To get started, a sample docker-compose file is located in the resources/docs folder.
EDC_IDS_TITLE: Title of the ConnectorEDC_IDS_DESCRIPTION: Description of the ConnectorEDC_IDS_ENDPOINT: URL of the Connectors endpointEDC_IDS_CURATOR:URL of the curator, i.e. the company, which configures data offerings etc.EDC_CONNECTOR_NAME:The name of the connectorEDC_HOSTNAME:The host of the connectorEDC_API_AUTH_KEY:The API authorization key of management API
The test environment is set by default.
EDC_BROKER_BASE_URL:https://broker.dev.mobility-dataspace.euEDC_OAUTH_CLIENT_ID:To be able to start an EDC-Connector with the broker-extensions, theSKIandAKIof the connector certificate must be entered asclient-IDin the docker-compose and the .jks must be placed under the path specified in the docker-compose (in the example in the folderresources/vault/edc/, seeEDC_KEYSTOREsetting).EDC_OAUTH_TOKEN_URL:https://daps.dev.mobility-dataspace.eu/tokenEDC_OAUTH_PROVIDER_JWKS_URL:https://daps.dev.mobility-dataspace.eu/jwks.json
Start via docker compose up in the docker-compose file folder
Use Postman (https://github.com/postmanlabs) and import collection located at resources/docs/postman_collection.json. Depending on your configuration changes, you need to adjust variables on collection MDV > Variables > Current Value
api_keyneeds to be aligned withEDC_API_AUTH_KEY
To test Broker functionality, simply execute steps
Publish Asset 1Publish Policy 1Publish ContractDefinition 1: You will see a notification about registering resource at broker, which will then be reflected in the Broker's UI.Delete ContractDefinition 1: You will see a notification about unregistering the resource at broker.
Example of a client-ID entry:
EDC_OAUTH_CLIENT_ID: 7X:7Y:...:B2:94:keyid:6A:2B:...:28:80
Here we show the way via the tool KeyStore Explorer (https://github.com/kaikramer/keystore-explorer) using Windows, for direct commands see other examples online.
- Convert the
p12to ajks
- Open the
p12in the KeyStore Explorer by entering the password File->Save as-> SelectKeyStore FilesatFiles of Type-> Directly save the file again as file of typeKeyStore Fileswith a.jksextension in its name underFile Name, e.g.keystore.jks
- Get SKI and AKI
- Right-click on the KeyPair in KeyStore Explorer ->
Export->Export Certificate Chain-> Confirm the dialog withExportButton - Double-click on the certificate under the specified storage path (Windows Certificate Manager opens)
- Under the
Detailssection you will find the details aboutAKI(Authority Key Identifier, dt.: Stellenschlüsselkennung) andSKI(Subject Key Identifier, dt.: Schlüsselkennung des Antragstellers)
- Finally, the identifiers itself have to be manually combined into the required format
SKI:keyid:AKIwith upper case letters and colon separator (see the above example of the client-ID):
This project is licensed under the Apache License 2.0 - see here for details.