Skip to content

Latest commit

 

History

History
431 lines (306 loc) · 17.5 KB

File metadata and controls

431 lines (306 loc) · 17.5 KB

Generic badge

Message Level Encryption (MLE) Feature

This feature provides an implementation of Message Level Encryption (MLE) for APIs provided by CyberSource, integrated within our SDK. This feature ensures secure communication by encrypting messages at the application level before they are sent over the network.

MLE supports both Request Encryption (encrypting outgoing request payloads) and Response Decryption (decrypting incoming response payloads).



Authentication Requirements

  • Request MLE: Only supported with JWT (JSON Web Token) authentication type
  • Response MLE: Only supported with JWT (JSON Web Token) authentication type


Configuration

1. Request MLE Configuration

1.1. Global Request MLE Configuration

Configure global settings for request MLE using these properties in your merchant configuration:

(i) Primary Configuration
  • Variable: enableRequestMLEForOptionalApisGlobally
  • Type: Boolean
  • Default: false
  • Description: Enables request MLE globally for all APIs that have optional MLE support when set to true.

(ii) Deprecated Configuration (Backward Compatibility)
  • Variable: useMLEGlobally ⚠️ DEPRECATED
  • Type: Boolean
  • Default: false
  • Description: DEPRECATED - Use enableRequestMLEForOptionalApisGlobally instead. This field is maintained for backward compatibility and will be used as an alias for enableRequestMLEForOptionalApisGlobally.

(iii) Advanced Configuration
  • Variable: disableRequestMLEForMandatoryApisGlobally
  • Type: Boolean
  • Default: false
  • Description: Disables request MLE for APIs that have mandatory MLE requirement when set to true.

1.2. Request MLE Certificate Configuration [Optional Params]

(i) Certificate File Path (Optional)
  • Variable: mleForRequestPublicCertPath
  • Type: String
  • Optional: true
  • Description: Path to the public certificate file used for request encryption. Supported formats: .pem, .crt.
    • Note: This parameter is optional when using JWT authentication. If not provided, the request MLE certificate will be automatically fetched from the JWT authentication P12 file using the requestMleKeyAlias.

(ii) Key Alias Configuration (Optional)
  • Variable: requestMleKeyAlias
  • Type: String
  • Optional: true
  • Default: CyberSource_SJC_US
  • Description: Key alias used to retrieve the MLE certificate from the certificate file. When mleForRequestPublicCertPath is not provided, this alias is used to fetch the certificate from the JWT authentication P12 file. If not specified, the SDK will automatically use the default value CyberSource_SJC_US.

(iii) Deprecated Key Alias (Backward Compatibility) (Optional)
  • Variable: mleKeyAlias ⚠️ DEPRECATED
  • Type: String
  • Optional: true
  • Default: CyberSource_SJC_US
  • Description: DEPRECATED - Use requestMleKeyAlias instead. This field is maintained for backward compatibility and will be used as an alias for requestMleKeyAlias.


2. Response MLE Configuration

2.1 Global Response MLE Configuration

  • Variable: enableResponseMleGlobally
  • Type: Boolean
  • Default: false
  • Description: Enables response MLE globally for all APIs that support MLE responses when set to true.

2.2 Response MLE Private Key Configuration

(i) Option 1: Provide Private Key Object
  • Variable: responseMlePrivateKey
  • Type: OpenSSL::PKey | String
  • Description: Direct private key object for response decryption. If this field contains an encrypted string, the responseMlePrivateKeyPassword field must also be provided.

  • Variable: responseMlePrivateKeyPassword
  • Type: String
  • Description: This password is used to decrypt a password-protected key if the value of responseMlePrivateKey is an encrypted String.

(ii) Option 2: Provide Private Key File Path
  • Variable: responseMlePrivateKeyFilePath
  • Type: String
  • Description: Path to the private key file. Supported formats: .p12, .pfx, .pem, .key, .p8. Recommendation use encrypted private Key (password protection) for MLE response.

(iii) Private Key File Password
  • Variable: responseMlePrivateKeyFilePassword
  • Type: String
  • Description: Password for the private key file (required for .p12/.pfx files or encrypted private keys).

2.3 Response MLE Additional Configuration

  • Variable: responseMleKID
  • Type: String
  • Optional: true (when using CyberSource-generated P12 file)
  • Required: true (when using PEM files or private key object)
  • Description: Key ID value for the MLE response certificate (provided in merchant portal).
    • Note: This parameter is optional when responseMlePrivateKeyFilePath points to a CyberSource-generated P12 file. If not provided, the SDK will automatically fetch the Key ID from the P12 file. If provided, the SDK will use the user-provided value instead of the auto-fetched value.
    • Required when using PEM format files (.pem, .key, .p8) or when providing responseMlePrivateKey object directly.


3. API-level MLE Control for Request and Response MLE

Map Configuration

  • Variable: mapToControlMLEonAPI
  • Type: Map<String, String>
  • Description: Overrides global MLE settings for specific APIs. The key is the API function name, and the value controls both request and response MLE.
  • Example: Map<'apiFunctionName', 'true::true'>

Structure of Values in Map:

(i) "requestMLE::responseMLE" - Control both request and response MLE

  • "true::true" - Enable both request and response MLE
  • "false::false" - Disable both request and response MLE
  • "true::false" - Enable request MLE, disable response MLE
  • "false::true" - Disable request MLE, enable response MLE
  • "::true" - Use global setting for request, enable response MLE
  • "true::" - Enable request MLE, use global setting for response
  • "::false" - Use global setting for request, disable response MLE
  • "false::" - Disable request MLE, use global setting for response

(ii) "requestMLE" - Control request MLE only (response uses global setting)

  • "true" - Enable request MLE
  • "false" - Disable request MLE


4. Example Configurations

(i) Minimal Request MLE Configuration

    # Configuration in Hash - Uses defaults (most common scenario)
    merchantCustomConfiguration = {}
    merchantCustomConfiguration['enableRequestMLEForOptionalApisGlobally'] = true

    # Both mleForRequestPublicCertPath and requestMleKeyAlias are optional
    # SDK will use JWT P12 file with default alias "CyberSource_SJC_US"

(ii) Request MLE with Deprecated Parameters (Backward Compatibility)

    # Using deprecated parameters - still supported but not recommended
    merchantCustomConfiguration = {}
    merchantCustomConfiguration['useMLEGlobally'] = true # Deprecated - use enableRequestMLEForOptionalApisGlobally
    merchantCustomConfiguration['mleKeyAlias'] = 'Custom_Key_Alias' # Deprecated - use requestMleKeyAlias

(iii) Request MLE with Custom Key Alias

    # Configuration in Hash - With custom key alias only
    merchantCustomConfiguration = {}
    merchantCustomConfiguration['enableRequestMLEForOptionalApisGlobally'] = true
    merchantCustomConfiguration['requestMleKeyAlias'] = 'Custom_Key_Alias'
    # Will fetch from JWT P12 file using provided custom alias

(iv) Request MLE with Separate Certificate File

    # Configuration in Hash - With separate MLE certificate file
    merchantCustomConfiguration = {}
    merchantCustomConfiguration['enableRequestMLEForOptionalApisGlobally'] = true
    merchantCustomConfiguration['mleForRequestPublicCertPath'] = 'path/to/public/cert.pem'
    merchantCustomConfiguration['requestMleKeyAlias'] = 'Custom_Key_Alias'

    # API-specific control
    mleControlMap = {
      'createPayment' => 'true', # Enable request MLE for this API
      'capturePayment' => 'false' # Disable request MLE for this API
    }
    merchantCustomConfiguration['mapToControlMLEonAPI'] = mleControlMap

(v) Response MLE Configuration with Private Key File

    # Configuration in Hash with CyberSource-generated P12 file
    merchantCustomConfiguration = {}
    merchantCustomConfiguration['enableResponseMleGlobally'] = true
    merchantCustomConfiguration['responseMlePrivateKeyFilePath'] = 'path/to/private/key.p12'
    merchantCustomConfiguration['responseMlePrivateKeyFilePassword'] = 'password'
    # responseMleKID is optional for CyberSource-generated P12 files - SDK will auto-fetch if not provided
    # merchantCustomConfiguration['responseMleKID'] = 'your-key-id' # Optional - overrides auto-fetched value

    # API-specific control
    mleControlMap = {
      'createPayment' => '::true' # Enable response MLE only for this API
    }
    merchantCustomConfiguration['mapToControlMLEonAPI'] = mleControlMap
    # Configuration in Hash with PEM file (responseMleKID is required)
    merchantCustomConfiguration = {}
    merchantCustomConfiguration['enableResponseMleGlobally'] = true
    merchantCustomConfiguration['responseMlePrivateKeyFilePath'] = 'path/to/private/key.pem'
    merchantCustomConfiguration['responseMleKID'] = 'your-key-id' # Required for PEM files

    # API-specific control
    mleControlMap = {
      'createPayment' => '::true' # Enable response MLE only for this API
    }
    merchantCustomConfiguration['mapToControlMLEonAPI'] = mleControlMap

(vi) Response MLE Configuration with Private Key Object

    # Load private key programmatically into configuration in Hash (responseMleKID is required)
    merchantCustomConfiguration = {}
    merchantCustomConfiguration['enableResponseMleGlobally'] = true
    merchantCustomConfiguration['responseMleKID'] = 'your-key-id' # Required when using private key object
    merchantCustomConfiguration['responseMlePrivateKey'] = loadPrivateKeyFromSomewhere();
    # If `responseMlePrivateKey` is NOT an instance of `OpenSSL::PKey`, then uncomment the following line:
    # merchantCustomConfiguration['responseMlePrivateKeyPassword'] = 'password'

(vii) Both Request and Response MLE Configuration

    # Configuration in Hash
    merchantCustomConfiguration = {}

    # Request MLE Settings (minimal - uses default values)
    merchantCustomConfiguration['enableRequestMLEForOptionalApisGlobally'] = true

    # Response MLE Settings (with CyberSource-generated P12 file)
    merchantCustomConfiguration['enableResponseMleGlobally'] = true
    merchantCustomConfiguration['responseMlePrivateKeyFilePath'] = 'path/to/private/key.p12'
    merchantCustomConfiguration['responseMlePrivateKeyFilePassword'] = 'password'
    # responseMleKID is optional for CyberSource-generated P12 files
    # merchantCustomConfiguration['responseMleKID'] = 'your-key-id' # Optional - overrides auto-fetched value

    # API-specific control for both request and response
    mleControlMap = {
      'createPayment' => 'true::true', # Enable both request and response MLE for this API
      'capturePayment' => 'false::true', # Disable request MLE, enable response MLE for this API
      'refundPayment' => 'true::false', # Enable request MLE, disable response MLE for this API
      'createCredit' => '::true' # Use global request settings, enable response MLE for this API
    }
    merchantCustomConfiguration['mapToControlMLEonAPI'] = mleControlMap

(viii) Mixed Configuration (New and Deprecated Parameters)

    # Example showing both new and deprecated parameters (deprecated will be used as aliases)
    merchantCustomConfiguration = {}

    # If both are set with the same value, it works fine
    merchantCustomConfiguration['enableRequestMLEForOptionalApisGlobally'] = true
    merchantCustomConfiguration['useMLEGlobally'] = true # Deprecated but same value

    # If both are set with different values, it will throw an error
    # merchantCustomConfiguration['enableRequestMLEForOptionalApisGlobally'] = true
    # merchantCustomConfiguration['useMLEGlobally'] = false # This would cause an error

    # Key alias - new parameter takes precedence if both are provided
    merchantCustomConfiguration['requestMleKeyAlias'] = 'New_Alias'
    merchantCustomConfiguration['mleKeyAlias'] = 'Old_Alias' # This will be ignored


5. Supported Private Key File Formats

For Response MLE private key files, the following formats are supported:

  • PKCS#12: .p12, .pfx (requires password)
  • PEM: .pem, .key, .p8 (supports both encrypted and unencrypted)


6. Important Notes

(i) Request MLE

  • Both mleForRequestPublicCertPath and requestMleKeyAlias are optional parameters
  • If mleForRequestPublicCertPath is not provided, the SDK will automatically fetch the MLE certificate from the JWT authentication P12 file
  • If requestMleKeyAlias is not provided, the SDK will use the default value CyberSource_SJC_US
  • The SDK provides flexible configuration options: you can use defaults, customize the key alias only, or provide a separate certificate file
  • If enableRequestMLEForOptionalApisGlobally is set to true, it enables request MLE for all APIs that have optional MLE support
  • APIs with mandatory MLE requirements are enabled by default unless disableRequestMLEForMandatoryApisGlobally is set to true
  • If mapToControlMLEonAPI doesn't contain a specific API, the global setting applies
  • For HTTP Signature authentication, request MLE will fall back to non-encrypted requests with a warning

(ii) Response MLE

  • Response MLE requires either responseMlePrivateKey object OR responseMlePrivateKeyFilePath (not both)
  • The responseMleKID parameter behavior:
    • Optional when responseMlePrivateKeyFilePath points to a CyberSource-generated P12 file (SDK auto-fetches from P12)
    • Required when using PEM format files (.pem, .key, .p8)
    • Required when using responseMlePrivateKey object directly
    • When both auto-fetched and user-provided values exist, the user-provided value takes precedence
  • If an API expects a mandatory MLE response but the map specifies non-MLE response, the API might return an error
  • Both the private key object and file path approaches are mutually exclusive

(iii) Backward Compatibility

  • useMLEGlobally is deprecated but still supported as an alias for enableRequestMLEForOptionalApisGlobally
  • mleKeyAlias is deprecated but still supported as an alias for requestMleKeyAlias
  • If both new and deprecated parameters are provided with the same value, it works fine
  • If both new and deprecated parameters are provided with different values, it may throw an error
  • When both new and deprecated parameters are provided, the new parameter takes precedence wherever ambiguity can be avoided

(iv) API-level Control Validation

  • The mapToControlMLEonAPI values are validated for proper format
  • Invalid formats (empty values, multiple separators, non-boolean values) will cause configuration errors
  • Empty string before or after :: separator will use global defaults
  • The map also supports backward compatibility with Map<String, Boolean> format, which will be automatically converted to Map<String, String>

(v) Configuration Validation

  • The SDK performs comprehensive validation of MLE configuration parameters
  • Conflicting values between new and deprecated parameters will result in an error
  • File path validation is performed for certificate and private key files
  • Invalid boolean values in mapToControlMLEonAPI will cause parsing errors


7. Error Handling

The SDK provides specific error messages for common MLE issues:

  • Invalid private key for response decryption
  • Missing certificates for request encryption
  • Invalid file formats or paths
  • Authentication type mismatches
  • Configuration validation errors
  • Conflicting parameter values between new and deprecated fields
  • Invalid format in mapToControlMLEonAPI values


8. Sample Code Repository

For comprehensive examples and sample implementations, please refer to: Cybersource Ruby Sample Code Repository (on GitHub)



9. Additional Information

(i) API Support

  • MLE is designed to support specific APIs that have been enabled for encryption
  • Support can be extended to additional APIs based on requirements and updates

(ii) Using the SDK

To use the MLE feature in the SDK, create a custom configuration as a Ruby Hash as shown above and pass it to the SDK initialization. The SDK will automatically handle encryption and decryption based on your configuration.

(iii) Migration from Deprecated Parameters

If you're currently using deprecated parameters, here's how to migrate:

    # OLD (DEPRECATED)
    merchantCustomConfiguration['useMLEGlobally'] = true
    merchantCustomConfiguration['mleKeyAlias'] = 'Custom_Alias'

    # NEW (RECOMMENDED)
    merchantCustomConfiguration['enableRequestMLEForOptionalApisGlobally'] = true
    merchantCustomConfiguration['requestMleKeyAlias'] = 'Custom_Alias'

The deprecated parameters will continue to work but are not recommended for new implementations.



10. Contact

For any issues or further assistance, please open an issue on the GitHub repository or contact our support team.