To get started, a sample docker-compose file is located in the resources/docs folder.
EDC_IDS_TITLE
: Title of the ConnectorEDC_IDS_DESCRIPTION
: Description of the ConnectorEDC_IDS_ENDPOINT
: URL of the Connectors endpointEDC_IDS_CURATOR:
URL of the curator, i.e. the company, which configures data offerings etc.EDC_CONNECTOR_NAME:
The name of the connectorEDC_HOSTNAME:
The host of the connectorEDC_API_AUTH_KEY:
The API authorization key of management API
The test environment is set by default.
EDC_BROKER_BASE_URL:
https://broker.dev.mobility-dataspace.euEDC_OAUTH_CLIENT_ID:
To be able to start an EDC-Connector with the broker-extensions, theSKI
andAKI
of the connector certificate must be entered asclient-ID
in the docker-compose and the .jks must be placed under the path specified in the docker-compose (in the example in the folderresources/vault/edc/
, seeEDC_KEYSTORE
setting).EDC_OAUTH_TOKEN_URL:
https://daps.dev.mobility-dataspace.eu/tokenEDC_OAUTH_PROVIDER_JWKS_URL:
https://daps.dev.mobility-dataspace.eu/jwks.json
Start via docker compose up
in the docker-compose file folder
Use Postman (https://github.com/postmanlabs) and import collection located at resources/docs/postman_collection.json
. Depending on your configuration changes, you need to adjust variables on collection MDV > Variables > Current Value
api_key
needs to be aligned withEDC_API_AUTH_KEY
To test Broker functionality, simply execute steps
Publish Asset 1
Publish Policy 1
Publish ContractDefinition 1
: You will see a notification about registering resource at broker, which will then be reflected in the Broker's UI.Delete ContractDefinition 1
: You will see a notification about unregistering the resource at broker.
Example of a client-ID entry:
EDC_OAUTH_CLIENT_ID: 7X:7Y:...:B2:94:keyid:6A:2B:...:28:80
Here we show the way via the tool KeyStore Explorer
(https://github.com/kaikramer/keystore-explorer) using Windows, for direct commands see other examples online.
- Convert the
p12
to ajks
- Open the
p12
in the KeyStore Explorer by entering the password File
->Save as
-> SelectKeyStore Files
atFiles of Type
-> Directly save the file again as file of typeKeyStore Files
with a.jks
extension in its name underFile Name
, e.g.keystore.jks
- Get SKI and AKI
- Right-click on the KeyPair in KeyStore Explorer ->
Export
->Export Certificate Chain
-> Confirm the dialog withExport
Button - Double-click on the certificate under the specified storage path (Windows Certificate Manager opens)
- Under the
Details
section you will find the details aboutAKI
(Authority Key Identifier, dt.: Stellenschlüsselkennung) andSKI
(Subject Key Identifier, dt.: Schlüsselkennung des Antragstellers)
- Finally, the identifiers itself have to be manually combined into the required format
SKI:keyid:AKI
with upper case letters and colon separator (see the above example of the client-ID):
This project is licensed under the Apache License 2.0 - see here for details.