Skip to content

Application Provider Client Integration

This chapter describes how an Application Provider (AP) integrates its backend with the Swisscom Mobile ID signature service. It covers the necessary preconditions, endpoint configuration, and use of mutual TLS authentication.

Preconditions

Before using the Swisscom Mobile ID web service, some initial provisioning steps are required.

  1. The Mobile ID customer (your company) has an agreement with Swisscom:

    • Connectivity (Internet or LAN‑I) between the AP and Mobile ID has been established.
      • The AP’s public source IP address (or range) must be whitelisted in the Swisscom Firewall.
    • The customer has delivered the X.509 client certificate to Swisscom (see Create X509 Client Certificates).
  2. The Mobile ID customer receives from Swisscom:

    • An AP_ID (Application Provider Identifier) value.
    • A DataToBeDisplayed (DTBD) Prefix value:
      • The DTBD Prefix is an AP‑specific keyword that must be included as a prefix in every Mobile ID request text message sent to a Mobile ID user (the message displayed on the user’s mobile phone).
      • Example: "Bank ACME: "

Endpoint Address

The Swisscom Mobile ID web service is accessible through LAN-I or Internet. If not otherwise specified use the following default access details.

EnvironmentURL
Internethttps://mobileid.swisscom.com
Swisscom LAN‑Ihttps://195.65.233.218

Overview Access

interconnection-backend

INFO

For accessing the service endpoints the Mobile ID customer can choose between SOAP or RESTful endpoints.

SOAP Endpoint

A description of this interface is available as a WSDL file on GitHub: mobileid.yaml

Endpoints

Endpoint URLDescriptionReference Section
<Base‑URL>/soap/services/MSS_SignaturePortMSS SignatureSection 3.2
<Base‑URL>/soap/services/MSS_StatusQueryPortMSS Status QuerySection 0
<Base‑URL>/soap/services/MSS_ReceiptPortMSS ReceiptSection 3.4
<Base‑URL>/soap/services/MSS_ProfilePortMSS Profile QuerySection 3.5

REST Endpoint

A description of this interface is available as a YAML file on GitHub: mobileid.yaml

Endpoints

Endpoint URLDescriptionReference Section
<Base‑URL>/rest/service/signMSS SignatureSection 3.2
<Base‑URL>/rest/service/statusMSS Status QuerySection 0
<Base‑URL>/rest/service/receiptMSS ReceiptSection 3.4
<Base‑URL>/rest/service/profileMSS Profile QuerySection 3.5

Mutual Authentication

A certificate-based mutual authentication when accessing the Mobile ID web service is highly recommended. When using certificate-based mutual authentication, the following actions occur:

mutual-authentication

  1. The client Application Provider (AP) requests access to a protected resource on the Mobile ID (MID) server.
  2. The MID web server presents its server certificate to the client AP.
  3. The client AP verifies the MID server certificate.
  4. If verification is successful, the client AP sends its client certificate to the MID server.
  5. The MID server verifies the AP client credentials.
  6. If verification succeeds, the MID server grants access to the protected resource requested by the client AP.

Important Guidelines for Certificate-Based Mutual Authentication

  • The client must send only its end‑entity certificate.

    • Authentication on the MID side does not consider validation of a full client certificate chain or any restrictions on the root CA.
    • Authentication is denied if the client sends a bag with the full certificate chain.
  • The Enhanced Key Usage value of client certificates must include Client Authentication (1.3.6.1.5.5.7.3.2).

    • See X509 Client Certificates for examples of creating self‑signed certificates.
  • All requests to the Mobile ID service must originate only from servers that you control.

    • Never send requests directly from client‑side code such as mobile apps or JavaScript, as this may compromise your credentials.
  • To validate the chain of trust for the Mobile ID server certificate:

    • Add the SwissSign Gold CA – G2 root certificate to your client TrustStore.
    • The intermediate CAs are returned dynamically by the MID server and may change.
    • Refer to Section tbd for more details.

INFO

Get the root certificate from https://www.swisssign.com/en/support/faq.html

© Swisscom (Schweiz) AG