Skip to content
This repository was archived by the owner on Nov 28, 2025. It is now read-only.
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 3 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ Web eID only works over a HTTPS connection with a trusted HTTPS certificate.
You can either setup a reverse HTTPS proxy during development or, alternatively, configure
HTTPS support directly in the bundled web server. HTTPS configuration is described in more detail in section _[HTTPS support](#https-support)_ below.

You can use, for example, [_ngrok_](https://ngrok.com/) or [_localtunnel_](https://theboroer.github.io/localtunnel-www/) to get a reverse HTTPS proxy. Download _ngrok_ and run it in a terminal window by providing the protocol and Spring Boot application port arguments as follows:
You can use solutions like [_ngrok_](https://ngrok.com/), [_localtunnel_](https://theboroer.github.io/localtunnel-www/), or any other reverse HTTPS proxy tool. For example, with _ngrok_, download and run it in a terminal window by providing the protocol and the Spring Boot application port arguments as follows:

ngrok http 8080

Expand All @@ -33,6 +33,8 @@ web-eid-auth-token:
local-origin: "https://<<NGROK HOSTNAME HERE>>"
```

**Note that the origin URL must not end with a slash `/`**.

### 3. Configure the trusted certificate authority certificates

The algorithm, which performs the validation of the Web eID authentication token, needs to know which intermediate certificate authorities (CA) are trusted to issue the eID authentication certificates. CA certificates are loaded either from `.cer` files in the profile-specific subdirectory of the [`certs` resource directory](src/main/resources/certs) or the [truststore file](src/main/resources/certs/prod/trusted_certificates.jks). By default, Estonian eID test CA certificates are included in the `dev` profile and production CA certificates in the `prod` profile.
Expand Down
8 changes: 4 additions & 4 deletions pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -5,12 +5,12 @@
<parent>
<groupId>org.springframework.boot</groupId>
<artifactId>spring-boot-starter-parent</artifactId>
<version>3.2.4</version>
<version>3.3.0</version>
<relativePath/> <!-- lookup parent from repository -->
</parent>
<groupId>eu.webeid.example</groupId>
<artifactId>web-eid-springboot-example</artifactId>
<version>3.0.0-SNAPSHOT</version>
<version>3.1.0</version>
<name>web-eid-springboot-example</name>
<description>Example Spring Boot application that demonstrates how to use Web eID for authentication and digital
signing
Expand All @@ -19,7 +19,7 @@
<properties>
<java.version>17</java.version>
<maven-surefire-plugin.version>3.2.5</maven-surefire-plugin.version>
<webeid.version>3.0.2-SNAPSHOT</webeid.version>
<webeid.version>3.1.0</webeid.version>
<digidoc4j.version>5.3.0</digidoc4j.version>
<jmockit.version>1.44</jmockit.version>
<jib.version>3.4.2</jib.version>
Expand All @@ -45,7 +45,7 @@
<version>${digidoc4j.version}</version>
</dependency>
<dependency>
<groupId>org.webeid.security</groupId>
<groupId>eu.webeid.security</groupId>
<artifactId>authtoken-validation</artifactId>
<version>${webeid.version}</version>
</dependency>
Expand Down