ClearBank API Gateway Installation Guide

This document aims at explaining the installation procedures required to install the ClearBank Inbound & ClearBank Outbound Camel WAR file for the payments and accounts development. The scope of the document is to cover the deployment of the bar file of the ClearBank Inbound and Outbound flow.

System Requirements

The following are the pre-requisites for installing this package.

  • Jdk 1.8.
  • Active MQ 5.19+.
  • TPH necessary setup for processing the PACS and CAMT xml.

General Considerations

The Temenos firewall restricts the incoming request coming from ClearBank and thus the POC was tested in DMZ machine outside the Temenos network.

The TPH queue name mentioned in the below ClearBank_InboundPayment and ClearBank_Outbound WAR files is defaulted to the one that were used during the development of the POC. The queue name should be changed or configured to the TPH internal queue name available in the TPH area.

For ClearBank_InboundAccount WAR file, the new queue has to be created by modifying the standalone-utp.xml file and the same queue has to be associated with the IF exit point for the newly created Aacount application version.

It is assumed that the necessary information like URL name, certificate name, etc are already updated in the ClearBank simulation environment.

Contents of the Package

CAMEL war components:

  • ClearBank_InboundPayment.war.
  • ClearBank_InboundAccount.war.
  • ClearBank_Outbound.war.

Steps for Deploying the Bar File

Follow the steps below to deploy the bar file.

Configuring the System

  1. Commands to generate CSR and PFX with Public and private key that can be used in the simulation environment:
    • # generate a dummy certificate authority openssl genrsa -out CA.key 2048 openssl req -new -x509 -key CA.key -out CA.crt -subj /CN=CA.
    • # generate the simulation key and CSR (CSR it the thing you need to upload to ClearBank, so they will know about your public key) openssl genrsa -out SIM.key 2048 openssl req -new -sha256 -key SIM.key -out SIM.csr -subj /CN=SIM.
    • # Create CRT and PFX files openssl x509 -req -in SIM.csr -CA CA.crt -CAkey CA.key -CAcreateserial -out SIM.crt openssl pkcs12 -export -out SIM.pfx -inkey SIM.key -in SIM.crt
  2. Import the CA certificate provided by Security team in PFX to Keystore JKS format for HTTPS connectivity.
    • # Generate PEM file from PFX file openssl pkcs12 -in mypfxfile.pfx -out mypemfile.pem
    • #Generate P12 format file from PEM file openssl pkcs12 -export -in mypemfile.pem -out mykeystore.p12 -name "MyCert"
    • # Check the certificate inside the P12 file keytool -v -list -keystore mykeystore.p12 -storetype pkcs12
    • # Import the P12 and certifictaes in Keystore file keytool -importkeystore -srckeystore mykeystore.p12 -destkeystore clientcert.jks -srcstoretype pkcs12 -deststoretype JKS

Bookmark Name Actions
Feedback
x