Skip to content

API Hub Connectivity & Certificates v2.1

This page describes the network architecture of the API Hub and the certificates that secure communication between all parties in the ecosystem.

Network Architecture

The diagram below shows the full connectivity model between TPPs, the API Hub, and the LFI's infrastructure.

API Hub connectivity diagram showing certificate placement across TPP, API Hub, and LFI networks
Click to expand

All connections between the API Hub and external parties use mutual TLS (mTLS). Each certificate has a specific role in securing a particular connection path. The certificates are created and stored within the Trust Framework, and the private keys are held by the party responsible for that connection.

The sequence diagram below shows which certificate secures each direction of traffic between the TPP, the API Hub, and the LFI's Ozone Connect backend.

Click to expand

Connection Paths

TPP to API Hub

ConnectionCertificateDescription
TPP → API HubC1 (TPP client cert)The TPP presents its client certificate to identify itself to the API Hub.
API Hub → TPPS1 (API Hub server cert)The API Hub presents this server certificate to identify the LFI's API Hub instance to the TPP.
Request signingSig1The TPP signs request JWTs (e.g. PAR request objects and private_key_jwt client assertions) sent to the API Hub. The API Hub verifies using the public key in the TPP's JWKS.
Response signingSig2The API Hub signs responses and id_token payloads sent to the TPP. The TPP verifies using the public key in the JWKS.

API Hub to LFI (Ozone Connect)

ConnectionCertificateDescription
API Hub → LFIC4 (API Hub client cert)The API Hub presents this client certificate when calling the LFI's Ozone Connect endpoints.
LFI → API HubS4 (LFI server cert)The LFI's Ozone Connect server presents this certificate to identify itself to the API Hub.
Request signing (JWT Auth)Sig3The API Hub signs JWT Auth headers on Ozone Connect requests. Only applicable when JWT Auth is selected.
Response signing (JWT Auth)Sig4The LFI signs JWT Auth headers on Ozone Connect responses. Only applicable when JWT Auth is selected.
ConnectionCertificateDescription
LFI → API HubC3 (LFI client cert)The LFI presents this client certificate when calling the Consent Manager and Headless Heimdall Auth Server.
API Hub → LFIS3 (API Hub server cert)The Consent Manager and Headless Heimdall servers present this certificate to identify themselves to the LFI.
Request signing (JWT Auth)Sig4The LFI signs JWT Auth headers on requests to the Consent Manager and Headless Heimdall. Only applicable when JWT Auth is selected.
Response signing (JWT Auth)Sig3The API Hub signs JWT Auth headers on Consent Manager and Headless Heimdall responses. Only applicable when JWT Auth is selected.

Payload Encryption

Payload encryption is separate from transport: Enc1 and Enc2 are JWE keys applied to the message body, not to the TLS connection. The sequence below shows how each one is used.

Click to expand
CertificateDescription
Enc1 (LFI encryption key)Used by the TPP to encrypt Personally Identifiable Information (PII) sent via the API Hub. Only the LFI can decrypt this data using its private key.
Enc2 (TPP encryption key)Used by the API Hub to encrypt webhook event payloads sent to the TPP. Only the TPP can decrypt using its private key.

Certificate Summary

The table below summarises all certificates, who holds the private key, and where the certificate is created in the Trust Framework.

CertificateTypePrivate Key Held ByTrust Framework LocationPurpose
S1Server TransportOzoneLFI's organisationIdentifies the LFI's API Hub instance to TPPs
S3Server TransportOzoneLFI's organisationIdentifies the CM & HH servers to the LFI
S4Server TransportLFILFI's organisationIdentifies the LFI's Ozone Connect server to the API Hub
C1Client TransportTPPTPP's organisationIdentifies the TPP when calling the API Hub
C3Client TransportLFILFI's organisation (C3-hh-cm-client application)Identifies the LFI when calling CM & HH
C4Client TransportOzoneOzone's organisationIdentifies the API Hub when calling Ozone Connect
Sig1SigningTPPTPP's organisationSigns TPP request JWTs (e.g. PAR request objects, private_key_jwt)
Sig2SigningOzoneLFI's organisationSigns API Hub responses and id_token sent to TPPs
Sig3SigningOzoneOzone's organisationSigns JWT Auth headers on API Hub requests/responses to the LFI
Sig4SigningLFILFI's organisation (C3-hh-cm-client application)Signs JWT Auth headers on LFI requests/responses to the API Hub
Enc1Server EncryptionLFILFI's organisationEncrypts PII — only the LFI can decrypt
Enc2Client EncryptionTPPTPP's organisationEncrypts webhook event payloads — only the TPP can decrypt

Trust Framework certificate types

When creating these certificates in the Trust Framework, select the following types:

  • C1, C3, C4OPF UAE CLIENT TRANSPORT
  • S1, S3, S4OPF UAE SERVER TRANSPORT
  • Sig1, Sig2, Sig3, Sig4OPF UAE CLIENT SIGNING
  • Enc1SERVER ENCKEY
  • Enc2OPF UAE CLIENT ENCRYPTION

Sig3 and Sig4

The Sig3 and Sig4 certificates are only required when JWT Auth is selected as the application layer authentication method.

Who Does What

Ozone-held certificates (S1, S3, Sig2, C4, Sig3)

For certificates where Ozone holds the private key, the process is:

  1. Ozone generates the private key and a Certificate Signing Request (CSR).
  2. For S1, S3, and Sig2: Ozone provides the CSR to the LFI. The LFI uploads the CSR to their own organisation in the Trust Framework to generate the certificate, then provides the JWKS URL and KID back to Ozone.
  3. For C4 and Sig3: These certificates are in Ozone's own Trust Framework organisation. Ozone provides the JWKS URL and KID to the LFI. No action is required from the LFI for these certificates.

LFI-held certificates (C3, S4, Sig4, Enc1)

For certificates where the LFI holds the private key, the process is:

  1. The LFI generates the private key and CSR.
  2. For C3 and Sig4: The LFI creates the certificate in the C3-hh-cm-client application in the Trust Framework. See Creating the C3-hh-cm-client Application and Keys & Certificates.
  3. For S4 and Enc1: The LFI creates the certificate under Organisation Certificates in the Trust Framework.
  4. The LFI provides the JWKS URL and KID to Ozone.

Certificate reuse across brands

If your institution operates multiple API Hub instances (e.g. for retail and business brands), LFI-held certificates (C3, S4, Sig4, Enc1) MAY be reused across brands. Each brand still requires its own environment-specific onboarding form, but can reference the same certificates if appropriate.

Next Steps