SSL when it is calling SML via HTTPS.
If the Keystore does not exist when the SMP is started for the first time, it is automatically created with a sample key/certificate 'sample_key'.
The user with a system administrator role can update/manage the Keystore
entries using the user interface on the
System settings/Keystore page:
4.5.6. SMP Truststore
eDelivery SMP uses truststore for storing trusted X509Certificates for the WebService 2-way-SSL authentication and for storing the SML server certificate. The truststore is automatically created at the initial SMP start-up. The truststore can be managed with a System admin account using the UI tools under the page System settings / Truststore.
4.5.7. Custom Keystore and Truststore
On some systems, generating new passwords and keys can take a long time. To speed up the initial startup, consider the following option:
-
Install faster system random generators.
-
In case of development or local testing, set property: smp.mode.development=true to smp.config.properties. To ensure high security, this option MUST NOT be enabled in production.
-
Use custom/preprepared keystore and truststore as described below.
Users can configure eDelivery SMP to use prepared keystores at initial
startup. To achieve this, the Keystore must be generated manually and
saved in the SMP security folder. If the Keystore already contains the
keys/certificates, they must have the same Key password as it was set
for accessing the Keystore.
The following properties must be set in smp.config.properties
:
-
smp.security.folder
: The security folder of the SMP where the keystore must be located. -
smp.keystore.filename
: The keystore’s filename. -
smp. truststore.password
: Password for accessing the keystore and keys.NoteDecrypted passwords must be wrapped in {DEC}\{[PASSWORD]};.
Example: {DEC}{testPASSkeystore1234}.
../
smp.security.folder=/opt/tomcat/security/
smp.keystore.filename=smp-keystore.p12
smp.keystore.password=\{DEC}\{testPASSkeystore1234}
smp.keystore.type=PKCS12
smp.truststore.filename=smp-keystore.p12
smp.truststore.password=\{DEC}\{testPASStruststore1234}
smp.truststore.type=PKCS12
/..
-
After initial startup, the properties are stored (and the password encrypted) inside the
SMP_CONFIGURATION
table, and they should be removed from thesmp.config.properties
file.
4.6. STEP4 Deploying SMP Application
The eDelivery SMP is deployed using the steps described in the next sections.
4.6.1. Tomcat
Download and copy smp-X.war
file in the Tomcat /webapps
directory
(AS_HOME/webapps/smp.war
).
Note
|
The application context path is the same as the first part
of the smp.war filename.For example, if we deploy the file smp.war , then the application will
be accessible on http://localhost:8080/smp/ .If the deployed file is smp-X.war , the application URL will be:http://localhost:8080/smp-X/ .
|
4.6.2. WebLogic/Oracle
Deploy the .war
file within WebLogic using the Oracle Weblogic
deployer feature or using the Weblogic Administration Console.
An example of using the Oracle ,the weblogic.deployer
, is shown below:
java weblogic.Deployer -adminurl t3://$\{WebLogicAdminServerListenAddress}:$\{WebLogicAdminServerPort} \
-username $\{WebLogicAdminUserName} \
-password $\{WebLogicAdminUserPassword} \
-deploy -name smp.war \
-targets $\{SMP_ManagedServer} \
-source $TEMP_DIR/* smp.war
Installation Verification
Verify the installation by navigating in your browser:
http://<hostname>:<port>/smp
.
If the deployment was successful, the following page is displayed:
4.7. Configuring SMP/BDMSL integration
The eDelivery SMP can establish an BDMSL integration using two identification mechanisms:
-
Using HTTP and plain text with metadata embedded into the HTTP header Client-Cert of the REST request Using HTTP and plain text with metadata embedded into the HTTP header Client-Cert of the REST request.
ImportantThis approach should be used only for testing purposes and only if both BDMSL and eDelivery SMP are located in the same network where the BDMSL web services are not exposed to the internet. -
Using 2-way HTTPS/TLS (recommended).
The BDMSL integration configuration has two parts:
-
Configuration of the BDMSL integration data as: BDMLS URL, SMPs URL, etc.
-
Configuration of the SMP domain credentials/X509Certificate and unique SMP identifier.
4.7.1. Configuring BDSML
The BDMSL integration data can be set using the UI Property tool:
BDMSL Configuration Properties
To configure BDMSL, set the following properties:
-
bdmsl.integration.enabled
: set value to true to enable BDMSL (SML) integration. -
bdmsl.integration.url
: set the URL where BDMSL is located.
Example: https://acc.edelivery.tech.ec.europa.eu/edelivery-sml/ -
bdmsl.integration.logical.address
: set the public SMP URL address. The URL is used by the BDMSL when generating DNS records for the SMP. Do not change this property once the SMP domain is registered to BDMSL. Example:https://smp.domain.eu/smp
. -
bdmsl.integration.physical.address
: IP4 address of the SMP server. The value is informative and can be0.0.0.0
.
2-Way TLS Authentication Configuration Properties
If using the 2-Way TLS authentication, configure:
-
bdmsl.integration.tls.disableCNCheck
: if set totrue
, the BDMSL server domain and Certificate CN value must match with the BDMSL certificate to be trusted. -
bdmsl.integration.tls.useSystemDefaultTruststore
: if set totrue
, the system default truststore is used to verify the BDMSL truststore. The system default truststore usually points to the$JAVA_HOME/lib/security/cacerts
truststore, or is configured on the application server using thejavax.net.ssl.trustStore
system parameter. If the property is set to false, the SMP truststore is used to verify the BDMSL server certificate trust. -
bdmsl.integration.tls.serverSubjectRegex
: regular expression for BDMSL server TLS certificate subject verification.
Example: CertEx. .CN=acc.edelivery.tech.ec.europa.eu.
.
4.7.2. Configuring SMP domain credentials
Once BDMSL integration data is configured, the next step is to configure
the SMP client certificate and ID for the BDMSL authentication. Because
SMP 4.2 can handle multiple domains, each domain can have its
X509Certificate to log into the correct BDMSL DNS domain.
-
Register BDMSL client key/certificate to the SMP Keystore.
-
Create or edit Domain in the UI/Domain tool, enter the SMP ID and choose the client certificate.
-
Choose the authentication type. SML supports two ways of authentication.
- ClientCert
-
HTTP Client-Cert certificate header. This must be used only behind a reverse proxy. The BDMSL should NOT allow this type of authentication from the internet. In practice, the HTTP Client-Cert should be generated only by the reverse proxy.
- HTTPS/TLS*
-
standard mutual TLS authentication (*recommended).
4.8. SMP User Management
The DomiSMP has two user application roles:
-
System Admin: the role allows user to modify DomiSMP system management and settings such as: Domain management, User management, Truststore management, Key management, DomiSMP configuration, etc.
-
User: this role allows the user to log into the DomiSMP.
The user can have additional permissions on editing DomiSMP entities when they are assigned to the Resource, Groups, and Domains. Please read the following chapter for more details.
4.8.1. Domain, Group and Resources
The DomiSMP supports 3-layer security realms.
- Resource
-
the most basic unit.
The Resource is identified by the unique ID, which is part of the URL of the resource as example:A Resource example is the Service Group document from the Oasis SMP specification. The user can be a Resource member with Admin or Viewer membership roles. If the user has an Admin membership role, it can modify resource document(s) and manage the resource memberships. If the user has role Viewer, it can view/read the Resource if the Resource has visibility set to:
Private
. - Group
-
a cluster of resources managed by the dedicated group administrators.
The group admin(s) can create and delete the resource, but only the resource admins can modify data/documents for the resource. The user can be a Group member with Admin or Viewer membership roles. With Admin group membership, the user can create and delete group resources. If the user has group role Viewer, it can view/read the Resources if the Group has visibility set to: “Private”. - Domain
-
the top layer.
It indicates the business purpose of the network of participants, such as invoice exchange, Health Records message exchanges, etc. The Domain usually has a domain owner who handles participant interoperability, defining message types, network authentication, and authorization methods such as Certificate PKI, Identity Service providers, etc.In DomiSMP 5.0, the user with a Domain Admin role can create domain groups and assign users to them.
The provided database script creates the following users:
User name | Role | Default password [1] |
---|---|---|
system |
SYSTEM_ADMIN |
123456 |
user |
USER |
123456 |
4.8.2. User Roles
The following DomiSMP users can be of three types, as briefly described below:
Actor | UC | Short description | Oper. | Data |
---|---|---|---|---|
Group Admin |
Create or Update resource: Service Group |
Create a new
ServiceGroup for a new receiver participant. This service stores the
Service Group and links it to the specified duplet
|
PUT |
ServiceGroup |
Group SMP |
Erase Service Group |
Erases the resource (service group definition) AND the list of sub-resources such as servicemetada for the specified receiver participant. |
DELETE |
ServiceGroup |
Resource |
Create or Update Resource such as: |
Publish detailed information about one specific document service (multiple processes and endpoints). This same service is used to create and update ServiceMetaData. |
PUT |
ServiceMetadata |
Resource |
Erase Service Metadata |
Remove all information about one specific service (i.e. all related processes and endpoints definitions). |
DELETE |
ServiceMetadata |
Anonymous |
Retrieve Service Group |
Obtain the list of public services
provided by a specific receiver participant (collection of references to
the ServiceMetaData’s). This service provides the information related to
the Service Group according to the input duplet |
GET |
ServiceGroup |
Anonymous |
Retrieve Service Metadata |
Obtain detailed definition about one
specific service of a specific participant for all supported transports.
This service retrieves the SignedServiceMetadata according to the input
quadruplet
|
GET |
SignedServiceMetadata |
System admin |
Create, modify, and delete users and domains. System admin can be only used in the DomiSMP UI. |
Note
|
For a complete description of the SMP user management, please
consult the SMP Interface Control Document (ICD) document available at
https://ec.europa.eu/digital-building-blocks/wikis/display/DIGITAL/SMP .
|
+ Users can be added, modified and deleted using the SMP Admin console or directly by executing sql commands. Below are instructions on how to modify users in the database.
4.8.3. BCRYPT password generation
To manage DomiSMP users, you can use the DomiSMP UI console.
Use the procedure below to create the first system admin user.
An alternative is to use the provided SQL init scripts and replace passwords by first login.
The DomiSMP uses the BCRYPT algorithm to hash users' passwords. A BCRYPT-hashing tool is bundled with the SMP WAR file.
To get the hashing code:
-
Place a copy of the
smp-X.war
file into a temporary directory. -
Extract the war file using the
jar
command:
jar -xvf smp-X.war
Obtain one or multiple hashes at once, using the following command:
java -cp "WEB-INF/lib/" eu.europa.ec.edelivery.smp.utils.BCryptPasswordHash* <password_to_be_hashed>
The result is a BCRYPT hash of the specified password (in this example, 123456
)
java -cp "WEB-INF/lib/" eu.europa.ec.edelivery.smp.utils.BCryptPasswordHash 123456
Result:
2a$10$6nYTSUSh2BQfbOLIyCXn8eUViBcnn.WcjUrWOtJlMNDOdAtI85zMa
The next command shows the hashing of several passwords at once, separated by a space in the command.
java -cp "WEB-INF/lib/" eu.europa.ec.edelivery.smp.BCryptPasswordHash*
<password_to_be_hashed_1> <password_to_be_hashed_2>
2a$10$6nYTSUSh2BQfbOLIyCXn8eUViBcnn.WcjUrWOtJlMNDOdAtI85zMa
2a$107zNzSeZpxiHeqY2BRKkHE.HknfIe3aiu6XzU.qHHnnPbUHKtfcmDG
4.8.4. SMP Database User Creation
Adding an SMP user is done by adding a new entry in the SMP database SMP_USER table either directly or via the Administration console.
The User role is set in the SMP_USER table APPLICATION_ROLE column as follows:
User Role | Role value |
---|---|
System Administrator |
SYSTEM_ADMIN |
Domi SMP user |
USER |
AnonymousUser (Not defined in the SMP User database) |
N/A |
In the following examples, a System Admin user is created.
SYSTEM_ADMIN SMP User creation
Note
|
To log in the Administration Console (for the first time),
it is necessary to, create a user with SYSTEM_ADMIN privileges by
entering the details directly into the SMP_USER table.This initial user’s password is generated using the BCRYPT utility described
previously.If PASSWORD_CHANGED is not set, the user will be asked to change the
password at first logon.Example of a SYSTEM_ADMIN user creation:Username: smp_admin Password (Hashed): $2a$10$6nYTSUSh2BQfbOLIyCXn8eUViBcnn.WcjUrWOtJlMNDOdAtI85zMa Role: SYSTEM_ADMIN
|
Execute the following database command using the database user/password created in the Database Configuration section of this guide.
MySql example:
insert into SMP_USER (USERNAME, ACTIVE, APPLICATION_ROLE, EMAIL, CREATED_ON, LAST_UPDATED_ON) values 1,'smp_admin', 1, 'SYSTEM_ADMIN', 'system@mail-example.local', NOW(), NOW()); insert into SMP_CREDENTIAL (FK_USER_ID, CREDENTIAL_ACTIVE, CREDENTIAL_NAME, CREDENTIAL_VALUE, CREDENTIAL_TYPE, CREDENTIAL_TARGET, CREATED_ON, LAST_UPDATED_ON) values ((select id from SMP_USER where USERNAME='smp_admin'),1, 'smp_admin', '$2a$10$olcGeWKGEoRia2DPuFqRNeca0IEdRSmOrljLz57BAjf1jlC9SohrS', 'USERNAME_PASSWORD','UI', NOW(), NOW());
Oracle example:
insert into SMP_USER (ID, USERNAME, ACTIVE, APPLICATION_ROLE, EMAIL, CREATED_ON, LAST_UPDATED_ON) values (SMP_USER_SEQ.NEXTVAL,'smp_admin', 1, 'SYSTEM_ADMIN', 'system@mail-example.local', sysdate, sysdate); insert into SMP_CREDENTIAL (FK_USER_ID, CREDENTIAL_ACTIVE, CREDENTIAL_NAME, CREDENTIAL_VALUE, CREDENTIAL_TYPE, CREDENTIAL_TARGET, CREATED_ON, LAST_UPDATED_ON) values ((select id from SMP_USER where USERNAME='smp_admin'),1,'smp_admin', '$2a$10$olcGeWKGEoRia2DPuFqRNeca0IEdRSmOrljLz57BAjf1jlC9SohrS', 'USERNAME_PASSWORD','UI', sysdate, sysdate);
Note
|
The username/password credential is stored in the SMP_CREDENTIAL table.
|
The record must have the following values set to:
-
CREDENTIAL_VALUE
: the BCrypted password -
CREDENTIAL_TYPE
: value must be set to: 'USERNAME_PASSWORD' -
CREDENTIAL_TARGET
: value must be set to: 'UI' -
FK_USER_ID
: value must be set to user id.
4.9. Logging Configuration
4.9.1. Logging properties
The SMP logging properties are defined in the
./WEB-INF/classes/logback.xml file embedded in the SMP .war
file.
It is possible to modify the configuration of the logs by editing the
embedded logback.xml
or by defining new logback file in
smp.config.properties file as example:
log.configuration.file=/opt/apache-tomcat-8.5.30/smp/logback.xml
In the example below, a logback.xml
file is shown:
More details on how to configure logback can be found at:
4.10. Capability Documents
SMP’s primary function is to store and provide access to participant capability documents. Once stored in DomiSMP, these documents can be accessed via the SMP REST API during the dynamic discovery process. Examples of capability documents are:
-
Oasis SMP 1.0 Service Groups Document
-
Oasis SMP 1.0 ServiceMetadata document
-
Oasis CPPA3-CPP document
The Oasis SMP 1.0 ServiceMetadata document example is shown below:
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<ServiceMetadata xmlns="http://docs.oasis-open.org/bdxr/ns/SMP/2016/05" xmlns:ns2="http://www.w3.org/2000/09/xmldsig#">
<ServiceInformation>
<ParticipantIdentifier scheme="iso6523-scheme-type">0088:123456</ParticipantIdentifier>
<DocumentIdentifier
scheme="my-service-document">document-to-exchang</DocumentIdentifier>
<ProcessList>
<Process>
<ProcessIdentifier scheme="as4-conformance-scheme">conformance-service</ProcessIdentifier>
<ServiceEndpointList>
<Endpoint transportProfile="bdxr-transport-ebms3-as4-v1p0">
<EndpointURI>http://access-point.eu/msh</EndpointURI>
<Certificate>Q2VydGlmaWNhdGUgZGF0YSA=</Certificate>
<ServiceDescription>Service description for partners </ServiceDescription>
<TechnicalContactUrl>www.contact-data-page.eu</TechnicalContactUrl>
</Endpoint>
</ServiceEndpointList>
</Process>
</ProcessList>
</ServiceInformation>
</ServiceMetadata>
DomiSMP categorizes these capability documents into two main levels:
- Resources
-
Resources are the main documents of the participant. An example of a resource document is the Oasis SMP 1.0 Service Groups Document.
- Sub-resources
-
The Sub-resources are the documents that provide additional information about a particular participant’s service. An example of a Sub-resource document is the Oasis SMP 1.0 Service Metadata document. .
4.10.1. Referencing Document Properties
In DomiSMP capability documents have a set of default properties which users can extend by creating custom properties.
DomiSMP also provides the possibility of referencing the values of these user-defined properties by using the following notation:
${custom_prop_name}
This allows users to reference these property values dynamically use them in the content of the document’s XML. When properties' values are modified, their references are updated transparently. DomiSMP replaces all these references before returning the resource via an API call.
Below is an example where ParticipantIdentifier
, DocumentIdentifier
, EndpointURI
, and the Certificate
endpoint are referenced.
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<ServiceMetadata xmlns="http://docs.oasis-open.org/bdxr/ns/SMP/2016/05" xmlns:ns2="http://www.w3.org/2000/09/xmldsig#">
<ServiceInformation>
<ParticipantIdentifier scheme="${resource.identifier.scheme}">${resource.identifier.value}</ParticipantIdentifier> (1)
<DocumentIdentifier scheme="${subresource.identifier.scheme}">${subresource.identifier.value}</DocumentIdentifier> (2)
<ProcessList>
<Process>
<ProcessIdentifier scheme="as4-conformance-scheme">conformance-service</ProcessIdentifier>
<ServiceEndpointList>
<Endpoint transportProfile="bdxr-transport-ebms3-as4-v1p0">
<EndpointURI>${ap.url}</EndpointURI>
<Certificate>${ap.certificate}</Certificate>
<ServiceDescription>Service description for partners </ServiceDescription>
<TechnicalContactUrl>www.contact-data-page.eu</TechnicalContactUrl>
</Endpoint>
</ServiceEndpointList>
</Process>
</ProcessList>
</ServiceInformation>
</ServiceMetadata>
Where:
-
Is resolved as:
<ParticipantIdentifier scheme="iso6523-scheme-type">0088:123456</ParticipantIdentifier>
. -
Is resolved as:
<DocumentIdentifier scheme="my-service-document">document-to-exchang</DocumentIdentifier>
.
Document properties are managed in the console’s document editor under the Document editor/Document properties page.
Document’s default properties are:
-
Resources and sub-resources properties:
-
document.name
- The name of the document. -
document.mimetype
- The version of the document. -
resource.identifier.scheme
- the scheme of the resource identifier. -
resource.identifier.value
- the value of the resource identifier.
-
-
Sub-resource documents properties:
-
subresource.identifier.scheme
- the scheme of the subresource identifier. -
subresource.identifier.value
- the value of the subresource identifier.
-
Other document properties can be defined and managed by the user within the Document properties tool.
4.10.2. Referencing Documents
The document referencing feature enables users to reuse the content of a single document across multiple resources. Prior to DomiSMP 5.1, each resource had its own document where users published their message exchange capabilities.
When multiple participants shared the same Access Point service provider, they all published within their service capabilities the same Access Point data: such as Access Point URL and Certificates. This resulted in multiple documents with the same content. To avoid this redundancy, DomiSMP 5.1 introduced the document referencing feature so that users can reference the same document across multiple resources.
This feature simplifies the maintenance of user’s documents by reusing the same document template data multiple times.
Document referencing combined with placeholders allows users to override specific values with their own (e. g. participant identifier).
When placeholder values are not defined in the final document, the values from the referenced document are used.
To allow documents to be referenced, they must have the Document payload sharing enabled option set in the Document configuration tool. Once the checkbox is selected, the documents can be referenced from other documents.
To reference a document, follow these steps in the Document Configuration tool:
-
Open the document where the reference will be used and choose the Document Configuration tab on the left side of the document editor.
-
Click the Document References button to open the Document Reference dialog.
-
From the Document Reference Table, select the document to be referenced. If the target document is not listed, use the filter fields to narrow the results.
-
Select the document and click the Save button to add the reference.
-
Save the changes to the document.
When retrieving the document via REST API, the referenced document is automatically included in the response.
Important
|
If the document is already referencing another document, it cannot be set as "Shared enabled" as "Shared enabled" documents cannot reference other documents. == Document Review |
DomiSMP offers a basic document review and approval feature, allowing users to review and approve documents before they are published.
Disabled by default, this feature can be enabled for each Resource and Subresource via the DomiSMP Console, in the Resource Details page.
When the review process is enabled for a Resource, this option is applied to all related Sub-resources. The same is true for when disabling the review process.
When the Review process is enabled, the following actions become available to the user in the DomiSMP Document editor page:
-
Submit for review
- allows the user to submit the document for review. -
Approve
- allows the user to approve the document. Visible only for the users with review permissions. -
Reject
- allows the user to reject the document. Resource administrators can always reject documents under review even if when they do not have review permissions for the specific document in review. This ensures that the administrator can remove documents from the review queue.
The documents can be reviewed/approved only by the resource administrators that have the review permission enabled. The permissions can be set in the DomiSMP Console in the Edit Resource page. Once the document is approved, it can be published.
The reviewers can find documents under review in the DomiSMP Console in the Review page.
by double-clicking on the document, the reviewer can see the document details, and approve or reject it. == Localization
Currently, DomiSMP provides language support and date/time format per locale.
4.10.3. Translations
By default, DomiSMP UI ships in English, but it provides support for multiple languages. This feature allows users to add custom translations.
4.10.4. Setting Custom Translations
DomiSMP loads user provided translations from a pre-configured folder in its installation location.
The location of this folder is set via the smp.locale.folder=locales
configuration property.
This property takes as value either a relative or an absolute path to a directory accessible from the machine where DomiSMP is running on.
If relative, the provided path describes the file’s location relative to the working directory of the server into which DomiSMP is deployed. If the directory does not yet exist, DomiSMP creates it along with all its parents when at startup.
Multiple custom translations files can be deployed at the configured location.
Translation files are .json
files with names that are:
-
prefixed with
ui_
; -
followed by the ISO 639 language code (
en
,fr
, etc.).
DomiSMP automatically loads new valid translation files placed at the configured location.
See below a part of the default ui_en.json
file’s:
ui_en.json
```json
{
"column.selection.link.all": "All",
"column.selection.link.none": "None",
"column.selection.link.show": "Show columns",
"column.selection.link.hide": "Hide columns",
"cancel.dialog.text": "Do you want to cancel all unsaved operations?",
"cancel.dialog.title": "Unsaved data",
...
}
```
When creating a new translation of the UI, copy the default ui_en.json
file in order to reuse the labels referencing UI items, such as column.selection.link.show
and replace the language values with its equivalents in the new language.
This new file should be named using the correct language code. See below a partial example for a French translation file.
See also DomiSMP Supported Locales.
ui_fr.json
```json
{
"column.selection.link.all": "Tout",
"column.selection.link.none": "Aucun",
"column.selection.link.show": "Afficher les colonnes",
"column.selection.link.hide": "Masquer les colonnes",
"cancel.dialog.text": "Voulez-vous annuler toutes les opérations non enregistrées ?",
"cancel.dialog.title": "Données non enregistrées",
...
}
```
DomiSMP Supported Locales
File | Locale |
---|---|
|
Bulgarian |
|
`Czech |
|
Danish |
|
German |
|
Greek |
|
English |
|
Spanish |
|
Estonian |
|
Finnish |
|
French |
|
Croatian |
|
Hungarian |
|
Italian |
|
Lithuanian |
|
Latvian |
|
Maltese |
|
Dutch |
|
Polish |
|
Portuguese |
|
Romanian |
|
Slovak |
|
Slovenian |
|
Swedish |
4.10.5. Setting User’s Language Preference
Once a translation file is created in the locales folder (see Setting Custom Translations) and loaded in DomiSMP, users
can then set their preferred language by navigating to the User Profile page in the DomiSMP UI and selecting the
corresponding value from the dropdown.
Note
|
The DomiSMP Console’s Language preference option in User Profile is currently listing all European countries
official languages. If you would like to see other languages added on the dropdown, please contact eDelivery Support. |
If a user selects a language for which a translation file cannot be found, DomiSMP then loads English, the default
translation file.
This user preference is remembered between visits.
4.11. SMP SOAP UI
The SOAP UI can be used to create, update and delete Service Groups and Metadata.
An SMP SoapUI project contains sample requests and is included in the zip file already downloaded.
The procedure to create, update or delete a Service Group is described in the next steps.
4.11.1. Service Groups CRUD Operations
CREATE Service Group
In the left navigation pane of the SoapUI interface, browse to the REST PUT method as shown below:
UPDATE Service Group
The REST method to update the ServiceGroup is the same as the one used for creating ServiceGroup described in the previous section.
DELETE ServiceGroup
On the SoapUI interface on the left navigation panel, browse to the REST DELETE method as indicated below:
4.11.2. Service Metadata CRUD Operations
CREATE Service Metadata
In the left navigation pane of the SoapUI interface, browse to the REST PUT method as shown below:
UPDATE Service Metadata
The REST method to update ServiceMetadata
is the same as the one use
for creating ServiceMetadata
as described in the previous section.
DELETE Service Metadata
In the left navigation pane of the SoapUI interface, browse to the
REST DELETE
method as indicated below:
4.12. Compiling SMP
4.12.1. Compilation Prerequisites
The eDelivery SMP can be built on the following OS platforms:
-
Windows Workstation & Server
-
Linux platform
The following software components are required on the target system:
-
Java Development Kit environment (JDK), version 8:
http://www.oracle.com/technetwork/java/javase/downloads/index.html -
Maven 3.6 and above (https://maven.apache.org/download.cgi)
-
GIT (optional: Git is only used to download the project sources but these sources can be downloaded from any system having Git installed and then just copied manually on the compilation platform).
4.12.2. Downloading the Source Code
The source code of SMP is freely available and can be downloaded from the
SMP Source Code Repository.
URL
SMP Source Code Repository:
https://ec.europa.eu/digital-building-blocks/code/projects/EDELIVERY/repos/smp/browse
4.12.3. Compiling SMP Source Code
-
Create a new
/comp_dir
temporary directory. -
From
/comp_dir
, execute:git clone https://ec.europa.eu/digital-building-blocks/code/scm/edelivery/smp.git
-
Go to the newly created
/smp
directory.Using a ls command in the above-mentioned directory renders the following contents:
pom.xml README.md smp-api smp-parent-pom smp-server-library smp-soapui-tests smp-webapp
-
Start the compilation by executing the following command:
mvn clean install -DskipTests
-
A successful compilation will result with the following:
mvn clean install -DskipTests
Expected Console Output[INFO] Scanning for projects… /.. ../ [INFO] Installing /home/smpcomp/smp/smp/pom.xml to /home/smpcomp/.m2/repository/eu/europa/ec/smp/3.X/smp-3.X.pom [INFO] ------------------------------------------------------------------------ [INFO] Reactor Summary: [INFO] [INFO] smp-angular ........................................ SUCCESS [132.375 s] [INFO] smp-api ............................................ SUCCESS [32.375 s] [INFO] smp-server-library ................................. SUCCESS [02:01 min] [INFO] smp-webapp ......................................... SUCCESS [23.314 s] [INFO] SMP Builder POM .................................... SUCCESS [2.222 s] [INFO] ------------------------------------------------------------------------ [INFO] BUILD SUCCESS [INFO] ------------------------------------------------------------------------ [INFO] Total time: 03:00 min [INFO] Finished at: 2017-06-08T11:35:27+02:00 [INFO] Final Memory: 61M/726M [INFO] ------------------------------------------------------------------------
As a result the web application, smp.war
, is created in the /smp-webapp/target/
directory.
Using a ls command in the above-mentioned directory renders the following contents:
smp-X smp.war classes generated-sources generated-test-sources maven-status test-classes webapp-classes
4.13. SMP Admin Console
The SMP Admin console enables:
-
Anonymous users to search and explore published data in the SMP.
Anonymous users can search for participants by participant ID, schema, or domain. -
Service Group administrators to manage owned Service groups; SMP administrators to manage Service groups registered on SMP, and System Administrators to manage users and domains
The Admin console dashboard is reachable via the following URLs:
http://[host]:[port]/smp%5b-version%5d/iu/[http://[host]:[port]/smp[-version]/iu/]
If the deployment package (war file) filename changed in order to simply
upgrade the old SMP version as for example smp-4.0.0.war
to cipa-smp-full-webapp.war
,
then the application root context might change as well.
Example:
http://wlal0079a.cc.cec.eu.int:1043/cipa-smp-full-webapp/ui/[http://
[host]:[port]/cipa-smp-full-webapp/ui/].
Two types of application roles are defined in the SMP Admin Console:
-
System Administrator: this is a super admin who can manage SMP users and domains.
-
User: a regular user of the DomiSMP: the user can administer Domains, Groups and Resources according to membership roles described in SMP User Management.
When users are logged, their role is displayed in read-only mode (as a label). Only the System Administrator can change the role of another user.
|
5. Interface Description
|
eDelivery building blocks helps public administrations exchange electronic data and documents with other public administrations, businesses and citizens, in an interoperable, secure, reliable and trusted way. By using this building block, every participant becomes a node in the network using standard transport protocols and security policies. eDelivery is based on a distributed model, allowing direct communication between participants without the need to set up bilateral channels.
See Also
|
Guide’s Purpose, Scope and Target Audience
This document defines the participant’s interface to the SMP component of the eDelivery building block as it will extend and evolve in sight of its usage in the framework of eHealth and its additional requirements.
This use case/interface control document will be used as reference for mutual understanding of eHealth requirements on the one hand and the future service delivered by the Digital Europe Programme on the other hand.
This document is a high-level functional definition of the services provided by SML. This document will be later extended with additional document that further detail the services with technical information intended for the development of eHealth client solutions implementation.
This document is intended for:
-
architects and development teams of the Digital Europe Programme for committing on future service delivery of SMP
-
architects and functional analysts of the eHealth team for validating the intended service against their requirements.
Useful References
All the concepts used throughout this document have been defined in the following documents:
Document | Description |
---|---|
Short description of HTTP Methods for RESTful Services. |
|
- |
|
This document describes a protocol for publishing service metadata within a 4-corner network. |
|
Capability Lookup is a technical service to accommodate a dynamic and flexible interoperability community. A capability lookup can provide metadata about the communication partner’s interoperability capabilities on all levels defined in the European Interoperability Framework. |
|
e-SENS will use SML (Simple Metadata Publisher) specification originally developed by PEPPOL and generalised and standardised by OASIS.TheSMPspecification usually complements the Location LookUp ABB. |
|
This document describes the REST (Representational State Transfer) interface for Service Metadata Publication within the Business Document Exchange Network (BUSDOX). |
|
This document is the Software Architecture document of the CIPA eDelivery Business Document Metadata Service Location application (BDMSL) sample implementation. It intends to provide detailed information about the project: 1) An overview of the solution 2) The different layers 3) The principles governing its software architecture. |
|
This document defines the profiles for the discovery and management interfaces for the Business Document Exchange Network (BUSDOX) Service Metadata Locator service. |
|
This document describes the version 2.0 of the Oasis SMP standard. |
Important
|
documents listed in bold italic red in the above list are to be considered for the detailed design and the implementation of the SMP as this one must be fully compliant to those specifications. |
SMP Role
The role of SML in the Four Corner Model is to allow:
-
servers (receivers) to publish the definition of the services they provide, i.e., the documents they are able to receive and the means through which they can receive them,
-
clients (senders) to find out the definitions of those services.
To that end, SMP provides services for:
-
receivers to register services definitions (such as “put metadata”);
-
senders to consult those definitions (“retrieve metadata”).
SMP/SML Interactions
To promote the consistency of the whole process SMP sends location information to SML of:
-
SMP's own location to allow senders to discover SMP;
-
all Access Points providing access to declared
ServiceGroups
of the participants SMP is managing.
SML exposes multiple management services allowing SML to declare new location information or any related changes. They are:
- Manage participant identifiers interface
-
the interface for Service Metadata publishers for managing the metadata relating to specific participant identifiers that they make available.
- Manage service metadata interface
-
the interface for Service Metadata publishers for managing the metadata about their services, e.g., binding, interface profile and key information.
Note
|
TManage participant identifiers interface and Manage service metadata interface are not detailed here but the document will refer to these when they are invoked from SML REST services. Refer to the Execution sections of the REST Services definitions below for further details on these interactions.
|
See Also
|
The PEPPOL Transport Infrastructure Service Metadata Locator (SML) document. |
SML also exposes the,
- Service Metadata discovery interface
-
This is the lookup interface which enables senders to discover service metadata about specific target participants. As it is out of the scope of this document this service is not further discussed in the present document.
Note
|
This functionality isn’t addressed currently, but is planned for a future release. The use cases envisioned for this functionality are: UC08 - Register SMP UC09 - Change SMP Location UC10 - Unregister SMP UC11 - Migrate Metadata SMP |
Data model
The SMP interface is built around the data it is intended to manage. Therefore, this document starts by defining the data itself.
Logical data model
The diagram below depicts the major parts of the data model describing the configuration held by SML and managed through the interface described in this document. This model is another view of the XSD definition that can be found in the XSD Files section.
ServiceGroup
A service group is defined as structure that represents a set of services associated with a specific Participant identifier that is handled by a specific Service Metadata Publisher. The ServiceGroup structure holds a list of references to ServiceMetadata resources in the ServiceList structure
See Also
|
Data Model in PEPPOL Transport Infrastructure Service Metadata Publishing (SMP)). |
See Also
|
Refer to Identifiers in Oasis SMP 1.0 or Interfaces and Data Model in Oasis SMP 1.0 for more details and additional references about identifiers of participants (/businesses), documents and processes. |
ServiceMetadata
ServiceMetadata is defined as “_a structure that represents Metadata about a specific electronic service. The role of the ServiceMetadata structure is to associate a participant identifier with the ability to receive a specific document type over a specific transport […]”.
See Also
|
Refer to Identifiers in Oasis SMP 1.0 or Interfaces and Data Model in Oasis SMP 1.0 for more details and additional references about identifiers of participants (/businesses), documents and processes. |
Process
You can find the following definitions for ServiceMetadata
:
"a structure that reresents Metadata about a specific electronic service. The role of the ServiceMetadata structure is to associate a participant identifier with the ability to receive a specific document type over a specific transport."
“It also describes which business processes a document can participate […]”
"… and it is the purpose of this intermediate entity (Process) to hold
the process-related information (i.e. its identifier and scheme), and to
allow a participant to use a document type to participate in multiple
business processes (when applicable)."
"It also describes which business processes a document can participate […]"
Endpoint
The endpoint is the ultimate entity, holding all the necessary information for all services of the ServiceGroup to be accessed by the sender in order to send document(s) to the receiver.
See Also
|
2.3.3.3 Description of the individual fields (elements and attributes) and 2.3.4.4 Description of the individual fields (elements and attributes) in Service Metadata Publishing (SMP) Version 1.0 and see PEPPOL Transport Infrastructure Service Metadata Locator (SML). |
XSD element | Description |
---|---|
endpointURI Oasis SMP 1.0 Element: /ServiceEndpointList/ Endpoint/EndpointURI Oasis SMP 2.0 Element: /sma:ProcessMetadata/sma:Endpoint/smb:AddressURI |
The address of an endpoint, as a URL. |
transportProfile Oasis SMP 1.0 Element: ServiceInformation/ ProcessList/../Endpoint/ @transportProfile Oasis SMP 2.0 Element: /ServiceMetadata/sma:ProcessMetadata/sma:Endpoint/smb:TransportProfileID |
Indicates the type of transport method that is being used between access points |
requireBusinessLevelSignature Oasis SMP 1.0 Element: ServiceInformation/ProcessList/../Endpoint/ |
Indicates the type of transport method that is being used between access points. |
requireBusinessLevelSignature Oasis SMP 1.0 Element: ServiceInformation/ ProcessList/../Endpoint/ RequireBusinessLevelSignature Oasis SMP 2.0 Element: / |
Set to “true” if the recipient requires business-level signatures for the message, meaning a signature applied to the business message before the message is put on the transport. This is independent of the transport-level signatures that a specific transport profile might mandate. This flag does not indicate which type of business-level signature might be required. Setting or consuming business-level signatures would typically be the responsibility of the final senders and receivers of messages, rather than a set of gateways. |
minimumAuthenticationLevel Oasis SMP 1.0 Element: ServiceInformation/ ProcessList/../Endpoint/ MinimumAuthenticationLevel Oasis SMP 2.0 Element: / |
Indicates the minimum authentication level that recipient requires. The specific semantics of this field is defined in a specific instance of a 4-corner infrastructure. |
serviceActivationDate Oasis SMP 1.0 Element: ServiceInformation/ ProcessList/../Endpoint/ ServiceActivationDate Oasis SMP 2.0 Element: sma:ProcessMetadata/sma:Endpoint/smb:ActivationDate |
Activation date of the service. Senders should ignore services that are not yet activated. Format of ServiceActivationDate date is xs: dateTime. |
serviceExpirationDate Oasis SMP 1.0 Element: /ProcessList/../Endpoint/ ServiceExpirationDate Oasis SMP 2.0 Element: sma:ProcessMetadata/sma:Endpoint/smb:ExpirationDate |
Expiration date of the service. Senders should ignore services that are
expired. Format of |
certificate Oasis SMP 1.0 Element: /ProcessList/../Endpoint/ Certificate Oasis SMP 2.0 Element: /ServiceMetadata/sma:ProcessMetadata/sma:Endpoint/sma:Certificate |
Holds the complete [X509v3] signing certificate of the recipient gateway, as a PEM base 64 encoded DER formatted value. |
serviceDescription Oasis SMP 1.0 Element: /ProcessList/../Endpoint/ ServiceDescription Oasis SMP 2.0 Element: / |
A human-readable description of the service |
technicalContactUrl Oasis SMP 1.0 Element: /ProcessList/../Endpoint/ TechnicalContactUrl Oasis SMP 2.0 Element: /ServiceMetadata/sma:ProcessMetadata/sma:Endpoint/smb:Contact |
Represents a link to human-readable contact information. This might also be an email address. |
technicalInformationUrl Oasis SMP 1.0 Element: /ProcessList/../Endpoint/ TechnicalInformationUrl Oasis SMP 2.0 Element: |
A URL to human-readable documentation of the service format. This could for example be a website containing links to XML Schemas, WSDLs, Schematrons and other relevant resources. |
extension Oasis SMP 1.0 Element: /Process/Extension Oasis SMP 2.0 Element: /ServiceMetadata/sma:ProcessMetadata/ext:SMPExtensions |
The extension element may contain any XML element. Clients MAY ignore this element. It can be used to add extension metadata to the process metadata block as a whole. |
extension Oasis SMP 1.0 Element: /ServiceInformation/ Extension Oasis SMP 2.0 Element: / |
The extension element may contain any XML element. Clients MAY ignore this element. It can be used to add extension metadata to the service metadata. |
XSD files
Two XSDs are used to support the overall processes as defined in User Administration Process.
- 1 Original official OASIS SMP XSD
-
the standard XSD as published by OASIS and which defines the interface for the storage and retrieval of participant’s information, see Original official OASIS SMP XSD.
- 2 Extended SMP XSD
-
defines the structure of error messages, see Extended SMP XSD.
Use Cases Overview
System Admin |
|
A user granted rights to administer the Domain Admin type of users. This role is symbolised by 4 stars (it has the highest authority). The system admin is application role with permissions to configure SMP systems settings. |
|
Domain Admin |
|
A user granted to administer the Domain groups. The domain groups are group of users in the domain/network. This role has the authority to create/delete groups and manage their memberships. |
|
Group Admin |
|
A user granted rights to administer the participants for the group. The group admin administers the resources (Service groups) and assigns the memberships to the resources. |
|
Resource Admin |
|
A user granted rights to administer the national access points (i.e. one or more ServiceGroups); i.e. to define the access points services metadata. This role is symbolised by 1 single stars (it has the authority to administer (update) the resource (service groups) and subresources (ServiceMetadata), but cannot create or delete the resource). |
|
User |
Any participant sending documents to any other receiver participant and consulting SML in that purpose. This role is symbolised by no single star since he has only public read accesses. |
In addition to the roles described above, two additional relevant terms are used:
- Sender
-
refers to an actor who uses the system (SML) on the left hand side of the four corner model introduced in eDelivery in a nutshell. In the current use cases, the sender only behaves as a
User
(see the Actors list above). - Receiver
-
refers to an actor who uses the system (SML) on the right hand side of the same model. In the current use cases, the receiver behaves as
Resource Admin
.The
System Admin
being neither on the left nor on the right of that model, but rather on top of it, is never referred to as sender nor as receiver.
Use Cases Diagrams
Use Cases List
Use Cases List
ID | Actor | UC | Description | Operation | Data |
---|---|---|---|---|---|
UC01 |
System Admin |
Manage Administrators |
Create and modify user information in the SMP Aministrator table. |
N/A |
User (table) |
UC02 |
Group Admin |
Create or Update Resources/Service Group |
Create a new ServiceGroup for a new receiver participant. |
|
|
UC03 |
Group Admin |
Erase Resource/Service Group |
Erases the service group definition AND the list of services for the specified receiver participant. |
|
|
UC04 |
Resource Admin |
Create or Update Service Metadata |
Publish detailed information about one specific document service (multiple
processes and endpoints). |
|
|
UC05 |
Resource Admin |
Erase Service Metadata |
Remove all information about one specific service (i.e. all related processes and endpoints definitions). |
|
|
UC06 |
User |
Retrieve Service Group |
Obtain the list of services provided by a specific receiver participant (collection of references to the ServiceMetaData’s) |
|
|
UC07 |
User |
Retrieve Service Metadata |
Obtain detailed definition
about one specific service of a specific participant for all supported
transport. |
|
|
User Stories
Below we list a typical use cases sequence thinking of a real-life example.
When the sequence step involves the SML system, the corresponding SML Use Case ID is referenced.
Otherwise, if the step only involves SML partially, UC N/A is mentioned.
-
(UC01) As a System Admin, I create a new
Group Admin
to allow the creation and the management of a newServiceGroup
for a participant. -
(UC01) As a System Admin, I create a new
Resource Admin
to allow the creation and the management of the metadata of that new ServiceGroup. -
(UC02) As a Group Admin, I create a new
ServiceGroup
and link it to the administratorResource Admin
to allow the management ofServiceMetadata
for the related participant. -
(UC04) As a Resource Admin, I define all the
ServiceMetadata
for the participant that I administer. -
(UC N/A) As a User, I ask the DNS to resolve the address of SML hosting the receiver’s metadata.
-
(UC07) As a User, I retrieve the definition of the service (metadata) I need to invoke to send a document to the receiver.
-
(UC N/A) As a User, I send the document to the receiver.
Administration Use Cases
Paragraphs 2.4 and 2.5 define the use cases listed above with more detail.
The following use cases (of this paragraph 2.4) are intended for the
different types of administrators in order to define all services
(ServiceGroup
and ServiceMetada
).
UC01 Manage Administrators
UC01 Use Case Description
This use case introduces the foundation for an administration console: creating an ‘Group Admin’ user is the task of superuser, and no REST service shall consequently support that functionality. As this is a necessary functionality, this one should be included into the administration console.
Create and modify administrator information in SMP table Administrator
.
Note
|
This is a temporary solution planned to be later replaced by functionality in the administration console. |
-
System Admin
The actor (system admin) has all access rights to modify content of SMP configuration tables.
Step | Description |
---|---|
1 |
System admin creates a new administrator in table 'Administrator' |
2 |
Use case ends with success |
Step | Description |
---|---|
1a |
Administrator must be removed |
1a1 |
System admin removes all ServiceGroup definitions linked to that administrator by calling "DeleteServiceGroup" SMP service for all ServiceGroups this administrator is linked to (as defined by the "ownership" relationship). |
1a2 |
System admin removes the administrator from table 'Administrator'. |
1b |
New administrator must take over administration of some participant(s) |
1b1 |
After creating the new user (step 1), the system admin reassigns specific ServiceGroups to that user by changing the 'username' foreign key in table Ownership. |
1b2 |
Use case ends. |
1c |
Administrator already exists and must be modified |
1c1 |
System admin modifies some data (role, password) of the user in table 'User'. |
1c2 |
Use case ends. |
N/A
-
Administrator definition has been modified
Failure Conditions N/A
REST Service: None
This functionality should be implemented into the administrator’s console of SML which is not further detailed it the present document.
UC02 Create/Update Service Group
UC02 Use Case Description
Create a new ServiceGroup for a new receiver participant.
This service stores the Service Group and links it to the specified
duplet participantIdentifier
+ participantIndentifierScheme
.
Information is stored into ServiceGroup table.
This same service is used to create and update a ServiceGroup.
-
Group Admin
-
The authenticated user has the role of
Group Admin
. -
If the ServiceGroup is managed remotely, the Resource Admin must have been created before in the
Administrator
table. -
Identifier and scheme of the service group provided in the request must comply to the policy defined in OpenPEPPOL AISBL - Policy for use of Identifiers.
-
If SML is serving multiple domains, the header field
Domain
must be populated and refer to one of the domains served by SML.
Step | Description |
---|---|
1 |
The receiver declares its service group and the related Administrator (Resource Admin) to SML. |
2 |
The SMP authenticates the user, validates the request, and add or replace the information into its configuration database and passes the information to SML. |
3 |
The receiver receives the confirmation that the definitions were stored properly with HTTP response "201 Created". |
4 |
Use case ends with success. |
3a | ServiceGroup already exists |
---|---|
3a1 |
The receiver receives the confirmation that the definitions were
updated properly with HTTP response |
3a2 |
Use case ends with success. |
1a | SMP is not reachable |
---|---|
1a1 |
The user receives a network connection error. |
1a2 |
Use case ends. |
2a |
Authentication / Authorization fails |
2a1 |
The SMP replies with HTTP error "401 Unauthorized" |
2a2 |
The receiver receives the error message |
2a3 |
Use case ends. |
2b |
Request is not well formed (or any other business/technical error) |
2b1 |
The SMP replies with HTTP error "400 Bad request" or "500 Internal server error" with details on the error allowing to identify the error in the request (cf. "Error codes" table below). |
2b2 |
The receiver receives the error message. |
2b3 |
Use case ends. |
2c |
SMP is serving multiple domains and the Domain field is not specified in the header |
2c1 |
The SMP replies with HTTP error |
2c2 |
The receiver receives the error message. |
2c3 |
Use case ends. |
2d |
Domain field refers to a domain that is not served by SML |
2d1 |
The SMP replies with HTTP error "400 Bad request" (business code WRONG_FIELD) with message: Requested domain does not exist " (followed by the domain field value). |
2d2 |
The receiver receives the error message. |
2d3 |
Use case ends. |
N/A
-
ServiceGroup is either created or updated, and the corresponding Resource Admin is defined.
-
In case of error, no change occurs into the configuration database and the response gives technical details on the exception condition.
REST Service: PutServiceGroup
-
In the URL:
-
The participant’s identifier and identifier’s scheme (
ParticipantIdentifier
).
-
-
In the header (optional fields):
-
the Certificate Identifier required for authenticating the remote user as "Resource Admin" for this service group.
NoteIf the Certificate Identifier is not provided, the "Group Admin "will manage the metadata of that Service Group – the username of the basic authentication is used to identify the "Group Admin " to link him with the Service Group. -
The "Domain" for which the ServiceGroup must be created.
Notethis field is optional and relevant only if SML is serving multiple domains. In that case this field must be provided.
-
-
In the TEXT:
a ServiceGroup structure as defined in the standard OASIS XSD (cf. 3.1.1 - "Original official OASIS SMP XSD") containing:-
The Participant’s identifier and scheme that uniquely identifies this service group;These must be identical to the ones provided in the URL.
-
Optionally, the Extension information in the HTTP TEXT.
-
ServiceGroup-Owner
structure details:-
The following attributes of the certificate are used in this order:
-
CN,
-
O,
-
C, and
-
Serial number
-
An example is the following certificate,
sno=0001&subject=EMAILADDRESS=receiver@test.be, CN=SMP_receiverCN,
OU=B4, O=DIGIT, L=Brussels, ST=BE, C=BE:df48f09389f034&validfrom=Jun 1
10:37:53 2015 CEST&validto=Jun 1 10:37:53 2035
CEST&issuer=EMAILADDRESS=root@test.be,CN=rootCN,OU=B4,O=DIGIT,L=Brussels,ST=BE,C=BE
would be provided in the HTTP header:
ServiceGroup-Owner: CN=SMP_receiverCN, O=DIGIT, C=BE:df48f09389f034
-
Start a new transaction.
-
Create or update (overwrites) the corresponding rows in the configuration, ownership and ServiceGroup identified by the participant’s identifier and identifier’s scheme keys:
-
If attribute
ServiceGroup-Owner
is present in the HTTP Header, then use this as information to store asIdentifier
. Else, store instead the basic authentication information provided in the HTTP header.
In the case of:
-
a newly created
ServiceGroup
, invoke "SML’s Create Business Identifier" service. -
an existing
ServiceGroup
, invoke "SML’s Delete Business Identifier" and the "Create Business Identifier" services. -
If the service invocation:
-
succeeds, commit the transaction.
-
fails, rollback the transaction.
-
-
If necessary (Delete succeeded), try to reinvoke the "Create Business Identifier" service with the old information to restore SML properly;
-
The Response to this service is “failure”.
-
-
Return a response confirming the success (or eventually the failure) of the operation.
Sample Request
HTTP Header
(No AdminServiceGroup
authentication information – Group Admin creates or updates the ServiceGroup
)
PUT
http://smp-digit-mock.publisher.ehealth.acc.edelivery.tech.ec.europa.eu/ehealth-actorid-qns::urn:poland:ncpb
HTTP/1.1
Host: smp-digit-mock.publisher.ehealth.acc.edelivery.tech.ec.europa.eu
Accept: application/xml
Content-Type: application/xml
Authorization: Basic dXNlcjpwYXNz
Content-Length: 278
HTTP Header (Resource Admin authentication information is certificate)
Host: smp-digit-mock.publisher.ehealth.acc.edelivery.tech.ec.europa.eu
Accept: application/xml
Content-Type: application/xml
ServiceGroup-Owner: CN=SMP_1000000181,O=DIGIT,C=DK:406b2abf0bd1d46ac4292efee597d414
Authorization: Basic dXNlcjpwYXNz
Content-Length: 278
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<ServiceGroup xmlns="http://docs.oasis-open.org/bdxr/ns/SMP/2016/05">
<ParticipantIdentifier
scheme="ehealth-actorid-qns">urn:poland:ncpb</ParticipantIdentifier>
<ServiceMetadataReferenceCollection/>
</ServiceGroup>
HTTP header HTTP/1.1 201 Created
Server: Apache-Coyote/1.1
Pragma: No-cache
Expires: Thu, 01 Jan 1970 01:00:00 CET
Content-Length: 0
Date: Wed, 27 Jan 2016 10:32:40 GMT
Cache-Control: no-cache, proxy-revalidate
Connection: Keep-Alive
Note
|
If the ServiceGroup previously existed, 200 OK is returned as
HTTP response instead of 201 Created as showed in the above example.
|
N/A
HTTP code | HTTP Message | Business code | Meaning |
---|---|---|---|
|
|
N/A |
The request was completed successfully. |
|
|
N/A |
The PUT operation completed successfully. |
|
|
|
The XML included in the request is not validate against the XSD defining the input structure. |
|
Some field that is optional in the XSD but mandatory for this invocation is missing (missing field name in description). |
||
|
Some field is valid against XSD definition, but the more specific content is invalid (erroneous field name in description). + Or + Some header field is either missing or invalid. |
||
|
Some field is expected to have a specific format is not valid (erroneous field name in description). |
||
|
The referenced " Resource Admin" was not found as Administrator. |
||
|
|
|
The user is not granted the right to issue this request. |
|
|
|
The requested information was not found. |
|
|
|
Some unexpected technical error occurred (detailed information is available in the response). |
Note
|
The business code and the description are both in the response, and are compliant with `ErrorResponseType`as described in Errors Structure Detail. |
Audit information that must be audited per service:
Logged Info | UC1 | UC2 | UC3 | UC4 | UC5 | UC6 | UC7 |
---|---|---|---|---|---|---|---|
|
- |
x |
x |
x |
x |
- |
- |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
- |
- |
x |
x |
- |
x |
|
- |
- |
- |
x |
x |
- |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
- |
x |
x |
? |
? |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
- |
- |
- |
- |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
- |
- |
|
- |
x |
x |
x |
x |
- |
- |
Note
|
See also Auditing. |
UC03 Erase Service Group
UC03 Use Case Description
Erases the service group definition and the list of services for the specified receiver participant.
-
Group Admin
-
The authenticated user has the role of "Group Admin".
-
Referenced service group was previously defined.
Basic Flow
Step | Description |
---|---|
1 |
The receiver requests its service group to be removed from SML. |
2 |
The SMP authenticates the user, validates the request, and removes all the information on the service group from its configuration and from SML. |
3 |
The receiver receives the confirmation that the definitions were removed properly with HTTP response |
4 |
Use case ends with success. |
Exception flows
1a | SMP is not reachable |
---|---|
1a1 |
The user receives a network connection error. |
1a2 |
Use case ends. |
2a |
Authentication / authorization fails |
2a1 |
The SMP replies with HTTP error |
2a2 |
The receiver receives the error message. |
2a3 |
Use case ends. |
2b |
Request is not well formed (or any other business/technical error) |
2b1 |
The SMP replies with HTTP error |
2b2 |
The receiver receives the error message. |
2b3 |
Use case ends. |
2c |
ServiceGroup is not defined |
2c1 |
The SMP replies with HTTP error "404 Resource not found". |
2c2 |
The receiver receives the error message. |
2c3 |
Use case ends. |
N/A
-
The specified service group is removed with all its related information.
-
In case of error, no change occurs into the configuration database and the response gives technical details on the exception condition.
REST Service: DeleteServiceGroup
ServiceGroup identifier: ParticipantIdentifier
, ParticipantIdentifierScheme
in the HTTP header.
-
The username or the certificate from the HTTP header is verified to be the owner of the specified Service Group. If not, the operation is rejected.
-
Start a new transaction.
-
Delete ALL information related to that service group in tables: Endpoint, Process, ServiceMetadata and finally the ServiceGroup itself where the
ParticipantIdentifiers
match the specifiedServiceGoup
identifier. -
Invoke SML service “Delete Business Identifier”.
-
If SML service invocation:
-
succeeds, commit the transaction;
-
fails, rollback the transaction.
-
Response to this service is “failure”.
-
-
-
HTTP
200
if done, -
HTTP
404
if the specified service group does not exist -
HTTP
500
if any error occurred.
HTTP Header
DELETE
http://smp-digit-mock.publisher.ehealth.acc.edelivery.tech.ec.europa.eu/ehealth-actorid-qns::urn:poland:ncpb
HTTP/1.1
Host: smp-digit-mock.publisher.ehealth.acc.edelivery.tech.ec.europa.eu
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0
Accept: application/xml
Accept-Language: en-GB,en;q=0.8,de;q=0.5,fr;q=0.3
Accept-Encoding: gzip, deflate
DNT: 1
Referer: http://130.206.118.4/smp-swagger-ui/
Origin: http://130.206.118.4
Proxy-Authorization: Basic dXNlcm5hbWU6cGFzc3dvcmQ=
Connection: keep-alive
N/A
HTTP header
HTTP/1.1 200 OK
Connection: Keep-Alive
Content-Encoding: gzip
Content-Length: 20
Content-Type: application/xml
Date: Thu, 22 Dec 2016 10:47:56 GMT
Server: Jetty(6.1.26)
Set-Cookie: BCIDSLB=PS1LUX-56; domain=europa.eu; path=/; HttpOnly
access-control-allow-origin:*
N/A
HTTP Code | HTTP Message | Business Code | Description |
---|---|---|---|
|
OK |
N/A |
The request was completed successfully. |
|
|
|
Some field is expected to have a specific format is not valid (erroneous field name in description). |
|
|
|
The user is not granted the right to issue this request. |
|
|
|
The requested information was not found. |
|
|
|
Some unexpected technical error occurred (detailed information is available in the response). |
Audit information that must be audited per service:
Logged Info | UC1 | UC2 | UC3 | UC4 | UC5 | UC6 | UC7 |
---|---|---|---|---|---|---|---|
|
- |
x |
x |
x |
x |
- |
- |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
- |
- |
x |
x |
- |
x |
|
- |
- |
- |
x |
x |
- |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
- |
x |
x |
? |
? |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
- |
- |
- |
- |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
- |
- |
|
- |
x |
x |
x |
x |
- |
- |
Note
|
See also Auditing. |
UC04 Create/Update Service Metadata
UC04 Use Case Description
Publish detailed information about one specific document service
(multiple processes and endpoints).
This same service is used to create and update ServiceMetadata.
See Also
|
2.1 Discovery Flow in PEPPOL Transport Infrastructure Service Metadata Publishing (SMP). |
A sender (ed. user) may want to discover what document types can be handled by a specific participant identifier. Such
discovery is relevant for applications supporting several equivalent
business processes. Knowing the capabilities of the recipient is
valuable information to a sender application and ultimately to an end
user. For example, the end user may be presented with a choice between a
simple and a rich business process.
This is enabled by a pattern where the sender first retrieves the
ServiceGroup entity, which holds a list of references to the
ServiceMetadata resources associated with it. The ServiceMetadata in
turn holds the metadata information that describes the capabilities
associated with the recipient participant identifier.
-
Resource Admin
-
The authenticated user has the
Resource Admin
role. -
Resource Admin
user initiating the request is linked to the specifiedServiceGroup
. -
The `Resource Admin’s certificate:
-
is valid;
-
was previously stored in the configuration.
-
-
Identifier and scheme of the service group and documents provided in the request comply to the policy defined in OpenPEPPOL AISBL - Policy for use of Identifiers.
Step | Description |
---|---|
1 |
The receiver requests its service metadata to be put into SML. |
2 |
The SMP verifies the certificate of the " Resource Admin" against its information in the database, validates the request, and either create or update all the information into its configuration database. |
3 |
The receiver receives the confirmation that the definitions were created properly with HTTP response "201 Created". |
4 |
Use case ends. |
3a | ServiceMetadata already exists |
---|---|
3a1 |
The receiver receives the confirmation that the definitions were
updated properly with HTTP response |
3a2 |
Use case ends with success. |
1a | SMP is not reachable |
---|---|
1a1 |
The user receives a network connection error. |
1a2 |
Use case ends with success. |
2a |
Authentication / authorization fails |
2a1 |
The SMP replies with HTTP error "401 Unauthorized". |
2a2 |
The receiver receives the error message. |
2a3 |
Use case ends. |
2b |
Request is not well formed (or any other business/technical error) |
2b1 |
The SMP replies with HTTP error "400 Bad request" or "500 Internal server error" with details on the error allowing to identify the error in the request (cf. "Error codes" table below). |
2b2 |
The receiver receives the error message. |
2b3 |
Use case ends. |
2c |
ServiceGroup is not defined |
2c1 |
The SMP replies with HTTP error "404 Resource not found". |
2c2 |
The receiver receives the error message. |
2c3 |
Use case ends. |
N/A
-
ServiceMetadata is defined
-
In case of error, no change occurs into the configuration database and the response gives technical details on the exception condition.
REST Service: PutServiceMetadata
-
ServiceGroup
and Document’s identifiers in the URL and -
ServiceMetadata
in the text.
This input structure, from the ServiceInformation
node down to the
Process leaves, will fully define the content of the referenced service
metadata as defined by the four identifiers of the
participant AND related specific document.
This means that the configuration of a Service must be done with a single call
(for all Processes
) to this service, and it can be considered that all previously existing information in ServiceInformation
, Process and Endpoint tables are discarded (if they
exist) and completely replaced by the newly provided information.
-
Start a new transaction.
-
Insert or replace the all the
ServiceInformation
for thatServiceGroup
Document. -
In case of error:
-
Rollback the transaction.
-
Response to this service is “failure”.
-
-
If no error occurred:
-
Commit the transaction
-
Response to this service is “success”.
-
The operation will be allowed if and only if the authenticated user
matches the Resource Admin
user linked to the ServiceGroup
.
For this user to be the eligible “Resource Admin” it must have been referenced as such in the ServiceGroup definition (cf. PutServiceGroup) by an “Group Admin” user via service “PutServiceGroup” (by the “Group Admin” who was previously defined by the “Domain Admin”).
All the provided information will either be created in the
configuration (put = create) or be overwritten (PUT =
update); i.e., PUT
does both.
As explained above, in some cases ServiceMetadata information can be stored in ‘another SMP’; i.e., another SMP than the one that is queried by the user. In such case, ‘redirect’ information is provided to the user to allow him to query the appropriate SMP for obtaining the ServiceMetadata information from the relevant SMP.
For that to be possible, the receiver must eventually be able to store that redirect information. That is why this service provides this possibility, by allowing provision of “Redirect” information instead of the “ServiceInformation” itself:
The fields are in used as follows:
-
CertificateUID
: holds the Subject Unique Identifier of the certificate of the destination SMP. A client SHOULD validate that the Subject Unique Identifier of the certificate used to sign the resource at the destination SMP matches the Subject Unique Identifier published in the redirecting SMP. -
href
attribute of the Redirect element contains the full address of the destination SMP record that the client is redirected to. -
Extension
: not defined and optional.
Note
|
About Cascaded redirections In the case where a client encounters such a redirection element, the client MUST follow the first redirect reference to the alternative SMP. If the SignedServiceMetadata resource at the alternative SMP also contains a redirection element, the client SHOULD NOT follow that redirect. It is the responsibility of the client to enforce this constraint. |
HTTP response code 200 if ok, 401 if not allowed and 400 if any other error occurred. Details are available in the response text.
This example sends actual information of the service and uses a certificate in the header.
HTTP Header (with certificate)
HTTP/1.1
Accept-Encoding: gzip,deflate
Content-Type: text/xml;charset=UTF-8
Client-Cert: sno=0001&subject=EMAILADDRESS=receiver@test.be,
CN=SMP_receiverCN, OU=B4, O=DIGIT, L=Brussels, ST=BE, C=BE&validfrom=Jun
1 10:37:53 2015 CEST&validto=Jun 1 10:37:53 2035
CEST&issuer=EMAILADDRESS=root@test.be,CN=rootCN,OU=B4,O=DIGIT,L=Brussels,ST=BE,C=BE
Host: smp-digit-mock.publisher.ehealth.acc.edelivery.tech.ec.europa.eu
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0
Accept: application/xml
Accept-Language: en-GB,en;q=0.8,de;q=0.5,fr;q=0.3
Accept-Encoding: gzip, deflate
DNT: 1
Content-Type: application/xml
Referer: http://130.206.118.4/smp-swagger-ui/
Content-Length: 4741
Origin: http://130.206.118.4
Proxy-Authorization: Basic dXNlcm5hbWU6cGFzc3dvcmQ=
Connection: keep-alive
Note
|
The Client-Cert value in the HTTP header above is only an
example that is specific to production and acceptance environments at
DIGIT and should not be considered as constraining.
|
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<ServiceMetadata xmlns="http://docs.oasis-open.org/bdxr/ns/SMP/2016/05">
<ServiceInformation>
<ParticipantIdentifier scheme="ehealth-actorid-qns">urn:poland:ncpb</ParticipantIdentifier>
<DocumentIdentifier
scheme="ehealth-resid-qns">urn::epsos##services:extended:epsos::107
</DocumentIdentifier>
<ProcessList>
<Process>
<ProcessIdentifier scheme="ehealth-procid-qns">
urn:epsosPatientService::List</ProcessIdentifier>
<ServiceEndpointList>
<Endpoint transportProfile="urn:ihe:iti:2013:xcpd">
<EndpointURI>http://poland.pl/ncp/patient/list</EndpointURI>
<RequireBusinessLevelSignature>false</RequireBusinessLevelSignature>
<MinimumAuthenticationLevel>urn:epSOS:loa:1</MinimumAuthenticationLevel>
<ServiceActivationDate>2016-06-06T11:06:02.000+02:00</ServiceActivationDate>
<ServiceExpirationDate>2026-06-06T11:06:02+02:00</ServiceExpirationDate>
<Certificate>MIID7jCCA1egAwIBAgICA+YwDQYJKoZIhvcNAQENBQAwOjELMAkGA1UEBhMCRlIxEzARBgNVBAoMCklIRSBFdXJvcGUxFjAUBgNVBAMMDUlIRSBFdXJvcGUgQ0EwHhcNMTYwNjAxMTQzNTUzWhcNMjYwNjAxMTQzNTUzWjCBgzELMAkGA1UEBhMCUFQxDDAKBgNVBAoMA01vSDENMAsGA1UECwwEU1BNUzENMAsGA1UEKgwESm9hbzEOMAwGA1UEBRMFQ3VuaGExHTAbBgNVBAMMFHFhZXBzb3MubWluLXNhdWRlLnB0MRkwFwYDVQQMDBBTZXJ2aWNlIFByb3ZpZGVyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1eN4qPSSRZqjVFG9TlcPlxf2WiSimQK9L1nf9Z/s0ezeGQjCukDeDq/Wzqd9fpHhaMMq+XSSOtyEtIr5K/As4kFrViONUUkG12J6UllSWogp0NYFwA4wIqKSFiTnQS5/nRTs05oONCCGILCyJNNeO53JzPlaq3/QbPLssuSAr6XucPE8wBBGM8b/TsB2G/zjG8yuSTgGbhaZekq/Vnf9ftj1fr/vJDDAQgH6Yvzd88Z0DACJPHfW1p4F/OWLI386Bq7g/bo1DUPAyEwlf+CkLgJWRKki3yJlOCIZ9enMA5O7rfeG3rXdgYGmWS7tNEgKXxgC+heiYvi7ZWd7M+/SUwIDAQABo4IBMzCCAS8wPgYDVR0fBDcwNTAzoDGgL4YtaHR0cHM6Ly9nYXplbGxlLmloZS5uZXQvcGtpL2NybC82NDMvY2FjcmwuY3JsMDwGCWCGSAGG+EIBBAQvFi1odHRwczovL2dhemVsbGUuaWhlLm5ldC9wa2kvY3JsLzY0My9jYWNybC5jcmwwPAYJYIZIAYb4QgEDBC8WLWh0dHBzOi8vZ2F6ZWxsZS5paGUubmV0L3BraS9jcmwvNjQzL2NhY3JsLmNybDAfBgNVHSMEGDAWgBTsMw4TyCJeouFrr0N7el3Sd3MdfjAdBgNVHQ4EFgQU1GQ/K1ykIwWFgiONzWJLQzufF/8wDAYDVR0TAQH/BAIwADAOBgNVHQ8BAf8EBAMCBSAwEwYDVR0lBAwwCgYIKwYBBQUHAwEwDQYJKoZIhvcNAQENBQADgYEAZ7t1Qkr9wz3q6+WcF6p/YX7Jr0CzVe7w58FvJFk2AsHeYkSlOyO5hxNpQbs1L1v6JrcqziNFrh2QKGT2v6iPdWtdCT8HBLjmuvVWxxnfzYjdQ0J+kdKMAEV6EtWU78OqL60CCtUZKXE/NKJUq7TTUCFP2fwiARy/t1dTD2NZo8c=</Certificate>
<ServiceDescription>
This is the epSOS Patient Service List for the Polish NCP
</ServiceDescription>
<TechnicalContactUrl>http://poland.pl/contact</TechnicalContactUrl>
<TechnicalInformationUrl>http://poland.pl/contact</TechnicalInformationUrl>
</Endpoint>
</ServiceEndpointList>
<Process>
</ProcessList>
<Extension>
<Signature
xmlns="http://www.w3.org/2000/09/xmldsig#"><SignedInfo><CanonicalizationMethod
Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315"/><SignatureMethod
Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/><Reference
URI=""><Transforms><Transform
Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/></Transforms><DigestMethod
Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/>
<DigestValue>
CJeDJ72nQkwsZ2XWc8eput8pcBzfHSwO6uHr77/xbQo=
</DigestValue>
</Reference>
</SignedInfo>
<SignatureValue>
WlCUwlHJy9sehansEjFXSPkAobodbeM8OxXfLjQVYs7Vh085dESYaAbcDoDZ6t8IaHbsRtkiCgZG
yVRvOwB42EVRkhyWu0zVnlowfieBgvMqtZdYMbx6Z7Npwvo0UDcYI/HnHnzsyHhklKKNGPymXJXH
waEt4QJw+ne2n7Tb0Qg=
</SignatureValue>
<KeyInfo>
<X509Data>
<X509SubjectName>
CN=Sample National Infrastructure,OU=Sante,C=PT
</X509SubjectName>
<X509Certificate>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</X509Certificate>
</X509Data>
</KeyInfo>
</Signature>
</Extension>
</ServiceInformation>
</ServiceMetadata>
HTTP header
HTTP/1.1 201 Created
Server: Apache-Coyote/1.1
Pragma: No-cache
Expires: Thu, 01 Jan 1970 01:00:00 CET
Content-Length: 0
Date: Fri, 22 Jan 2016 09:46:10 GMT
Cache-Control: no-cache, proxy-revalidate
Connection: Keep-Alive
Note
|
if the ServiceMetadata previously existed, 200 OK will be returned as HTTP response instead of 201 Created as show in the above example.
|
Text N/A
HTTP code | HTTP Message | Business code | Meaning |
---|---|---|---|
|
|
N/A |
The request was completed successfully. |
|
|
N/A |
The PUT operation completed successfully. |
|
|
|
The XML included in the request is not validate against the XSD defining the input structure. |
|
Some field that is optional in the XSD but mandatory for this invocation is missing (missing field name in description). |
||
|
Some field is valid against XSD definition, but the more specific content is invalid (erroneous field name in description). |
||
|
Some numeric (or date field) is out of the valid range (erroneous field name in description). |
||
|
Some field that is optional in the XSD but forbidden for this invocation is present (unauthorized field name in description). |
||
|
Some field is expected to have a specific format is not valid (erroneous field name in description). |
||
|
Some other specific error was encountered processing the request (more information in the ErrorDescription field). |
||
|
|
|
The user is not granted the right to issue this request. |
|
|
|
The requested information was not found. |
|
|
|
Some unexpected technical error occurred (detailed information is available in the response). |
Audit information that must be audited per service:
Logged Info | UC1 | UC2 | UC3 | UC4 | UC5 | UC6 | UC7 |
---|---|---|---|---|---|---|---|
|
- |
x |
x |
x |
x |
- |
- |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
- |
- |
x |
x |
- |
x |
|
- |
- |
- |
x |
x |
- |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
- |
x |
x |
? |
? |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
- |
- |
- |
- |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
- |
- |
|
- |
x |
x |
x |
x |
- |
- |
Note
|
See also Auditing. |
UC05 Erase Service Metadata
UC05 Use Case Description
-
Remove all information about one specific service (i.e., all related processes and endpoints definitions).
-
Resource Admin (or Group Admin).
-
The user knows the address of SML.
-
Resource Admin initiating the request is linked to the specified
ServiceGroup
. -
The authenticated user has the role of
Resource Admin
. -
The referenced ServiceMetadata exists.
Step | Description |
---|---|
1 |
The receiver requests its service metadata to be removed from the SMP. |
2 |
The SMP authenticates the user, validates the request, and delete any information from the referenced ServiceMetadata from its configuration database (from table ServiceMetadata and all its tables). |
3 |
The receiver receives the confirmation that the definitions were
removed properly with HTTP response |
4 |
Use case ends with success. |
1a | SMP is not reachable |
---|---|
1a1 |
The user receives a network connection error. |
1a2 |
Use case ends. |
2a |
Authentication / authorization fails |
2a1 |
The SMP replies with HTTP error "401 Unauthorized". |
2a2 |
The receiver receives the error message. |
2a3 |
Use case ends. |
2b |
Request is not well formed (or any other business/technical error) |
2b1 |
The SMP replies with HTTP error "400 Bad request" or "500 Internal server error" with details on the error allowing to identify the error in the request (cf. "Error codes" table below). |
2b2 |
The receiver receives the error message. |
2b3 |
Use case ends. |
2c |
ServiceGroup or ServiceMetadata is not defined |
2c1 |
The SMP replies with HTTP error "404 Resource not found". |
2c2 |
The receiver receives the error message. |
2c3 |
Use case ends. |
N/A
-
ServiceMetadata
are absent.
-
In case of error, no change occurs into the configuration database and the response gives technical details on the exception condition
REST Service: DeleteServiceMetadata
Authorization The operation will be allowed if and only the authenticated user matches the “Resource Admin” user linked to the Service Group.
For this user to be the eligible “Resource Admin” it must have been referenced as such in the ServiceGroup definition (cf. PutServiceGroup) by an “Group Admin” user via service “PutServiceGroup”.
Start a new transaction.
Note
|
If no more ServiceMetadata information is available on the related ServiceGroup, the limited information on the ServiceGroup is nevertheless kept to allow keeping track of the previously defined administrator and the service group. Should it be deleted, it is the responsibility of the “Group Admin” user to issue the required operation (DeleteServiceGroup) if necessary. |
Delete in one single transaction any information related to that service where participant and documents identifiers match the provided ServiceMetadata identifier.
In case of operation abort, the deletion to undo what was previously done:
-
Rollback the transaction
-
Response to this service is “failure”.
If no error occurred:
-
Commit the transaction
-
Response to this service is “success”.
-
HTTP
200
if done -
HTTP
404
if the service metadata or the service group does not exist -
HTTP
500
if any error occurred.
HTTP Header
HTTP/1.1
Accept-Encoding: gzip,deflate
Authorization: Basic dGVzdGVyOnRlc3Q=
Host: 130.206.118.4:8080
Connection: Keep-Alive
User-Agent: Apache-HttpClient/4.1.1 (java 1.5)
N/A
HTTP header
HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Pragma: No-cache
Expires: Thu, 01 Jan 1970 01:00:00 CET
Content-Length: 0
Date: Fri, 22 Jan 2016 09:47:52 GMT
Cache-Control: no-cache, proxy-revalidate
Connection: Keep-Alive
N/A
HTTP code | HTTP Message | Business code | Description |
---|---|---|---|
200 |
OK |
N/A |
The request was completed successfully. |
400 |
Bad Request |
OTHER_ERROR |
Some other specific error was encountered
processing the request (more information in the |
401 |
Unauthorized |
UNAUTHORIZED |
The user is not granted the right to issue this request. |
404 |
Resource not found |
NOT_FOUND |
The requested information was not found. |
500 |
Internal Server Error |
TECHNICAL |
Some unexpected technical error occurred (detailed information is available in the response). |
Audit information that must be audited per service:
Logged Info | UC1 | UC2 | UC3 | UC4 | UC5 | UC6 | UC7 |
---|---|---|---|---|---|---|---|
|
- |
x |
x |
x |
x |
- |
- |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
- |
- |
x |
x |
- |
x |
|
- |
- |
- |
x |
x |
- |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
- |
x |
x |
? |
? |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
- |
- |
- |
- |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
- |
- |
|
- |
x |
x |
x |
x |
- |
- |
Note
|
See also Auditing. |
Information Retrieval Use Cases
These use cases are mainly intended for sender participants for them to collect information on the target receivers.
They are based on the standard OASIS XSD. See OASIS SMP XSD
UC06 Retrieve Service Group
UC06 Use Case Description
Obtain the list of services provided by a specific receiver participant
(collection of references to the ServiceMetaData’s).
This service provides the information related to the Service Group
according to the input duplet participantIdentifier
+participantIndentifierScheme
.
Returns information from the ServiceMetadata table only (references to
actual MetaData)
See Also
|
2.1 Discovery Flow in PEPPOL Transport Infrastructure Service Metadata Publishing (SMP). |
A sender (ed. user) may want to discover what document types can be handled by a specific participant identifier.
Such discovery is relevant for applications supporting several equivalent business processes.
This is enabled by a pattern where the sender first retrieves the ServiceGroup
entity, which holds a list of references to the ServiceMetadata
resources associated with it.
The ServiceMetadata
in turn holds the metadata information that describes the capabilities associated with the recipient participant identifier.
-
User
-
The requester application has previously resolved the address of the SMP from the DNS.
-
Referenced service group was previously defined by the receiver.
Step | Description |
---|---|
1 |
The user request one service group references to SML. |
2 |
The SMP validates the request and retrieves the information from its configuration database (into table ServiceGroup and Service Metadata tables). |
3 |
The user receives the participant’s service group information. |
4 |
Use case ends with success. |
1a | SMP is not reachable |
---|---|
1a1 |
The user receives a network connection error. |
1a2 |
Use case ends. |
2a |
Request is not well formed (or any other business/technical error) |
2a1 |
The SMP replies with HTTP error "400 Bad request" or "500 Internal server error" with details on the error allowing to identify the error in the request (cf. "Error codes" table below). |
2a2 |
The receiver receives the error message. |
2a3 |
Use case ends. |
2b |
ServiceGroup is not defined |
2b1 |
The SMP replies with HTTP error "404 Resource not found". |
2b2 |
The receiver receives the error message. |
2b3 |
Use case ends. |
N/A
-
The user receives ServiceGroup information for the requested receiver participant.
The user received no ServiceGroup information about the requested receiver participant.
REST Service: GetServiceGroup
ParticipantIdentifier
Represents the business level endpoint key and key type, for example, a DUNS or GLN number that is associated with a group of services.
See Also
|
The ParticipantIdentifier section of the Common Definitions document [BDEN-CDEF] for more information on this data type.
|
-
Selects all service Metadata related to the
ServiceGroup
specified by the providedParticipantIdentifier
and build the corresponding URI from it.
Note
|
There is no interaction with SML (from SML). |
ServiceGroup
This SMP service will return the reference URI for the user that will enable him to retrieve all information about the services that a participant (receiver) participates in, i.e., all service metadata of the specified participant. To obtain the details on those services, the ServiceMetadata can be obtained from SML using the references provided.
HTTP Header
HTTP/1.1
Accept-Encoding: gzip,deflate
Host: 130.206.118.4:8080
Connection: Keep-Alive
User-Agent: Apache-HttpClient/4.1.1 (java 1.5)
N/A
HTTP header
HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: text/xml
Content-Length: 959
Date: Thu, 21 Jan 2016 08:38:33 GMT
Cache-Control: proxy-revalidate
Connection: Keep-Alive
<ServiceGroup xmlns="http://docs.oasis-open.org/bdxr/ns/SMP/2016/05">
<ParticipantIdentifier scheme="busdox-actorid-upis">
0010:5798000000001
</ParticipantIdentifier>
<ServiceMetadataReferenceCollection>
<ServiceMetadataReference
href="http://serviceMetadata.eu/busdox-actorid-upis%3A%3A0010%3A5798000000001/services/bdx-docid-qns%3A%3Aurn%3Aoasis%3Anames%3Aspecification%3Aubl%3Aschema%3Axsd%3AInvoice-
2%3A%3AInvoice%23%23UBL-2.0" />
</ServiceMetadataReferenceCollection>
<Extension>
<ex:Test xmlns:ex="http://test.eu">Test</ex:Test>
</Extension>
</ServiceGroup>
HTTP code | HTTP Message | Business code | Meaning |
---|---|---|---|
200 |
OK |
N/A |
The request was completed successfully |
400 |
Bad Request |
OTHER_ERROR |
Some other specific error was encountered processing the request (more information in the ErrorDescription field) |
404 |
Resource not found |
NOT_FOUND |
The requested information was not found |
500 |
Internal Server Error |
TECHNICAL |
Some unexpected technical error occurred (detailed information is available in the response) |
Audit information that must be audited per service:
Logged Info | UC1 | UC2 | UC3 | UC4 | UC5 | UC6 | UC7 |
---|---|---|---|---|---|---|---|
|
- |
x |
x |
x |
x |
- |
- |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
- |
- |
x |
x |
- |
x |
|
- |
- |
- |
x |
x |
- |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
- |
x |
x |
? |
? |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
- |
- |
- |
- |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
- |
- |
|
- |
x |
x |
x |
x |
- |
- |
Note
|
See also Auditing. |
UC07 Retrieve Service Metadata
UC07 Use Case Description
Obtain detailed definition about one specific service of a specific
participant for all supported transport.
This service retrieves the SignedServiceMetadata according to the input
quadruplet
participantIdentifier
` `participantIndentifierScheme` `
documentIdentifier
+
documentIdentifierScheme
.
Returns information from the Endpoint table.
-
User
-
The user application has previously resolved the address of SML from the DNS.
-
Referenced service group and required Service Meta data were previously defined by the receiver.
Step | Description |
---|---|
1 |
The user requests the detailed information of a receiver’s service to SML. |
2 |
The SMP validates the request, retrieves the information from its configuration database and sends it as response to the user. |
3 |
The user receives the participant’s service detailed information. |
4 |
Use case ends with success. |
Step | Description |
---|---|
3a |
Redirect |
3a1 |
The configuration refers to another SMP. The SMP returns the redirection information to the user. |
3a2 |
The user reinitiates the same request to that other SMP: restart use case at step 1. |
3a3 |
Use case ends. |
Step | Description |
---|---|
1a |
SMP is not reachable |
1a1 |
The user receives a network connection error. |
1a2 |
Use case ends. |
2a |
Request is not well formed (or any other business/technical error) |
2a1 |
The SMP replies with HTTP error "400 Bad request" or "500 Internal server error" with details on the error allowing to identify the error in the request (cf. "Error codes" table below). |
2a2 |
The receiver receives the error message. |
2a3 |
Use case ends. |
2b |
ServiceGroup or ServiceMetadata is not defined |
2b1 |
The SMP replies with HTTP error "404 Resource not found". |
2b2 |
The receiver receives the error message. |
2b3 |
Use case ends. |
2a2a |
Multiple redirect |
2a2a1 |
The client receives redirect information for the 2nd time (and must ignore it). |
2a2a2 |
Use case ends. |
N/A
-
The user receives ServiceMetaData information for the requested receiver participant.
-
The user received no Metadata information about the requested receiver participant.
REST Service: GetSignedServiceMetadata
ServiceMetadataReference
i.e., the PK made of4 fields that uniquely identify the ServiceMetadata entry in SML configuration.
This service will return necessary information for the user to send
documents to the receiver, this information is held in the
ServiceInformation
structure, i.e., the information stored in tables
Process and Endpoint (related to the requested service metadata and
highlighted into red squares below):
Note
|
There is no interaction with SML. |
SignedServiceMetadata
See PEPPOL Transport Infrastructure Service Metadata Publishing (SMP), §4.3: this data structure represents Metadata about a specific electronic service.
The role of the ServiceMetadata structure is to associate a participant identifier with the ability to receive a specific document type over a specific transport. It also describes which business processes a document can participate in, and various operational data such as service activation and expiration times. The ServiceMetadata resource contains all the metadata about a service that a user Access Point needs to know in order to send a message to that service.
The SignedServiceMetadata
structure holds both a ServiceMetadata
structure and the corresponding signature by SML to allow the user
(or any other user) verifying the authenticity of the information
provided by SML by using the public key of SML before sending
any document to the receiver.
Supports the alternative flow ‘a’ in the use case.
Eventually, this service will return redirect information instead of
the ServiceInformation
information itself, when it is held by another
SMP.
See Also
|
Redirection is exhaustively explained in the 4.3 ServiceMetadata section of the PEPPOL Transport Infrastructure Service Metadata Publishing document. and in the 2.1.3 Service Metadata Publisher Redirection section of the Service Metadata Publishing (SMP) Version 1.0 document. |
In such a case, the information returned is the reference to SML
that holds the corresponding ServiceMetadata
; i.e., in the
Redirect structure containing the target URI.
The queried SMP has in fact no information about the participant
services (there is no related Process entry for that participant),
instead, he has the target URI of the other SMP in the Redirect
column
of the ServiceMetadata
row for that receiver.
HTTP Header
Accept-Encoding: gzip,deflate
+
Host: 130.206.118.4:8080
Connection: Keep-Alive
User-Agent: Apache-HttpClient/4.1.1 (java 1.5)
N/A
HTTP header
HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: text/xml
Transfer-Encoding: chunked
Date: Thu, 21 Jan 2016 10:22:38 GMT
Cache-Control: proxy-revalidate
Connection: Keep-Alive
<SignedServiceMetadata
xmlns="[.mark]#http://docs.oasis-open.org/bdxr/ns/SMP/2016/05# ">
<ServiceMetadata
xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd">
<ServiceInformation>
<ParticipantIdentifier scheme="busdox-actorid-upis">
0010:5798000000001
</ParticipantIdentifier>
<DocumentIdentifier scheme="bdx-docid-qns">
urn:oasis:names:specification:ubl:schema:xsd:Invoice-2::Invoice##UBL-2.02
</DocumentIdentifier>
<ProcessList>
<Process>
<ProcessIdentifier scheme="cenbii-procid-ubl">
BII04
</ProcessIdentifier>
<ServiceEndpointList>
<Endpoint transportProfile="busdox-transport-start">
<EndpointURI>http://busdox.org/sampleService/</EndpointURI>
<RequireBusinessLevelSignature>
false
</RequireBusinessLevelSignature>
<MinimumAuthenticationLevel>2</MinimumAuthenticationLevel>
<ServiceActivationDate>
2009-05-01T09:00:00
</ServiceActivationDate>
<ServiceExpirationDate>
2016-05-01T09:00:00
</ServiceExpirationDate>
<Certificate>
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
</Certificate>
<ServiceDescription>invoice service</ServiceDescription>
<TechnicalContactUrl>
https://example.com
</TechnicalContactUrl>
<TechnicalInformationUrl>
http://example.com/info
</TechnicalInformationUrl>
</Endpoint>
</ServiceEndpointList>
</Process>
<Process>
<ProcessIdentifier scheme="cenbii-procid-ubl">
BII07
</ProcessIdentifier>
<ServiceEndpointList>
<Endpoint transportProfile="busdox-transport-start">
<EndpointURI>http://busdox.org/sampleService/</EndpointURI>
<RequireBusinessLevelSignature>
true
</RequireBusinessLevelSignature>
<MinimumAuthenticationLevel>1</MinimumAuthenticationLevel>
<ServiceActivationDate>
2009-05-01T09:00:00
</ServiceActivationDate>
<ServiceExpirationDate>
2016-05-01T09:00:00
</ServiceExpirationDate>
<Certificate>
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
</Certificate>
<ServiceDescription>invoice service</ServiceDescription>
<TechnicalContactUrl>
https://example.com
</TechnicalContactUrl>
<TechnicalInformationUrl>
http://example.com/info
</TechnicalInformationUrl>
<Extension>
<ex:Test
xmlns:ex="http://test.eu">Test
</ex:Test>
</Extension>
</Endpoint>
</ServiceEndpointList>
<Extension>
<ex:Test
xmlns:ex="http://test.eu">Test
</ex:Test>
</Extension>
</Process>
</ProcessList>
<Extension>
<ex:Test
xmlns:ex="http://test.eu">Test
</ex:Test>
</Extension>
</ServiceInformation>
</ServiceMetadata>
<Signature
xmlns="http://www.w3.org/2000/09/xmldsig#">
<SignedInfo>
<CanonicalizationMethod
Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315"/>
<SignatureMethod
Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
<Reference URI="">
<Transforms>
<Transform
Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
</Transforms>
<DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
<DigestValue>6r3W426Gx5foBPtasSdIEj6JvAY=</DigestValue>
</Reference>
</SignedInfo>
<SignatureValue>2NJB0Pv3ORL+EpPYLCl/InXI+mDbUsV8CrWzRVJvEJMnnyuI2bPMe6k4MJwp9A4bTkzjvkMPARYAhyVNm6MNNlJRAFL4qddsRrWa4Jgf/QF0zQgpJ7ZUPdVQ8L8A54FiPZWltOIgZCfO7sDbEcB00V4gKmzVPBsVu6BIBOws/UY=</SignatureValue>
<KeyInfo>
<X509Data>
<X509SubjectName>1.2.840.113549.1.9.1=#160e73656e64657240746573742e6265,CN=senderCN,OU=B4,O=DIGIT,L=Brussels,ST=BE,C=BE</X509SubjectName>
<X509Certificate>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</X509Certificate>
</X509Data>
</KeyInfo>
</Signature>
</SignedServiceMetadata>
HTTP header
HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Content-Type: text/xml
Transfer-Encoding: chunked
Date: Thu, 21 Jan 2016 10:22:38 GMT
Cache-Control: proxy-revalidate
Connection: Keep-Alive
<?xml version="1.0" encoding="utf-8" ?>
<SignedServiceMetadata
xmlns="[.mark]#http://docs.oasis-open.org/bdxr/ns/SMP/2016/05# ">
<ServiceMetadata>
<Redirect
href="http://serviceMetadata2.eu/busdox-actorid-upis%3A%3A0010%3A5798000000001/services/bdx-docid-qns%3A%3Aurn%3Aoasis%3Anames%3Aspecification%3Aubl%3Aschema%3Axsd%3AInvoice-
2%3A%3AInvoice%23%23UBL-2.0">
<CertificateUID>PID:9208-2001-3-279815395</CertificateUID>
<Extension>
<ex:Test
xmlns:ex="http://test.eu">Test
</ex:Test>
</Extension>
</Redirect>
</ServiceMetadata>
<Signature
xmlns="http://www.w3.org/2000/09/xmldsig#">
<SignedInfo>
<CanonicalizationMethod
Algorithm="http://www.w3.org/TR/2001/REC-xml-c14n-20010315"/>
<SignatureMethod
Algorithm="http://www.w3.org/2000/09/xmldsig#rsa-sha1"/>
<Reference URI="">
<Transforms>
<Transform
Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/>
</Transforms>
<DigestMethod Algorithm="http://www.w3.org/2000/09/xmldsig#sha1"/>
<DigestValue>6r3W426Gx5foBPtasSdIEj6JvAY=</DigestValue>
</Reference>
</SignedInfo>
<SignatureValue>2NJB0Pv3ORL+EpPYLCl/InXI+mDbUsV8CrWzRVJvEJMnnyuI2bPMe6k4MJwp9A4bTkzjvkMPARYAhyVNm6MNNlJRAFL4qddsRrWa4Jgf/QF0zQgpJ7ZUPdVQ8L8A54FiPZWltOIgZCfO7sDbEcB00V4gKmzVPBsVu6BIBOws/UY=</SignatureValue>
<KeyInfo>
<X509Data>
<X509SubjectName>1.2.840.113549.1.9.1=#160e73656e64657240746573742e6265,CN=senderCN,OU=B4,O=DIGIT,L=Brussels,ST=BE,C=BE</X509SubjectName>
<X509Certificate>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</X509Certificate>
</X509Data>
</KeyInfo>
</Signature>
</SignedServiceMetadata>
HTTP code | HTTP Message | Business code | Description |
---|---|---|---|
|
OK |
N/A |
The request was completed successfully |
|
Bad Request |
OTHER_ERROR |
Some other specific error was encountered processing the request (more information in the ErrorDescription field). |
|
Resource not found |
NOT_FOUND |
The requested information was not found. |
|
Internal Server Error |
TECHNICAL |
Some unexpected technical error occurred (detailed information is available in the response). |
Audit information that must be audited per service:
Logged Info | UC1 | UC2 | UC3 | UC4 | UC5 | UC6 | UC7 |
---|---|---|---|---|---|---|---|
|
- |
x |
x |
x |
x |
- |
- |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
- |
- |
x |
x |
- |
x |
|
- |
- |
- |
x |
x |
- |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
- |
x |
x |
? |
? |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
- |
- |
- |
- |
x |
x |
|
- |
x |
x |
x |
x |
x |
x |
|
- |
x |
x |
x |
x |
- |
- |
|
- |
x |
x |
x |
x |
- |
- |
Note
|
See also Auditing. |
5.1. Security
5.1.1. User Management
Administration Process
As described in §2.3.1 – “Actors”, there are 3 types of users accessing SML. Among them, only “Resource Admin” and “Group Admin” types of users are registered into the configuration of SML.
This paragraph summarizes the process for defining the users who are responsible for managing the overall configuration of SMPs.
-
Creation of a Group Admin
Details
The "Domain Admin" sets existing users as an "Group Admin".
In the picture below, "System Admin b" creates one user "Group Admin " that will manage the service groups on this SMP’s.
-
Creation of a remote ServiceGroup administrator (for one Participant)
Details
This step is necessary for remote administration of ServiceGroups (if administration is local it is done by the "Group Admin" himself).
The "System Admin”:
-
deploys the certificates that will be used to access SML for a new participant’s administration (if certificates are used);
-
creates manually the " Resource Admin" entry in the "Administrator" table
-
-
Creation of the ServiceGroup (for one Participant)
Details
The "Group Admin" accesses SML via http with basic authentication with the previously assigned username and password by the "System Admin".
He uses "UC02 - Create or Update Service Group" (cf. §2.4.2) to define new service groups.
When doing so, the "Group Admin" provides either:
-
A "ServiceGroup-Owner" in the HTTP header, i.e. some pieces of the Participant’s certificates that will be used to identify the " Resource Admin" user accessing SML for configuration purposes (mostly for distributed SMP model)
-
Nothing: in that case, the basic authentication information of the "Group Admin" (in the HTTP header) will be stored as identifier and will be himself the administrator of this ServiceGroup (cf. Step 1 of UC02 - Create or Update Service Group).
Later, he can to remove that Service Group via the same access method using "UC03 - Erase Service Group" (cf. §2.4.3).
In the picture below, "Group Admin b" creates one user "Resource Admin D, E, F" that will manage parties D,E and F.
-
-
Creation of ServiceMetadata
Details
The "Resource Admin" accesses SML using its certificate.
He defines some new services using "UC04 - Create or Update Service Metadata" (cf. §2.4.4).
Later he can remove deprecated services similarly with "UC05 - Erase Service Metadata" (cf. §2.4.5).
In the picture below, " Resource Admin D, E, F" defines some of the services for one or several parties among D, E and F.
-
Discovering a participant’s services capabilities
Details
The Participant access SML with no authentication.
He uses "UC06 - Retrieve Service Group" (cf. §2.5.1) and "UC07 - Retrieve Service Metadata" (cf. §2.5.2) to collect eDelivery information on another participant he wants to exchange messages with.
In the picture below, "Participant C" collects metadata from one (and only one) participant among D, E and F.
The following diagram illustrates distributed (remote) "Resource Admin"'s:
The following diagram illustrates centralised ServiceGroup management (by the "Group Admin"):
The specifications allow the coexistence of both models: some domain may decide to manage some ServiceGroups centrally (by the "Group Admin"), others in a distributed manner (by multiple remote "Resource Admin’s").
Simple User
The regular users (Actor “User”) are any user accessing the system public services. As these users do not need to be authenticated, they do not have to be known in advance by the System and are therefore not preregistered in any way on SML.
System Admin
The “System Admin” actor is, as the name suggests, a system user having special accesses to the system. In the purpose of user administration for SML, this “system user” is able to modify the content of SML configuration database, i.e. he must have full read/write data access on this configuration database, in particular table "Administrator" described in §2.6.1.4 "Security tables".
He is responsible for creating and maintaining the definition of all “Group Admin” and "Resource Admin" administrators (as described by use case UC01).
Administrator
This table identifies the administrators of SML; this means Group Admin
and Resource Admin
actors introduced above.
There are two possible means to obtain access to SML non-public services:
-
through basic authentication; i.e. with a simple username/password authentication method:
-
Identifier column contains then the username used to identify the administrator at logon
-
Password column contains then the hash of the password used to authenticate the user at logon
-
-
through two-way SSL using PKI infrastructure (i.e., X.509 certificates):
-
the Identifier column contains pieces of the client certificate that are forwarded by the reverse proxy in the http header to the server (cf. 2.6.3 – “HTTP Authentication”)
-
Password column is unused for 2-way-ssl since the certificate is not validated by the application layer itself; the prerequisite being that the user’s certificate is already present in the truststore of the reverse proxy server.
-
In all cases, it is the responsibility of SML to hash the password (and apply the same algorithm for authentication). The participant will send the password in 'clear' in the HTTP header.
1-N relationship materialization between the service groups and the “Resource Admin” type of users of SML. More details are available under §2.6.1.6 – “Resource Resource Admin”.
This relationship allows the system to identify which ‘user’ (singular)
is allowed to modify(/delete) all the information related to all the
ServiceMetadata of one given ServiceGroup
.
Group Admin
The “Group Admin” user is created by the system administrator (cf. §2.3.1 – “Actors” and §2.4.1 – "UC01 - Manage Administrators").
Some information in the system (not detailed here) allows the system to identify this specificity of such users.
Resource Admin
The “Resource Admin” user of one specific participant will be allowed to use all the services that modify the definition of the ServiceGroups, i.e. to create, modify or delete SignedServiceMetadata belonging to/referenced by a ServiceGroup.
To allow the access right verification, the configuration holds a link between the “Resource Admin” and the related ServiceGroup via an “ownership relationship” materialized as shown here in the configuration:
The ServiceGroup can be managed by:
-
The related "Resource Admin" (if any); and,
-
The Group Admin (who may administer all service groups).
This link is established when the ServiceGroup
is created (or updated).
5.1.2. Access rights
The following matrix clarifies the access rights of each actor to all use cases and the type of authentication method that are supported for each user role:
The following matrix clarifies the access rights
Use Case |
System Admin |
Group Admin |
Resource Admin |
User |
---|---|---|---|---|
UC01 Manage Administrators |
x |
- |
- |
- |
UC02 Create or Update Service Group |
- |
x |
- |
- |
UC03 Erase Service Group |
- |
x |
- |
- |
UC04 Create or Update Service Metadata |
- |
x |
x |
- |
UC05 Erase Service Metadata |
- |
x |
x |
- |
UC06 Retrieve Service Group |
x |
x |
x |
x |
UC07 Retrieve Service Metadata |
x |
x |
x |
x |
Method | System Admin | Group Admin | Resource Admin | User |
---|---|---|---|---|
System & Database Authentication |
x |
- |
- |
- |
HTTP Basic authentication |
- |
x |
N/A |
- |
HTTP 2-way-ssl |
- |
- |
x |
- |
None |
- |
- |
- |
x |
Method | System Admin | Group Admin | Resource Admin | User |
---|---|---|---|---|
System & database authentication |
x |
- |
- |
- |
HTTP Basic authentication |
- |
x |
x |
- |
HTTP 2-way-ssl |
- |
- |
N/A |
- |
None |
- |
- |
- |
x |
See Also
|
"Group Admin" user may act on behalf of all the "Resource Admin" defined in SML. |
5.1.3. HTTP Authentication
SSL will be used at all times (i.e., for any exchange of message between a SMP and any participant, acting as a sender or as a receiver.) to guarantee the validity of the information provided by SML to the sender and receiver.
Two authentication methods are supported and vary with services and/or user’s roles:
-
Basic HTTP authentication (username/password) – for “Group Admin” users and optionally for “Resource Admin” users (cf. "Test at EC" above).
-
HTTP 2-way SSL for remote “Resource Admin” users (only) when and if this method is preferred for those to basic authentication (see "Authentication method" tables in §2.6.2 above: this authentication method might be used at EC in production environment).
If HTTP basic authentication is available for both types of users, 2-way SSL will also be usable for authenticating “Resource Admin” users. In order to achieve this, all the PUT and DELETE services on ServiceMetadata data type (cf. UC04 and UC05) will be able to use that type of authentication.
In order to provide this possibility, the certificates of the authorized administrators (“Resource Admin” users) will be deployed on the necessary SMPs on dedicated keystores. This will allow the transport layers to establish necessary trust without any addition to the existing message structure.
Also, the fields in Administrator table will be used as follows differently in the different possible cases (by user roles and authentication methods):
Authentication Method |
Identifier |
Password |
|
---|---|---|---|
Group Admin |
Basic Authentication |
Basic User Name |
Password Hash |
Resource Admin |
2 way-ssl |
HTTP Client Cert |
N/A |
Basic Authentication |
Basic User Name |
Password Hash |
Note
|
Only basic authentication is allowed for “Group Admin” user since they are intended to be “intranet” users rather than “internet” ones. |
The password field, when applicable, will hold a hash value of the password.
5.1.4. Reverse proxy
With information purposes only, here’s a description of the European Commission’s SML deployment in Production. In this environment,
-
a BDMSL server is already hosted behind a Reverse Proxy.
See Also
|
See §11.2.2 Reverse proxy with SSL in DomiSML. |
-
2-way SSL is set up on the reverse proxy and the server hosting the application can use the HTTP protocol.
A similar configuration could be used at the European Commission# for SMP’s where 2-way SSL must be used.
As stated above, this type of access will be provided for remote “Resource Admin” type of users only and is optional. Basic authentication will be used instead when there is no remote " Resource Admin"; i.e., when the "Group Admin" administers the ServiceGroup himself.
Therefore, the authentication mechanism for services modifying Service Metadata will behave as follow:
-
Search HTTP header for “Client Certificate” data (conversion performed by the reverse proxy). If present, use these to authenticate user against the “username” present in table “Administrator”.
The “Client Certificate” values will be inserted in the HTTP header to SML by the Reverse Proxy out of the X.509 Certificate.
The X.509 attributes to be used will be defined in the detailed design.
The value stored in the “Administrator” table column “username” should contain necessary information to validate that the provided value match.
-
If no “Client certificate” information is available (meaning there is no reverse proxy between the client and SML), use Basic HTTP authentication: check provided username and password (clear value) to identify and authenticate the requesting user and authorize access.
The SML deployed at the European Commission has the following accesses:
-
Direct system and database logins are used by the System Admin.
-
Basic authentication over HTTP is used for the Group Admin and Resource’s which share the same network location with SML.
SMP authenticates the local Group Admin’s based on the hash of the password stored by the System Admin. -
Certificates of remote Admin Service Group’s are authenticated by the Reverse Proxy.
-
Information of the client’s certificate is provided to SML for authorization (
Client-Cert
attribute), while the password is blank. -
Parties do not have to authenticate themselves but may use SML’s certificate to authenticate it.
5.1.5. Auditing
Authentication Types Usage
All SMP services will log relevant information regarding access as specified in the table below.
Service Information Logging table
Manage Admins | Create or Update Service Group |
Delete Service Group |
Create or Update Service Metadata |
Delete Service Metadata |
Retrieve Service Group |
Retrieve Service Metadata |
|
---|---|---|---|---|---|---|---|
Column/ |
UC01 |
UC02 |
UC03 |
UC04 |
UC05 |
UC06 |
UC07 |
AdministratorIdentifier |
N/A |
x |
x |
x |
x |
- |
- |
AccessTime |
N/A |
x |
x |
x |
x |
x |
x |
Operation |
N/A |
x |
x |
x |
x |
x |
x |
ParticipantIdentifier |
N/A |
x |
x |
x |
x |
x |
x |
ParticipantIdentifierScheme |
N/A |
x |
x |
x |
x |
x |
x |
DocumentIdentifier |
N/A |
- |
- |
x |
x |
- |
x |
DocumentIdentifierScheme |
N/A |
- |
- |
x |
x |
- |
x |
IpAddress |
N/A |
x |
x |
x |
x |
x |
x |
RequestHeader |
N/A |
x |
x |
x |
x |
x |
x |
RequestText |
N/A |
x |
- |
x |
- |
- |
- |
ResponseHeader |
N/A |
x |
x |
x |
x |
x |
x |
ResponseText |
N/A |
- |
- |
- |
- |
x |
x |
HTTP code |
N/A |
x |
x |
x |
x |
x |
x |
Business code |
N/A |
x |
x |
x |
x |
- |
- |
ErrorDescription |
N/A |
x |
x |
x |
x |
- |
- |
Whether to persist the logged information in a database table, log files or any other type of persistence solution is a design decision, provided that the information is persisted and searchable.
Note
|
Audited information must be kept accessible (online or offline) for a minimum of three months. |
No hard link (with foreign keys) is established between this table and the User or the Participant Identifier’s to allow keeping:
-
the logs relating to one user or one participant that is later removed from the database (if ever applicable),
-
track of unauthorized calls from unidentified users or erroneous participant identifications.
5.2. Special requirements
-
SMP should be available 99%.
-
Response time should be less than:
-
5s for
GET
services calls for 90% of the requests. -
10s for
PUT
/DELETE
service calls for 90% of the requests.
-
|
6. Reference Guides
SMP Properties Reference
|
Mandatory Properties
SMP Configuration Properties
Configuration Property | Description and Usage | Default | ||
---|---|---|---|---|
|
Configuration property file path. |
|
||
|
Init configuration property file path. |
|
||
|
Security folder for storing the keystore and the truststore. |
|
||
|
Database Configuration - Driver
|
|
||
|
Database Configuration - URL
|
|
||
|
Database User/Password Configuration - User |
|
||
|
Database User/password Configuration - Password |
|
||
|
If the data source is configured on the application server (*recommended), the property defines the JNDI name of the database connection. |
|
||
|
Print generated sql queries to logs. The property is effective only when |
|
||
|
Auto create/update database objects. The property is effective only when |
|
||
|
The provided logback.xml configuration defines logging file as
With the property we can define the folder for the logging files. |
|
||
|
Custom logback configuration file (filepath can be absolute or relative to smp configuration.dir). |
|
||
|
Path where SMP extensions are located. The folder is loaded by the SMP classloader at startup. |
|
||
|
The development mode uses semi-random generators for password and key generation. Setting the property value to ‘true‘ makes the first startup and access token generation faster. To ensure high security, this option MUST NOT be enabled in production. |
|
Application Properties
SMP Application Configuration Properties
Configuration Property | Description and Usage | Default | ||
---|---|---|---|---|
|
The name of the DomiSMP instance is used in email notifications and alerts to specify which SMP instance generated the notifications. Usage: |
|
||
|
This property controls pattern of URLs produced by SMP in GET ServiceGroup responses. Usage: |
|
||
|
Allow encoded slashes in context path. Set to true if slashes are part of identifiers. Usage: |
|
||
|
Use (value true) or remove (value false) forwarded headers. There are security considerations for forwarded headers since an application cannot know if the headers were added by a proxy, as intended, or by a malicious client. Usage: |
|
||
|
How long (in seconds) should HSTS last in the browser cache (default one year). Usage: |
|
||
|
Content Security Policy (CSP)
Usage: |
- |
||
Configuration Property |
Description and Usage |
Default |
||
|
The http proxy host. Usage: |
- |
||
|
List of nor proxy hosts. Usage: Default: |
See Description |
||
|
Base64 encrypted password for Proxy. Usage: |
- |
||
|
The http proxy port. Usage: |
80 |
||
|
The proxy user. Usage: |
- |
||
Configuration Property |
Description and Usage |
Default |
||
|
Participant Identifier Schema of each PUT ServiceGroup request is validated against this schema. Usage: Default: |
See Description |
||
|
Error message for UI. Usage: Value Format: OR
Example: |
- |
||
|
Scheme for participant identifier is mandatory. Usage: |
|
||
Configuration Property |
Description and Usage |
Default |
||
|
Specifies the time, in seconds, between client requests before the SMP will invalidate session for ADMIN users (System). Usage: |
|
||
|
Specifies the time, in seconds, between client requests before the SMP will invalidate session for users (Service group, SMP Admin). Usage: |
|
||
|
Define if application is set in cluster. In not cluster environment, properties are updated on set Property. Usage: |
|
||
Configuration Property |
Description and Usage |
Default |
||
|
The URL address for resetting the password in DomiSMP. This URL can be used when DomiSMP is behind a reverse proxy. If the property value is not set, the reset URL is created using reverse proxy headers such as Host and X-Forwarded-Host. Usage: |
- |
||
|
The number of minutes for reset token to be valid. Usage: |
|
||
|
Password minimum complexity rules. Usage: Default: ^(?=.*[0-9])(?=.*[a-z])(?=.*[A-Z])(?=.*[~`!@#$%^&+=\-_<>.,?:;*/()|\[\]\{}'"\\]).\{16,32}$ |
See Description |
||
|
The error message shown to the user in case the password does not
follow the regex put in the Usage: Must have:
|
- |
||
|
Number of days password is valid. Usage: |
|
||
|
How many days before expiration should the UI warn users at login. Usage: |
|
||
|
Force change password at UI login if expired. Usage: |
|
||
Configuration Property |
Description and Usage |
Default |
||
|
Delay response in ms on invalid username or password. Usage: |
1000 |
||
|
Number of console login attempt before the user is deactivated. Usage: |
|
||
|
Time in seconds for a suspended user to be reactivated. Usage:
|
|
||
Configuration Property |
Description and Usage |
Default |
||
|
Number of days access token is valid. Usage: |
|
||
|
Number of accessToken login attempt before the accessToken is deactivated. Usage: |
|
||
|
Time in seconds for a suspended accessToken to be reactivated. Usage:
|
|
||
|
Delay in ms on invalid token id or token. Usage: |
|
||
|
Set list of '|' separated authentication types: PASSWORD|SSO. Usage: |
|
||
|
Set list of "|" separated application-automation authentication types (Web-Service integration). Usage: Default: TOKEN|CERTIFICATE |
See Description |
||
|
Authentication with external module as: reverse proxy. Authenticated data are sent to application using 'Client-Cert' HTTP header. Do not enable this feature without a properly configured reverse-proxy. Usage: |
|
||
|
Authentication with external module as: reverse proxy. Authenticated
certificate is sent to application using Usage: |
|
||
Configuration Property |
Description and Usage |
Default |
||
|
The SSO service provider label. Usage: |
|
||
|
The SSO CAS URL endpoint. Usage: Default: http://localhost:8080/cas/ |
See Description |
||
|
The CAS URL path for login. ${smp.sso.cas.url}/${smp.sso.cas.urlpath.login}. Usage: |
|
||
|
The URL is the callback URL belonging to the local SMP Security System.
If using RP,make sure it target SMP path Usage: |
See Description |
||
|
SMP relative path which triggers CAS authentication. Usage: Default: |
See Description |
||
|
Relative path for CAS user data. Complete URL is composed by parameters: ${smp.sso.cas.url}/${smp.sso.cas.smp.user.data.urlpath} Usage: Default: |
See Description |
||
|
The CAS URL path for login. Complete URL is composed of parameters: ${smp.sso.cas.url}/${smp.sso.cas.token.validation.urlpath} Usage: Default:
|
See Description |
||
|
The CAS token validation key:value properties separated with a pipe ( Usage: Default: acceptStrengths:BASIC,CLIENT_CERT|assuranceLevel:TOP |
See Description |
||
|
Pipe-separated ( Usage: Default: DIGIT_SMP|DIGIT_ADMIN |
See Description |
||
|
If the value is set to true, the user is automatically registered to DomiSMP the first time they use the external CAS. The CAS server provides the necessary user data, which is then mapped to the DomiSMP user entity according to the smp.sso.cas.registration.mapping. Usage: |
|
||
|
The value determines whether the CAS-automatically created user is activated immediately or if the System admin must activate the user before they can log in to DomiSMP. Usage: |
|
||
|
Pipe-separated ( Usage: Default: EMAIL:${email}|FULL_NAME:${firstName} ${lastName} |
See Description |
||
Configuration Property |
Description and Usage |
Default |
||
|
Email configuration: Email server. Usage: |
- |
||
|
Email configuration: SMTP mail port. Usage: |
|
||
|
Email configuration: SMTP mail protocol. Usage: |
smtp |
||
|
Email configuration: SMTP mail protocol; mail sender’s username. Usage: |
- |
||
|
Email configuration: _SMTP mail protocol; mail sender’s encrypted password. Usage: |
- |
||
|
Pipe-separated ( Usage: Example: mail.smtp.auth:true|mail.smtp.starttls.enable:true|mail.smtp.quitwait:false |
- |
||
Configuration Property |
Description and Usage |
Default |
||
|
Enable or disable notifications for user creation events. Usage: |
|
||
|
User creation event notification alert level. Usage: |
|
||
|
Enable or disable notifications when user data is changed. Usage: |
|
||
|
User update data event notification alert level. Usage: |
|
||
|
Enable/disable the login failure alert of the authentication module. Usage: |
|
||
|
Login failure alert level. Usage: |
|
||
|
Enable/disable the login suspended alert of the authentication module. Usage: |
|
||
|
Suspended login alert level. Usage: |
|
||
|
When should the account disabled alert be triggered. Usage:
|
|
||
Configuration Property |
Description and Usage |
Default |
||
|
Enable/disable the "Password about to expire" alert. Usage: |
|
||
|
Number of days before password expiration the system is to send alerts. Usage: |
|
||
|
Frequency in days for (re)sending the "Password about to expire" alert. Usage: |
|
||
|
"Password about to expire" alert’s level. Usage: |
|
||
Configuration Property |
Description and Usage |
Default |
||
|
Enable/disable the "Password expired" alert. Usage: |
|
||
|
Period in days after password expiration the system is to send "password expiration" alerts. Usage: |
|
||
|
Frequency in days between "Password expired" alerts. Usage: |
|
||
|
"Password expired" alert’s level. Usage: |
|
||
Configuration Property |
Description and Usage |
Default |
||
|
Enable/disable the "accessToken about to expire" alert. Usage: |
|
||
|
Number of days before password expiration the system is to send alerts. Usage: |
15 |
||
|
Frequency in days between alerts. Usage: |
|
||
|
AccessToken imminent expiration alert level. Usage: |
|
||
Configuration Property |
Description and Usage |
Default |
||
|
Enable/disable the accessToken expiration alert. Usage: |
|
||
|
Number of days after expiration as for how long the system should send alerts. Usage: |
|
||
|
Frequency in days between alerts. Usage: |
|
||
|
Access Token expiration alert level. Usage: |
|
||
Configuration Property |
Description and Usage |
Default |
||
|
Enable/disable the imminent certificate expiration alert. Usage: |
|
||
|
Number of days before expiration as for how long before expiration the system should send alerts. Usage: |
|
||
|
Frequency in days between alerts. Usage: |
|
||
|
Certificate imminent expiration alert level. Values: \{LOW, MEDIUM, HIGH} Usage: |
|
||
Configuration Property |
Description and Usage |
Default |
||
|
Enable/disable the certificate expiration alert. Usage: |
|
||
|
Number of days after expiration as for how long the system should send alerts. Usage: |
|
||
|
Frequency in days between alerts. Usage: |
|
||
|
Certificate expiration alert level. Usage: |
|
||
Configuration Property |
Description and Usage |
Default |
||
|
Property CRON expression for triggering alert messages. Usage: Default: |
See Description |
||
|
Which instance (hostname) to generates a report when Usage: |
|
||
|
Max alerts generated in a batch for the type. Usage: |
|
||
Configuration Property |
Description and Usage |
Default |
||
|
Alert send mail. Usage: Default: |
See Description |
||
|
Default domain code. Usage:
|
- |
||
Configuration Property |
Description and Usage |
Default |
||
|
Allowed user certificate types. Usage: Example: RSA|EC|Ed25519|Ed448
|
- |
||
|
Usage: |
|
||
|
Default domain code. If the domain cannot be determined from the request, the default domain is used. Usage: |
- |
||
|
Allowed user certificate types. Usage: Example: RSA|EC|Ed25519|Ed448
|
- |
Other References
Errors
|
Services Error Codes Table
The following table summarizes all possible errors returned by SML services:
Services Error Codes table
Applicable UC/Request Method |
||||||||
---|---|---|---|---|---|---|---|---|
HTTP Code/ |
Business Code/ Error Code Description |
UC01 |
UC02 |
UC03 |
UC04 |
UC05 |
UC06 |
UC07 |
|
N/A |
- |
x |
x |
x |
x |
x |
x |
|
N/A |
- |
- |
x |
x |
- |
- |
- |
|
XSD_INVALID |
- |
x |
- |
x |
- |
- |
- |
|
MISSING_FIELD |
- |
x |
- |
x |
- |
- |
- |
|
WRONG_FIELD |
- |
x |
- |
x |
- |
- |
- |
|
OUT_OF_RANGE |
- |
- |
- |
x |
- |
- |
- |
|
UNAUTHOR_FIELD |
- |
- |
- |
x |
- |
- |
- |
|
FORMAT_ERROR |
- |
x |
x |
x |
- |
- |
- |
|
USER_NOT_FOUND |
- |
x |
- |
- |
- |
- |
- |
|
OTHER_ERROR |
- |
- |
- |
(x) |
(x) |
(x) |
(x) |
|
UNAUTHORIZED |
- |
x |
x |
x |
x |
- |
- |
|
NOT_FOUND |
- |
- |
x |
- |
x |
x |
x |
|
TECHNICAL |
- |
x |
x |
x |
x |
x |
x |
Table Key: |
Errors Structure Detail
In case of error, a response text will be provided,
in an ErrorResponse
type of element (cf. definition in 3.1.2 – “Extended SMP XSD ”).
The ErrorResponse
holds the following elements:
BusinessCode
-
This code allows the client application to behave appropriately according to the encountered error. The expected values are summarized in §§3.2 –"Errors codes table" and their applicability explicitly specified for each service in the corresponding paragraph.
ErrorDescription
-
This description provides some detailed information on the encountered error. Its content is not predefined and should be intended to help the client developer or administrator to investigate the encountered error.
ErrorUniqueId
-
This identifier uniquely identifies the occurrence of the error. This value is intended to facilitate further investigations on a specific error in particular to search into log files.
<ErrorResponse xmlns="ec:services:SMP:1.0">
<BusinessCode>TECHNICAL</BusinessCode>
<ErrorDescription>Some unexpected technical error occurred. (detailed
information available here)</ErrorDescription>
<ErrorUniqueId>5378C627DA4275F698458AB6845C68456845</ErrorUniqueId>
</ErrorResponse>
XSD Files
|
OASIS SMP XSD
bdx-smp-201605.xsd
<?xml version="1.0" encoding="UTF-8"?>
<!--
Service Metadata Publishing (SMP) Version 1.0
Committee Specification 03
30 June 2016
Copyright (c) OASIS Open 2016. All Rights Reserved.
Source: http://docs.oasis-open.org/bdxr/bdx-smp/v1.0/cs03/schemas/
Latest version of the specification: http://docs.oasis-open.org/bdxr/bdx-smp/v1.0/bdx-smp-v1.0.html
TC IPR Statement: https://www.oasis-open.org/committees/bdxr/ipr.php
-->
<xs:schema
xmlns:xs="http://www.w3.org/2001/XMLSchema"
xmlns="http://docs.oasis-open.org/bdxr/ns/SMP/2016/05"
xmlns:ds="http://www.w3.org/2000/09/xmldsig#" elementFormDefault="qualified" targetNamespace="http://docs.oasis-open.org/bdxr/ns/SMP/2016/05" id="ServiceMetadataPublishing">
<xs:import namespace="http://www.w3.org/2000/09/xmldsig#" schemaLocation="http://www.w3.org/TR/xmldsig-core/xmldsig-core-schema.xsd"/>
<xs:element name="ServiceGroup" type="ServiceGroupType"/>
<xs:element name="ServiceMetadata" type="ServiceMetadataType"/>
<xs:element name="SignedServiceMetadata" type="SignedServiceMetadataType"/>
<xs:complexType name="SignedServiceMetadataType">
<xs:sequence>
<xs:element ref="ServiceMetadata"/>
<xs:element ref="ds:Signature"/>
</xs:sequence>
</xs:complexType>
<xs:complexType name="ServiceMetadataType">
<xs:choice>
<xs:element name="ServiceInformation" type="ServiceInformationType"/>
<xs:element name="Redirect" type="RedirectType"/>
</xs:choice>
</xs:complexType>
<xs:complexType name="ServiceInformationType">
<xs:sequence>
<xs:element ref="ParticipantIdentifier"/>
<xs:element ref="DocumentIdentifier"/>
<xs:element name="ProcessList" type="ProcessListType"/>
<xs:element name="Extension" type="ExtensionType" minOccurs="0" maxOccurs="unbounded"/>
</xs:sequence>
</xs:complexType>
<xs:complexType name="ProcessListType">
<xs:sequence>
<xs:element name="Process" type="ProcessType" maxOccurs="unbounded"/>
</xs:sequence>
</xs:complexType>
<xs:complexType name="ProcessType">
<xs:sequence>
<xs:element ref="ProcessIdentifier"/>
<xs:element name="ServiceEndpointList" type="ServiceEndpointList"/>
<xs:element name="Extension" type="ExtensionType" minOccurs="0" maxOccurs="unbounded"/>
</xs:sequence>
</xs:complexType>
<xs:complexType name="ServiceEndpointList">
<xs:sequence>
<xs:element name="Endpoint" type="EndpointType" maxOccurs="unbounded"/>
</xs:sequence>
</xs:complexType>
<xs:complexType name="EndpointType">
<xs:sequence>
<xs:element name="EndpointURI" type="xs:anyURI"/>
<xs:element name="RequireBusinessLevelSignature" type="xs:boolean" minOccurs="0" default="false"/>
<xs:element name="MinimumAuthenticationLevel" type="xs:string" minOccurs="0"/>
<xs:element name="ServiceActivationDate" type="xs:dateTime" minOccurs="0"/>
<xs:element name="ServiceExpirationDate" type="xs:dateTime" minOccurs="0"/>
<xs:element name="Certificate" type="xs:base64Binary"/>
<xs:element name="ServiceDescription" type="xs:string"/>
<xs:element name="TechnicalContactUrl" type="xs:anyURI"/>
<xs:element name="TechnicalInformationUrl" type="xs:anyURI" minOccurs="0"/>
<xs:element name="Extension" type="ExtensionType" minOccurs="0" maxOccurs="unbounded"/>
</xs:sequence>
<xs:attribute name="transportProfile" type="xs:string" use="required"/>
</xs:complexType>
<xs:complexType name="ServiceGroupType">
<xs:sequence>
<xs:element ref="ParticipantIdentifier"/>
<xs:element name="ServiceMetadataReferenceCollection" type="ServiceMetadataReferenceCollectionType"/>
<xs:element name="Extension" type="ExtensionType" minOccurs="0" maxOccurs="unbounded"/>
</xs:sequence>
</xs:complexType>
<xs:complexType name="ServiceMetadataReferenceCollectionType">
<xs:sequence>
<xs:element name="ServiceMetadataReference" type="ServiceMetadataReferenceType" minOccurs="0" maxOccurs="unbounded"/>
</xs:sequence>
</xs:complexType>
<xs:complexType name="ServiceMetadataReferenceType">
<xs:attribute name="href" type="xs:anyURI"/>
</xs:complexType>
<xs:complexType name="RedirectType">
<xs:sequence>
<xs:element name="CertificateUID" type="xs:string"/>
<xs:element name="Extension" type="ExtensionType" minOccurs="0" maxOccurs="unbounded"/>
</xs:sequence>
<xs:attribute name="href" type="xs:anyURI" use="required"/>
</xs:complexType>
<xs:element name="ParticipantIdentifier" type="ParticipantIdentifierType"/>
<xs:element name="DocumentIdentifier" type="DocumentIdentifierType"/>
<xs:element name="ProcessIdentifier" type="ProcessIdentifierType"/>
<xs:element name="RecipientIdentifier" type="ParticipantIdentifierType"/>
<xs:element name="SenderIdentifier" type="ParticipantIdentifierType"/>
<xs:complexType name="ParticipantIdentifierType">
<xs:simpleContent>
<xs:extension base="xs:string">
<xs:attribute name="scheme" type="xs:string"/>
</xs:extension>
</xs:simpleContent>
</xs:complexType>
<xs:complexType name="DocumentIdentifierType">
<xs:simpleContent>
<xs:extension base="xs:string">
<xs:attribute name="scheme" type="xs:string"/>
</xs:extension>
</xs:simpleContent>
</xs:complexType>
<xs:complexType name="ProcessIdentifierType">
<xs:simpleContent>
<xs:extension base="xs:string">
<xs:attribute name="scheme" type="xs:string"/>
</xs:extension>
</xs:simpleContent>
</xs:complexType>
<xs:complexType name="ExtensionType">
<xs:annotation>
<xs:documentation>
A single extension for private use.
</xs:documentation>
</xs:annotation>
<xs:sequence>
<xs:element maxOccurs="1" minOccurs="0" name="ExtensionID" type="xs:token">
<xs:annotation>
<xs:documentation>
An identifier for the Extension assigned by the creator of the extension.
</xs:documentation>
</xs:annotation>
</xs:element>
<xs:element maxOccurs="1" minOccurs="0" name="ExtensionName" type="xs:string">
<xs:annotation>
<xs:documentation>
A name for the Extension assigned by the creator of the extension.
</xs:documentation>
</xs:annotation>
</xs:element>
<xs:element maxOccurs="1" minOccurs="0" name="ExtensionAgencyID" type="xs:string">
<xs:annotation>
<xs:documentation>
An agency that maintains one or more Extensions.
</xs:documentation>
</xs:annotation>
</xs:element>
<xs:element maxOccurs="1" minOccurs="0" name="ExtensionAgencyName" type="xs:string">
<xs:annotation>
<xs:documentation>
The name of the agency that maintains the Extension.
</xs:documentation>
</xs:annotation>
</xs:element>
<xs:element maxOccurs="1" minOccurs="0" name="ExtensionAgencyURI" type="xs:anyURI">
<xs:annotation>
<xs:documentation>
A URI for the Agency that maintains the Extension.
</xs:documentation>
</xs:annotation>
</xs:element>
<xs:element maxOccurs="1" minOccurs="0" name="ExtensionVersionID" type="xs:normalizedString">
<xs:annotation>
<xs:documentation>
The version of the Extension.
</xs:documentation>
</xs:annotation>
</xs:element>
<xs:element maxOccurs="1" minOccurs="0" name="ExtensionURI" type="xs:anyURI">
<xs:annotation>
<xs:documentation>
A URI for the Extension.
</xs:documentation>
</xs:annotation>
</xs:element>
<xs:element maxOccurs="1" minOccurs="0" name="ExtensionReasonCode" type="xs:token">
<xs:annotation>
<xs:documentation>
A code for reason the Extension is being included.
</xs:documentation>
</xs:annotation>
</xs:element>
<xs:element maxOccurs="1" minOccurs="0" name="ExtensionReason" type="xs:string">
<xs:annotation>
<xs:documentation>
A description of the reason for the Extension.
</xs:documentation>
</xs:annotation>
</xs:element>
<xs:any namespace="##other" processContents="lax"/>
</xs:sequence>
</xs:complexType>
</xs:schema>
Extended SMP XSD
ErrorResponse
was defined as a response to return available detailed information on occurring error(s). You can find additional information for the values of elements BusinessCode
and ErrorDescription
in the Error Codes Table.
<?xml version="1.0" encoding="UTF-8"?>
<xs:schema
xmlns:xs="http://www.w3.org/2001/XMLSchema"
xmlns="ec:services:SMP:1.0" targetNamespace="ec:services:SMP:1.0"
elementFormDefault="qualified" id="ServiceMetadataPublishing">
<xs:element name="ErrorResponse" type="ErrorResponseType"/>
<xs:complexType name="ErrorResponseType">
<xs:sequence>
<xs:element name="BusinessCode" type="xs:string"/>
<xs:element name="ErrorDescription" type="xs:string" minOccurs="0"/>
<xs:element name="ErrorUniqueId" type="xs:string"/>
</xs:sequence>
</xs:complexType>
</xs:schema>
|
Support
eDelivery Support Team maintains and supports the DomiSMP Documentation. For any questions, comments or requests for change, please contact:
-
Hours: 8AM to 6PM (Normal EC working days)