Sample application to demonstrate how to use mid-rest-java-client library and implement:
- authentication with Mobile ID
- fetching the signing certificate and signing a document with Mobile ID using Digidoc4j library
Option 1: ./mvnw spring-boot:run
Option 2. run main method of MidRestJavaDemoApplication
Start the application, open http://localhost:8081/ and authenticate or sign a document using test numbers.
Forwarding request to a real phone is no longer possible in demo environment.
For real-life use case you need to change in class MobileIdSignatureServiceImpl
in method sendSignatureRequest
the following line (constructor parameter needs to be PROD):
Configuration configuration = new Configuration(Configuration.Mode.PROD);
You also need to create your own Trust Store (or two separate Trust Stores) and only import the certificates you trust:
- SSL certificate of SK MID API endpoint. More info.
- MID root certificates (to validate that the returned certificate is issued by SK). More info.
This application only connects to servers it trusts. That is the SSL cert of the server must be imported into file src/main/resources/mid.trusted_server_certs.p12.
If you change this application to connect to some other server (or if the SSL cert of the demo server has expired and replaced with new one) then you need to import server's cert into the trust store.
More info how to do this can be found from mid-rest-java-client documentation.
Demo application has two separate trust stores:
- mid.trusted_server_certs.p12 holds SSL certificates of servers it trusts
- mid.trusted_root_certs.p12 holds all MID root certificates of MID test chain
Next section shows how these two trust stores were created and with instructions how to create similar trust stores for production.
NB! Avoid placing certificates from production chain and test chain into the same trust store. Create separate trust stores for each environment of your application and only import certificates needed for that specific environment.
Without following step one would not be able to connect to Demo API server:
-
import demo env API endpoint SSL root certificate. See instructions how to obtain the certificate.
-
Note that for demo we have imported ROOT certificate (DigiCert TLS RSA SHA256 2020 CA1) from the chain. Importing root certificate is not recommended for production.
keytool -importcert -storetype PKCS12 -keystore mid.trusted_server_certs.p12 \ -storepass changeit -alias midDemoServerRootCert -file demo_root_cert.crt -noprompt
Refer to the documentation for more info.
First we create a trust store and import one of two test root certifices. Without following step you couldn't log in with Estonian (+37200000766) testuser.
-
import demo env "TEST of ESTEID-SK 2015" root certificate:
keytool -importcert -storetype PKCS12 -keystore mid.trusted_root_certs.p12 \ -storepass changeit -alias "TEST of ESTEID-SK 2015" -file TEST_of_ESTEID-SK_2015.pem.crt -noprompt
We also need to import a second test root certificate. Without following step you couldn't log in with Lithuanian (+37060000666) or Estonian (+37268000769) testuser:
-
import demo env "TEST of EID-SK 2016" root certificate:
keytool -importcert -file TEST_of_EID-SK_2016.pem.crt -keystore mid.trusted_root_certs.p12 \ -storepass changeit -alias "TEST_of_EID-SK_2016" -file TEST_of_EID-SK_2016.pem.crt -noprompt
If new certificates (e.g. TEST_EID-Q_2021E.pem.crt with alias "TEST of SK ID Solutions EID-Q 2021E") become available, then these need to be imported as well.