This repository aims to build a process capable of signing certificates for
BrowserID. If you wanted to build a Primary Identity Authority with
BrowserID support, this is something you can run in your environment,
and talk to over HTTP to implement certificate generation.
A Work In Progress.
Web Service API
The Certifier webservice provides the following API:
/cert_key
A request to /cert_key must
Be sent with the Content-Type of application/json
The POST message body should be a JSON formatted object which includes:
email - The email address for this certificate
duration - How long until the certificate expires, in seconds
For maximum security, the above configuration makes the server
only listen locally (on 127.0.0.1).
If you need the certifier to be accessible over the network,
consider changing to something else,
or listen on every IP (with “0.0.0.0”), provided you protect it by other means.
Generating the Keypar
Both your IdP service and the Certifier must share a public key.
The Certifier, requires both a private and public keypair.
Do the following:
mkdir var
cd var/
../node_modules/.bin/generate-keypair
ls
You should now see a key.publickey and key.secretkey
in the directory. This matches your local.json config.
You’ll also want to import or re-use this key.publickey in
your IdP’s /.well-known/browserid file.
cd ..
./scripts/gen_well_known_browserid.py var/key.publickey > /some/path/www/.well-known/browserid
A Certifier Process for BrowserID
This repository aims to build a process capable of signing certificates for BrowserID. If you wanted to build a Primary Identity Authority with BrowserID support, this is something you can run in your environment, and talk to over HTTP to implement certificate generation.
A Work In Progress.
Web Service API
The Certifier webservice provides the following API:
/cert_key
A request to /cert_key must
Content-Typeofapplication/jsonThe response will be:
Content-Typeofapplication/jsonnavigator.id.registerCertificatefrom the BrowserID Provisioning ProtocolDependencies
Installation
Either npm or git should work:
or
You must install the dependencies:
You must create a config file. Example
config/local.jsonFor maximum security, the above configuration makes the server only listen locally (on 127.0.0.1).
If you need the certifier to be accessible over the network, consider changing to something else, or listen on every IP (with “0.0.0.0”), provided you protect it by other means.
Generating the Keypar
Both your IdP service and the Certifier must share a public key. The Certifier, requires both a private and public keypair.
Do the following:
You should now see a
key.publickeyandkey.secretkeyin the directory. This matches your local.json config.You’ll also want to import or re-use this
key.publickeyin your IdP’s/.well-known/browseridfile.Running Certifier
Simple Test
will output something like