Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[(main)] update public key for client:systematic-columna-cura-test #50

Merged
merged 2 commits into from
Oct 5, 2023

Conversation

CuraDevelopment
Copy link
Contributor

No description provided.

@ohetrifork
Copy link
Contributor

Any preferred installation date? Or just as soon as possible?

@CuraDevelopment
Copy link
Contributor Author

We would like it as soon as possible please, as we cannot currently test our integration with gateway.

@ohetrifork
Copy link
Contributor

Allright, I'll put in into pipeline for the next deployment. It will probably be handled by the change board on Tuesday 16/5

@ohetrifork
Copy link
Contributor

The deployment will happen on Monday 22/5 at 10-11 o'clock

@CuraDevelopment
Copy link
Contributor Author

Any updates on this?

@ohetrifork
Copy link
Contributor

Yes, I forgot to update this issues yesterday. The change was performed yesterday 10-11.

@ohetrifork
Copy link
Contributor

The previous public key in this merge request was actually release on May 22, but for some reason I didn't merge this branch. I can see you have committed a new public key - would you like to have that activated on the test environment?

@CuraDevelopment
Copy link
Contributor Author

We would like it as soon as possible please.

@ohetrifork
Copy link
Contributor

I'll bring the update to a pre-cab meeting next Tuesday and schedule the deployment for 5. October 8.00-9.00

@ohetrifork
Copy link
Contributor

@CuraDevelopment will you be able to verify the public key update tomorrow? It will be installed between 8 and 9 in the morning

@ohetrifork ohetrifork merged commit 2ae48b6 into trifork:main Oct 5, 2023
@ohetrifork
Copy link
Contributor

@CuraDevelopment the change is now complete. Is it possible for you to verify?

@CuraDevelopment
Copy link
Contributor Author

@ohetrifork Sorry for late response, but we tested this only on Friday and got following error "Client authentication with signed JWT failed: Signature on JWT token failed validation" when calling https://saml.test001.ehealth.sundhed.dk/auth/realms/ehealth/protocol/openid-connect/token. Could you please double check that everyting fine on your end? (request time stamp 2023-10-06 14:37:28.213)

@ohetrifork
Copy link
Contributor

@nigtrifork Do you see a reason why Systematic would be getting the above error? Could there be a new certificate on the Kombit STS?

@ohetrifork
Copy link
Contributor

@CuraDevelopment could you paste your JWT here? Looks like certificates are ok on KL-Gateway

@nigtrifork
Copy link
Collaborator

@CuraDevelopment
Copy link
Contributor Author

CuraDevelopment commented Oct 12, 2023

JWT seem to be fine:
eyJraWQiOiJoVU1DbmhBLTVuaEwtc2N0Qkh6WnpQX2o5V3lNeUNsNnBsSlEzbVBwRjFrIiwidHlwIjoiSldUIiwiYWxnIjoiUlMyNTYifQ.eyJzdWIiOiJzeXN0ZW1hdGljLWNvbHVtbmEtY3VyYS10ZXN0IiwiYXVkIjoiaHR0cHM6Ly9zYW1sLnRlc3QwMDEuZWhlYWx0aC5zdW5kaGVkLmRrL2F1dGgvcmVhbG1zL2VoZWFsdGgvcHJvdG9jb2wvb3BlbmlkLWNvbm5lY3QvdG9rZW4iLCJuYmYiOjE2OTcxMDIwMTUsImlzcyI6InN5c3RlbWF0aWMtY29sdW1uYS1jdXJhLXRlc3QiLCJleHAiOjE2OTcxMDIzMTUsImlhdCI6MTY5NzEwMjAxNSwianRpIjoiNWJiOWIzMjUtOWYzOS00Njg4LTllMzktY2RlNWEwOThhNjhjIn0.kf7IStytAx_MeV8w2iseFiKXTPzxn5hp-hFqJCyOW7iAsR0D6tOcptvxR78lcpy2J7bDpxGMRSeE5S_4rKJYozYZH1uWKVa-EIQPvlMkq8yj8vkiJHAXWQa1OpGxsDUGzCQK9pyPAi_ZeUrKAGXtp-Fq7PQGPA9lqyv4aV1K27yrE5sI25hy80WFMprvtKPp3MHNUcx7hncIxD_Hl5sQMhPwCK6DDIApqRo5teLF19HviCe_t5cSVHUQzr2MS9mhA8JQ3NikFN4GtZ4AWalkXgDpB-R6HKD_ERnPi0-RciM_V_TLtNrf_XmUb8lz-TVCb_nP1gF6ZnUuv2AhVqe8mwWdENSFctOH8oIBSa-VSCeGRC-sd-uIc4dnzG7IPS7fLd1C2_dWiTVw-vgRkpnZzwfkXdjMrCiciPwrAG4rqdn_utoNszGxpAMc4VaZ2pMVPOhJucR8hGMUFbAe6nVMPjYW1RqXIHXHTqOVou7fPu8vvTXmZQ0h3LI10ceAPAZU
In regards to kid update - it is calculated by code from public key and this is working same way as for previous public key upgrade.

@CuraDevelopment
Copy link
Contributor Author

Any updates on this?It is becoming to be critical on our end

@nigtrifork
Copy link
Collaborator

@CuraDevelopment The signature in the JWT example can not be verified by the provided public key. This is why it is rejected.

You can check this by pasting the JWT and public key here: https://jwt.io/

@nigtrifork
Copy link
Collaborator

Here's a valid example: valid jwt

And the one provided: provided jwt

@CuraDevelopment
Copy link
Contributor Author

My bad. I've created new pull request with updated public key. Could you please accept this on your end?
#52

@ohetrifork
Copy link
Contributor

We are not allowed to make certificate updates without following a change process, but we have a deployment scheduled for Thursday 19/10, where we can include the new key.
That deployment, however, disables the service security - but as your issue is with the token exchange, that is before actually calling the service, so you should be able to move a step forward. I will give you a heads up when the new key is installed on Thursday

@ohetrifork
Copy link
Contributor

ohetrifork commented Oct 19, 2023

@CuraDevelopment the new public key is now active.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants