This article is for X-Road versions < 7.3.0. Instructions for X-Road versions >= 7.3.0 are available here.

Table of contents

1. Configuration of the Central Server

1.1 Logging in to the administration interface and creating initial configuration

The official Central Server installation guide is available at: https://github.com/nordic-institute/X-Road/blob/develop/doc/Manuals/ig-cs_x-road_6_central_server_installation_guide.md

After installing the Central Server the admin interface can be found at https://<CENTRAL_SERVER_URL>:4000. At the first time the self-signed certificate from the server needs to be accepted.

If you go to the URL right after the installation has finished, usually the background services have not started yet and an error message 502 Bad Gateway is returned.

Wait for a while and eventually the browser connects to the admin interface. 

In the initial configuration screen you need to input the following information.

The initial configuration is saved and the server outputs message Central Server Initialized.

Initially the admin interface displays multiple error messages but they will vanish while the configuration proceeds. At this point the errors can be ignored.

1.2 Adding member classes

Choose System Settings -> Member Classes -> ADD. Add suitable Member Class for the administrative organization and press OK.

The added Member Class shows in the list.

1.3 Adding certification service

When using the test CA as a certification provider, please see the location of the CA root certificate and OCSP certificate, and OCSP URL at:

https://github.com/nordic-institute/X-Road/blob/develop/ansible/TESTCA.md#6-configuring-the-central-server-to-use-the-test-ca

Screen after adding the certification service.

1.4 Adding time-stamping service

When using the test CA as a time-stamping provider, please see the location of the TSA certificate and TSA URL at:

https://github.com/nordic-institute/X-Road/blob/develop/ansible/TESTCA.md#6-configuring-the-central-server-to-use-the-test-ca

The screen after adding the time-stamping service.

1.5 Adding the administrative organization and subsystem

The screen after adding the organization.

The screen after adding the subsystem.

1.6 Configuring the management services

The screen after configuring the subsystem for management services.

1.7 Adding the signing keys

The screen after adding the internal signing key.

The screen after adding the external signing key.

The user interface error messages vanish after small wait. The configuration of the central server is now finished.

2. Installing the Security Server for management services

The official Security Server installation guide is available at: https://github.com/nordic-institute/X-Road/blob/develop/doc/Manuals/ig-ss_x-road_v6_security_server_installation_guide.md

3. Configuring the Security Server for management services

3.1 Initial configuration

After installing the Security Server the admin interface is found at https://<SECURITY_SERVER_URL>:4000/. At the first time the self-signed certificate needs to be approved.

If you go to the address right after the installation has finished, usually the background services have not yet started and an error message 502 Bad Gateway is displayed.

Wait for a while and eventually the browser connects to the admin user interface. Enter the administrator user credentials created during the installation.

In the next screen a configuration anchor is requested.

Next the anchor upload needs to be confirmed.

In the initial configuration screen input the values as follows.

The initial configuration was saved successfully.

3.2 Entering the PIN code

The security server asks for PIN code.

Clicking the links navigates to Keys and Certificates page.

The red error message bar disappears.

3.3 Configuring the time-stamping service

3.4 Creating the certificate requests




The certificate request is downloaded to browser's download folder.





The certificate request is downloaded to the browser's download folder.

When using the test CA as a certification provider, sign the certificate requests according to the instructions:

https://github.com/nordic-institute/X-Road/blob/develop/ansible/TESTCA.md#7-signing-certificates

3.5 Importing the certificates

The screen after importing the certificate. Auth certificate is disabled initially.

The auth certificate activates.

The screen after importing the certificate. Sign certificate is good / registered.

3.6 Registering the authentication certificate

The registration request of the authentication certificate is sent to the central server. The certificate transitions to state registration in progress.

The next screen says Certificate imported successfully.

 The next screen displays the message Successfully approved request.

Return to the Security Server's admin interface.

The screen after successful registration.

3.7 Add subsystem for management services

The registration request fails because the management services have not yet been defined.

The next screen shows a message about successful registration.

The screen after successful registration.

3.8 Configuring the management services

Services tab opens.

The added WSDL shows disabled on the list.


The screen after enabling the WSDL.

The screen after the services under WSDL has been expanded.


The list is populated with choices.

The ACL now shows the Security server owners.

Eventually, all of the WSDL services have access rights defined and the management services are ready to use.

4. Testing the management services

4.1 Add subsystem to Central Server

You can test the management services' functionality by adding a subsystem to the Security Server.

The screen after making the registration request.

4.2 Add subsystem to Security Server

4.3 Register the subsystem

A dialog asking about subsystem registration opens.

The subsystem TEST shows on the list. The yellow ball in front of it indicates the registration is not yet ready.

The screen after accepting the management request.

The screen after the client registration has completed.

Related articles

Related articles appear here based on the labels you select. Click to edit the macro and add or change labels.



Related issues