Our implementation uses established security protocols to ensure the integrity and confidentiality of the B2B messages.
This section provides you with the configuration unique to our implementation, and the steps you need to perform to intergate with our security.
Security is setup across the following three layers:
Security Layer | How it works |
---|---|
Network | Creates a secure communications channel between your network and ours by only allowing messages between our B2B gateway and our customer. |
Transport | Ensures the secure transport of the message between your network and ours using Transport Layer Security (TLS) X.509 certificates over HTTP (HTTPS). |
Web Services |
Secure the payload by signing the messages. We exchange X.509 public key certificates with you so that the intended recipient can verify the message. Applies validation to message ensure that we only accept messages from an authorised party. |
The following diagram provides a visual aid to understand how the messages are communicated between our operational support systems.