Chorus Portal Customer List
The following table provides a list of the Chorus customers.
The Chorus system name column lists the values required in the existingProviderName field if you are transferring or replacing another customers product.
From 16 June 2025, we’ve upgraded our Home Fibre plans. These changes are now live, but while some documents on this site may still reference the old plan names, rest assured, the new speeds apply. Find out more.
Chorus Portal Customer List
The following table provides a list of the Chorus customers.
The Chorus system name column lists the values required in the existingProviderName field if you are transferring or replacing another customers product.
The steps below describe how to install OpenSSL and generate a self-signed certificate.
Use the following steps to install OpenSSL on your local machine.
Step | Action |
---|---|
1 | Download openssl-0.9.8h-1-setup from http://downloads.sourceforge.net/gnuwin32/openssl-0.9.8h-1-setup.exe. |
2 |
Navigate to your download folder, double-click openssl-0.9.8h-1-setup.exe. Result: the Welcome to the OpenSSL Setup Wizard is displayed. |
3 |
Click Next. Result: the Licence Agreement screen is displayed. |
4 |
Click Next. Result: the Select Desination Location screen is displayed. |
5 |
The default install folder is: C:\Program Files (x86)\GnuWin32 Click Next. Result: the Select Components screen is displayed. |
6 |
Select Compact installation. Click Next. Result: the Select Start Menu Folder is displayed. |
7 |
Click Next. Result: the Select Additional Tasks screen is displayed. |
8 |
Click Next. Result: the Ready to Install screen is displayed. |
9 |
Click Install. Result: OpenSSL is installed. |
Step | Action | ||||||
---|---|---|---|---|---|---|---|
1 |
Follow the menu Start > Control Panel > System Click Advance system settings Result: the System Properties screen is displayed. |
||||||
2 | Click Advanced tab | ||||||
3 |
Click Environment Vairables Result: the Environment Variables screen is displayed. |
||||||
4 |
Under System variables Select the Path variable
Click OK |
||||||
5 |
Under System variables Select New
Click OK |
Use the following steps to generate your certificate and private key.
Step | Action | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 |
Open a command prompt. Change directory to where you would like to save the certificate. |
||||||||||||||||||||||||
2 |
Note: the following command uses "key.pem" as the Private Key name, "certificate.pem" as the Certificate name and creates a certificate for one year. You may choose your own values.
Result: the following message is displayed. Loading 'screen' into random state - done Generating a 2048 bit RSA private key .........+++ ...................................................+++ writing new private key to 'secret.pem' |
||||||||||||||||||||||||
3 |
Result: the following message is displayed. ----- You are about to be asked to enter information that will be incorporated into your certificate request. |
||||||||||||||||||||||||
4 |
Result: the certificate and private key are created in the current directory. |
Use the following steps to verify that your certificate has been created successfully.
Action | ||
---|---|---|
Open a command prompt. Change to the directory where you generated the certificate. Note: the following command uses "certificate.pem" as the Certificate name.
Result: the certificate details are displayed. The following output was generated by a certificate created using the example values listed in step 4 above. The extensions are created as a default by OpenSSL 0.9.8h and are not mandatory. Certificate: Data: X509v3 Basic Constraints: |
Send the certificate to your Implementation Manager for uploading into the Chorus B2B.
To enable messages to be exchanged between our network and yours, the external firewalls on both networks have to be configured to allow incoming and outgoing messages between our B2B gateways.
You need to provide us with all the static public IP address(es) and port number(s), which you will use to initiate and receive messages, and the URL endpoints of your B2B, so that we can allow them on our network.
Our public IP addresses, port, and URL endpoints, which you need to allow, are shown in the following tables.
Public IP Address Range | Port | Environment |
---|---|---|
|
443 | Emulation & Production |
URL End Point | Environment | |
---|---|---|
https://emma-b2b-ws.chorus.co.nz/b2b | Emulation | |
https://b2b-ws.chorus.co.nz/b2b | Production |
We use X.509/TLS 1.2 to encrypt the message over HTTP (HTTPS), to set this up in your B2B you need to access our certificates from our URL endpoints. This needs to be done for both emulation and production.
We will retrieve your TLS certificates from your URL endpoints.
The web services validate the SOAP header elements to ensure that messages are signed using security encryption (WS-Security) and that the message diagnostic header elements (MDH) identify the sender.
Message encryption works as follows:
To set this up we will send you our public key certificates for both production and emulation. And you need to send us your public key certificates.
The certificates must meet x509 standards and we request that you provide them in the PEM file format. You may use Certificate Authority (CA) issued, or self-signed certificates. If you use:
To securely deliver your public key certificates to us, we recommend they are exchanged on physical media like a USB flash drive or by email in a password protected zip file.
The Web Services Security - Message Diagnostic Header page describes the values required in the MDH elements.
To validate the messaging is secure and encrypted, submit a request to one of our web services (e.g. Query Location) and you should receive a response back from us.