You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ dependencies {
25
25
## Requirements
26
26
- Java SDK 1.6 and later
27
27
- Maven 3 and later
28
-
- It is recommended to use Unlimited Strength Jurisdiction Policy files from Oracle® (US_export_policy.jar and local_policy.jar) for appropriate JAVA version. For JAVA 7, it is available at http://www.oracle.com/technetwork/java/javase/downloads/jce-7-download-432124.html
28
+
- It is recommended to use Unlimited Strength Jurisdiction Policy files from Oracle® (US_export_policy.jar and local_policy.jar) for appropriate JAVA version. For JAVA 7, it is available at http://www.oracle.com/technetwork/java/javase/downloads/jce-7-download-432124.html
29
29
30
30
## Prerequisites
31
31
### CyberSource Evaluation account
@@ -37,7 +37,7 @@ Create security keys in the [Enterprise Business Center](https://ebctest.cyberso
37
37
- Refer to our [Developer Guide](http://apps.cybersource.com/library/documentation/dev_guides/security_keys/html/wwhelp/wwhimpl/js/html/wwhelp.htm#href=securityKeys_SO_API.4.1.html) for details.
38
38
39
39
### JCE Unlimited Strength Jars
40
-
Replace your Java installation’s existing security policy files with the new ones you downloaded from the Oracle site:
40
+
Replace your Java installation’s existing security policy files with the new ones you downloaded from the Oracle site:
41
41
- Locate your existing US_export_policy.jar and local_policy.jar files in the $JAVA_HOME/jre/lib/security directory.
42
42
- Rename or move your existing files to another directory.
43
43
- Copy the new US_export_policy.jar and local_policy.jar that you downloaded from Oracle to the $JAVA_HOME/jre/lib/security directory.
@@ -60,8 +60,8 @@ You do not need to download and build the source to use the SDK but if you want
60
60
-`serverURL` config parameter will take precedence over `sendToProduction` and `sendToAkamai` config parameters. By default the `serverURL` configuration is commented out.
61
61
- if `enablejdkcert` parameter is set to true, certificates will be read from the JKS file specified at keysDirectory location. The JKS file should be of the same name as specified in keyFilename.
62
62
- To know how to convert p12 to JKS refer the JKS creation section of this document.
63
-
- If `enableCacerts` is set to true, certificates will be read from the cacerts folder under the $JAVA_HOME/jre/lib/security.
64
-
Also point keysDirectory to $JAVA_HOME/jre/lib/security and keyFilename=cacerts .
63
+
- If `enableCacerts` is set to true, certificates will be read from the cacerts folder under the " %JAVA_HOME\jre\lib\security ".
64
+
Also point keysDirectory to " %JAVA_HOME\\jre\\lib\\security " and keyFilename=cacerts .
65
65
- if `certificateCacheEnabled` parameter is set to false (default is true), the p12 certificate of a merchant will be reloaded from filesystem every time a transaction is made
66
66
-`allowRetry` config parameter will only work for HttpClient. Set `allowRetry` config parameter to "true" to enable retry mechanism and set merchant specific values for the retry.
67
67
- Set integer values for config parameter `numberOfRetries`*and*`retryInterval`. Retry Interval is time delay for next retry in seconds.
- The first entry should contain a chain of two certificates - `CyberSourceCertAuth` and <Merchant_ID> with alias name <Merchant_ID>
140
140
- Second entry should be for `CyberSource_SJC_US` certificate with alias name as CyberSource_SJC_US
141
-
141
+
142
+
142
143
## Message Level Encryption
143
144
CyberSource supports Message Level Encryption (MLE) for Simple Order API. Message level encryption conforms to the SOAP Security 1.0 specification published by the OASIS standards group.
144
145
145
146
### Authentication Details
146
147
Message level encryption authenticates using the same mechanism as signed SOAP messages. The signature creation involves utilizing the merchants private key which combined with a hash of the message to be signed, can be validated with the merchants certificate and the message which was signed.
147
-
The merchant certificate is included in the SOAP message for both signature and message level encryption. Message level encryption, encrypts a temporary message key for a specific recipient. This is done by encrypting the temporary message key with the recipient’s public certificate. Therefore only the party holding the private key (CyberSource) can decrypt the temporary message key. The merchant sending the request must be a valid merchant for the environment which the message is being processed in. After validating the merchant and retrieving the CyberSource copy of the merchant certificate from our database, these additional authentication steps are performed:
148
+
The merchant certificate is included in the SOAP message for both signature and message level encryption. Message level encryption, encrypts a temporary message key for a specific recipient. This is done by encrypting the temporary message key with the recipient’s public certificate. Therefore only the party holding the private key (CyberSource) can decrypt the temporary message key. The merchant sending the request must be a valid merchant for the environment which the message is being processed in. After validating the merchant and retrieving the CyberSource copy of the merchant certificate from our database, these additional authentication steps are performed:
148
149
1. The certificate sent in the message must have valid trust chain with the CyberSource certificate authority as the root signer.
149
150
2. A certificate belonging to the merchant which sent the message must exist within our database, having the exact serial number of the certificate provided.
150
151
3. Our record of the certificate must have a valid start and end date for the transaction time sent.
151
-
4. Our record of the certificate must have a “active� state (ie. Not deactivated by support).
152
+
4. Our record of the certificate must have a “active” state (ie. Not deactivated by support).
152
153
5. If merchant is reseller, the merchant must allow reseller to act upon their behalf and reseller must be configured as a reseller and the provided merchant must be configured as a merchant of this reseller. Additionally all above authorizations apply.
0 commit comments