Banks` TUPAS certification service for service providers Service

advertisement
Banks' TUPAS certification
service for service providers
Service description and service provider's
guidelines
Version 2.2
6 February 2007
FK|Federation of Finnish Financial Services
TUPAS certification service
for service providers
Service description and
guidelines
Version 2.2
6 February 2007
CHANGE LOG
Version
V2.0
V2.1
V2.2
Page
All
Comment
Message structures changed
New banks added, some wordings changed
New message fields and message field attributes.
Check from your bank whether the new attributes
have been taken into use.
APPROVAL
Version code
V2.0
Subcommittee
V2.1
Subcommittee
V2.2
Subcommittee
Date
13.6.2002
Approved by
Payment Transactions
3.10.2005
Payment Transactions
17.10.2006
Payment Transactions
TUPAS certification service
for service providers
Service description and
guidelines
Version 2.2
6 February 2007
Contents
Page
1 TUPAS CERTIFICATION SERVICE ............................................................... 1
1.1 Agreeing upon bank identifiers and the customer authentication........... 1
1.1.1 Bank identifiers for private customers.................................................... 1
1.1.2 Bank identifiers for business/corporate customers ................................... 2
1.2 Agreement on the use of Certification service........................................ 2
1.3 General description of Tupas-service..................................................... 2
1.4 Service functionality................................................................................ 3
1. 5 Service security ..................................................................................... 4
1.6 Definition of strong authentication .......................................................... 4
2 FUNCTIONAL SERVICE DESCRIPTION ....................................................... 5
3 MESSAGES IN THE TUPAS CERTIFICATION SERVICE AND RELATED
DATA ............................................................................................................... 7
3.1 Certificate request .................................................................................. 7
3.2 Certificate request field descriptions:...................................................... 8
3.3 orming the MAC for the certificate request (A01Y_MAC)..................... 9
3.4 Certificate and identifier........................................................................ 10
3.5 Certificate message field descriptions .................................................. 11
3.6 MAC calculation for in the Certificate ................................................... 12
3.7 Type of identification data..................................................................... 12
3.7.1 Identifier in plain text......................................................................... 13
3.7.2 Encrypted identifier ........................................................................... 13
3.8 Comparing the encrypted identifier data and authenticating
the customer............................................................................................... 13
3.9 Bank-specific buttons ........................................................................... 14
3.10 Exceptional situations......................................................................... 14
4 CHANGING THE PASS PHRASE.................................................................. 15
5 CHARACTER SET USED IN THE SERVICE................................................. 16
TUPAS certification service
for service providers
Service description and
guidelines
Version 2.2
6 February 2007
APPENDIX 1
BANK-SPECIFIC CONTACT INFORMATION...................... 18
APPENDIX 2
TYPE OF IDENTIFIER IN CERTIFICATE REQUEST
(A01Y_IDTYPE).............................................................................................. 20
APPENDIX 3
CUSTOMER IDENTIFIER IN THE CERTIFICATE ............... 21
1
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
1 TUPAS certification service
Banks’ Tupas-certification service (hereinafter “Certification service”)
allows businesses or corporations (hereinafter “service provider”) providing
electronic services on the Internet to authenticate their customers using
Tupas certificates. Within certfication service, the bank authenticates its
customer by a strong authentication method (see Section 1.6). Tupascertificates provided by the service can also be used for electronic signatures,
if so agreed between the customer authenticating him/herself and the service
provider.
The certification service is jointly specified by the banks. Each bank
authenticates its customers through the same bank-specific identifiers that the
customer uses in the bank’s own services.
1.1 Agreeing upon bank identifiers and the customer authentication
Certification service is accessed through bank-specific identifiers (hereafter
“bank identifiers”) created and issued by a bank for its customer. For
example, these can be a combination of a user ID and one-time passwords.
Bank identifiers are always personal regardless of whether they are issued for
use with private or business/corporate customers.
Banks can use subcontractors and agents in their operations as long as the
models of cooperation are compliant with the Credit Institutions Act and
standards issued by the Finnish Financial Supervision Authority by virtue of
the Act.
1.1.1 Bank identifiers for private customers
A customer can gain personal bank identifiers on the basis of a written
agreement. The individual concerned must always sign personally the
agreement. The customer cannot authorise another person to sign the
agreement on his/her behalf.
Banks have a statutory obligation to authenticate their customers. At a bank
branch or a bank’s subcontractor’s or agent’s office, the customer’s identity
is verified in a manner approved by the Financial Supervision Authority
using an official identity document approved by the bank, such as a driving
licence, personal identity card, passport or social insurance card with photo.
The first bank identifiers must be fetched in person to enable a reliable
customer authentication. Subsequent one-time identifiers can then be mailed
to the customer. The customer cannot authorise anyone else to fetch the
identifiers for the customer.
2
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
1.1.2 Bank identifiers for business/corporate customers
When making an agreement on bank identifiers for business/corporate use,
the bank identifiers are agreed on and fetched in compliance with the
provisions of Section 1.1.1 above as applicable and with the practice
accepted by the Finnish Financial Supervision Authority.
1.2 Agreement on the use of Certification service
The service provider must enter into a contract regarding Certification
service with all of the banks whose services are to be used. A separate
contract must be made with each bank. Bank-specific contact information is
included in Appendix 1 to this description.
Certification service implementation date is agreed upon when preparing the
contract. The service provider’s data is registered in each bank and the
service provider notifies each bank separately when changes occur to the
contract data.
Once the contract has been signed, the bank delivers the bank-specific
service identifier and pass phrase to the service provider. The data is
delivered to the service provider through a bank-specific procedure, either
electronically or in paper format.
The bank-specific data used in the testing phase is available with the service
descriptions of each bank. The service provider can test the service in a
production environment by using bank-specific testing identifiers before
signing the contract.
1.3 General description of Tupas-service
The customer authenticating him/herself plays a central role in the service.
The customer controls the transmission of data between the service provider
and the bank. The bank and the service provider are not in direct contact with
each other during the service.
When the service provider needs to authenticate a customer, the service
provider sends a certification request to the customer, who is transferred to
the bank’s authentication service by clicking on the link leading to the bank’s
authentication service. The service provider’s certification request is transmitted from the customer to the bank’s Certificate service, which sends a
response message to the customer (“the Certificate”). The customer checks
the certificate’s data. If the customer approves it, he/she returns to the service
provider’s service and the Certificate is transmitted to the service provider. If
the customer so wishes, he/she is allowed to cancel the authentication transaction before authenticating him/herself to the bank’s service or reject the
Certificate given by the bank.
3
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
The service provider and customer may agree on using the certificate as a
component in an electronic signature used for a legal transaction between the
customer and the service provider. However, the bank is only responsible for
authenticating the customer as specified in this service description. The bank
is not responsible for the validity or content of the legal transaction between
the customer and the service provider.
1.4 Service functionality
The Certificate provided by the bank is unique and tied to the service
transaction in question and to the customer with a time stamp.
The Certification service contains several functionalities and possibilities for
use depending on the type of the Certificate specified in the service
agreement between the service provider and the bank. The certificate issued
by a bank always includes the name of the customer (person and/or
company). Any additional identification information can be either plain text
or encrypted.
If the identification information is plain text, the bank may transmit either the
customer’s personal identity number, the last four characters of the personal
identity number, a Business Identity Code (hereinafter “Business ID”) or
other electronic transaction identifier in accordance with the service
agreement. The bank will only transmit personal identity numbers in plain
text to service providers authorised to register them.
If the identification information is encrypted, the bank will provide the
service provider with an identifier based on the customer’s personal identity
number, Business ID or other electronic transaction identifier. The actual
personal identity number or other identifier will not be transmitted with the
response message. Thus the service provider must have access to the
customer’s personal identity number, Business ID or other electronic
transaction identifier in order to ensure the correct authentication of the
customer’s identity based on the response message provided by the bank. If
the service provider does not possess the customer’s code, it should be
requested before sending the certificate request. This functionality is suitable
for verifying the validity of data submitted by the customer by comparing the
data with the data stored at the bank.
The Certification service is mainly applicable to consumer services. Some
banks are able to identify a corporate user through the Business ID, but not
all banks offer certification service certifying corporate customers. When
authenticating banks’ corporate customers, the banks can give, together with
the certificate, either the customer’s Business ID and the company name or
4
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
the customer’s Business ID, company name, name of person and personal
identity code.
1. 5 Service security
The SSL protocol is used in data communication between the parties of the
certification service, preventing external parties from viewing the
information or changing any of it. The service provider’s server software
must support SSL encryption implemented with 128-bit keys. The length of
the key used in the session is based on the properties of the customer’s
browser. The Certification request and the Certificate are protected with a
message authentication code ensuring data integrity, so it is not possible for
the customer who controls the Certificate transmission to alter the data
without the service provider or the bank noticing it.
Each party is responsible for the protection and security of its own services
and correctness of the data stored by them. The customer authenticating
him/herself is responsible for making sure that the identifiers provided by the
bank do not fall into the hands of any third parties.
The service provider’s service must include a notice specifying that the
service uses certification service employing the customer’s personal bank
identifiers or corporate bank identifiers. The service provider must edit the
notice text in its service according to whether the service provider wants to
authenticate private customers and/or corporate customers.
1.6 Definition of strong authentication
A strong authentication of a person comprises something that the user:
1) knows (such as a user ID),
2) possesses (such as a list of passwords),
3) is (such as a fingerprint).
An authentication transaction can be considered to comply with the definition of the strong authentication if two of these requirements are fulfilled
simultaneously. In addition to the strong authentication, the transaction must
be based on a sufficiently secure procedure. One-time passwords fulfil the
criteria for a strong authentication. This means that the sole combination of a
fixed password and user ID does not fulfil the criteria for the strong authentication required in the Certification service.
5
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
2 Functional service description
Customer
Service provider
Service
screens
1
Customer
service
2
Certificate
request
Customer's bank
3
Bank's
customer
authentication
Approval of
Certificate
data
4
5
Customer
authentication
and Tupas
certification
service
8
6
7
Service terms
Tupas
Certificate
Explanation of the chart describing service progression:
1.
The customer identifying him/herself is in contact with the service
provider’s service. The data communication between the customer and the
service provider must be SSL-protected when the customer begins to enter
data related to the certification service. During phases 2 to 7, the data transfer
link is always SSL-protected.
2.
The service provider sends to the customer a certification request
containing specification data related to the transaction. The customer verifies
the data in the request, but cannot alter it. The customer can, however,
interrupt the authentication process, if desired, and return to customer
service. The certification request page in the customer’s browser includes
function buttons leading to the banks’ certification service and a Cancel
button.
3.
The customer clicks on a button transferring him/her to his/her bank’s
certification service. The certificate request transmitted to the bank contains
6
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
the data on the service provider and transaction. The bank verifies the
integrity of the request and the correctness of the data.
4.
The bank sends an authentication request to the customer if the service
provider’s certificate request is valid. The bank gives the customer an error
notification if the bank notices errors in the request. Then the customer
returns to the service provider’s service by clicking the Cancel button.
5.
The customer authenticates him/herself in the certification service of
the bank. The bank returns an error message to the customer if the
authentication fails, and the customer returns to the service provider’s service
by clicking the Cancel button.
6.
After successful authentication, the bank generates the certificate. The
certification service activates Accept and Cancel buttons for the customer.
7.
The customer verifies the Certificate and approves the identification
data to be transmitted to the service provider. By clicking Cancel, the
customer can interrupt the authentication process and return to the service
provider’s service.
8.
The service provider verifies the integrity and uniqueness of the
Certificate received. The service provider attaches the Certificate to the
customer’s service transaction and stores it for as long as other service data is
stored. Customer identification data must not be registered or used for any
other purpose.
7
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
3 Messages in the TUPAS certification service and related data
3.1 Certificate request
Certificate request data lies behind the bank-specific button or icon in the
FORM data group, as hidden variables.
CERTIFICATE REQUEST
Field
1. Type of message
2. Version
3. Service provider
4. Service language
Name of data
A01Y_ACTION_ID
A01Y_VERS
A01Y_RCVID
A01Y_LANGCODE
Length
3-4
4
10 -15
2
5. Request identifier
A01Y_STAMP
20
6. Type of identifier
7. Return address
A01Y_IDTYPE
A01Y_RETLINK
2
199
8. Cancel address
A01Y_CANLINK
199
9. Rejected address
A01Y_REJLINK
199
10. Key version
11. Algorithm
A01Y_KEYVERS
A01Y_ALG
4
2
12. Control field
A01Y_MAC
32 - 40
Comment
Standard, "701"
For example, "0002"
Customer code
ISO 639 identifier:
FI = Finnish
SV = Swedish
EN = English
yyyymmddhhmmssxx
xxxx
See Appendix 2
OK return address for
Certificate
Return address in
cancellation
Return address in
error situations
Key generation data
01 = MD5
02 = SHA-1
Message
Authentication Code
of request
Data field names are written in capital letters. The HTML structure of the
FORM data group is:
<FORM METHOD=”POST” ACTION=”bank certification service URL”>
<INPUT NAME=”A01Y_ACTION_ID” TYPE=”hidden” VALUE=”701”>
<INPUT NAME=”A01Y_VERS” TYPE="hidden” VALUE=”...”>
<INPUT NAME=”A01Y_RCVID” TYPE="hidden” VALUE=”...”>
<INPUT NAME=”A01Y_LANGCODE” TYPE="hidden” VALUE=”...”>
<INPUT NAME=”A01Y_STAMP” TYPE="hidden” VALUE=”...”>
8
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
<INPUT NAME=”A01Y_IDTYPE” TYPE="hidden” VALUE=”...”>
<INPUT NAME=”A01Y_RETLINK” TYPE="hidden” VALUE=”...”>
<INPUT NAME=”A01Y_CANLINK” TYPE="hidden” VALUE=”...”>
<INPUT NAME=”A01Y_REJLINK” TYPE="hidden” VALUE=”...”>
<INPUT NAME=”A01Y_KEYVERS” TYPE="hidden” VALUE=”...”>
<INPUT NAME=”A01Y_ALG” TYPE="hidden” VALUE=”...”>
<INPUT NAME=”A01Y_MAC” TYPE="hidden” VALUE=”...”>
</FORM>
3.2 Certificate request field descriptions:
Field 1
service.
Type of message, which is a standard "701" in the certification
Field 2 Version number of the certificate request message, which is bankspecific.
Field 3
Service provider’s bank-specific customer identifier. The bank
identifies the service provider based on the customer code and
attaches to the certificate the service provider’s name existing in its
register.
Field 4 The language code of the service indicates the language of the
service provider’s page, and the bank certification service opens in this
language.
Field 5 Individual code assigned to the certificate request by the service
provider. The identifier can be a reference or customer number or a
combination of the date, time and running identifier, as well as a reference
number.
Field 6 The identifier type shows what kind of an identifier the service
provider wants from the customer to be authenticated. The identifier type
must correspond to the functionality agreed upon in the service contract.
Field 7 This is the address of the service provider’s page where the service
continues when OK. The service address must start with ‘https’ - that is, the
page must be SSL protected.
Example:
VALUE="https://product.merchant.fi/order/confirmation.htm"
Field 8 Continuation point for the service provider’s service in case the
customer cancels the transmission of the Certificate.
9
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
Example:
VALUE="https://product.merchant.fi/order/cancel.htm"
Field 9 Continuation point for the service provider’s service in case of a
technical error during identification. The return address can be the same as in
field 8.
Example:
VALUE="https://product.merchant.fi/order/error.htm"
Field 10 Key version used in MAC calculation.
Field 11 Algorithm type code used in MAC calculation.
01 = MD5 algorithm, which produces a 32-character MAC
01 = SHA-1 algorithm, which produces a 40-character MAC.
Field 12 Message Authentication Code (MAC), calculated from the data to
be protected in the certificate request and the service provider’s pass phrase
using the algorithm defined in data field 11. Using the MAC, the recipient
can verify the integrity of the certificate request and authenticate the sender.
3.3 Forming the MAC for the certificate request (A01Y_MAC)
The service provider forms a bank-specific certificate request for each bank’s
button, protected by a MAC attached to each request. The MAC is calculated
from the bank-specific certificate request’s FORM data group using the pass
phrase given to the service provider by the specific bank.
The calculation starts by forming a character string from the VALUE of all
data fields in the FORM data group preceding the MAC (fields 1 to 11) and
the service provider’s pass phrase. The data is combined into character
strings in sequence, and any blanks serving as fill characters are left out. The
data groups in the character string are separated by “&” characters. An “&”
character is also placed between the last data (field 11) and the pass phrase,
as well as at the end of the pass phrase. The “&” characters are included in
the MAC calculation. The data appears on one single line. "↵" indicates a
line break in this document.
A01Y_ACTION_ID&A01Y_VERS&A01Y_RCVID&A01Y_LANGCODE&↵
A01Y_STAMP&A01Y_IDTYPE&A01Y_RETLINK&A01Y_CANLINK&↵
A01Y_REJLINK&A01Y_KEYVERS&A01Y_ALG&passphrase&
10
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
The calculated MAC is converted into hexadecimal form, in which
characters from A to F are represented in capitals. The hexadecimal hash
value is taken to the Control field.
3.4 Certificate and identifier
CERTIFICATE
Field
Name of data
Length
1. Version
B02K_VERS
4
2. Certificate identification
B02K_TIMESTMP
23
3. Certificate number
B02K_IDNBR
10
4. Request identifier
B02K_STAMP
20
5. Customer
B02K_CUSTNAME
–40
6. Key version
7. Algorithm
B02K_KEYVERS
B02K_ALG
4
2
8. Identifier
9. Type of identifier
10. User ID
B02K_CUSTID
B02K_CUSTTYPE
B02K_USERID
-40
2
-40
11. User name
B02K_USERNAME
-40
12. Control field
B02K_MAC
32-40
1
Obligatoriness of the data:
O = obligatory
R = at request only
Obligato- Comment
riness1
O
For example,
"0002"
O
NNNyyyymmddh
hmmssxxxxxx
O
Number assigned
to the identifier by
the bank
O
Request data field
7
(A01Y_STAMP)
O
Name of person or
company
authenticated that
is in the bank’s
database
O
Key generation
O
01 = MD5
02 = SHA-1
O
See Appendix 3
O
See Appendix 3
R
Corporate user’s
social security
number or
encrypted
identifier
See appendix 3
R
Corporate user’s
name
See appendix 3
O
MAC of the
Certificate
11
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
The customer’s bank adds the certificate data in the response message to the
OK return link in so-called query-string format.
http://A01Y_RETLINK?↵
B02K_VERS&B02K_TIMESTMP&B02K_IDNBR&B02K_STAMP&↵
B02K_CUSTNAME&B02K_KEYVERS&B02K_ALG&B02K_CUSTID&↵
&B02K_MAC
The data BO2K_USERID and BO2K_USERNAME_are optional and are
included only with identifier values “
3.5 Certificate message field descriptions
Field 1 Version number of the certificate message, which is bank-specific.
Field 2 Time stamp formed by the bank’s system, in which NNN is the
bank’s number:
Handelsbanken
Nordea Bank Finland
OP Bank Group
Sampo Bank
Savings banks and local co-op banks
Tapiola Bank
Bank of Åland
= 310
= 200
= 500
= 800
= 400
= 360
= 600
Field 3 Data provided for the Certificate by the bank’s information system,
uniquely identifying the Certificate in the bank’s system.
Field 4 Identification of the certificate request, picked from data field 7 in
the certificate request in question (A01Y_STAMP)
Field 5 Name of authenticated customer according to the bank’s customer
database.
Field 6 Generation number of the MAC pass phrase.
Field 7 MAC algorithm code.
Field 8 Customer identifier with contents depending on the A01Y_IDTYPE
field in the certificate request. The field may contain a customer identifier
either in encrypted or in plain text format.
Field 9 Type of identifier.
Field 10 Corporate user’s social security number or encrypted identifier.
12
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
Field 11 Corporate user’s name.
Field 12 MAC code of the certificate
3.6 MAC calculation for in the Certificate
The control code (BO2K_MAC)is calculated from the original message, after
which the Scandinavian characters and certain special characters (eg blank
spaces, equal signs and quotation marks) are replaced in the corresponding
hexadecimall character (eg %20) in the data communication message.
The bank calculates the MAC of the Certificate with a service provider
specific key. With the MAC the service provider can ensure that the
Certificate has been formed at the customer’s bank and that its contents are
unchanged. With the Certificate’s identifier type values “00” - “07” the MAC
is calculated using data fields 1 to 9 in the Certificate. When calculating the
MAC, the data and the pass phrase are separated by an "&" character. The
character is also appended at the end of the pass phrase. The service
provider-specific key is used in calculating the MAC. MAC calculation is
not executed for the optional fields 10 & 11 when they are empty and are not
returned to the service provider.
B02K_VERS&B02K_TIMESTMP&B02K_IDNBR&B02K_STAMP&↵
B02K_CUSTNAME&B02K_KEYVERS&B02K_ALG&↵
B02K_CUSTTYPE&passphrase&
with the Certificate’s identifier type values “08” - “09” the MAC is
calculated using data fields 1 to 11 in the certificate. When calculating the
MAC, the data and the pass phrase are separated by an "&" character. The
character is also appended at the end of the pass phrase. The service
provider-specific key is used in calculating the MAC
B02K_VERS&B02K_TIMESTMP&B02K_IDNBR&B02K_STAMP&↵
B02K_CUSTNAME&B02K_KEYVERS&B02K_ALG&B02K_CUSTID↵
B02K_CUSTTYPE&BO2K_USERID&B02K_USERNAME&passphase&
3.7 Type of identification data
The type of the identifier to be transmitted, specified in the A01Y_IDTYPE
field of the certificate request, affects the response message MAC calculation.
13
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
3.7.1 Identifier in plain text
The value of the A01Y_IDTYPE field in the certificate request is ”02” or
”03” - that is, basic identifier or truncated basic identifier in plain text.
The identifier is a character string in plain text - for example, a personal
identity number or the last four characters thereof - in accordance with the
A01Y_IDTYPE field in the request message. The identifier will be assigned
to the data field B02K_CUSTID in the Certificate in an unchanged form.
3.7.2 Encrypted identifier
The value of the A01Y_IDTYPE field in the certificate request is “01” - that
is, encrypted basic identifier.
The bank uses the same hash algorithm for encrypting the identifier as is
used for the MAC fields. The uniqueness of the identifier is ensured by using
the data in the certificate data fields 2 to 4 and the customer identifier
(personal identity number or Business ID) in accordance with data field 8
(A01Y_IDTYPE) in the request message as additional data. When calculating the encrypted identifier, the data and the pass phrase are separated by
an "&" character. The character is also appended at the end of the pass
phrase. The service provider-specific key is used for encryption.
B02K_TIMESTMP&B02K_IDNBR&B02K_STAMP&↵
customer_identifier&passphrase&
The result of the calculation is converted into hexadecimal form, in which
characters from A to F are represented in capitals. The final result is a
character string identifying the customer. The string will be used in the
B02K_CUSTID field of the Certificate.
3.8 Comparing the encrypted identifier data and authenticating the customer
If the identifier is encrypted, the service provider first verifies the integrity of
the Certificate. Then the service provider calculates the comparison data for
the customer identifier as described in section 3.7.2 on the basis of the customer code stored in its register.
When the calculated comparison data and the identifier of the received
message are identical and the message is intact, the data for the customer
authenticated by the bank corresponds to that for the customer registered by
the service provider.
14
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
3.9 Bank-specific buttons
The image files for bank-specific buttons can be obtained from a website at
an address separately specified by each bank. The size or colour of the buttons must not be changed. The button image must not be used for purposes
other than those that have been agreed upon between the service provider and
the bank.
3.10 Exceptional situations
The service provider must be prepared for exceptional occasions, which
include:
1. Customer interrupts the authentication process
The customer can interrupt the transaction by clicking the Cancel button,
either before the certificate request has been sent to the bank or after
receiving the Certificate. The address for the Cancel button is the Cancel
address in FORM data field 8 of the certificate request.
2. Customer authentication failed
Customer authentication may fail if there are errors in the identifier or if the
customer has requested authentication at a wrong bank. The customer can
return to the service provider’s service by using the Cancel button. The
address for the Cancel button is the Cancel address in FORM data field 8 of
the certificate request.
3. The bank notices an error in the certificate request
The bank notices an error in the identification request before the customer
has been authenticated. The customer returns to the service provider’s
service using the Cancel button assigned to the Rejected address in FORM
data field 9.
4. The service provider notices an error in the Certificate.
The service provider notices an error when verifying the Certificate that
might be due to an error in the Certificate content or because the data
provided by the customer to the service provider does not match the data
stored in the bank’s information system.
The service provider should provide the customer with information relevant
to the situation at hand.
15
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
5. There is no response at all
The reason for the interruption may be a connection break or other technical
disturbance, or the customer terminating the session halfway through.
6. The same response comes several times
The service provider must be prepared for that the customer will send the
same response several times or resend an old certificate when moving
between browser windows with the back/forward buttons.
4 Changing the pass phrase
The pass phrase (key) used when calculating the MAC values can be
changed if the bank or service provider so wishes. Bank-specific procedures
are used when changing the key, and these are described in the bank-specific
system descriptions.
Two bank-specific procedures are used when changing the key:
•
Only the pass phrase is changed, the service provider’s customer ID
remains the same.
•
Both the pass phrase and the customer ID are changed.
The pass phrase is delivered to the contact person named in the contract. At
the same time, the information on the new key’s version number and the
effective date will also be delivered. From that date onwards, all MACs will
be calculated using the new key.
In order to guarantee a smooth change between keys, the service provider’s
system must enable the entry of the new key into the system ahead of time in other words, the simultaneous use of at least two pass phrases. At the time
of transfer (for a period of about 15 minutes), it is possible that the MACs in
some Certificates arriving to the service provider have been calculated using
the old key and the rest have been calculated using the new key.
Once the new pass phrase has been successfully taken into use, the old key
can be deleted or deactivated in the service provider’s system.
16
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
5 CHARACTER SET USED IN THE SERVICE
An 8-bit ISO 8859-1 (Latin1) character set is used in the service, the
codes of which are listed in the table below.
æ
backspace
tab
linefeed
c return
Space
!
"
#
$
%
&
'
%00
%01
%02
%03
%04
%05
%06
%07
%08
%09
%0a
%0b
%0c
%0d
%0e
%0f
%10
%11
%12
%13
%14
%15
%16
%17
%18
%19
%1a
%1b
%1c
%1d
%1e
%1f
%20
%21
%22
%23
%24
%25
%26
%27
0
1
2
3
4
5
6
7
8
9
:
;
<
=
>
?
@
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
%30
%31
%32
%33
%34
%35
%36
%37
%38
%39
%3a
%3b
%3c
%3d
%3e
%3f
%40
%41
%42
%43
%44
%45
%46
%47
%48
%49
%4a
%4b
%4c
%4d
%4e
%4f
%50
%51
%52
%53
%54
%55
%56
%57
`
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
{
|
}
~
€
‚
ƒ
„
…
†
‡
%60
%61
%62
%63
%64
%65
%66
%67
%68
%69
%6a
%6b
%6c
%6d
%6e
%6f
%70
%71
%72
%73
%74
%75
%76
%77
%78
%79
%7a
%7b
%7c
%7d
%7e
%7f
%80
%81
%82
%83
%84
%85
%86
%87
‘
’
“
”
•
–
—
˜
™
š
›
œ
Ÿ
¡
¢
£
¥
|
§
¨
©
ª
«
¬
¯
®
¯
°
±
²
³
´
µ
¶
·
%90
%91
%92
%93
%94
%95
%96
%97
%98
%99
%9a
%9b
%9c
%9d
%9e
%9f
%a0
%a1
%a2
%a3
%a4
%a5
%a6
%a7
%a8
%a9
%aa
%ab
%ac
%ad
%ae
%af
%b0
%b1
%b2
%b3
%b4
%b5
%b6
%b7
À
Á
Â
Ã
Ä
Å
Æ
Ç
È
É
Ê
Ë
Ì
Í
Î
Ï
Ð
Ñ
Ò
Ó
Ô
Õ
Ö
Ø
Ù
Ú
Û
Ü
Ý
Þ
ß
à
á
â
ã
ä
å
æ
ç
%c0
%c1
%c2
%c3
%c4
%c5
%c6
%c7
%c8
%c9
%ca
%cb
%cc
%cd
%ce
%cf
%d0
%d1
%d2
%d3
%d4
%d5
%d6
%d7
%d8
%d9
%da
%db
%dc
%dd
%de
%df
%e0
%e1
%e2
%e3
%e4
%e5
%e6
%e7
ð
ñ
ò
ó
ô
õ
ö
÷
ø
ù
ú
û
ü
ý
þ
ÿ
%f0
%f1
%f2
%f3
%f4
%f5
%f6
%f7
%f8
%f9
%fa
%fb
%fc
%fd
%fe
%ff
17
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
(
)
*
+
,
.
/
%28
%29
%2a
%2b
%2c
%2d
%2e
%2f
X
Y
Z
[
\
]
^
_
%58
%59
%5a
%5b
%5c
%5d
%5e
%5f
ˆ
‰
Š
‹
Œ
Ž
%88
%89
%8a
%8b
%8c
%8d
%8e
%8f
¸
¹
º
»
¼
½
¾
¿
%b8
%b9
%ba
%bb
%bc
%bd
%be
%bf
è
é
ê
ë
ì
í
î
ï
%e8
%e9
%ea
%eb
%ec
%ed
%ee
%ef
18
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
APPENDIX 1
BANK-SPECIFIC CONTACT INFORMATION
HANDELSBANKEN
Contract issues:
Codes and keys:
Customer support and
technical problems:
E-mail:
Local branch
Collected from the bank
HelpDesk 010 444 2545
During weekdays 8–17
finhelp@handelsbanken.fi
NORDEA
Contract issues:
Codes and keys:
Customer support and
technical problems:
E-mail:
OP BANK GROUP
Contract issues:
Codes and keys:
Customer support:
E-mail:
SAMPO BANK
Contract issues:
Local branch
Delivered by mail to the contact
person named in the
contract.
Solo information for corporate
customers
• In Finnish: 0200 67210 (0.11 €/min
+ local network/mobile call fee)
During weekdays between 8–18
• In Swedish: 0200 67220
(0.11 €/min + local network/mobile
call fee)
During weekdays 9–16.30
• In English: 0200 67230 (0.11 €/min
+ local network/mobile call fee)
During weekdays 9–18
Solo.tori@nordea.fi
Local OP bank
To be collected from a branch of the
bank
OP Bank phone service:
• In Finnish: 0100 0500
• In Swedish: 0100 9051
verkkopainikkeet@op.fi
Local branch or
phone 0106 6060 (local n
etwork/mobile call fee) Mon–Fri
8–17
19
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
Codes and keys:
Will be delivered on diskette in a
sealed mail package
Customer support and technical problems:
• Private customers 0200 2589
(local network/mobile call fee),
Mon–Fri 9–18
• Corporate customers 0600 122 12
(1.17 €/min +local network/mobile
fee),
Mon–Fri 8–17
E-mail:
asiakastuki.ml@sampo.fi or
varmennepalvelu@sampo.fi
SAVINGS BANKS AND LOCAL CO-OPERATIVE BANKS
Contract issues:
Local branch
Codes and keys:
Collected from the bank
Customer support and technical problems:
• phone 0100 4052 (1.17 €/min +
local network fee)
E-mail:
info@samlink.fi
TAPIOLA BANK
Contract issues
Codes and keys
Tapiola electronic services
Delivered to the contact person named
in the contract
Customer support and technical problems:
• Private customers 0203 45370
(Mon–Fri)
E-mail:
tunnistuspalvelu@tapiola.fi
BANK OF ÅLAND
Contract issues:
Customer code:
Customer support and
technical problems:
e-mail:
Local branch
Delivered at the branch upon signing
the contract.
The pass phrase is mailed to the
contact person named in the contract.
Contact Center customer service
• In Finnish: 0204 292920
• In Swedish: 0204 292910
• During weekdays Mon–Thu 8.40–
16.30, Fri 9.30–16.30
contactcenter@alandsbanken.fi
20
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
APPENDIX 2
TYPE OF IDENTIFIER IN CERTIFICATE REQUEST (A01Y_IDTYPE)
Data field 6 in the certificate request specifies the type of identifier
requested. The type is encoded with two characters XY as follows:
The first figure (X) indicates the contents of the type of identifier
requested:
0Y = basic identifier
1Y = personal identity number
2Y = Business ID
3Y = personal identity number or Business ID
4Y = personal identity number and Business ID
5Y = personal identity number and Business ID or
personal identity number alone
The latter figure (Y) indicates the form of the identifier requested:
X1 = Encrypted identifier
A hexadecimal MAC (Message
Authentication Code) calculated on
the basis of the customer’s
identification data.
X2 = Identifier in plain text
The identifier can be the customer’s
complete personal identity number, an
electronic transaction identifier or a
complete Business ID.
03 = Truncated identifier
A truncated identifier can contain the
last four characters of the personal
identity number without the
punctuation mark indicating century,
or a complete Business ID.
NB: Code 23 is not used.
21
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
APPENDIX 3
CUSTOMER IDENTIFIER IN THE CERTIFICATE
The data field for identifier type (field 9) indicates the type of
identifier data. The data is encoded with two characters XY so that
the first figure indicates whether the requested information about the
customer is in the bank's customer database.
0Y = The requested information was found.
The Certificate is returned to the return address in
the return address field of the certificate request.
00 = identifier not known
Value "00" is used if no identifiers are
found.
01 = personal identity number in plain text
Value "01" is used if the request
concerns an identifier in plain text and
only the personal identity number is
returned.
Field 5 holds the customer's name and
field 8 the personal identity number in
plain text.
02 = last four characters of personal identity number
in plain text
Value "02" is used if the request
concerns a truncated identifier and
only the last four characters of the
personal identity number are returned.
Field 5 holds the customer's name and
field 8 the last four characters of the
personal identity number in plain text.
22
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
03 = Business ID in plain text
Value "03" is used if the request
concerns an identifier in plain text and
only the Business ID is returned.
Field 5 holds the company's name and
field 8 the Business ID in plain text.
04 = electronic transaction identifier in plain text
Value "04" is used if the request
concerns an identifier in plain text and
only the electronic transaction
identifier is returned.
Field 5 holds the customer's name and
field 8 the electronic transaction
identifier in plain text.
05 = encrypted personal identity number
Value "05" is used if the request
concerns an encrypted identifier and
only the personal identity number is
returned.
Field 5 holds the customer's name and
field 8 the encrypted personal identity
number.
06 = encrypted Business ID
Value "06" is used if the request
concerns an encrypted identifier and
only the Business ID is returned.
Field 5 holds the company's name and
field 8 the encrypted Business ID.
07 = encrypted electronic transaction identifier
Value "07" is used if the request
concerns an encrypted identifier and
only the electronic transaction
23
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
identifier is returned (not in use at
Sampo).
Field 5 holds the customer's name and
field 8 the encrypted electronic
transaction identifier.
08 = Business ID and corporate user's personal
identity number in plain text, or other identifier agreed
between the service provider and the bank in plain
text
Value "08" is used if the request
concerns identifiers in plain text.
Field 5 holds the company's name,
field 8 the Business ID in plain text,
field 10 the corporate user's personal
identity number in plain text and field
11 the corporate user's name.
09 = encrypted Business ID and encrypted corporate
user's personal identity number, or other encrypted
identifier agreed between the service provider and the
bank
Value "09" is used if the request has
concerned encrypted identifiers.
Field 5 holds the company's name,
field 8 the encrypted Business ID,
field 10 the corporate user's encrypted
personal identity number and field 11
the corporate user's name.
1Y = The requested information or part of it was not found.
The information in the type of identifier field
(B02K_CUSTTYPE) is returned to the address in the
rejected address field of the certificate request. The
latter number (Y) in the type of identifier indicates
what information was not found on the customer. In
such cases, the service provider can automate its error
messages to the customers in different situations.
24
TUPAS certification service
Service description and
guidelines
Version 2.2
6 February 2007
10 = No requested information on the customer.
11 = No personal identity number for the customer.
12 = No Business ID for the customer.
Example: A service provider wants to know the
customer's personal identity number but the customer
uses identifiers that only have a Business ID. The
bank sends the information in the type of identifier
field (B02K_CUSTTYPE) to the address in the
rejected address field. In this case, field 9, type of
identifier, holds the value 11.
Bulevardi 28
FI-00120 Helsinki, Finland
Tel. +358 20 7934 200
Fax +358 20 7934 202
firstname.surename@fkl.fi
http://www.fkl.fi
Download