/
SWS Network guide
SWS Network guide
Introduction
SWS to complete her flow of sign or verify use external services (for example download all the trusted list, send to Namirial server the hash to sign ecc...). Below will be described the main comunication used by SWS. If this comunication aren't enabled, SWS will not work correctly.
Ports and Protocols Usages (firewall rules)
Below the list of port and protocol used by SWS:
Operation | Description | Frequency | Protocol | Ports | TCP/UDP | Address | SWS Environment |
---|---|---|---|---|---|---|---|
Signature | Sends a request to the Namirial server for signing the hash | Every call | HTTPS | 443 | TCP | fra.firmacerta.it | PROD |
Timestamp | Sends a request to the Namirial server for applying the timestamp to the hash | Every call | HTTP | 80 | TCP | timestamp.firmacerta.it | PROD |
Timestamp | Sends a request to the Namirial server for applying the timestamp to the hash | Every call | HTTPS | 443 | TCP | timestamp.firmacerta.it | PROD |
Verification OCSP | Sends a request to the OCSP link for checking the certificate | Every call (whenever possible) | OCSP | 80 | TCP | It depends on the the CA that issued the certificate for the signature. For Namirial, the link is: "ocsp.firmacerta.it" | PROD |
Signature | This operation sends a request to the Namirial server for signing the hash | Every call | HTTPS | 443 | TCP | fra.test.firmacerta.it | TEST |
Timestamp | Sends a request to the Namirial server for applying the timestamp to the hash | Every call | HTTP | 80 | TCP | timestamp.test.firmacerta.it | TEST |
Timestamp | Sends a request to Namirial server for applying the timestamp to the hash | Every call | HTTPS | 443 | TCP | timestamp.test.firmacerta.it | TEST |
Verification OCSP | For validate the certificate send request to OCSP for check the certificate | Every call (whenever possible) | OCSP | 80 | TCP | It depends on the CA issued the certificate used for the signature. For Namirial it's: "ocsp.firmacerta.it" | PROD |
Verification CRL | For validate the signature certificate check the serial number into CRL | HTTP/LDAP | 80, 389 | TCP | It depends on the CA issued the certificate used for the signature. For Namirial it's: "crl.firmacerta.it" | PROD | |
Verification | At startup SWS download all European Trusted Root from European supervisory agenciences | HTTPS | 443 | TCP | ec.europa.eu (the full link is: https://ec.europa.eu/information_society/policy/esignature/trusted-list/tl-mp.xml) | TEST, PROD | |
Updates and Monitoring | Used for receiving automatic updates and receive | Always | JABBER, HTTP, HTTPS | 5222, 443, 80 | TCP | scm.firmacerta.it | TEST, PROD |
NTP sync | Used for synchronization of date and time | Always | NTP | 123 | UDP | TEST, PROD | |
Certificate verifier | Allow to verify a certificate | 443 | TCP | TEST, PROD |
Outbound communication to the Namirial FRA service are done through HTTPS, with a mutual authentication, and take place via a unique TLS certificate that Namirial distributes to every applicant, in order to identify the virtual appliance SWS caller.
Here is a table with the incoming protocols:
Service | Description | Protocol | Port | TCP/UDP | SWS Environment |
---|---|---|---|---|---|
Web Services | Web services interfacing | HTTP | 8080 | TCP | TEST, PROD |
, multiple selections available,
Related content
SWS Description
SWS Description
Read with this
Standard interface
Standard interface
Read with this
SWS Integration Guide
SWS Integration Guide
Read with this
SWS OnPremise - Docker container
SWS OnPremise - Docker container
Read with this
SWS SaaS Configuration Guide
SWS SaaS Configuration Guide
Read with this
FAQ
FAQ
Read with this