Signing API
Calculate Digest
Scope
Provide a signable data value calculation from the signable file by using the end-user signature certificate received.
Description
- Start signing session. If there are problems with the files or the request does not meet the format requirements for the document signing, the process is terminated and an error is returned;
- The hash of each file to be signed are calculated as well as signable data;
- The signature algorithm is determined from certificate;
- The prepared signable data in base64 format is returned to the requester for signature.
Request
The Service provider's application sends the following GET request using TLS:
POST /api-sign/v1.0/CalculateDigest
Authorization
The request must contain an Authorization header with an OAuth Introspect access token obtained via Integration Platform a Service provider's credentials grant flow.
Body
{
"sessions":[
{
"sessionId": "string"
}
],
"certificate": "string",
"signAsPdf": true,
"createNewEdoc": true
}
Property | Description |
---|---|
sessions | Information about file processing sessions |
sessions.sessionId | File processing session identifier. It is possible to specify multiple sessions. |
certificate | Signing certificate in base64 format |
signAsPdf | True - will be signed as PDF (can only be used for signing PDFs and only one PDF file per session). False - will create XAdES signature in ASICE container (EDOC). |
createNewEdoc | True - Always creates new ASICE container (even if signable file is already a ASICE container - ASICE in the ASICE container); False - If existing file is ASICE container, new signature will be added within existing ASICE container. If file is not ASICE, it will be added in ASICE container. |
Example of single session signing
POST /api-sign/v1.0/CalculateDigest HTTP/1.1
Authorization: Bearer a477b3a3366768c07e4c458f518711b4b351e8d2c2f0f78a1524e4d3efd00603
Host: signapi-prep.eparaksts.lv
{
"sessions": [
{
"sessionId": "fefdaec2b14bf2977d32a861fb49545244c654f7a4736dcc081ae1857a3a3dd4"
}
],
"certificate": "MIIG/j.......<sign certificate base64 here>.......xFP/IP==",
"signAsPdf": false,
"createNewEdoc": false
}
Example of batch session signing
POST /api-signing/v1.0/CalculateDigest HTTP/1.1
Authorization: Bearer a477b3a3366768c07e4c458f518711b4b351e8d2c2f0f78a1524e4d3efd00603
Host: signapi-prep.eparaksts.lv
{
"sessions": [
{
"sessionId": "fefdaec2b14bf2977d32a861fb49545244c654f7a4736dcc081ae1857a3a3dd4"
},
{
"sessionId": "fefdaec2b14bf2977d32a861fb49545244c654f7a4736dcc081ae18512121212"
},
{
"sessionId": "fefdaec2b14bf2977d32a861fb49545244c654f7a4736dcc081ae185bbbbbbbb"
}
],
"certificate": "MIIG/j.......<sign certificate base64 here>.......xFP/IP==",
"signAsPdf": false,
"createNewEdoc": false
}
Response
JSON object:
{
"sessionDigests":[
{
"sessionId": "string",
"digest": "string",
"error": {
"code": "string",
"message": "string"
}
}
],
"digests_summary": "string",
"algorithm": "string"
}
Property | Description |
---|---|
sessionDigest | Information about signable data session |
sessionDigest.sessionId | File processing session identifier |
sessionDigest.diggest | Signable data in _base64 _format In case of server signing - received "diggest" property value shall be used (as is, without any reformatting) in Electronic signature provider API when Create a Digital Signature on the Server as "digest_value" property value. In case of signing with Smart Card by using LVRTC provided browser extension integration, then this value shall be converted to HEX. |
sessionDigests.error | Session error if any |
sessionDigests.error.code | Session error code |
sessionDigests.error.message | Session error message |
digests_summary | ⚠️ This parameter must only be used to obtain the authorization from the end-user for generating a digital signature with a server signing identity enabled via password stored on the HSM. ⚠️ It is already precalculated digest summary. In case of server signing - "digests_summary" property value shall be used (as is, without any reformatting) in OAuth2.0 Authorization API when obtaining authorization code for signing operation as "digests_summary" property value. |
algorithm | Algorithm of the digital signature |
signature_algorithm | Public key algorithm of users signing certificate, for use in Identity platform methods /trustedx-resources/esigp/v1/signatures/server/raw/batch and /trustedx-resources/esigp/v1/signatures/server/raw with possible values "rsa" and "ecdsa". In case of "rsa" append "-sha256" (example "rsa-sha256"), in case of "ecdsa" use value as is (example "ecdsa"). |
Example of single session signing
{
"data": {
"sessionDigests": [
{
"sessionId": "a37e460b4c65cb01a01dce5c58149806ca2d20dab22e99905d45128c4e693a90",
"digest": "4xZX5G+R4gTbK2r6RlismZw4EBftvbSDcE3lXfpLMM4="
}
],
"digests_summary": "mnF3XVRWujh/Tsc3oA2HVGl0SI8VNb3pmscMcDhEzDo=",
"algorithm": "SHA256"
}
}
Example of batch session signing
{
"data": {
"sessionDigests": [
{
"sessionId": "fefdaec2b14bf2977d32a861fb49545244c654f7a4736dcc081ae1857a3a3dd4",
"digest": "wRX+DNmDdlDrMK8X/MEdersGZbsgTiSFHi26domxjwA="
},
{
"sessionId": "fefdaec2b14bf2977d32a861fb49545244c654f7a4736dcc081ae18512121212",
"digest": "wRX+DNmDdlDrMK8X/MEdersGZbsgTiSFHi26domxjwA="
},
{
"sessionId": "fefdaec2b14bf2977d32a861fb49545244c654f7a4736dcc081ae185bbbbbbbb",
"digest": "wRX+DNmDdlDrMK8X/MEdersGZbsgTiSFHi26domxjwA="
}
],
"digests_summary": "mnF3XVRWujh/Tsc3oA2HVGl0SI8VNb3pmscMcDhEzDo=",
"algorithm": "SHA256"
}
}
Finalize signing
Scope
Ensure the finalization of the signature or seal (and container in case of ASICE).
Description
- Attaches a signed data to the document;
- Starts LVRTC timestamp request;
- Attach timestamp and the revocation data (for example - OCSP) to the signature;
- In case of successful execution the message "OK" is returned.
Request
The Service provider's application sends the following GET request using TLS:
POST /api-sign/v1.0/finalizeSigning
Authorization
The request must contain an Authorization header with an OAuth Introspect access token obtained via Integration Platform a Service provider's credentials grant flow.
Body
{
"sessionSignatureValues": [
{
"sessionId": "string",
"signatureValue": "string"
}
],
"authCertificate": "string"
}
Property | Description |
---|---|
sessionSignatureValues | Contains details of signed data |
sessionSignatureValues.sessionId | File processing session identifier. It is possible to specify multiple sessions. |
sessionSignatureValues.signatureValue | Signed data in base64 format. If there is specified multiple sessions, then each specified session shall contain its signed data. |
authCertificate | End-user's authentication certificate |
Examples:
Example for single signature
POST /api-sign/v1.0/finalizeSigning HTTP/1.1
Authorization: Bearer a477b3a3366768c07e4c458f518711b4b351e8d2c2f0f78a1524e4d3efd00603
Host: signapi-prep.eparaksts.lv
{
"sessionSignatureValues": [
{
"sessionId": "76fa04d8e5e2451b867af6ae667558395459fb9d082d31dadb9f22222f80a3d2",
"signatureValue": "goU+aIw0sZHRwepWiooOdSb0eDbCZcBymXSgsLmYxCr6I6aZdDiG07vp4bbJMtGGPbTKEh6ZR+7eCmNfC02g/hhlGU4OCr+LFhKFIcYqUW1VGvnEPx4eIJlw43pSIo6k/It16RYyYWG1e2DVy1HuMoZEBScUAAN4tHFiHCiIsPuuzIYnRJtZMVi795dvgkEGxnghvzxp0rF+2eoT/5gMKEcBxRIKKs2gWyFK+UIpiXigk0K8LTSEw4XXKDCMSVJ8Vp08nRm1grE0tjLY6tvUVs61Bh5ylC4d7Nh4gQB5VBJHBcng8lFAfXIokX0hD9eoHBrx/bZ7uN1Co5U8H/HFvw=="
}
],
"authCertificate": "MIIGT....<auth cert base64 here>.......UoKew=="
}
Example for batch signing
POST /api-sign/v1.0/finalizeSigning HTTP/1.1
Authorization: Bearer a477b3a3366768c07e4c458f518711b4b351e8d2c2f0f78a1524e4d3efd00603
Host: signapi-prep.eparaksts.lv
{
"sessionSignatureValues": [
{
"sessionId": "4bf47a3df5020ed537cc6337429db6dcbf7c299ab03474099a0b592190362d06",
"signatureValue": "BJjtf/DjqBOTyFjjFci+HyzSnzhKE/diYpM9uf3HGLeX4VN+KYzwwgTiTnHn67zDMj5Qouu3ldBeIvswmD/wDuwk+XyMaII7iVEg9CpvABhjDINXhtu5Wn/X5DLXQovN6Fd2xDBV1a392XfeBDtWNmWUr5P6ZZ7wfaCGuae1YyFUbfep6nL/CC6iwKUmVMYyvHzr1ZHSpg/NAVvXC73Q3Bv3/XBYgPusuJZ5Sfv1Xv6PkyOMB9iC5307xk2V3+ptnDnKus+qYQioNhdKSmR4r92tQkZbtK/kgPmkwpGO/B0wmI18ldzVS8gv7Fhorxp0sbDzjRpj0DI+UH6yEZn7ew=="
},
{
"sessionId": "967e69ed16f7056dfe430f6292fd0f1dd9c28d87379bb7bcef94021ecc096642",
"signatureValue": "ldH/38RET4fR4nLH5s6/5uzkVbG4GPbsAsL0Wi9fAWWovXaR0ukzdhDnGVNuCQWfulOpEGKyTHvdfqbAKxrGlJ1QKcWvEluqk6bnYqUA/vPOabPpXqWAvhpqf6R507aGCtbsUJ2OoNLyIl3BCP1fqV0uD12bz4x8Geqm2pjB+mj1rbp8kN4og5z4MrPd34Wi0n5JD+pFqd4/UN5ttXB4Px5oZJGw99KvXU8sEDbyxn6qlojn7Z8OAQiwW6+x09degASXKGFHNbLBETbw8K/pUy1eaJDGQDn/+pba7ygCMB4YnK2cl7c7hgvkzQjyYg3PQ5kpwCPiUj4Tt5Zd9u5o5A=="
},
{
"sessionId": "3d87b13595af5094309028b7482df121988f97f4c04873ffd736a4186dd04069",
"signatureValue": "fR3E287+05Gb8bPjqoiy0SGMtbKLGkopMb+AUgpS872bJ6qctEmpmZ5ZcsQ5j6HjmsZG34qg7Cvj/AuviOEK8XPDrlFtGeHeq5Lb5Kjv7FJbDqoAP+DrRLmtt49/g9tSEbplZAiLiRCQg6uHpMr3gP7Jv6YWsQINArkAB7Gkpy/0eA5egaabxmP78iz8Y74XGl2eBbkUmJCXyOPUTsPmkJZuzVMVIG5GFBoDz32AVUC0S2J5jOW8WUu/JPIeD/UqAE7Rs4c0jKz6PnjbZLFKRE/qk2j2PCjzgd6kKNkNgPCA1mXXTPAd95Rq0FK25ZeHfZW93AaHDV1OFq85J6kMdA=="
}
],
"authCertificate": "MIIGT......<auth cert base64 here>........UoKew=="
}
Response
JSON object:
{
"data": {
"results": [
{
"sessionId": "string"
}
]
}
}
Property | Type | Description |
---|---|---|
sessionId | String (64) | File processing session identifier. |
Example for single signature
{
"data": {
"results": [
{
"sessionId": "2ddec3e17a456417f48b044d71d2db2a31d00b62baea3de1211617e856f0f19d"
}
]
}
}
Example for batch signing
{
"data": {
"results": [
{
"sessionId": "4bf47a3df5020ed537cc6337429db6dcbf7c299ab03474099a0b592190362d06"
},
{
"sessionId": "967e69ed16f7056dfe430f6292fd0f1dd9c28d87379bb7bcef94021ecc096642"
},
{
"sessionId": "3d87b13595af5094309028b7482df121988f97f4c04873ffd736a4186dd04069"
}
]
}
}
Archive Time stamp request
Scope
Provide a archive time stamp to already signed document.
Description
1.Requests time stamp with using client authentication certificate;
2.Received archive time stamp is added to signature with "ARCHIVE_TIMESTAMP" type;
3.In case of successful execution the session unique identifier is returned.
Request
The Service provider's application sends the following POST request using TLS:
POST /api-sign/v1.0/addArchive
Authorization
The request must contain an Authorization header with an OAuth Introspect access token obtained via Integration Platform a Service provider's credentials grant flow.
Body
{
"sessions": [
{
"sessionId": "{String}"
}
],
"authCertificate": "{String}"
}
Property | Description |
---|---|
sessionId | File processing session identifier |
authCertificate | End-user's authentication certificate |
Example
POST /api-sign/v1.0/addArchive HTTP/1.1
Authorization: Bearer a477b3a3366768c07e4c458f518711b4b351e8d2c2f0f78a1524e4d3efd00603
Host: signapi-prep.eparaksts.lv
{
"sessions": [
{
"sessionId": "26ae33853f7df73eaa84346a04a188db1614305aee43de0da667c67a4d371490"
}
],
"authCertificate": "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"
}
Response
JSON object:
{
"data": {
"results": [
{
"sessionId": {String}
}
]
}
}
Property | Description |
---|---|
sessionId | File processing session identifier |
Example
{
"data": {
"results": [
{
"sessionId": "26ae33853f7df73eaa84346a04a188db1614305aee43de0da667c67a4d371490"
}
]
}
}
eSeal creation
Scope
Puts organization’s electronic seal on a file.
Description
Creates electronic seal signature using organization’s electronic seal certificate, timestamp using authentication certificate and the revocation data (for example - OCSP).
Request
The Service provider's application sends the following POST request using TLS:
POST /api-sign/v1.0/eSealCreate
Authorization
The request must contain an Authorization header with an OAuth Introspect access token obtained via Integration Platform a Service provider's credentials grant flow.
Body
{
"sessions": [
{
"sessionId": "string"
}
],
"signAsPdf": false,
"createNewEdoc": false,
"signKey": "string",
"signKeyPassword": "string",
"authCertificate": "string"
}
sessionId | File processing session identifier Multiple sessions can be sealed at once |
signAsPdf | True - will be signed as PDF False - will cerate XAdES signature in ASICE container (EDOC). |
createNewEdoc | True - Always creates new ASICE container (even if signable file is already a ASICE container - ASICE in the ASICE container); False - If existing file is ASICE container, new signature will be added within existing ASICE container. |
signKey | eSeal certificate key in PFX file format encoded in base64. |
signKeyPassword | eSeal certificate key password encrypted with API central authentication certificate (issued by LVRTC) public key encoded in base64 ⚠️ RSA Encryption with SHA1 padding New production API (signapi.eparaksts.lv) central authentication certificate public key is available below. (VALID FROM 05.01.2024 00:00 GMT+2) ⚠️ Current public key can also be obtained using Configuration API method GET /api-config/v1.0/public/key |
authCertificate | Authentication certificate related to eSeal for Timestamp request in PEM format |
Key shall be provided in "pfx" format
New production API (signapi.eparaksts.lv) central authentication certificate public key is available below. (VALID FROM 05.01.2024 00:00 GMT+2)
-----BEGIN PUBLIC KEY----- MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAwtU0hglHMxwBTNQqymiv unJJGUprC7e3cHsDEKuXB32WwgZtPvFojbWIEDApOpZYL8f9JIPkzyeQnTiLnMf+ T86UiGAzRYTBd8tqaKINIXFHv+OqVvOTcBIm8UCc7vWChMdw7nm9A/LfHtPrtmPf d8qZqHaP73wqcPMeGRe930DnjRYgzp/y3fuuaZjIJOGU7cICO1wietMXEVfmqkF2 FBhyfj16CMeOuAKCYA9VGGIEwJBuJmS2eqUc7t8/IHohdb61D1U9UVwRaNDB6R9r UL2BW2S1LgoNEaKZMwckdd9NhO1R8Psvicx5R/liRZBIVTMAWKW3JDre8vaVMc5C wwIDAQAB -----END PUBLIC KEY-----
Encription
byte[] signKeyPasswordBytes = Encoding.UTF8.GetBytes(req.SignKeyPassword);
byte[] signKeyPasswordBytesEncrypted = publicKey.Encrypt(signKeyPasswordBytes, RSAEncryptionPadding.Pkcs1);
req.SignKeyPassword = Convert.ToBase64String(signKeyPasswordBytesEncrypted);
Example
POST /api-sign/v1.0/eSealCreate HTTP/1.1
Authorization: Bearer a477b3a3366768c07e4c458f518711b4b351e8d2c2f0f78a1524e4d3efd00603
Host: signapi-prep.eparaksts.lv
{
"sessions": [
{
"sessionId": "702e9106e3fe2987d04a0bf7d585050477c1c0dce4d5b76fafc1178b537bc891"
}
],
"signAsPdf": false,
"createNewEdoc": false,
"signKey": "gbfb43564/70OeyYmqoLJ+YAU1kl+vwGVHT0L+ywky80EO8qx/kMZ7hq1Rm9p/SjzexaS0lIH4yf0OJ74BdZCRGaeBfjZWHiQxBdQSXyeuCqDgawbcOjNMjQeLUK5s4a6T17WXjsPTqPulu8mdyhV+tPhwUE/UdtOcSrJeY+ZkGMsn1i+YcNk1cg12+A/zQZ8lWach7M7Fj7gYhNaHiNW5JUREJKGgVKU4rSEE1T2LosJ9H/b+I3Fj0AVR3Cw57W+VSxn8bXqQG8kq+MWdeomaprRvFQoSwY+MFUedqXgVNOioO8lARJNcd2duMLiy4PKEheqq6rZFftSlYulv+o9nPsbZXMO7H",
"signKeyPassword": "6hCV2AEjVdTWDw5EEurDANBgkqhkiG9w0BAQsFADCBgzELMAkGA1UEBhM",
"authCertificate": "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"}
Response
JSON object:
{
"results": "string"[
{
"sessionId": "string",
"error": {
"code": "string",
"message": "string"
}
}
]
}
Property | Description |
---|---|
results | Signing results: success if error == null or omitted |
results.sessionId | File processing session identifier |
results.error | Session error if any |
results.error.code | Session error code |
results.error.message | Session error message |
Example
{
"data": {
"results": [
{
"sessionId": "76fa04d8e5e2451b867af6ae667558395459fb9d082d31dadb9f22222f80a3d2"
}
]
}
}
Updated about 2 months ago