Signing API
Calculate Digest
Scope
Provide a signable data value calculation from the signable file by using the end-user signature certificate received.
Description
1. Start signing session. If there are problems with the files or the request does not meet the format requirements for the document signing, the process is terminated and an error is returned;
2. The hash of each file to be signed are calculated as well as signable data;
3. The signature algorithm is determined from certificate;
4. The prepared signable data in base64 format is returned to the requester for signature.
Request
The Service provider's application sends the following GET request using TLS:
POST /api-sign/v1.0/CalculateDigest
Authorization
The request must contain an Authorization header with an OAuth Introspect access token obtained via Integration Platform a Service provider's credentials grant flow.
Body
{ "sessions":[ { "sessionId": "string" } ], "certificate": "string", "signAsPdf": true, "createNewEdoc": true }
Property | Description |
---|---|
sessions | Information about file processing sessions |
sessions.sessionId | File processing session identifier. It is possible to specify multiple sessions. |
certificate | Signing certificate in base64 format |
signAsPdf | True - will be signed as PDF (can only be used for signing PDFs and only one PDF file per session). In this case, the propery "createNewEdoc" will be ignored.False - will create XAdES signature in ASICE container (EDOC). |
createNewEdoc |
False - If existing file is ASICE container, new signature will be added within existing ASICE container. If file is not ASICE, it will be added in ASICE container. |
Example of single session signing
POST /api-sign/v1.0/CalculateDigest HTTP/1.1 Authorization: Bearer a477b3a3366768c07e4c458f518711b4b351e8d2c2f0f78a1524e4d3efd00603 Host: signapi-prep.eparaksts.lv { "sessions": [ { "sessionId": "fefdaec2b14bf2977d32a861fb49545244c654f7a4736dcc081ae1857a3a3dd4" } ], "certificate": "MIIG/j.......<sign certificate base64 here>.......xFP/IP==", "signAsPdf": false, "createNewEdoc": false }
Example of batch session signing
POST /api-sign/v1.0/CalculateDigest HTTP/1.1 Authorization: Bearer a477b3a3366768c07e4c458f518711b4b351e8d2c2f0f78a1524e4d3efd00603 Host: signapi-prep.eparaksts.lv { "sessions": [ { "sessionId": "fefdaec2b14bf2977d32a861fb49545244c654f7a4736dcc081ae1857a3a3dd4" }, { "sessionId": "fefdaec2b14bf2977d32a861fb49545244c654f7a4736dcc081ae18512121212" }, { "sessionId": "fefdaec2b14bf2977d32a861fb49545244c654f7a4736dcc081ae185bbbbbbbb" } ], "certificate": "MIIG/j.......<sign certificate base64 here>.......xFP/IP==", "signAsPdf": false, "createNewEdoc": false }
Response
JSON object:
{ "sessionDigests":[ { "sessionId": "string", "digest": "string", "error": { "code": "string", "message": "string" } } ], "digests_summary": "string", "algorithm": "string" }
Property | Description |
---|---|
sessionDigest | Information about signable data session |
sessionDigest.sessionId | File processing session identifier |
sessionDigest.diggest | Signable data in base64 format In case of server signing - received " In case of signing with Smart Card by using LVRTC provided browser extension integration, then this value shall be converted to HEX. |
sessionDigests.error | Session error if any |
sessionDigests.error.code | Session error code |
sessionDigests.error.message | Session error message |
digests_summary |
It is already precalculated digest summary. In case of server signing - " |
algorithm | Algorithm of the digital signature |
Example of single session signing
{ "data": { "sessionDigests": [ { "sessionId": "a37e460b4c65cb01a01dce5c58149806ca2d20dab22e99905d45128c4e693a90", "digest": "4xZX5G+R4gTbK2r6RlismZw4EBftvbSDcE3lXfpLMM4=" } ], "digests_summary": "mnF3XVRWujh/Tsc3oA2HVGl0SI8VNb3pmscMcDhEzDo=", "algorithm": "SHA256" } }
Example of batch session signing
{ "data": { "sessionDigests": [ { "sessionId": "fefdaec2b14bf2977d32a861fb49545244c654f7a4736dcc081ae1857a3a3dd4", "digest": "wRX+DNmDdlDrMK8X/MEdersGZbsgTiSFHi26domxjwA=" }, { "sessionId": "fefdaec2b14bf2977d32a861fb49545244c654f7a4736dcc081ae18512121212", "digest": "wRX+DNmDdlDrMK8X/MEdersGZbsgTiSFHi26domxjwA=" }, { "sessionId": "fefdaec2b14bf2977d32a861fb49545244c654f7a4736dcc081ae185bbbbbbbb", "digest": "wRX+DNmDdlDrMK8X/MEdersGZbsgTiSFHi26domxjwA=" } ], "digests_summary": "mnF3XVRWujh/Tsc3oA2HVGl0SI8VNb3pmscMcDhEzDo=", "algorithm": "SHA256" } }
Finalize signing
Scope
Ensure the finalization of the signature or seal (and container in case of ASICE).
Description
1. Attaches a signed data to the document;
2. Starts LVRTC timestamp request;
3. Attach timestamp and the revocation data (for example - OCSP) to the signature;
4. In case of successful execution the message "OK" is returned.
Request
The Service provider's application sends the following GET request using TLS:
POST /api-sign/v1.0/finalizeSigning
Authorization
The request must contain an Authorization header with an OAuth Introspect access token obtained via Integration Platform a Service provider's credentials grant flow.
Body
{ "sessionSignatureValues": [ { "sessionId": "string", "signatureValue": "string" } ], "authCertificate": "string" }
Property | Description |
---|---|
sessionSignatureValues | Contains details of signed data |
sessionSignatureValues.sessionId | File processing session identifier. It is possible to specify multiple sessions. |
sessionSignatureValues.signatureValue | Signed data in base64 format. If there is specified multiple sessions, then each specified session shall contain its signed data. |
authCertificate | End-user's authentication certificate |
Examples
POST /api-sign/v1.0/finalizeSigning HTTP/1.1 Authorization: Bearer a477b3a3366768c07e4c458f518711b4b351e8d2c2f0f78a1524e4d3efd00603 Host: signapi-prep.eparaksts.lv { "sessionSignatureValues": [ { "sessionId": "76fa04d8e5e2451b867af6ae667558395459fb9d082d31dadb9f22222f80a3d2", "signatureValue": "goU+aIw0sZHRwepWiooOdSb0eDbCZcBymXSgsLmYxCr6I6aZdDiG07vp4bbJMtGGPbTKEh6ZR+7eCmNfC02g/hhlGU4OCr+LFhKFIcYqUW1VGvnEPx4eIJlw43pSIo6k/It16RYyYWG1e2DVy1HuMoZEBScUAAN4tHFiHCiIsPuuzIYnRJtZMVi795dvgkEGxnghvzxp0rF+2eoT/5gMKEcBxRIKKs2gWyFK+UIpiXigk0K8LTSEw4XXKDCMSVJ8Vp08nRm1grE0tjLY6tvUVs61Bh5ylC4d7Nh4gQB5VBJHBcng8lFAfXIokX0hD9eoHBrx/bZ7uN1Co5U8H/HFvw==" } ], "authCertificate": "MIIGT....<auth cert base64 here>.......UoKew==" }
POST /api-sign/v1.0/finalizeSigning HTTP/1.1 Authorization: Bearer a477b3a3366768c07e4c458f518711b4b351e8d2c2f0f78a1524e4d3efd00603 Host: signapi-prep.eparaksts.lv { "sessionSignatureValues": [ { "sessionId": "4bf47a3df5020ed537cc6337429db6dcbf7c299ab03474099a0b592190362d06", "signatureValue": "BJjtf/DjqBOTyFjjFci+HyzSnzhKE/diYpM9uf3HGLeX4VN+KYzwwgTiTnHn67zDMj5Qouu3ldBeIvswmD/wDuwk+XyMaII7iVEg9CpvABhjDINXhtu5Wn/X5DLXQovN6Fd2xDBV1a392XfeBDtWNmWUr5P6ZZ7wfaCGuae1YyFUbfep6nL/CC6iwKUmVMYyvHzr1ZHSpg/NAVvXC73Q3Bv3/XBYgPusuJZ5Sfv1Xv6PkyOMB9iC5307xk2V3+ptnDnKus+qYQioNhdKSmR4r92tQkZbtK/kgPmkwpGO/B0wmI18ldzVS8gv7Fhorxp0sbDzjRpj0DI+UH6yEZn7ew==" }, { "sessionId": "967e69ed16f7056dfe430f6292fd0f1dd9c28d87379bb7bcef94021ecc096642", "signatureValue": "ldH/38RET4fR4nLH5s6/5uzkVbG4GPbsAsL0Wi9fAWWovXaR0ukzdhDnGVNuCQWfulOpEGKyTHvdfqbAKxrGlJ1QKcWvEluqk6bnYqUA/vPOabPpXqWAvhpqf6R507aGCtbsUJ2OoNLyIl3BCP1fqV0uD12bz4x8Geqm2pjB+mj1rbp8kN4og5z4MrPd34Wi0n5JD+pFqd4/UN5ttXB4Px5oZJGw99KvXU8sEDbyxn6qlojn7Z8OAQiwW6+x09degASXKGFHNbLBETbw8K/pUy1eaJDGQDn/+pba7ygCMB4YnK2cl7c7hgvkzQjyYg3PQ5kpwCPiUj4Tt5Zd9u5o5A==" }, { "sessionId": "3d87b13595af5094309028b7482df121988f97f4c04873ffd736a4186dd04069", "signatureValue": "fR3E287+05Gb8bPjqoiy0SGMtbKLGkopMb+AUgpS872bJ6qctEmpmZ5ZcsQ5j6HjmsZG34qg7Cvj/AuviOEK8XPDrlFtGeHeq5Lb5Kjv7FJbDqoAP+DrRLmtt49/g9tSEbplZAiLiRCQg6uHpMr3gP7Jv6YWsQINArkAB7Gkpy/0eA5egaabxmP78iz8Y74XGl2eBbkUmJCXyOPUTsPmkJZuzVMVIG5GFBoDz32AVUC0S2J5jOW8WUu/JPIeD/UqAE7Rs4c0jKz6PnjbZLFKRE/qk2j2PCjzgd6kKNkNgPCA1mXXTPAd95Rq0FK25ZeHfZW93AaHDV1OFq85J6kMdA==" } ], "authCertificate": "MIIGT......<auth cert base64 here>........UoKew==" }
Response
JSON object:
{ "data": { "results": [ { "sessionId": "string" } ] } }
Property | Type | Description |
---|---|---|
sessionId | String (64) | File processing session identifier. |
Example for single signature
{ "data": { "results": [ { "sessionId": "2ddec3e17a456417f48b044d71d2db2a31d00b62baea3de1211617e856f0f19d" } ] } }
Example for batch signing
{ "data": { "results": [ { "sessionId": "4bf47a3df5020ed537cc6337429db6dcbf7c299ab03474099a0b592190362d06" }, { "sessionId": "967e69ed16f7056dfe430f6292fd0f1dd9c28d87379bb7bcef94021ecc096642" }, { "sessionId": "3d87b13595af5094309028b7482df121988f97f4c04873ffd736a4186dd04069" } ] } }
Archive Time stamp request
Scope
Provide a archive time stamp to already signed document.
Description
- Requests time stamp with using client authentication certificate;
- Received archive time stamp is added to signature with "ARCHIVE_TIMESTAMP" type;
- In case of successful execution the session unique identifier is returned.
Request
The Service provider's application sends the following POST request using TLS:
POST /api-sign/v1.0/addArchive
Authorization
The request must contain an Authorization header with an OAuth Introspect access token obtained via Integration Platform a Service provider's credentials grant flow.
Body
{ "sessions": [ { "sessionId": "{String}" } ], "authCertificate": "{String}" }
Property | Description |
---|---|
sessionId | File processing session identifier |
authCertificate | End-user's authentication certificate |
Example
POST /api-sign/v1.0/addArchive HTTP/1.1 Authorization: Bearer a477b3a3366768c07e4c458f518711b4b351e8d2c2f0f78a1524e4d3efd00603 Host: signapi-prep.eparaksts.lv { "sessions": [ { "sessionId": "26ae33853f7df73eaa84346a04a188db1614305aee43de0da667c67a4d371490" } ], "authCertificate": "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" }
Response
JSON object:
{ "data": { "results": [ { "sessionId": {String} } ] } }
Property | Description |
---|---|
sessionId | File processing session identifier |
Example
{ "data": { "results": [ { "sessionId": "26ae33853f7df73eaa84346a04a188db1614305aee43de0da667c67a4d371490" } ] } }
eSeal creation
Scope
Puts organization’s electronic seal on a file.
Description
Creates electronic seal signature using organization’s electronic seal certificate, timestamp using authentication certificate and the revocation data (for example - OCSP).
Request
The Service provider's application sends the following POST request using TLS:
POST /api-sign/v1.0/eSealCreate
Authorization
The request must contain an Authorization header with an OAuth Introspect access token obtained via Integration Platform a Service provider's credentials grant flow.
Body
{ "sessions": [ { "sessionId": "string" } ], "signAsPdf": false, "createNewEdoc": false, "signKey": "string", "signKeyPassword": "string", "authCertificate": "string" }
Property | Description |
---|---|
sessionId | File processing session identifier Multiple sessions can be sealed at once |
signAsPdf |
|
createNewEdoc |
False - If existing file is ASICE container, new signature will be added within existing ASICE container. |
signKey | eSeal certificate key in PFX file format encoded in base64. |
signKeyPassword | eSeal certificate key password encrypted with API central authentication certificate (issued by LVRTC) public key encoded in base64 RSA Encryption with SHA1 padding Production API (signapi.eparaksts.lv) central authentication certificate public key is available here. (VALID FROM 17.01.2022 00:00 GMT+2) |
authCertificate | Authentication certificate related to eSeal for Timestamp request in PEM format |
Key shall be provided in "pfx" format
Encription
byte[] signKeyPasswordBytes = Encoding.UTF8.GetBytes(req.SignKeyPassword); byte[] signKeyPasswordBytesEncrypted = publicKey.Encrypt(signKeyPasswordBytes, RSAEncryptionPadding.Pkcs1); req.SignKeyPassword = Convert.ToBase64String(signKeyPasswordBytesEncrypted);
Example
POST /api-sign/v1.0/eSealCreate HTTP/1.1 Authorization: Bearer a477b3a3366768c07e4c458f518711b4b351e8d2c2f0f78a1524e4d3efd00603 Host: signapi-prep.eparaksts.lv { "sessions": [ { "sessionId": "702e9106e3fe2987d04a0bf7d585050477c1c0dce4d5b76fafc1178b537bc891" } ], "signAsPdf": false, "createNewEdoc": false, "signKey": "gbfb43564/70OeyYmqoLJ+YAU1kl+vwGVHT0L+ywky80EO8qx/kMZ7hq1Rm9p/SjzexaS0lIH4yf0OJ74BdZCRGaeBfjZWHiQxBdQSXyeuCqDgawbcOjNMjQeLUK5s4a6T17WXjsPTqPulu8mdyhV+tPhwUE/UdtOcSrJeY+ZkGMsn1i+YcNk1cg12+A/zQZ8lWach7M7Fj7gYhNaHiNW5JUREJKGgVKU4rSEE1T2LosJ9H/b+I3Fj0AVR3Cw57W+VSxn8bXqQG8kq+MWdeomaprRvFQoSwY+MFUedqXgVNOioO8lARJNcd2duMLiy4PKEheqq6rZFftSlYulv+o9nPsbZXMO7H", "signKeyPassword": "6hCV2AEjVdTWDw5EEurDANBgkqhkiG9w0BAQsFADCBgzELMAkGA1UEBhM", "authCertificate": "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"}
Response
JSON object:
{ "results": "string"[ { "sessionId": "string", "error": { "code": "string", "message": "string" } } ] }
Property | Description |
---|---|
results | Signing results: success if error == null or omitted |
results.sessionId | File processing session identifier |
results.error | Session error if any |
results.error.code | Session error code |
results.error.message | Session error message |
Example
{ "data": { "results": [ { "sessionId": "76fa04d8e5e2451b867af6ae667558395459fb9d082d31dadb9f22222f80a3d2" } ] } }