Before you start to implement the rule chains according to the sequence diagram, ensure that the connection to the Trust Service is configured according to the following.
CA Service configured according to the Certificate Profiles Specification.
Configure CA Profile
The CA Service is configured using CA Profiles settings, defining the PKI configuration and providing parameters necessary for access.
- Network parameter from the Trust Service.
- Generated IdAM Security Token (P12 file)
- Issuing CA Certificate in PEM format.
- Optional: TLS Certificates in PEM format to establish a channel to the Trust Service
For more information on how to configure IdAM CA Profiles, see CA Configuration.
Next Step - Implement Process Workflow
Next, implement the process workflow by defining rule chains based on the sequence diagram, see Implement Process Workflow.