Configuring a connection between the signature verification service and an SAG
For each business
OU that employs the signature verification service (DNF_V_REQ) for
a particular message transfer service (for example, SIPN FIN) or the
signature verification API (DNF_V_API), there must be a connection
between DNF_V_REQ (respectively DNF_V_API) and the SAG that is to
verify the message signatures. Each connection specifies:
- Which message partner is the source of the LAU key that is to be used to authenticate the messages passed to and from the SAG
- Which authoriser DN is to be used to authorize VerifyDecrypt requests in the SAG.
You configure such a connection by setting
the attributes of a CO of type DnfVerifConn. To help you do this,
FTM SWIFT generates,
during customization, for each business OU, scripts with names of
the form:
deployment_dir/instance/admin/ou_dnfcvcsc.cli where: - deployment_dir
- Directory specified in the CDP initialization file.
- instance
- Name of the instance.
- ou
- Name of the OU.
add -ou DNIvOU -ct DnfVerifConn -co <service><number> -attr enabled
add -ou DNIvOU -ct DnfVerifConn -co <service><number> -attr SAGRequestQueue -val <queue>
add -ou DNIvOU -ct DnfVerifConn -co <service><number> -attr SAGQMgr -val <queue_manager>
add -ou DNIvOU -ct DnfVerifConn -co <service><number> -attr AuthoriserDN -val <DN>
add -ou DNIvOU -ct DnfVerifConn -co <service><number> -attr MessagePartner -val <message_partner>
add -ou DNIvOU -ct DnfVerifConn -co <service><number> -attr SAGName -val <sag_name>
com -ou DNIvOU
The customization process substitutes the placeholder DNIvOU in the scripts with the name of the OU. To modify and run these scripts: