X-Road: Use Case Model for Global Configuration Distribution

Analysis

Version: 1.8
07.02.2023 Doc. ID: UC-GCONF


Version history

Date Version Description Author
09.07.2015 0.1 Initial version Riin Saarmäe
10.09.2015 0.2 Central server use cases added Riin Saarmäe
14.09.2015 0.3 Error messages for global configuration generation added Martin Lind
14.09.2015 0.4 Added comments and minor editorial changes Margus Freudenthal
15.09.2015 0.5 Changes in error messages' structure and more accurate configuration location Martin Lind
15.09.2015 0.6 Corrections and additions done Riin Saarmäe
16.09.2015 0.7 Use cases for changing the central server address added Riin Saarmäe
20.09.2015 1.0 Editorial changes made Imbi Nõgisto
21.09.2015 1.1 Minor corrections made Imbi Nõgisto
04.11.2015 1.2 Renamed Scope element to System. Renamed native to local. Added brief description to UC GCONF_5. Riin Saarmäe
16.12.2015 1.3 GCONF_11 updated: a label value can be assigned for the key on generation. UC GCONF_24 updated: the last successful configuration source is used for downloading configuration, if the download from the last successful source fails then the next source is chosen randomly. Riin Saarmäe
12.02.2016 1.4 GCONF_22 updated: the verification of the instance identifier on configuration anchor file upload added. Meril Vaht
29.08.2017 1.5 Changed documentation type from docx to md file Lasse Matikainen
06.03.2018 1.6 Moved terms to term doc, added term doc reference and link, added internal MD-doc links Tatu Repo
25.08.2021 1.7 Update X-Road references from version 6 to 7 Caro Hautamäki
07.02.2023 1.8 Updates regarding the validation-program property for optional configuration parts Justas Samuolis

Table of Contents

License

This work is licensed under the Creative Commons Attribution-ShareAlike 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/3.0/.

1 Introduction

1.1 Purpose

The purpose of this document is to describe:

This document does not include use cases for

The use cases include verifications that take place, and the main error conditions that may be encountered during the described process. The general system errors that may be encountered in most of the use cases (e.g., database connection errors or out of memory errors) are not described in this document.

The use cases assume that the X-Road software components involved in the use cases are installed and initialised (see [IG-CS] and [IG-SS]).

The use cases including a human actor (the level of the use case is user task) assume, that the actor is logged in to the system and has the access rights required to carry out the use case.

1.2 Terms and Abbreviations

See X-Road terms and abbreviations documentation [TA-TERMS].

1.3 References

  1. [IG-CS] X-Road 7. Central Server Installation Guide. Document ID: IG-CS.

  2. [IG-SS] X-Road 7. Security Server Installation Guide. Document ID: IG-SS.

  3. [INI] INI file. http://en.wikipedia.org/wiki/INI_file

  4. [PKCS11] PKCS #11 Cryptographic Token Interface Base Specification Version 2.40. Function return values. http://docs.oasis-open.org/pkcs11/pkcs11-base/v2.40/csprd01/pkcs11-base-v2.40-csprd01.html#_Toc372627249

  5. [PR-GCONF] X-Road: Protocol for Downloading Configuration. Document ID: PR-GCONF.

  6. [SPEC-AL] X-Road: Audit Log Events. Document ID: SPEC-AL.

  7. [UC-CP] X-Road: Use Case Model for the Configuration Proxy. Document ID: UC-CP.

  8. [UC-FED] X-Road: Use Case Model for Federation. Document ID: UC-FED.

  9. [UG-SYSPAR] X-Road: System Parameters. Document ID: UG-SYSPAR.

  10. [TA-TERMS] X-Road Terms and Abbreviations. Document ID: TA-TERMS.

2 Overview

The X-Road security servers periodically download global configuration distributed by the configuration providers. The global configuration is used to verify the parties communicating over the X-Road and to check the validity of various data items, such as authentication certificates, OCSP responses and timestamps.

The information needed by the security servers for downloading and verifying global configuration is contained in configuration anchors. The configuration anchors are distributed by the internal configuration providers to the security server owners via out of band means.

The configuration providers ensure the integrity of the distributed configuration by signing the configuration directory.

2.1 Actors

The use case model for downloading configuration includes the following actors.

Relationships between the actors, systems and use cases are described in Figure 1.

Figure 1. Use case diagram for distributing global configuration

2.2 Central Server Use Cases

2.2.1 UC GCONF_01: View a Configuration Source

System: Central server

Level: User task

Component: Central server

Actor: CS administrator

Brief Description: CS administrator views the information about a configuration source provided by the central server.

Preconditions: -

Postconditions: The configuration source information has been displayed to CS administrator.

Trigger: CS administrator wishes to view the configuration source information.

Main Success Scenario:

  1. CS administrator selects to view a configuration source.

  2. System displays a configuration source provided by the central server. The following information is displayed.

    • Type of the configuration source (internal/external).

    • The SHA-224 hash value of the configuration anchor.

    • The generation date and time (UTC) of the configuration anchor.

    • The configuration download URL – address from where the configuration directory provided by this source can be downloaded. The system composes the download URL by adding /internalconf or /externalconf (depending on the type of the configuration source) to the address of the central server.

    • List of configuration signing keys. For each key, the following information is displayed:

      • the identifier of the device holding the key,

      • the identifier of the key,

      • the key generation date and time.

    The key currently used to sign configuration is displayed is emphasised. Only the keys that have a certificate associated with them are displayed.

    • List of configuration part files distributed by the source. For each configuration part, the following information is displayed:

    • name of the configuration part file,

    • content identifier of the configuration part,

    • date and time when the configuration part file was last updated.

    The following user action options are displayed:

    • download the configuration source anchor file: 2.2.2;

    • re-create the configuration source anchor file: 2.2.3;

    • add a configuration signing key: 2.2.11;

    • delete a configuration signing key: 2.2.13;

    • activate a configuration signing key: 2.2.12;

    • log in to a security token holding a configuration signing key: 2.2.7 or 2.2.8;

    • log out of a security token holding a configuration signing key: 2.2.9 or 2.2.10;

    • download a configuration part file: 2.2.6;

    • upload an optional configuration part file: 2.2.5, in case the optional part is described in the system: 2.2.4.

Extensions: -

Related information: -

2.2.2 UC GCONF_02: Download a Configuration Source Anchor File

System: Central server

Level: User task

Component: Central server

Actor: CS administrator

Brief Description: CS administrator downloads the configuration anchor of a configuration source.

Preconditions: The anchor file has been generated.

Postconditions: CS administrator has downloaded the anchor file.

Trigger: CS administrator wishes to download the configuration anchor, either to view its contents or to distribute the anchor to configuration clients.

Main Success Scenario:

  1. CS administrator selects to download the configuration anchor of a configuration source (internal or external).

  2. System presents the configuration anchor file for downloading.

  3. CS administrator saves the anchor file to the file system of the local computer.

Extensions: -

Related information:

2.2.3 UC GCONF_03: Re-Create a Configuration Source Anchor

System: Central server

Level: User task

Component: Central server

Actor: CS administrator

Brief Description: CS administrator re-creates the configuration anchor of a configuration source. Under normal system behaviour, generation of the anchor file by CS administrator is unnecessary, as the system generates the anchor file automatically when needed. The re-creation allows to recover from system malfunctions.

Preconditions: -

Postconditions: An audit log record for the event has been created.

Trigger: CS administrator wishes to re-create the configuration anchor for a configuration source.

Main Success Scenario:

  1. CS administrator selects to re-create the configuration anchor.

  2. System generates the configuration anchor: 2.2.17.

  3. System displays the message: “Internal configuration anchor generated successfully” or “External configuration anchor generated successfully, depending on the configuration source the anchor was re-created for.

  4. System logs the event “Re-create internal configuration anchor” or “Re-create external configuration anchor”, depending on which configuration source the anchor file was re-created for, to the audit log.

Extensions:

Related information:

2.2.4 UC GCONF_04: Describe Optional Configuration Part Data

System: Central server

Level: User task

Component: Central server

Actor: CS administrator

Brief Description: CS administrator creates a file in the system configuration that contains information needed for the system to recognize, validate and distribute an optional configuration part.

Preconditions: -

Postconditions: A file describing an optional configuration part has been saved in the system configuration. The option to upload the optional configuration part file is enabled in the GUI.

Trigger: Information not contained in the shared or private parameters parts needs to be added to the global configuration.

Main Success Scenario:

  1. CS administrator creates an INI file (see [INI]) in the /etc/xroad/configuration-parts directory containing the following key-value pairs:

    a. content-identifier = <value> (e.g., FOO)

    b. file-name = <value> (e.g., foo.xml)

  2. CS administrator saves the created file.

Extensions: -

Related information:

2.2.5 UC GCONF_05: Upload an Optional Configuration Part File

System: Central server

Level: User task

Component: Central server

Actor: CS administrator

Brief Description: CS administrator uploads an optional configuration part file.

Preconditions: Optional configuration part data is described in the system (see 2.2.4).

Postconditions: An audit log record for the event has been created.

Trigger: The contents of the optional configuration part file have been changed and CS administrator wants to upload the updated file to the system.

Main Success Scenario:

  1. CS administrator selects to upload an optional configuration part file.

  2. CS administrator inserts the path to the configuration part file in the computer's file system.

  3. System verifies that the uploaded file conforms to xsd schema for given content identifier.

  4. System displays the message “Configuration file for content identifier 'X' uploaded successfully.”, where “X” is the content-identifier described for the configuration part.

  5. System verifies that a file for this optional configuration part already exists in the system configuration and replaces the existing file with the uploaded one.

  6. System logs the event “Upload configuration part” to the audit log.

Extensions:

Related information:

2.2.6 UC GCONF_06: Download a Configuration Part File

System: Central server

Level: User task

Component: Central server

Actor: CS administrator

Brief Description: CS administrator downloads a configuration part file.

Preconditions: Configuration part file has been generated by the system or uploaded to the system.

Postconditions: CS administrator has downloaded the configuration part file.

Trigger: CS administrator wishes to download a configuration part file, e.g., to view the contents of the file.

Main Success Scenario:

  1. CS administrator selects to download a configuration part file.

  2. System presents the configuration part file for downloading.

  3. CS administrator saves the configuration part file to the computer's file system.

Extensions: -

Related information:

2.2.7 UC GCONF_07: Log In to a Software Security Token

System: Central server

Level: User task

Component: Central server

Actor: CS administrator

Brief Description: CS administrator logs in to a software token by entering the token PIN code.

Preconditions: The token is in logged out state.

Postconditions: An audit log record for the event has been created.

Triggers:

Main Success Scenario:

  1. CS administrator selects log in to a software security token.

  2. CS administrator enters the token PIN code.

  3. System parses the user input: 2.2.16.

  4. System verifies the PIN code is correct and logs in to the token.

  5. System logs the event “Log in to token” to the audit log.

Extensions:

Related information:

2.2.8 UC GCONF_08: Log In to a Hardware Security Token

System: Central server

Level: User task

Component: Central server

Actor: CS administrator

Brief Description: CS administrator logs in to a hardware token by entering the token PIN code.

Preconditions:

Postconditions: An audit log record for the event has been created.

Triggers:

Main Success Scenario:

  1. CS administrator selects log in to a hardware security token holding a configuration signing key.

  2. CS administrator enters the token PIN code.

  3. System parses the user input: 2.2.16.

  4. System verifies, that the token is not locked.

  5. System verifies that the entered PIN code conforms to the PIN code format configured for the token.

  6. System verifies the entered PIN code is correct and logs in to the token.

  7. System logs the event “Log in to token” to the audit log.

Extensions:

Related information:

2.2.9 UC GCONF_09: Log Out of a Software Security Token

System: Central server

Level: User task

Component: Central server

Actor: CS administrator

Brief Description: CS administrator logs out of a software security token.

Preconditions:

Postconditions:

Trigger: CS administrator wishes to log out of a software security token.

Main Success Scenario:

  1. CS administrator selects to log out of a token.

  2. System logs out of the token.

  3. System logs the event “Log out from token” to the audit log.

Extensions: -

Related information:

2.2.10 UC GCONF_10: Log Out of a Hardware Security Token

System: Central server

Level: User task

Component: Central server

Actor: CS administrator

Brief Description: CS administrator logs out of a hardware security token.

Preconditions:

Postconditions:

Trigger: CS administrator wishes to log out of a software security token.

Main Success Scenario:

  1. CS administrator selects to log out of a security token.

  2. System logs out of the token.

  3. System logs the event “Log out from token” to the audit log.

Extensions:

Related information:

2.2.11 UC GCONF_11: Add a Configuration Source Signing Key

System: Central server

Level: User task

Component: Central server

Actor: CS administrator

Brief Description: CS administrator generates a configuration source signing key on a security token. System creates a self-signed certificate containing the public key part of the generated key and generates the configuration anchor containing the created certificate.

Preconditions: A security token is initialised and connected to the system.

Postconditions: -

Trigger: CS administrator wishes to add a signing key for a configuration source (e.g., as a part of performing a regular key change).

Main Success Scenario:

  1. CS administrator selects to add a configuration source signing key for a configuration source (either internal or external).

  2. System displays the list of available security tokens.

  3. CS administrator selects a security token and enters the label of the key.

  4. System generates a new configuration signing key with the inserted label on the selected token.

  5. System creates a self-signed certificate containing the public key part of the generated key.

  6. System saves the generated key information and the created certificate to system configuration.

  7. System verifies that the selected configuration source already has an active key.

  8. System logs the event “Generate internal configuration signing key” or “Generate external configuration signing key”, depending of the configuration source, to the audit log.

  9. System generates the configuration anchor for the configuration source: 2.2.17.

Extensions:

Related information:

2.2.12 UC GCONF_12: Activate a Configuration Source Signing Key

System: Central server

Level: User task

Component: Central server

Actor: CS administrator

Brief Description: CS administrator activates a configuration signing key. System uses the active key to sign configuration provided by the configuration source.

Preconditions: A security token containing an inactive signing key associated with the configuration source is connected to the system.

Postconditions: -

Trigger: CS administrator wishes to change the key that the system uses for signing configuration provided by the source.

Main Success Scenario:

  1. CS administrator selects to activate an inactive configuration source signing key.

  2. System prompts for confirmation.

  3. CS administrator confirms.

  4. System verifies that the key to be activated is accessible, marks the key as active and starts using the key for signing the configuration provided by the source.

  5. System logs the event “Activate internal configuration signing key” or “Activate external configuration signing key”, depending of the configuration source, to the audit log.

Extensions:

Related information:

2.2.13 UC GCONF_13: Delete a Configuration Source Signing Key

System: Central server

Level: User task

Component: Central server

Actor: CS administrator

Brief Description: CS administrator deletes a configuration source signing key and the associated certificate. System generates the configuration anchor that contains updated certificates for the configuration source.

Preconditions: The signing key is not in active state (i.e., the system is using another key for signing the configuration).

Postconditions: -

Trigger: CS administrator wishes to delete a configuration signing key.

Main Success Scenario:

  1. CS administrator selects to delete a configuration source signing key.

  2. System prompts for confirmation.

  3. CS administrator confirms.

  4. System deletes the selected configuration signing key information and the associated certificate from system configuration and displays the message: “Key successfully deleted from central server configuration”.

  5. System generates the configuration anchor for the configuration source: 2.2.17.

  6. System logs the event “Delete internal configuration signing key” to the audit log.

  7. System deletes the signing key from the security token and displays the message: “Key successfully deleted from token 'X'”, where “X” is the identifier of the token.

Extensions:

Related information:

2.2.14 UC GCONF_14: View System Parameters

System: Central server

Level: User task

Component: Central server

Actor: CS administrator

Brief Description: CS administrator views the system parameters of the central server.

Preconditions: -

Postconditions: The system parameters have been displayed to the CS administrator.

Trigger: CS administrator wishes to view the system parameters.

Main Success Scenario:

  1. CS administrator selects to view the system parameters.

  2. System displays the following information:

    • the instance identifier of this X-Road instance;

    • the address of the central server.

    The following user action options are displayed:

    • edit the address of the central server: 2.2.15.

Extensions: -

Related information: -

2.2.15 UC GCONF_15: Edit the Address of the Central Server

System: Central server

Level: User task

Component: Central server

Actor: CS administrator

Brief Description: CS administrator changes the address of the central server.

Preconditions: -

Postconditions: An audit log record for the event has been created.

Trigger: CS administrator wishes to change the address on which the central server is available for incoming requests (e.g., management service requests, configuration download requests).

Main Success Scenario:

  1. CS administrator selects to change the public address of the central server.

  2. CS administrator inserts the address.

  3. System parses the user input 2.2.16.

  4. System verifies, that the inserted address is a valid DNS name or IP address.

  5. System saves the address.

  6. System logs the event “Edit central server address” to the audit log.

  7. System generates configuration anchors for the internal and external configuration: 2.2.17.

Extensions:

Related information:

2.2.16 UC GCONF_16: Parse User Input

System: Central server

Level: Subfunction

Component: Central server

Actors: -

Brief Description: System removes the leading and trailing whitespaces from the user input and verifies that the required fields are not empty.

Preconditions: -

Postconditions: -

Triggers:

Main Success Scenario:

  1. System removes leading and trailing whitespaces.

  2. System verifies that the mandatory fields are filled.

  3. System verifies that the user input does not exceed 255 characters.

Extensions:

Related information: -

2.2.17 UC GCONF_17: Generate a Configuration Anchor

System: Central server

Level: Subfunction

Component: Central server

Actor: -

Brief Description: System generates for a configuration source a configuration anchor containing the information needed for the configuration clients for downloading and verifying configuration from the configuration source.

Preconditions: The instance identifier and central server address are saved in the system configuration.

Postconditions: -

Triggers:

Main Success Scenario:

  1. System verifies that at least one signing key with the corresponding certificate is saved in the system configuration for the configuration source.

  2. System generates the anchor file and calculates the file hash.

  3. System saves the anchor file, file hash and file generation time to system configuration.

  4. System displays the message: “Internal configuration anchor generated successfully” or “External configuration anchor generated successfully”, depending on the configuration source.

Extensions:

Related information:

2.2.18 UC GCONF_18: Generate Configuration

System: Central server

Level: System task

Component: Central server

Actor: -

Brief Description: System generates private and shared configuration part files, builds and signs the configuration directories for configuration sources, and makes the global configuration available for configuration clients.

Preconditions: -

Postconditions: -

Trigger: Configuration generation timer defined in the central server configuration file /etc/cron.d/xroad-center*.*

Main Success Scenario:

  1. System verifies that the system configuration contains the data necessary for generating configuration and generates the private parameters and shared parameters configuration part files.

  2. System verifies the validity of the generated files against the respective schemas and saves the generated files to the system configuration.

  3. System

    • calculates the configuration expiry time (by adding the value of the central server system parameter confExpireIntervalSeconds to current time);

    • calculates the hash values of the generated configuration files using the algorithm defined by the value of the central server system parameter confHashAlgoUri; and

    • builds the internal and external configuration directories.

  4. System signs the internal and external configuration directories using the active configuration signing keys of the respective configuration sources.

  5. System makes the signed configuration directories and configuration part files available to configuration clients.

Extensions:

Related information:

2.2.19 UC GCONF_19: Handle a Configuration Download Request

System: Central server

Level: System task

Component: Central server, security server, configuration proxy

Actor: Configuration client

Brief Description: System receives a configuration download request from a configuration client and responds.

Preconditions: Signed configuration directory and configuration part files have been made available for downloading.

Postconditions: The configuration client has received either the requested configuration item (signed configuration directory or a configuration part file) or an error message.

Trigger: Download request from a configuration client.

Main Success Scenario:

  1. Configuration client requests to download the signed configuration directory or a configuration part file.

  2. System responds with the requested files.

Extensions:

Related information: -

2.3 Security Server Use Cases

2.3.1 UC GCONF_20: View the Configuration Anchor Information

System: Security server

Level: User task

Component: Security server

Actor: SS administrator

Brief Description: SS administrator views the information regarding the configuration anchor used by the system to download global configuration.

Preconditions: A configuration anchor is saved in the system configuration (see 2.3.3).

Postconditions: The configuration anchor information is displayed to SS administrator.

Trigger: SS administrator wishes to view the configuration anchor information e.g., to verify that the system is using the latest anchor provided by the governing agency.

Main Success Scenario:

  1. SS administrator selects to view the configuration anchor.

  2. System displays the following information.

    • The SHA-224 hash value of the configuration anchor.

    • The generation date and time (UTC) of the configuration anchor.

    The following user action options are displayed:

    • download the configuration anchor file: 2.3.2;

    • upload a configuration anchor file: 2.3.3.

Extensions: -

Related information: -

2.3.2 UC GCONF_21: Download the Configuration Anchor File

System: Security server

Level: User task

Component: Security server

Actor: SS administrator

Brief Description: SS administrator downloads the configuration anchor file used by the system to download configuration.

Preconditions: A configuration anchor is saved in the system configuration.

Postconditions: The configuration anchor file used by the system has been downloaded by the SS administrator.

Trigger: SS administrator wishes to view the contents of the configuration anchor file or to store the file to an external location.

Main Success Scenario:

  1. SS administrator selects to download the configuration anchor file.

  2. System presents the configuration anchor file for downloading.

  3. SS administrator saves the anchor file to the local file system.

Extensions: -

Related information: -

2.3.3 UC GCONF_22: Upload a Configuration Anchor File

System: Security server

Level: User task

Component: Security server

Actor: SS administrator

Brief Description: SS administrator uploads the configuration anchor file to the system. System displays the details of the anchor and asks for SS administrator to confirm the upload. After confirmation, the system verifies that the configuration downloaded from the source pointed by this anchor is usable and starts using the uploaded anchor.

Preconditions: SS administrator has received a configuration anchor file form the internal configuration provider and validated the integrity of the anchor.

Postconditions: -

Trigger: The configuration anchor needs to be uploaded

Main Success Scenario:

  1. SS administrator selects to upload a configuration anchor file.

  2. SS administrator inserts the path to the anchor file in the local file system.

  3. System verifies that the file is a valid configuration anchor file by validating the uploaded file against the configuration anchor schema.

  4. System verifies that the instance identifier in the anchor file corresponds to the instance identifier of the security server.

  5. System calculates and displays the SHA-224 hash value and the generation time of the selected anchor file and prompts for confirmation.

  6. SS administrator confirms.

  7. System verifies that the anchor file is functional by downloading configuration from the source pointed by the anchor: 2.3.4.

  8. System saves the configuration anchor (overwriting the existing anchor if such exists).

  9. System logs the event “Upload configuration anchor” to the audit log.

Extensions:

Related information:

2.3.4 UC GCONF_23: Update Configuration

System: Security server

Level: System task

Component: Security server

Actor: -

Brief Description: System updates configuration by downloading global configuration from every known configuration source and updating the states of system configuration objects based on information found in the downloaded configuration files.

Preconditions: Configuration anchor is saved in the system configuration.

Postconditions: -

Triggers:

Main Success Scenario:

  1. System downloads internal configuration: 2.3.5.

  2. System finds configuration anchors pointing to external configuration sources from the private parameters part of the internal configuration and downloads configuration from each source pointed by the anchors: 2.3.5.

  3. System verifies that the state values of one or more system configuration objects (i.e. authentication certificates, security server clients) need to be updated and updates the values.

Extensions:

Related information:

2.3.5 UC GCONF_24: Download Configuration from a Configuration Source

System: Security server

Level: Subfunction

Component: Security server, central server, configuration proxy

Actor: Configuration source

Brief Description: System downloads the configuration directory describing the configuration provided by the configuration source and verifies the integrity of the directory. System updates the configuration files stored in the system to match the list of configuration parts described in the configuration directory by downloading the latest version of (or deleting) the obsolete or missing files.

Preconditions: -

Postconditions: -

Triggers: Steps 1 and 2 of 2.3.4.

Main Success Scenario:

  1. System finds configuration source addresses from the configuration anchor.

  2. System downloads the signed configuration directory by making a HTTP GET request to the configuration source address found in the configuration anchor that successfully served the last configuration download request.

  3. System saves the information about the configuration source that successfully served the configuration download request.

  4. System parses the downloaded configuration directory and verifies that the configuration directory is signed and not expired (compares the Expire-date header value of the configuration directory to current date).

  5. System verifies the signature of the configuration directory: 2.3.6.

  6. System handles each configuration part found in the configuration directory: 2.3.7.

  7. System verifies, that one or more configuration files were downloaded and saves the files, replacing existing files (if such exist).

  8. System saves the expiry date of the downloaded configuration files.

  9. System verifies that every configuration file saved in the system configuration that originates from the used configuration source is described in the configuration directory.

Extensions:

Related information:

2.3.6 UC GCONF_25: Verify the Signature of the Configuration Directory

System: Security server

Level: Subfunction

Component: Security server

Actor: -

Brief Description: System verifies the signature of the configuration directory using the configuration source anchor.

Preconditions: -

Postconditions: -

Trigger: Step 4 of 2.3.5.

Main Success Scenario:

  1. System finds the configuration signature algorithm (value of the MIME header Signature-algorithm-id) and the hash value of the verification certificate (value of the MIME header Verification-certificate-hash) from the signature part of the downloaded configuration directory.

  2. System uses the found hash value to find the corresponding signature verification certificate from the configuration source anchor.

  3. System verifies the configuration signature value using the signature algorithm and the signature verification certificate.

Extensions:

Related information:

2.3.7 UC GCONF_26: Handle a Configuration Part of the Configuration Directory

System: Security server

Level: Subfunction

Component: Security server, central server, configuration proxy

Actor: Configuration source

Brief Description: System checks if the configuration file described in the configuration directory part is missing from the system or differs from the one stored in the system. If the file is missing or needs to be updated, the system downloads the file from the configuration source and verifies the integrity of the downloaded file.

Preconditions: -

Postconditions: The system has verified that the configuration file corresponding to the configuration part is up to date or has downloaded the latest version of the file from the configuration source.

Trigger: Step 5 of 2.3.5.

Main Success Scenario:

  1. System finds a configuration file stored in the system that corresponds to the file name part of the value of the Content-location MIME header of the configuration part. System calculates the hash value for the found file using the hash algorithm stated in the Hash-algorithm-id MIME header of the configuration part.

  2. System verifies that the hash value given as the contents of the configuration part is different from the hash value calculated for the configuration file stored in the system.

  3. System downloads the configuration file from the URL provided by the Content-location MIME header in the configuration part.

  4. System calculates the hash value of the downloaded file using the algorithm defined by the Hash-algorithm-id MIME header and verifies that the hash value of the downloaded file matches the hash value in the configuration part.

  5. In case the Content-identifier MIME header value of the downloaded configuration part is either PRIVATE-PARAMETERS or SHARED-PARAMETERS, the system verifies that the instance identifier stated in the downloaded file matches the instance parameter value of the Content-identifier MIME header.

Extensions:

Related information: