Encryption
Last updated
Last updated
All content on this page by eGov Foundation is licensed under a Creative Commons Attribution 4.0 International License.
Input to a decryption request may be an simple string OR an array OR a JSON Object. Every Object/Array will be navigated through to find simple strings, and those strings will be decrypted.
The response to a decryption request will have the same structure as the input.
Request has the name of the tenant for which the key needs to be rotated.
The tenantId for which the key needs to be changed.
Acknowldgement if the operation was successful.
Acknowledgement if the operation was successful.
Request contains the value and its signature.
The claim to be verified
The signature for the claim
Response returns if the provided signature is correct for the given value.
This will be true if the signature is correct according to the claim, otherwise false.
The tenantId for which the key needs to be changed.
OK
Acknowledgement if the operation was successful.
Request contains tenant id and the value that needs to be signed.
The key used for signing will be determined based on tenant id.
The value to be signed.
Response contains the value that has been signed and the value of signature.
The value that came with request.
The signature generated for the above value.