Before you start to implement the rule chains according to the sequence diagram, ensure that the connection to the Trust Service is configured according to the following.

IdAM Configuration

Configure Certificates

CA Service configured according to the Certificate Profiles Specification.

Configure CA Profile

The CA Service is configured using CA Profiles settings, defining the PKI configuration and providing parameters necessary for access.

  • Network parameter from the Trust Service.
  • Generated IdAM Security Token (P12 file)
  • Issuing CA Certificate in PEM format.
  • Optional: TLS Certificates in PEM format to establish a channel to the Trust Service

For more information on how to configure IdAM CA Profiles, see CA Configuration.

Next Step - Implement Process Workflow

Next, implement the process workflow by defining rule chains based on the sequence diagram, see Implement Process Workflow.