/
OpenNCP properties
OpenNCP properties
Following is a list of the OpenNCP properties that are used during its operation. The values provided are just examples and should be replaced according to each country's configuration.
Key | Value | Purpose |
---|---|---|
13069500379061044841 (<cert_serial_number>) | NCPB__eu_NCP (<alias>) | Serial number and alias for certificates fetched by TSL-Sync |
COUNTRY_CODE | PT | Country code according to ISO 3166-1 alpha-2 (see e.g. Wikipedia for a list of possible values) |
COUNTRY_NAME | Portugal | Name of country according to ISO 3166-1 alpha-2 (see e.g. Wikipedia for a list of possible values) |
LANGUAGE_CODE | pt-PT | Language code according to ISO 639x |
HOME_COMM_ID | 2.16.17.710.820.1000.990.1 | Participating Nation OID (used in Portal for patient consent submission, Protocol Terminators and eADC) |
COUNTRY_PRINCIPAL_SUBDIVISION | PT-1 | ISO 3166-2 code for country subdivision (used in Portal, Protocol Terminators, TRC-STS and epSOS Web Portal for audit purposes) |
TRUSTSTORE_PATH | /opt/epsos-configuration/cert/PPT/keystore/truststore.jks | Path to truststore |
TRUSTSTORE_PASSWORD | changeit | Truststore password |
SP_KEYSTORE_PATH | /opt/epsos-configuration/cert/PPT/keystore/servprov.jks | Path to Service Provider keystore |
SP_KEYSTORE_PASSWORD | changeit | Service Provider keystore password |
SP_PRIVATEKEY_ALIAS | SP-pk-alias | Service Provider private key alias |
SP_PRIVATEKEY_PASSWORD | changeit | Service Provider private key password |
SC_KEYSTORE_PATH | /opt/epsos-configuration/cert/PPT/keystore/servcons.jks | Path to Service Consumer keystore |
SC_KEYSTORE_PASSWORD | changeit | Service Consumer keystore password |
SC_PRIVATEKEY_ALIAS | SC-pk-alias | Service Consumer private key alias |
SC_PRIVATEKEY_PASSWORD | changeit | Service Consumer private key password |
NCP_SIG_KEYSTORE_PATH | /opt/epsos-configuration/cert/PPT/keystore/ncpsign.jks | Path to NCP Signature keystore |
NCP_SIG_KEYSTORE_PASSWORD | changeit | NCP Signature keystore password |
NCP_SIG_PRIVATEKEY_ALIAS | Ncp-sig-pk-alias | NCP Signature private key alias |
NCP_SIG_PRIVATEKEY_PASSWORD | changeit | NCP Signature private key password |
secman.sts.url | http://192.192.192.192:8080/epsos-trc-sts/STSServiceService | TRC-STS URL |
automated.validation | TRUE | This will call the XDStarClient online validator to validate messages |
SERVER_IP | 192.192.192.192 | IP address of the machine running OpenNCP |
audit.repository.port | 2862 | OpenATNA's TLS Server port |
audit.repository.url | localhost | OpenATNA's Server location |
audit.time.to.try | 200 | Timeout value (milliseconds) for sending audit message |
auditrep.forcewrite | TRUE | Force AuditManager to write audit message |
WRITE_TEST_AUDITS | TRUE | Determines if test audits should be written |
TEST_AUDITS_PATH | /opt/epsos-configuration/audits/ | Path where test audits will be written |
ncp.country | PT | Local NCP infos (used for audit purposes) – country code |
ncp.email | admin@ncp.pt | Local NCP infos (used for audit purposes) – NCP administrator email |
scheduled.time.between.failed.logs.handling.minutes | 60 | Interval (minutes) in which OpenATNA checks if some audit log was not persisted. In case these logs are found, they will be attempted to re-persist. |
<countryCode>.tsam.synchronizer.lastsyncdate | 4/11/15 03:41 AM | Date of last TSAM-Synchronization |
certificates.storepath | /opt/epsos-configuration/cert/PPT/certs/ | Path to folder where the other countries certificates will be stored |
ncp.countries | lu,at,ch,gr | You'll connect to the Central Services to fetch configuration and certificates from each one of these countries |
tsl.location.<CC> | https://ecrtsppt.conet-services.de:8445/NCP_Service_Status_List__COUNTRY_<CC>_.xml | Location of the TSL file for each country |
APP_BEHIND_PROXY | TRUE | Proxy configurations (to use in case your OpenNCP is running behind a proxy) |
APP_PROXY_HOST | 192.192.4.5 | Proxy configurations (to use in case your OpenNCP is running behind a proxy) |
APP_PROXY_PORT | 8080 | Proxy configurations (to use in case your OpenNCP is running behind a proxy) |
APP_PROXY_USERNAME | proxyuser | Proxy configurations (to use in case your OpenNCP is running behind a proxy) |
APP_PROXY_PASSWORD | proxypass | Proxy configurations (to use in case your OpenNCP is running behind a proxy) |
<CC>.ConsentService.WSE | https://172.31.64.14:8443/epsos-ncp-server/services/XDR_Service/ | URL for ConsentService of country <CC> |
<CC>.OrderService.WSE | https://172.31.64.14:8443/epsos-ncp-server/services/XCA_Service/ | URL for OrderService of country <CC> |
<CC>.PatientIdentificationService.WSE | https://172.31.64.14:8443/epsos-ncp-server/services/XCPD_Service/ | URL for PatientIdentificationService of country <CC> |
<CC>.PatientService.WSE | https://172.31.64.14:8443/epsos-ncp-server/services/XCA_Service/ | URL for PatientService of country <CC> |
<CC>.VPNGateway.WSE | 172.31.64.14 | Hostname or IP address of VPN gateway of country <CC> |
<CC>.DispensationService.WSE | https://172.31.64.14:8443/epsos-ncp-server/services/XDR_Service/ | URL for DispensationService of country <CC> |
PORTAL_ADMIN_PERMISSIONS | PRD-006,PRD-003,PRD-004,PRD-005,PRD-010,PRD-016,PPD-032,PPD-033 | Portal Administrator permissions (epSOS EED SAML Binding) |
PORTAL_CHECK_PERMISSIONS | FALSE | (? Check user permissions ?) |
PORTAL_CLIENT_CONNECTOR_URL | http://localhost:8080/epsos-client-connector/services/ClientConnectorService | URL of the web service exposed by epsos-client-connector to allow communication with the Portal |
PORTAL_CONSENT_ENABLED | TRUE | (? Activate Portal option to provide consent document ?) |
PORTAL_CONSENT_OID | 2.16.17.710.820.1000.990.1 | (? OID sent in Consent Submission ?) |
PORTAL_CUSTODIAN_NAME | <CountryCustodianName> | (? Name of organization ?) |
PORTAL_CUSTODIAN_OID | 2.16.17.710.820.1000.990.1 | (? Organization OID ?) |
PORTAL_DISPENSATION_COUNTRY | <CountryCode> | Country code according to ISO 3166-1 alpha-2 (see e.g. Wikipedia for a list of possible values) |
PORTAL_DISPENSATION_OID | 2.16.17.710.820.1000.990.1 | (? OID of dispensation country ?) |
PORTAL_DOCTOR_OID | 2.16.17.710.820.1000.990.1 | (? Doctor OID ?) |
PORTAL_DOCTOR_PERMISSIONS | PRD-006,PRD-003,PRD-004,PRD-005,PRD-010,PRD-016,PPD-032,PPD-033 | Portal Doctor permissions (epSOS EED SAML Binding) |
PORTAL_ENTRY_OID | 2.16.17.710.820.1000.990.1 | (? Organization OID ?) |
PORTAL_HOSPITAL_OID | 2.16.17.710.820.1000.990.1 | (? Hospital OID ?) |
PORTAL_LEGAL_AUTHENTICATOR_CITY | <City> | (? Legal Authenticator City ?) |
PORTAL_LEGAL_AUTHENTICATOR_FIRSTNAME | <LegalAuthenticatorFirstname> | (? Legal Authenticator Firstname ?) |
PORTAL_LEGAL_AUTHENTICATOR_LASTNAME | <LegalAuthenticatorLastname> | (? Legal Authenticator Lasttname ?) |
PORTAL_LEGAL_AUTHENTICATOR_ORG_OID | 2.16.17.710.820.1000.990.1 | (? Legal Authenticator Organization OID ?) |
PORTAL_LEGAL_AUTHENTICATOR_PERSON_OID | 2.16.17.710.820.1000.990.1 | (? Legal Authenticator Personal OID ?) |
PORTAL_LEGAL_AUTHENTICATOR_POSTALCODE | N/A | (? Legal Authenticator Postal Code ?) |
PORTAL_NURSE_PERMISSIONS | PRD-006,PRD-004,PRD-010 | Portal Nurse permissions (epSOS EED SAML Binding) |
PORTAL_ORDER_OID | 2.16.17.710.820.1000.990.1 | (? OID of ordering country ?) |
PORTAL_PATIENTS_OID | 2.16.17.710.820.1000.990.1 | (? Patients OID ?) |
PORTAL_PATIENT_PERMISSIONS | PRD-006,PRD-003,PRD-004,PRD-005,PRD-010,PRD-016,PPD-032,PPD-033 | Portal Patient permissions (epSOS EED SAML Binding) |
PORTAL_PHARMACIES_OID | 2.16.17.710.820.1000.990.1 | (? Pharmacies OID ?) |
PORTAL_PHARMACIST_OID | 2.16.17.710.820.1000.990.1 | (? Pharmacist OID ?) |
PORTAL_PHARMACIST_PERMISSIONS | PRD-006,PRD-004,PRD-010,PPD-046 | Portal Pharmacist permissions (epSOS EED SAML Binding) |
PORTAL_PROPERTIES_UPDATED | TRUE | (? True if Portal properties were updated by Portal Configuration Portlet ?) |
PORTAL_TEST_ASSERTIONS | FALSE | (?) |
secman.cert.validator.checkforkeyusage | FALSE | (? Determines if Security Manager validates certificate key usage extension ?) |
secman.digest.algorithm.default | http://www.w3.org/2000/09/xmldsig#sha1 | Security Manager digest algorithm |
secman.signature.algorithm.default | http://www.w3.org/2001/04/xmldsig-more#rsa-sha256 | Security Manager signature algorithm |
secman.sts.checkHostname | FALSE | (? Verify hostname when requesting assertion from TRC-STS ?) |
, multiple selections available,
Related content
OpenNCP Specifications
OpenNCP Specifications
More like this
Technical Requirements List for OpenNCP and integration design
Technical Requirements List for OpenNCP and integration design
More like this
Create epSOS Certificates
Create epSOS Certificates
More like this
OpenNCP Installation
OpenNCP Installation
More like this
Setup eADC in OpenNCP
Setup eADC in OpenNCP
More like this
Assessment on the OpenNCP Installation guide completeness
Assessment on the OpenNCP Installation guide completeness
More like this