Step by step instructions for service providers on how to Signing using CIBA and SIM certificate.
For all steps to be successful the following must be at hand.
Client Id (received from Auðkenni)
Client secret (received from Auðkenni)
Related party (not necessary)
Base URI (received from Auðkenni)
Private Key (to sign a JSON Web Token)
Public Key (to give to Auðkenni for configuration)
User’s mobile number
Message text for user (Including any verification messages: number, text etc.)
Client id: myCibaClientId
Client secret: MyApiClientP4$sW
Base URI: pfzww.audkenni.is
Private Key: Not shown here for security reasons
Public Key: Not shown
All code examples are generated using Postman. They are therefore only for demo.
The first step is to create a signed JWT to use for CIBA communication.
login_hint (the users mobile number)
scope (openid, profile, signature. Also possible to add “related party” info here (see example))
acr_values (“sim-sign-pkcs1”. This value is different between authentication/signing methods)
iss (the Client id)
aud (Should have “https://pfzww.audkenni.is:443/sso/oauth2/realms/root/realms/audkenni“)
exp (the lifetime of the token)
binding_message (the message to display at users mobile device)
binding_content (base64 string of a SHA256 hash)
Private key (to sign the JWT)
Alg info (Should be “RS256”)
eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJsb2dpbl9oaW50IjoiOTg3NjU0MyIsInNjb3BlIjoib3BlbmlkIHByb2ZpbGUgc2lnbmF0dXJlIFJFTEFURURQQVJUWTpNeU93bkNsaWVudCIsImFjcl92YWx1ZXMiOiJzaW0tc2lnbi1wa2NzMSIsImlzcyI6Im15Q2liYUNsaWVudElkIiwiYXVkIjoiaHR0cHM6Ly9wZnp3dy5hdWRrZW5uaS5pczo0NDMvc3NvL29hdXRoMi9yZWFsbXMvcm9vdC9yZWFsbXMvYXVka2VubmkiLCJleHAiOjE2MTExNDk0NTkuMTIyLCJiaW5kaW5nX21lc3NhZ2UiOiJBdcOwa2VubmkgU0lNIFNpZ25pbmciLCJiaW5kaW5nX2NvbnRlbnQiOiJQR1RMZitkeUtZU0EvR0tRMnJacUVRZXBmL3JZSExnZ0pyY3RZa0xHYlN3PSJ9.DRHn9-ueuLhr0y3RMu7NTS6_i3L2LbxLbwhnZg8JO6oLwmHtXenZXRGpF3n6Lgo3YRZPhpK6Tc_6kvMHmTyMQW2g2fTyFMylX2Z19rWwS5oHqTFGaqfLuePhzSxIFPUI56ofKp6jS4mb1dC85mxKrMxgvrlBgIlvA_rx9DqNUgSYyETzeBELlTwWdTOhJuCv-N53Ngt7Ro-s_FDceyOeVl_V-BJALO8Y6r2PF2DkKYFHW-4ykQc_MX3lhJYdaY6w26yYC1XkggmXsLz-JWVbwveB0JMv_5j2j6OiPnuKhkFWAoVKlS0rVENZCSZ_rptgPq9VT7ajlyeebB8mbcSm7w |
{ "login_hint": "9876543", "scope": "openid profile signature RELATEDPARTY:MyOwnClient", "acr_values": "sim-sign-pkcs1", "iss": "myCibaClientId", "aud": "https://pfzww.audkenni.is:443/sso/oauth2/realms/root/realms/audkenni", "exp": 1611149459.122, "binding_message": "Auðkenni SIM Signing", "binding_content": "PGTLf+dyKYSA/GKQ2rZqEQepf/rYHLggJrctYkLGbSw=" } |
To sign using mobile (SIM) we send a POST call to following URI:
https://pfzww.audkenni.is:443/sso/oauth2/realms/root/realms/audkenni/bc-authorize
We need to add following header parameter
A Basic Auth header, using the Client id and Client secret
We need to add following parameter
request (the value should be the JWT from step 1)
curl --location --request POST 'https://pfzww.audkenni.is:443/sso/oauth2/realms/root/realms/audkenni/bc-authorize' \ --header 'Content-Type: application/x-www-form-urlencoded' \ --header 'Authorization: Basic bXlDaWJhQ2xpZW50SWQ6TXlBcGlDbGllbnRQNCRzVw==' \ --data-urlencode 'request=eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJsb2dpbl9oaW50IjoiNjE3ODg4OCIsInNjb3BlIjoib3BlbmlkIHByb2ZpbGUgc2lnbmF0dXJlIFJFTEFURURQQVJUWTpNeU93bkNsaWVudCIsImFjcl92YWx1ZXMiOiJzaW0tc2lnbiIsImlzcyI6Im15Q2liYUNsaWVudElkIiwiYXVkIjoiaHR0cHM6Ly9wZnp3dy5hdWRrZW5uaS5pczo0NDMvc3NvL29hdXRoMi9yZWFsbXMvcm9vdC9yZWFsbXMvYXVka2VubmkiLCJleHAiOjE2MTExNDIzMDAuMSwiYmluZGluZ19tZXNzYWdlIjoiQXXDsGtlbm5pIFNJTSBTaWduaW5nIiwiYmluZGluZ19jb250ZW50IjoiUEdUTGYrZHlLWVNBL0dLUTJyWnFFUWVwZi9yWUhMZ2dKcmN0WWtMR2JTdz0ifQ.TpDlBSbcmY11lD-725snq_Hn-vAN1T5SA_-9FT8l7k2Wwax6MtD1qF_2kPFUvV6-xsK1mK-lMqpmqUlwctkE8zIUkMtc-vrmunfaHin9EvkNGPCfjV7FfCZdzSZMrz1YombfC6Vte3dC33AMxTimMZkD3lRwnlX-lHap00ERbZReEngt10ZvEJgrjOY3Z6jROgMCLSBDkPs3mAEZSfcimYpXjiNUUa5Pras-kD7HgisAtVP-9eTBQeCwoM_rsYEXSsrkhNBYj_JTLt3Q5z3zqTj2km-Rwl4ITn9yAn055fC2FnPOTbHQ2sHahqVdDlLBMSUOhkdn3N9syx1-NOUjsw' |
var client = new RestClient("https://pfzww.audkenni.is:443/sso/oauth2/realms/root/realms/audkenni/bc-authorize"); client.Timeout = -1; var request = new RestRequest(Method.POST); request.AddHeader("Content-Type", "application/x-www-form-urlencoded"); request.AddHeader("Authorization", "Basic bXlDaWJhQ2xpZW50SWQ6TXlBcGlDbGllbnRQNCRzVw=="); request.AddParameter("request", "eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJsb2dpbl9oaW50IjoiNjE3ODg4OCIsInNjb3BlIjoib3BlbmlkIHByb2ZpbGUgc2lnbmF0dXJlIFJFTEFURURQQVJUWTpNeU93bkNsaWVudCIsImFjcl92YWx1ZXMiOiJzaW0tc2lnbiIsImlzcyI6Im15Q2liYUNsaWVudElkIiwiYXVkIjoiaHR0cHM6Ly9wZnp3dy5hdWRrZW5uaS5pczo0NDMvc3NvL29hdXRoMi9yZWFsbXMvcm9vdC9yZWFsbXMvYXVka2VubmkiLCJleHAiOjE2MTExNDIzMDAuMSwiYmluZGluZ19tZXNzYWdlIjoiQXXDsGtlbm5pIFNJTSBTaWduaW5nIiwiYmluZGluZ19jb250ZW50IjoiUEdUTGYrZHlLWVNBL0dLUTJyWnFFUWVwZi9yWUhMZ2dKcmN0WWtMR2JTdz0ifQ.TpDlBSbcmY11lD-725snq_Hn-vAN1T5SA_-9FT8l7k2Wwax6MtD1qF_2kPFUvV6-xsK1mK-lMqpmqUlwctkE8zIUkMtc-vrmunfaHin9EvkNGPCfjV7FfCZdzSZMrz1YombfC6Vte3dC33AMxTimMZkD3lRwnlX-lHap00ERbZReEngt10ZvEJgrjOY3Z6jROgMCLSBDkPs3mAEZSfcimYpXjiNUUa5Pras-kD7HgisAtVP-9eTBQeCwoM_rsYEXSsrkhNBYj_JTLt3Q5z3zqTj2km-Rwl4ITn9yAn055fC2FnPOTbHQ2sHahqVdDlLBMSUOhkdn3N9syx1-NOUjsw"); IRestResponse response = client.Execute(request); Console.WriteLine(response.Content); |
The CIBA service answer is in JSON format.
When Step 2 is executed the signing process at the users device starts.
auth_req_id (to use in next step)
expires_in (the lifetime of th id)
interval
{ "auth_req_id": "8ag4NXa4ctFJuv1h9EtUnfNeFww", "expires_in": 600, "interval": 2 } |
After executing Step 2 the signing process at the users device starts. It depends on the user, the device and the network how long time this process takes.
In this step we poll for results from the signing process. When signing process is finished successfully you will receive answer with Access and Id token of the user.
To poll for tokens we send another POST call to following URI:
https://pfzww.audkenni.is:443/sso/oauth2/realms/root/realms/audkenni/access_token
We need to add following header parameter
A Basic Auth header, using the Client id and Client secret
We need to add following parameter
grant_type (the value should be: “urn:openid:params:grant-type:ciba”)
auth_req_id (the value should be the auth_req_id from last step answer)
curl --location --request POST 'https://pfzww.audkenni.is:443/sso/oauth2/realms/root/realms/audkenni/access_token' \ --header 'Content-Type: application/x-www-form-urlencoded' \ --header 'Authorization: Basic bXlDaWJhQ2xpZW50SWQ6TXlBcGlDbGllbnRQNCRzVw==' \ --data-urlencode 'grant_type=urn:openid:params:grant-type:ciba' \ --data-urlencode 'auth_req_id=P8ZFeExVCVs0oFfbGDpG4CUv_D4' |
var client = new RestClient("https://pfzww.audkenni.is:443/sso/oauth2/realms/root/realms/audkenni/access_token"); client.Timeout = -1; var request = new RestRequest(Method.POST); request.AddHeader("Content-Type", "application/x-www-form-urlencoded"); request.AddHeader("Authorization", "Basic bXlDaWJhQ2xpZW50SWQ6TXlBcGlDbGllbnRQNCRzVw=="); request.AddParameter("grant_type", "urn:openid:params:grant-type:ciba"); request.AddParameter("auth_req_id", "P8ZFeExVCVs0oFfbGDpG4CUv_D4"); IRestResponse response = client.Execute(request); Console.WriteLine(response.Content); |
If you run the poll call before the user signing process is finished you will receive a answer notifying the process isn’t finished.
The REST API service answer is in JSON format.
If you get answer like this you need to wait for short time and run Step 3 call again.
error_description
error
{ "error_description": "End user has not yet been authenticated", "error": "authorization_pending" } |
The answer from this call should give you the Access and Id tokens along type and lifetime info.
The Id token contains a PKCS1 signature and a signing certificate.
The REST API service answer is in JSON format.
Best practice is to verify the signature and the certificate. Verify the user’s info in the Id token against the certificate. By decoding the signature using the certificate you should end up with the hash from the earlier step.
access_token
scope
id_token
token_type
expires_in (lifetime of the tokens)
{ "access_token": "eyJ0eXAiOiJKV1QiLCJ6aXAiOiJOT05FIiwiYWxnIjoiSFMyNTYifQ.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.m9MZw1VvtvH9UwH1GvV1Y7posi4TX23qve7V7ZzOn7k", "scope": "openid profile signature RELATEDPARTY:MyOwnClient", "id_token": "eyJ0eXAiOiJKV1QiLCJraWQiOiJ3VTNpZklfueU44kLOPVUFSZVJCL0ZHNmVNMVAxUU09IiwiYWxnIjoiUlMyNTYifQ.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.XKBYIPDNpYy8dWkh7vrjXjrk7F7UiYxoUZTxfpcLI1LEADhwgKWKU5sGIQNVQf-u8uxFMWsPg-bIaFnWg9yxmRmnBZ0PKbAqTYGqg2BAPc-z8VobLVhXxERgFuqukuka2KIO3fcY7avgseFb8E3a0XUTqRMTObIyPPGQjWDvHt3iVf45vIKtfH1oZ7acyBrs6Z40UsVPm9RM1PhovmDd4bnXMX3Kff-e6fSpkbwIPO8qHTi75KRz5kcjiSY-MjVytE1tHYH2EPHSnNxnXmdJpZdIxzmW9rnx_NpUsGD7dyFnkE900GI0MXdAQc4tm19vMNH4k8DZkpLiE7dNBuwbTA", "token_type": "Bearer", "expires_in": 3599 } |
{ "sub": "10935f1e-2688-4f9c-80d2-3fb45241522c", "cts": "OAUTH2_STATELESS_GRANT", "auth_level": 0, "auditTrackingId": "ed977018-9c1c-4037-ad58-c61dc22480a8-1172709", "subname": "10935f1e-2688-4f9c-80d2-3fb45241522c", "iss": "https://pfzww.audkenni.is:443/sso/oauth2/realms/root/realms/audkenni", "tokenName": "access_token", "token_type": "Bearer", "authGrantId": "2JEKfpTDq_GTNP9c1jXPuKaiBX0", "aud": "myCibaClientId", "nbf": 1611149700, "grant_type": "urn:openid:params:grant-type:ciba", "scope": [ "RELATEDPARTY:MyOwnClient", "signature", "openid", "profile" ], "auth_time": 1611149700, "realm": "/audkenni", "exp": 1611153300, "iat": 1611149700, "expires_in": 3600, "jti": "Wft1onj_0ijnSkNk6NpcuG0_EDo" } |
{ "at_hash": "HS346_RrLjYdBWM0kz9iig", "sub": "10935f1e-2688-4f9c-80d2-3fb45241522c", "signature": "GKW/CmGmNJ1/p7EMPxQuoE/WQ/nQf5FuVHkjgPpCwOsdkfjU45S57SAH/nKevPP6to3+Mfr2WhZePd5NOf1s8SivFDn4dBSbe92n1HpUYhH7sXgyDR+IlWUmFw0CKKQ2hkYRMU7fW1TCKzQxs30m9vik6XkfcQisIIEdWUU5eP3oi+HF5HHZ8GzSGa23oA39t56+Gz+TIUH6G3OevIJv7xQgl8cJd+ZwlUtvQQQbRwZVdmC4ZFQ+rfW7h3TCmZqbBuO9CQnOWYAmx9vkynEyaVbkt89/cy2D5YRBjgiT87j7fJv89a5K05EMPgF/eeCNOSoCGFS0H01Y5FIRAL/nkpOI0EA==", "auditTrackingId": "ed977018-9c1c-4037-ad58-c61dc22480a8-1172710", "subname": "10935f1e-2688-4f9c-80d2-3fb45241522c", "certificate": "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", "iss": "https://pfzww.audkenni.is:443/sso/oauth2/realms/root/realms/audkenni", "tokenName": "id_token", "aud": "myCibaClientId", "documentNr": "na", "nationalRegisterId": "1406714889", "azp": "myCibaClientId", "auth_time": 1611149700, "name": "Einar Helgi Hrafnsson", "realm": "/audkenni", "exp": 1611153300, "tokenType": "JWTToken", "iat": 1611149700 } |
Here we ask for the users info using the Access token as Authorization header parameter.
To get the Userinfo we send a POST call to following URI:
https://pfzww.audkenni.is:443/sso/oauth2/realms/root/realms/audkenni/userinfo
We need to add following header parameter
Token (Bearer, using the Access token from last call as value)
curl --location --request POST 'https://pfzww.audkenni.is:443/sso/oauth2/realms/root/realms/audkenni/userinfo' \ --header 'Content-Type: application/x-www-form-urlencoded' \ --header 'Authorization: Bearer eyJ0eXAiOiJKV1QiLCJ6aXAiOiJOT05FIiwiYWxnIjoiSFMyNTYifQ.eyJzdWIiOiIxMDkwNWYxZS0yNjA4LTRmOWMtODBkMi0zZmI0NTI0MTUyMmMiLCJjdHMiOiJPQVVUSDJfU1RBVEVMRVNTX0dSQU5UIiwiYXV0aF9sZXZlbCI6MCwiYXVkaXRUcmFja2luZ0lkIjoiZWQ5NzcwMTgtOWMxYy00MDM3LWFkNTgtYzYxZGMyMjQ4MGE4LTExNDk2NjUiLCJpc3MiOiJodHRwczovL3Bmend3LmF1ZGtlbm5pLmlzOjQ0My9zc28vb2F1dGgyL3JlYWxtcy9yb290L3JlYWxtcy9hdWRrZW5uaSIsInRva2VuTmFtZSI6ImFjY2Vzc190b2tlbiIsInRva2VuX3R5cGUiOiJCZWFyZXIiLCJhdXRoR3JhbnRJZCI6Inc5eUpXem1fMU04TGJqenplUnJQOUp3anZzSSIsImF1ZCI6Im15Q2liYUNsaWVudElkIiwibmJmIjoxNjExMTQzNDYzLCJncmFudF90eXBlIjoidXJuOm9wZW5pZDpwYXJhbXM6Z3JhbnQtdHlwZTpjaWJhIiwic2NvcGUiOlsiUkVMQVRFRFBBUlRZOk15T3duQ2xpZW50Iiwic2lnbmF0dXJlIiwib3BlbmlkIiwicHJvZmlsZSJdLCJhdXRoX3RpbWUiOjE2MTExNDM0NjMsInJlYWxtIjoiL2F1ZGtlbm5pIiwiZXhwIjoxNjExMTQ3MDYzLCJpYXQiOjE2MTExNDM0NjMsImV4cGlyZXNfaW4iOjM2MDAsImp0aSI6ImFqNzJuR0Y4ZElyclU2TFlZSlNhSjJ0bDNXNCJ9.3tGtHPYYN-ImdiPDj8JIQYFwqR_2VrjARo4FDWshbZ8' |
var client = new RestClient("https://pfzww.audkenni.is:443/sso/oauth2/realms/root/realms/audkenni/userinfo"); client.Timeout = -1; var request = new RestRequest(Method.POST); request.AddHeader("Content-Type", "application/x-www-form-urlencoded"); request.AddHeader("Authorization", "Bearer eyJ0eXAiOiJKV1QiLCJ6aXAiOiJOT05FIiwiYWxnIjoiSFMyNTYifQ.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.3tGtHPYYN-ImdiPDj8JIQYFwqR_2VrjARo4FDWshbZ8"); IRestResponse response = client.Execute(request); Console.WriteLine(response.Content); |
The answer from this call should give you a PKCS1 Signature and a signing certificate. The same signature and certificate as is in the Id token from last step.
The REST API service answer is in JSON format.
Best practice is to verify the signature and the certificate. Verify the user’s info in answer against the certificate. By decoding the signature using the certificate you should end up with the hash from the earlier step.
signature (PKCS1)
documentNr (should be “na”)
certificate (signing certificate)
nationalRegisterId (The social id number of the user)
name (The users name)
sub (A unique Id of the user in our system)
subname (A unique Id of the user in our system)
{ "signature": "GKW/CmGmNJ1/p7EMPxQuoE/WQ/nQfGfusIe3i8jgPpCwOphUS57SAH/nKevPP6to3+Mfr2WhZePd5NOf1E/SivFDn4dBSbe92n1HpUYhH7sXgyDR+IlWUmFw0CKKQ2hkYRMU7fW1TCKzQxs30m9vik6XkfcQisIIEdWUU5eP3oi+HF5HHZ8GzSGa23oA39t56+Gz+TIUH6G3OevIJv7xQgl8cJd+ZwlUtvQQQbRwZVdmC4ZFQ+rfW7h3TCmZqbBuO9CQnOWYAmx9vkynEyaVbkt89/cy2D5YRBjgiT87j7fJv89a5K05EMPgF/eeCNOSoCGFS0H01Y5FIRAL/nkpOI0EA==", "documentNr": "na", "certificate": "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", "nationalRegisterId": "1406714889", "name": "Einar Helgi Hrafnsson", "sub": "10935f1e-2638-4f9c-80d2-3fb45241522c", "subname": "10935f1e-2638-4f9c-80d2-3fb45241522c" } |