Skip to content

telia-oss/tunnistus

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

81 Commits
 
 
 
 

Repository files navigation

Telia Tunnistus Pre-Production

Table of Contents


1 Endpoints

1.1 OpenID Connect Metadata

1.2 Keys

1.3 OAuth2 Endpoints

1.4 SAML Metadata

2 Integration Document

This guide provides instructions for integrating with the Telia Identification Broker Pre-Production Service, enabling strong electronic identification for test users. The service supports both OpenID Connect (OIDC) and Security Assertion Markup Language (SAML) protocols, offering secure authentication in compliance with Finnish regulations. It is intended for technical architects and developers seeking to connect their services to the Identification Broker Service.

📥 Telia Tunnistus Integration Guide To Identification Broker Service (PDF)

3 Regulatory Compliance Requirements for Strong Electronic Identification (Finland)

Below are official documents and directives related to electronic identification and trust services in Finland, provided by the Finnish Transport and Communications Agency (Traficom) and the National Cyber Security Centre (NCSC-FI).

3.1 General Information

3.2 Official Announcements

3.3 Regulation 72B: Identification and Trust Services

3.4 Technical Profiles

3.4.1 OpenID Connect (OIDC)

3.4.2 SAML

Note: The interface descriptions are available in English only to ensure wide use and prevent interpretation differences.

4 Tunnistus Python Sample Application

Sample application integration with Python: https://github.com/telia-oss/tunnistus-python-sample

5 Questions and Answers on the Traficom announcement to e-services

Q: How do I know if this applies to me?
A: If your service relies on Finnish strong electronic identification methods — such as online banking credentials or the Mobile ID (Mobiilivarmenne) — then this applies to you.

Q: How do I get started?
A: Begin by reading Chapter 2 of the "Telia Tunnistus – Integration Guide to the Identification Broker Service" (version 2.29 or later).

Q: I only have one key pair. Can I still test signed requests?
A: Yes, you can use the same key pair for both signing and encryption. In that case, do not specify the key usage as 'sig' or 'enc'; omit the parameter entirely.
However, for a more secure and scalable setup, it's recommended to use separate key pairs for signing and encryption.

Q: I already have an OIDC integration with Telia Tunnistus. How can I test signed requests?
A: If your OIDC integration is based on public keys, signed requests are already supported. You can begin testing right away.

Q: Does this apply to SAML integrations?
A: This requirement applies only to OIDC integrations, not to SAML-based connections.

Q: How do I know whether my integration uses signed requests?
A: Your authentication request should be structured like this:
https://tunnistus-pp.telia.fi/uas/oauth2/authorization?request=eyJhbGciOiJSUzI1NiIsImtp...
You can inspect this using your browser's developer tools. The only parameter must be "request", nothing else.
If the request contains other parameters, they are ignored, and only the parameters included in the signed request object are processed.

Q: Will you retrieve the JWKS URI daily or weekly to detect rotated keys, or should we use static keys for this integration?
A: If automation is used, see the document Telia Tunnistus Integration Guide chapter 2.1 about Entity Statement. In the Finnish FTN integration case, the JWKS must be signed if keys are updated automatically. This requirement is mandated by Traficom. Signed JWKS can be provided using the OpenID Federation specification, either by sending an Entity Statement securely to Telia Tunnistus or by publishing a Federation endpoint.

Q: Do you expect both signing keys?
A: We recommend to user separate signing ("use": "sig") and encryption ("use": "enc") keys. This is the more future-proof approach. We sign the ID token with our signing key and encrypt it using your encryption key, so you must have the corresponding private key to decrypt it. While it is possible to use a single key without the "use" parameter, the recommended setup is to use separate keys for signing and encryption.

Q: Do the keys require additional certificate metadata, or is the key material itself sufficient?
A: Just the key material is sufficient. Public key information is provided in JSON Web Key (JWK) format. The key data is Base64-encoded without padding (= characters), and is included within a JSON object according to the key type. The keys must use the RSA algorithm with a minimum key length of 2048 bits.

Sample data:

{
 "keys": [
 {
 "e": "AQAB",
 "kid": "34567947-2167-4a9c-8368-b199fe63b6e2",
 "kty": "RSA",
 "n": 
"yas1HSwbF85dr4YpMOlcupdZY4SEBPrCZMp5w6F9IxWewmhQSsa1fGa2t3_CKl0LgIM1nbJd1fr5CQKN_Hpb0u7H5N3Not4akhNqcZHGNI7xrwOn
OOIifwgQb2SF3J7xtKJJ0s8igQ5gxNm5rJyaeeJFxoR3tZC9lMbBpHdOiH7HXz3OOZIDbFm5da-i2u91T22UJgHBIZmXzl_7L3ZpIenSECRD9M3fuj9aVCNf3zKo67UuqaPdueRj_ywGqk94Iwr-FnmZ9NKpZe067VK4s2h-CufkGCAhKu9WVgSIHzSzIzCbLSfTXgMCpJyC4dw7TBzlvHOI3BgMjqrUqb3kkw",
 "use": "sig"
 },
 {
 "e": "AQAB",
 "kid": "ae29278f-87be-4914-bcfc-bdb659e8fe1d",
 "kty": "RSA",
 "n": "wDYW8Y_uZI9F9Qy0WrwYE6xkxEF8k4PTMUgl-ul3J7Lw-v9VuZtH2aSoX3LgTH_qpCGRIUZy7OPDYYXGV1phrVHs7-
NpevO4aXdTZOwUvjViFbTXO3RkTdh4f0d_YpA6RC2owI41BhE_FmShmPKNGskpyTNAp1E_eH1e_w4FM2g_sbwlDJQ1ckJSyXkDoGrW7Dbx34zlrQg
UgHdKtepSCX_b3WWLKD3KW7W3lmoeSpI9iLmPLJMiYHlBcd70dCBBQW24n2bSk1BLwiNVETWPfsNnFWA2t19Jl0u3vCHNCCdKi0WORtI-JiaXQSmPW9ZD2kiZUwYwRi8Cg6Z9a85ngQ",
 "use": "enc"
 }
 ]
}

6 Questions and Answers on Telia Tunnistus key rotation

Q: How do I know if this applies to me?
A: This applies to all integrations with Telia Tunnistus. Some integrations have already implemented automated key management. In that case no action is required. Otherwise you need to manually update the new keys to your service.

Q: What is the plan?
A: The plan is to rotate Telia Tunnistus OIDC and SAML keys. See the time table below:

ENV DATE NAME ACTION
PRE-PROD 12.1.2026 tunnistus-pp.telia.fi OIDC and SAML keys publication
PRE-PROD 9.2.2026 tunnistus-pp.telia.fi OIDC and SAML keys deployment
PROD 23.2.2026 tunnistus.telia.fi OIDC and SAML keys publication
PROD 20.4.2026 tunnistus.telia.fi OIDC and SAML keys deployment

About

Telia Tunnistus / Telia ID Broker

Resources

Stars

Watchers

Forks

Releases

No releases published