To get started with the development of the issuing process workflow, we recommend developing a diagram over the interaction, defining the exchange of messages between the IdAM and the device in the production line. Such an interaction diagram or sequence diagram will allow you to identify the necessary rule-chains and determine their functions.
IdAM Installation Overview
The following overview illustrates a typical installation of the IdAM and its connection to the CA Service in the PKI Trust Center.

The overview includes the following steps:
- The device initiates the certificate request with the onboard key generation or external key generation.
- IdAM performs the CSR using standard formats. CMP is built-in and custom formats can be added.
- IdAM pulls device information from the database, the Manufacturing Execution System (MES), or another server.
- The CSR is sent to the CA for certificate signing via a standard protocol, for example, CMP.
- The certificates are then sent back to the production line. Responses are validated and certificates are optionally distributed to other locations.
- Certificates are stored on the device.
Sequence Diagram
Developing a sequence diagram helps you to use the specified communication and methods, passed between the production device and the IdAM and will allow you to identify the necessary rule chains and determine their functions. For the communication between the product in production and the IdAM, use the interface specification described in Device Adapter HTTP Interface with External Key Generation.
Based on the steps illustrated above, the following sequence diagram can be drawn.
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
Next, review information on configuring the connection to the Trust Service, see Configure IdAM.