SWIFTNet PKI Service Overview Guide
SWIFTNet PKI Service Overview Guide
Service Description
This service description describes the features and functions of the SWIFTNet PKI service, and the roles and
responsibilities of SWIFT and the customer regarding SWIFTNet PKI. This document is for any customers who use or
intend to use SWIFTNet PKI.
18 March 2021
Table of Contents
Preface............................................................................................................................................................... 4
Significant Changes..........................................................................................................................................5
1 Overview...................................................................................................................................................6
1.1 Scope.......................................................................................................................................................6
1.2 Eligibility...................................................................................................................................................6
7 SWIFT Training...................................................................................................................................... 60
18 March 2021 2
SWIFTNet PKI Table of Contents
Service Description
8 Contractual Framework........................................................................................................................ 61
Legal Notices................................................................................................................................................... 62
18 March 2021 3
SWIFTNet PKI Preface
Service Description
Preface
Purpose of this document
This service description describes the features and functions of SWIFTNet PKI, and the roles and
responsibilities of SWIFT and the customer.
Note This service description, together with other applicable SWIFT contractual
documentation (typically, the SWIFT General Terms and Conditions), is an integral
part of the contractual arrangements between SWIFT and its customers for the
provision and the use of SWIFTNet PKI.
Audience
SWIFT intends this document for any customers who use or plan to use SWIFTNet PKI.
SWIFT-defined terms
In the context of SWIFT documentation, certain terms have a specific meaning. These terms are
called SWIFT-defined terms (for example, customer, user, or SWIFT services and products).
The definitions of SWIFT-defined terms appear in the SWIFT Glossary.
Related documentation
• FIN Service Description
• Price List for SWIFT Messaging and Solutions
• Pricing and Invoicing - Ordering, Invoicing, and Payment
• SWIFT Certificate Centre - Getting Started with your Personal Token
• SWIFT By-laws
• SWIFT Corporate Rules
• SWIFT Data Retrieval Policy
• SWIFT General Terms and Conditions
• SWIFT Glossary
• SWIFT Personal Data Protection Policy
• SWIFTNet Online Operations Manager User Guide
• SWIFTNet PKI Certificate Administration Guide
• SWIFTNet Service Description
Note Customers can find the latest version of most of these documents at Knowledge
Centre (User Handbook). For more information, customers can contact a SWIFT
commercial manager.
18 March 2021 4
SWIFTNet PKI Significant Changes
Service Description
Significant Changes
The following tables list the significant changes to this guide since the release of December 2018.
These tables do not include editorial changes that SWIFT may have made to improve the usability
and comprehension of the document.
Customer responsibilities in respect of the Root Responsibility for Activation Secrets, Certificates, and
Key Renewal (RKR) initiative. Private Keys on page 51
18 March 2021 5
SWIFTNet PKI Overview
Service Description
1 Overview
1.1 Scope
SWIFTNet PKI is designed to enable customers to securely exchange information in the following
way:
• The customer signs data that is sent using SWIFT messaging services.
• The receiver authenticates the signer and verifies the integrity of the received data.
SWIFTNet PKI offers certification services which enable a customer to request the issuance of
certificates in respect of specific entities such as individuals or applications under its responsibility
and thereby enabling these entities to securely exchange information (using SWIFT messaging
services).
SWIFTNet PKI also provides directory services that can store certificates and revocation
information, used to verify the SWIFTNet PKI signature and certificate validity.
Unless otherwise expressly permitted in the applicable contractual documentation, SWIFTNet PKI
must be used in conjunction with SWIFT messaging services only. For details on how SWIFTNet
PKI secures the use of SWIFT messaging services, see the relevant service description such as
the FIN Service Description and the SWIFTNet Service Description.
In some cases, SWIFTNet PKI can also be used to sign business data contained in the message
payload that is transported using a SWIFT messaging service. This service description contains
details on how SWIFTNet PKI can be used in this context.
1.2 Eligibility
Unless otherwise expressly permitted in the applicable contractual documentation, SWIFTNet PKI
is available to customers to secure the use of SWIFT messaging services only.
18 March 2021 6
SWIFTNet PKI SWIFTNet PKI Components
Service Description
SWIFTNet Directory
SNL
D0710013
(during signature verification)
18 March 2021 7
SWIFTNet PKI SWIFTNet PKI Components
Service Description
SWIFTNet Directory
The SWIFTNet Directory is a centralised X.500 directory of entities that stores the certificates and
Certificate Revocation Lists that the SWIFTNet Certification Authority issues. The SWIFTNet
Directory identifies an entity by its Distinguished Name (DN).
The entities are available to security officers who use the Local Registration Application through the
SWIFTNet Online Operations Manager to manage them. The certificates and Certificate
Revocation Lists are available to the customer's SWIFTNet interface (for example, Alliance
Gateway).
Secure Channel
Secure Channel is SWIFT's central application that is designed to enable offline security officers to
submit offline interventions for managing SWIFTNet PKI certificates, when the SWIFTNet Online
Operations Manager cannot be used. Offline security officers are registered in Secure Channel and
receive a secure code card to authenticate requests.
For more information, see the Secure Channel User Guide.
18 March 2021 8
SWIFTNet PKI SWIFTNet PKI Components
Service Description
PKI subdomain
The customer's subscription to SWIFTNet PKI is automatic once the customer (per 8-character
BIC) subscribes to a SWIFT messaging service for the first time. At the time of subscription, SWIFT
creates a PKI subdomain in the SWIFTNet Directory under the 8-character BIC of the customer.
The SWIFTNet PKI subdomain is an area in the SWIFTNet Directory reserved for the customer. It
is identified by a directory tree root based on the institution DN (which always includes the 8-
character BIC of the customer) and contains all of the registered DNs of the entities under the
customer's responsibility.
The security officers of the customer can request the registration of entities and request the
issuance of certificates in respect of specific customer entities. They can also administer
certificates and keys in the PKI subdomain of the customer. The SWIFTNet Certification Authority
stores the certificates in the SWIFTNet Directory.
Security officers
A customer appoints security officers to manage its customer entities and certificates per 8-
character BIC. SWIFT registers the first two security officers of the customer per 8-character BIC
as part of the registration process. These security officers can request the registration and
issuance of certificates for additional security officers of the customer if necessary.
18 March 2021 9
SWIFTNet PKI SWIFTNet PKI Components
Service Description
2.3 Definitions
Entity: An entity is an end node in the SWIFTNet Directory that is identified with a Distinguished
Name (DN), and either has a certificate or is set up for certification.
Agent: An individual responsible for managing the certificates and the private keys of an entity
where such entity is not itself a named individual, for example :
• an application or system
• an organisational unit or department
• a function, represented by an anonymous individual such as an end user or a security officer
• a service
Agents are appointed (and have their appointment terminated) by the customer directly through its
security officers.
In a SWIFT WebAccess service, a customer entity can represent:
• a web browser
• a web server
18 March 2021 10
SWIFTNet PKI Set-Up of the Service
Service Description
18 March 2021 11
SWIFTNet PKI Set-Up of the Service
Service Description
SWIFT registers the first two security officers with both online and offline capabilities. The security
officers can subsequently register additional security officers of each category.
Note Note that shared security officers belong to the category of security officer that can
contact SWIFT offline and online.
For more information about online and offline capabilities, see Online and offline capabilities on
page 47. For information about online and offline administration, see Online Security
Administration on page 13 and Offline Security Administration on page 14.
18 March 2021 12
SWIFTNet PKI Set-Up of the Service
Service Description
18 March 2021 13
SWIFTNet PKI Set-Up of the Service
Service Description
18 March 2021 14
SWIFTNet PKI Set-Up of the Service
Service Description
3.5 Termination
Customer termination
To help prevent the misuse of obsolete certificates and private keys, the SWIFTNet Registration
Authority revokes the certificates and disables the entities of customers who cease to use
messaging services.
Confirmation of termination
When a customer has been deactivated, the SWIFTNet Registration Authority confirms by e-mail,
to two contact persons of the deactivated customer, that it has revoked all current certificates and
disabled the corresponding entities.
18 March 2021 15
SWIFTNet PKI Features and Functions
Service Description
4.1.1 Certificates
[Link] Format
The SWIFTNet PKI certificates conform to the X.509 format, and contain the following information:
• the identification of the customer and its entities in the form of the Distinguished Name (DN)
• the certificate version
• the serial number identifying uniquely the certificate issued by the SWIFTNet Certification
Authority
• the identification of the SWIFTNet Certification Authority
• the public key and cryptographic algorithm identifier
• the certificate validity period (issuance and expiry date)
• the certificate purpose, for example, digital signing or encryption
• the SWIFTNet Certification Authority signature
• a Policy ID
Description
Business certificates provide SWIFTNet customers with a strong level of authentication and non-
repudiation.
Customers also use this class of digital certificate to communicate with SWIFT about updates to
customer profiles. SWIFT also issues security officers with business certificates.
The customer must ensure that business certificates are used only by the identified entities, and
that the related private keys and passwords remain private at all times.
SWIFTNet Link and Alliance Gateway Instant (AGI) retrieve the certificates from the SWIFTNet
Directory when necessary, and when these certificates are not available in the local cache memory.
18 March 2021 16
SWIFTNet PKI Features and Functions
Service Description
Policy IDs
The Policy ID uniquely identifies a business certificate, as follows:
• The Policy ID that SWIFT has allocated to business certificates that must be stored on
Hardware Security Modules (HSMs) is [Link].2
A customer must use certificates stored on a Hardware Security Module (HSM) and carrying
Policy ID [Link].2 to sign live traffic.
• The Policy ID that SWIFT has allocated to business on disk certificates, that is, certificates
stored on disk, is [Link].1 (for integration testbed environment only).
Description
Lite certificates have a Policy ID with the following value: [Link].[Link]
Lite certificates can only be used to sign traffic sent on pilot (Test and Training) services. These
certificates have a lower level of requirements for key protection and offer a lower level of trust than
business certificates.
18 March 2021 17
SWIFTNet PKI Features and Functions
Service Description
The security officer registers the DN and sets it up for certification through the SWIFTNet Online
Operations Manager, and then retrieves the activation code.
To obtain the certificate, the end user, using a personal token, must access the SWIFT Certificate
Centre (a web-based certificate administration portal) with the activation code provided by the
security officer. The personal token is then ready for use.
Policy ID [Link].[Link] identifies the signature verification certificate stored on the personal
token.
For more information about personal tokens, see the SWIFT Certificate Centre - Getting Started
with your Personal Token guide.
Description
The personal HSM certificate identifies an individual owning a certificate that is stored in an HSM
box for use on SWIFT WebAccess services. Personal HSM certificates cannot be stored on a
token.
Like for personal token certificates, the Distinguished Name (DN) must include the name of the end
user in the format cn=firstname-lastname, thereby referencing the identity of the end user based
on the customer's SWIFTNet PKI security officer registration.
The security officer must ensure that the DN includes the certificate holder's verified personal
identity (cn=firstname-lastname).
This type of certificate cannot have an anonymous DN, it cannot be shared, transferred, or re-
assigned between different end users. It can be associated with one virtual SWIFTNet user but
cannot be used in a relaxed mode.
The security officer registers the DN and sets it up for certification through the SWIFTNet Online
Operations Manager, and then retrieves the initial secrets. To obtain the certificate, the Alliance
Gateway operator or administrator certifies the DN in the Alliance Gateway using the activation
code provided by the security officer.
For more information about the registration and management of personal HSM certificates, see the
SWIFTNet Online Operations Manager User Guide and the Alliance Gateway Administration and
Operations Guide.
Policy ID
Personal HSM certificates have a Policy ID with the following value: [Link].[Link]
18 March 2021 18
SWIFTNet PKI Features and Functions
Service Description
Related information
SWIFTNet Online Operations Manager User Guide
Configuration and Operations Guide for MI Channel Using Alliance Gateway and SWIFTNet Link
18 March 2021 19
SWIFTNet PKI Features and Functions
Service Description
Web certificates
Web certificates are intended for establishing a secure session between each browser and a web
server. They are not intended for signing SWIFT messaging traffic.
SWIFT only supports limited management functions for the web certificates. For example, web
certificates cannot be renewed but must be recovered upon expiry. The revocation status of web
certificates is not checked when the certificate is used to establish a secure session with the web
server. Unlike the business and lite certificates, it is the standard web browsers that use the web
certificates.
In addition to local storage in the web server, SWIFT stores the web certificates centrally in the
SWIFTNet Directory.
If a web certificate expires, then the security officer must obtain a new certificate. Web certificates
expire after 2 years.
There are different types of web certificates:
• Web server: identified by Policy ID [Link].[Link]
• Web client: identified by Policy ID [Link].[Link]
Revocation
In very exceptional circumstances, SWIFT can decide to revoke the SWIFTNet Certification
Authority certificate. In such cases, SWIFT informs the customer and reissues certificates to all
affected entities.
18 March 2021 20
SWIFTNet PKI Features and Functions
Service Description
(1) This certificate is for integration testbed (ITB) environment only and cannot be used to sign live traffic.
Certificate Expires
18 March 2021 21
SWIFTNet PKI Features and Functions
Service Description
Certificate Expires
4.1.2 Keys
18 March 2021 22
SWIFTNet PKI Features and Functions
Service Description
Storage
Customers must store business keys on HSMs. If customers generate these keys on Alliance
Gateway, or on interfaces that vendors other than SWIFT provide, then customers must store the
keys on one or more HSMs. For pilot or test traffic, customers can store them on HSMs or on hard
disk. SWIFT includes the public keys in the certificates, and stores them centrally in the SWIFTNet
Directory.
Key length
All keys used to sign live traffic exchanged between customers are 2048 bits long.
Validity periods
The following table specifies the validity periods for private keys and certificates.
Key Expires
Business and lite private signing key 18 months after key generation
Business and lite public signature verification key 24 months after key generation
Use
Customers use private authentication keys and associated certificates at the beginning of a secure
browse session (SSL) to authenticate the client (the web client) and the (web) server. SSL secures
the browse traffic for integrity and encryption. The web certificate and private authentication key do
not provide non-repudiation, because the customer does not sign the HTTPS traffic with the unique
private authentication key. It is important to add the valid SWIFTNet CA certificate(s) to the list of
trusted CA certificates at both the client (web client) and the (web) server.
Protection
Although a standard browser does not enforce the usage of passwords for the protection of the
web keys, SWIFT strongly recommends that customers use passwords.
18 March 2021 23
SWIFTNet PKI Features and Functions
Service Description
Validity period
Private authentication keys are valid for 18 months. Public authentication keys and web certificates
are valid for 24 months.
Key length
The key length determines the cryptographic strength. All web keys are 2048 bits long.
Use
End users of customers use personal keys on applications where the end user's interaction is
required, such as on SWIFT WebAccess. Personal keys are not supported for FIN, InterAct, or
FileAct.
Personal token keys are created and managed through the SWIFTNet Online Operations Manager
and the SWIFT Certificate Centre. Personal HSM keys are created and managed through the
SWIFTNet Online Operations Manager and Alliance Gateway.
Expiry
Personal keys expire after 24 months. Personal token keys are not renewed automatically, they
must be renewed through the SWIFT Certificate Centre. Personal HSM keys are not renewed
automatically, they must be recovered through the SWIFTNet Online Operations Manager and
Alliance Gateway.
4.1.3 Passwords
Requirements for using passwords
SWIFT provides a mechanism for customers to protect the access to the private key issued in
respect of their customer entities using passwords.
To use their private key, customers, acting in particular through their entities or their agents, are
required to provide a password.
18 March 2021 24
SWIFTNet PKI Features and Functions
Service Description
Typically, this is the password policy for a profile that corresponds to a human operator.
Password complexity cannot have any character repeating for more than half the length of the
password
18 March 2021 25
SWIFTNet PKI Features and Functions
Service Description
The password is checked against the policy during certification, recovery, or password change.
Migrated end users who have passwords that do not meet these requirements will be asked to
select a new password at the first password change following the installation of Release 7.2.
18 March 2021 26
SWIFTNet PKI Features and Functions
Service Description
Password rules
Provide a strong password. Use the following guidelines when creating a password:
• the minimum length varies according to the password policy
• the maximum possible password length is twenty characters
18 March 2021 27
SWIFTNet PKI Features and Functions
Service Description
Personal tokens
The security device for use on a person's desktop, typically for screen-based applications, is the
personal token. For information about personal tokens, see Personal Tokens on page 29.
18 March 2021 28
SWIFTNet PKI Features and Functions
Service Description
18 March 2021 29
SWIFTNet PKI Features and Functions
Service Description
using the token to be identified. The token is personal and must not be shared with another entity. It
is protected by a password that the entity must keep private.
Customers can order two types of personal tokens: one for the production environment (live and
pilot/test services) and another for the integration testbed environment (ITB).
18 March 2021 30
SWIFTNet PKI Features and Functions
Service Description
[Link] Overview
Online administration through the SWIFTNet Online Operations Manager
The SWIFTNet Online Operations Manager enables security officers to manage certificates for all
entities within their scope of authority. Other interfaces may also provide such functionality.
The SWIFTNet Online Operations Manager is designed to enable the security officer to do the
following:
• create nodes in the SWIFTNet Directory, for the customer's entities
• initiate the issue of certificates
• revoke certificates
• initiate the recovery of entities
• disable entities
• delete entities that have been disabled and whose certificates have been revoked
18 March 2021 31
SWIFTNet PKI Features and Functions
Service Description
For more information about certificate administration, see the SWIFTNet PKI Certificate
Administration Guide and the SWIFTNet Online Operations Manager User Guide.
Activity log
Customers can use the SWIFTNet Online Operations Manager to generate a report of the
certificate management activities of their security officers. For more information, see the SWIFTNet
Online Operations Manager User Guide.
Certification
In support of the chain of trust, the SWIFTNet Certification Authority validates that a certification
request comes from a customer's entity by validating that the activation secrets issued to a security
officer of that customer entity (when the entity was set up for certification) are still active and are
being appropriately used.
18 March 2021 32
SWIFTNet PKI Features and Functions
Service Description
Renewal notification
SWIFT does not notify individuals or agents about the renewal of certificates.
For time-critical applications that use SWIFTNet PKI certificates, the agent must anticipate and
monitor the automated renewal.
The SWIFTNet Online Operations Manager is designed to enable security officers to monitor
certificate expiry dates online or through automated reports. Customers can also retrieve the
certificate expiry date through SNL or AGI.
Online recovery
To minimise the customer's system unavailability due to corrupted or lost private keys, SWIFT
provides an online recovery capability.
Customers can lose or damage business and lite private keys. Also, the certificates and keys can
expire if automatic renewal does not succeed. In these cases, customers can request new
certificates and keys immediately by recovering the entities to which these certificates and keys are
associated.
To protect the entity profile during recovery, the customer must define a password that differs from
the previously used password.
The most common situations that require entity recovery are described in the table in
Circumstances for business and lite entities on page 37.
18 March 2021 33
SWIFTNet PKI Features and Functions
Service Description
Revocation process
As a result of the revocation process, SWIFT updates the appropriate Certificate Revocation List
with the serial numbers of the revoked certificates and uploads it into the SWIFTNet Directory. The
updated Certificate Revocation List is then available for retrieval by the SWIFTNet Link or Alliance
Gateway Instant (AGI) of the customer.
Note If a disaster strikes a SWIFT operating centre, then SWIFT may not have fully
processed the online revocation requests that customers have sent in the 15 minutes
before the disaster. In such cases, on request, SWIFT assists the customer to trace
the affected requests.
Note For SWIFT Secure Channel end users, an offline revocation request is valid when it
meets all of the following conditions:
• The security officer successfully submits the revocation request through the SWIFT
Secure Channel.
• The second security officer approves the revocation request (if required).
• The security officer receives the confirmation e-mail of the revocation request.
For more information about the revocation process, see the SWIFTNet PKI Certificate
Administration Guide.
18 March 2021 34
SWIFTNet PKI Features and Functions
Service Description
18 March 2021 35
SWIFTNet PKI Features and Functions
Service Description
Web certificates
The following table shows the actions for changing the state of web certificates and the person that
is responsible for the action.
18 March 2021 36
SWIFTNet PKI Features and Functions
Service Description
Change
Situation Revoke Recover Disable
Password
Password forgotten. x
18 March 2021 37
SWIFTNet PKI Features and Functions
Service Description
Change
Situation Revoke Recover Disable
Password
(1) Entities that have been revoked and disabled can be deleted.
(2) If both the Policy ID and the password policy do not change, then it is also recommended to initialise the HSM partition
(holding the previous profile) or alternatively, to perform a revocation in order to make the previous profile unusable.
Password disclosed
or stolen.
The security profile
cannot be copied in x
case of personal
tokens or personal
HSMs.
Password forgotten. x
18 March 2021 38
SWIFTNet PKI Features and Functions
Service Description
The entity is no
x x
longer needed.(1)
The end-user
certificate has x
expired.
The activation
secrets are x x
compromised.
The activation
x x
secrets do not work.
(1) Entities that have been revoked and disabled can be deleted.
Situation Recover
Password forgotten x
Circumstances for communication footprint (AGI/SNL) instance and TLS (connection to SWIFT)
certificates
Except for recovery, communication footprint (AGI/SNL) instance certificates cannot be managed
online, and so there is only a limited set of situations in which intervention is required.
Situation Recover
18 March 2021 39
SWIFTNet PKI Features and Functions
Service Description
Key is compromised x x
[Link] Overview
Online administration through the SWIFTNet Online Operations Manager
The SWIFTNet Online Operations Manager is designed to enable security officers to manage Role-
Based Access Control (RBAC) roles for the customer entities within their scope of authority. Other
interfaces may also provide such a functionality.
The SWIFTNet Online Operations Manager enables the security officer to do the following:
• create nodes in the SWIFTNet Directory for the customer entities
• assign roles to, or remove roles from, customer entities
For more information about role administration, see the SWIFTNet PKI Certificate Administration
Guide and the SWIFTNet Online Operations Manager User Guide.
Processing of administration requests
The Role-Based Access Control (RBAC) server processes online role administration requests.
Activity log
Customers can use the SWIFTNet Online Operations Manager to generate a report of the role
management activities of their security officers. For more information, see the SWIFTNet Online
Operations Manager User Guide.
18 March 2021 40
SWIFTNet PKI Features and Functions
Service Description
Related information
For more information about RBAC administration, see the
SWIFTNet PKI Certificate Administration Guide
.
18 March 2021 41
SWIFTNet PKI Features and Functions
Service Description
Web servers
For the browse services, each web server has its own tool to generate a private key - public key
pair, and a Certificate Signing Request (CSR). Using the standard browser and connecting to the
Entrust Authority Enrolment Server for Web, the customer submits the CSR and obtains a
certificate. This certificate is then installed in the web server.
18 March 2021 42
SWIFTNet PKI Features and Functions
Service Description
• Decryption: Through SNL or AGI, the receiver can use a private decryption key to decrypt a
message.
Authentication control
After verifying the signature and the validity of the certificate that was used to generate the
signature, the receiver can authenticate, through SWIFTNet Link (SNL) or Alliance Gateway Instant
(AGI), the counterparty responsible for the signed message or data received over SWIFTNet.
Integrity control
After verifying the signature, the receiver can validate, through SWIFTNet Link (SNL) or Alliance
Gateway Instant (AGI), that the signed message or data received over SWIFTNet has not changed
since it was signed.
Non-repudiation
There are 3 types of non-repudiation:
• Non-repudiation of origin
The signature on the message or data received over SWIFTNet can be used to obtain certainty
that the message or data was signed by the holder of a valid SWIFTNet PKI certificate owned
by the customer represented by, and responsible for, the 8-character BIC in the level 2 of the
certificate DN.
The non-repudiation of origin can be established by the customer using their SWIFTNet Link
(SNL) or Alliance Gateway Instant (AGI) at the time of receiving the message or data, or later on
by asking SWIFT to reverify the signature on a message or data up to 24 years after it was
signed. For the latter case, SWIFT retrieves the certificate data from its systems, checks the
certificate validity at the time specified by the customer, and reverifies the signature on the
message or data provided by the customer.
• Non-repudiation of emission
Non-repudiation of emission is an optional feature offered as part of SWIFT messaging
services. For more information about how to obtain certainty regarding the origin of a received
message, the fact that the message was sent at a specific time, and the destination to which the
sender intended to send that message, see the SWIFTNet Service Description and the FIN
Service Description.
Non-repudiation of emission cannot be provided for signed business data.
• Non-repudiation of reception
Non-repudiation of reception is an optional feature offered as part of SWIFT messaging
services. For more information about how to obtain certainty regarding the reception of a
message and the fact that the message was received at a specific time, see the SWIFTNet
Service Description and the FIN Service Description.
Non-repudiation of reception cannot be provided for signed business data.
Certificate verification
To rely on a correspondent's business or lite certificate, the customer must verify that the certificate
is valid. Customers can use SWIFTNet Link (SNL) or Alliance Gateway Instant (AGI) to check the
following information that the certificates retrieved from the SWIFTNet Directory and possibly
stored in the local cache memory:
• The certificate expiration date.
• The purpose of the certificate. For example, signing or encryption.
• The technical environment. For example, business and lite, or web certificate.
18 March 2021 43
SWIFTNet PKI Features and Functions
Service Description
• The certificate's revocation status. Customers can check against the Certificate Revocation List.
• The certificate's authenticity. Customers can verify the SWIFTNet Certification Authority
signature.
Certificate revocation status check
The certificate revocation status check differs when PKI certificates are used for signing SWIFT
messaging and for signing business data contained in the message payload that is transported
using a SWIFT messaging service:
• Signing SWIFT messages
For each message exchanged, the central SWIFTNet systems check, upon receipt of the
message, that the PKI certificate that has been used to sign the message is not revoked.
SWIFT ensures that this check takes the following certificate revocations into account:
- all online revocations that happened at least 5 minutes before the message was sent
- all offline revocations for which SWIFT has received a valid revocation request (and has
successfully authenticated the requesting security officers) at least 2 hours before the
message was sent
If the certificate is revoked, then SWIFT rejects the message.
• Signing business data
SWIFT does not check the revocation status of the PKI certificate used to sign business data
contained in the message payload that is transported using a SWIFT messaging service. The
revocation status must be checked by the receiver using its SWIFTNet Link (SNL) or Alliance
Gateway Instant (AGI). If the certificate is revoked, then the receiver must not rely on the
signature and must contact the customer responsible for the certificate that was used to sign the
data.
In normal operational circumstances, the receiver's SNL or AGI retrieves the updated Certificate
Revocation List (containing the newly revoked certificate):
- within a maximum of 1 hour after SWIFT has received a valid online certificate revocation
request from the sender of the business data
- within a maximum of 3 hours after SWIFT has received a valid and authenticated offline
certificate revocation request from the sender of the business data
Signed traffic rejection
Traffic is not rejected immediately after a certificate revocation request. This is due to the delay
between the successful revocation of a certificate and the time that it takes:
• to propagate the revocation information to all central SWIFTNet systems
• for all customer SWIFTNet Links (SNLs) or Alliance Gateway Instants (AGIs) to retrieve the
updated Certificate Revocation List
Within the period of delay, the certificate for which a revocation request has been received can still
be interpreted as valid.
The customer is liable for any reliance on the customer's certificate as a valid certificate during this
period of delay.
For the time frames between certificate revocation and traffic rejection, see Certificate revocation
status check on page 44.
18 March 2021 44
SWIFTNet PKI Features and Functions
Service Description
18 March 2021 45
SWIFTNet PKI Roles and Responsibilities
Service Description
5.1.1 Entity
Description
An entity is identified in the SWIFTNet Directory with a Distinguished Name (DN), and either has a
certificate or is set up for certification.
Identification
An entity is identified by its DN, which always includes the 8-character BIC of the customer
responsible for the entity. If the entity has a certificate, then the DN is included in the entity's
certificate.
The service administrator of a business service using SWIFT messaging can mandate participants
in their service to use specific DNs.
If the service administrator mandates specific DNs, then it must notify service participants of this in
dedicated guidelines.
For more information about the identification of entities, see the SWIFTNet Naming and Addressing
Guide.
Occurrences
In SWIFTNet messaging, entities can occur in the form of a signer DN, encrypter DN, and
authoriser DN.
Authorised activities
An entity or, as applicable, its agent does the following:
• provides the password for the private keys
• signs and encrypts messages (applicable for entities only)
• verifies signatures and decrypts messages (applicable for entities only)
5.1.2 Agent
Definition
An agent is an individual responsible for managing the certificate(s) and the private keys of an
entity where such entity is not itself a named individual, for example:
• an application or system
• an organisational unit or department
• a function, represented by an anonymous individual such as an end user or a security officer
• a service
Agents are appointed (and have their appointment terminated) by the customer directly through its
security officers. The agent's role is crucial in the chain of trust.
18 March 2021 46
SWIFTNet PKI Roles and Responsibilities
Service Description
Authorised activities
An agent does the following:
• generates the private keys and obtains the certificate of the entity
• protects the password for the entity's private key against disclosure and changes the password
of the entity's private key
• protects the private keys of the entity
• notifies the security officer in case of (suspected) compromise or loss of either the entity's
private key or the associated password
Maintenance of certificates
Security officers are responsible for regularly reviewing the list of certificates within their scope of
authority (see Scope of authority on page 48). Security officers must verify that all certificates in
the list are still required and appropriate, and if not the case, then the security officers must revoke
or disable those certificates that are no longer valid.
18 March 2021 47
SWIFTNet PKI Roles and Responsibilities
Service Description
officer must have a [Link] account with access to the Secure Channel and use a personal
secure code card for authentication.
4-eyes authorisation
To increase customers' protection against unauthorised actions or wrongdoing by security officers,
SWIFT provides optional 4-eyes role profiles for certificate management and role management.
If customers activate this mechanism, then two security officers must issue requests. SWIFT
recommends that if the customer applies the 4-eyes principle, then the customer must also define
additional security officers to ensure consistent levels of operational availability.
Online security officers require the CertificateAdministration4eyes or the Delegator4eyes RBAC
role, or both. SWIFT recommends that security officers who previously had both
CertificateAdministration and Delegator roles grant themselves the CertificateAdministration4eyes
and Delegator4eyes roles in combination. For more information about implementing the 4-eyes
principle, see the SWIFTNet PKI Certificate Administration Guide.
Scope of authority
The area within the SWIFTNet Directory that the security officer is allowed to manage is called the
scope of authority. The scope of authority of the first two security officers that SWIFT defines is
equal to the customer's subdomain. The customer can define additional security officers at
subordinate levels, with a more limited scope of authority than the first two security officers. The
scope of authority of a security officer is defined as the sub-tree in the customer subdomain
including the node above the security officer's node.
For Alliance Cloud customers, the scope of authority is extended to include SWIFT. Indeed, the
sub-tree for Alliance Cloud customers contains a dedicated sub-tree under ou=swift-managed,
which is managed by SWIFT only and cannot be administered by an administering entity. For more
information about Alliance Cloud administration, see the Alliance Cloud Getting Started.
Authorised activities
The security officer uses the SWIFTNet Online Operations Manager to do the following:
• identify and authenticate the certificate applicants
• obtain the activation secrets that applicants for certification require
• revoke compromised certificates
• disable entities that no longer need certificates
• assign or remove roles
For more information about how to create a security officer, the roles and tasks of the security
officer, and for recommendations regarding the correct set-up and management of the SWIFTNet
PKI for the customer, see the SWIFTNet PKI Certificate Administration Guide. For information
about the registration of security officers, see Own Security Officers on page 11.
18 March 2021 48
SWIFTNet PKI Roles and Responsibilities
Service Description
The shared security officer requires the Scope role in addition to the CertificateAdministration and
Delegator role. SWIFT grants the Scope role to the administering institution. SWIFT defines this
additional role in the Role-Based Access Control (RBAC) service. For more information about the
shared security officer roles, see the SWIFTNet PKI Certificate Administration Guide. SWIFT
verifies the presence of this Scope role each time it receives an online request from the shared
security officer.
A service bureau cannot act as an administering institution.
Maintenance of certificates
Shared security officers are responsible for regularly validating the list of certificates within their
scope of authority (see Scope of authority on page 49). Shared security officers must verify that
all certificates in the list are still required and appropriate, and if not the case, then the shared
security officers must revoke or disable those certificates that are no longer valid.
Creation
For more information about how to create a shared security officer, see the SWIFTNet PKI
Certificate Administration Guide. For information about the registration of shared security officers,
see Shared Security Officers on page 12.
Scope of authority
The area within the SWIFTNet Directory that the shared security officer is allowed to manage is
called the scope of authority. The scope of authority of shared security officers is defined as the
subdomains of the customer(s) for whom they act as a shared security officer. Additionally, such
security officers have a scope of authority within the subdomains of the customer for whom they act
as their own security officer.
Authorised activities
Shared security officers use the certificate and role administration functionality (for each customer
for which the shared security officer administers the certificates) to do the following:
• identify and authenticate applicants to receive certificates
• obtain the activation secrets needed for certification
• revoke compromised certificates
• disable entities that no longer require certificates
For more information about the roles and the tasks of the shared security officer, see the
SWIFTNet PKI Certificate Administration Guide.
18 March 2021 49
SWIFTNet PKI Roles and Responsibilities
Service Description
application clsgateway2
5.2.1 Subscription
The customer must provide accurate and complete information in connection with its subscription
to SWIFTNet Public Key Infrastructure (PKI), including its full legal name and the identity of its first
two security officers.
Identification
The customer must ensure that it provides accurate and complete identification details of the first
two security officers and that its security officers always present a true and authentic identification
of themselves in all communication with SWIFT. This applies to (without limitation) the initial
registration process, certificate issuance, and maintenance and revocation requests, either online
or offline.
The customer must ensure that security officers always authenticate the customer's agents in all
communications with those agents.
The customer must also inform SWIFT of registration changes by means of the Secure Channel.
For example, an offline security officer role granted to a new person, the revocation of an offline
security officer role for an obsolete security officer, the update of address details for the secure
code card shipping.
Obligations
The customer must ensure that its security officers follow the obligations and scope of authority
defined for the role of security officer in this service description and the applicable operational
guides. To avoid any doubt, the customer always remains responsible for all acts, omissions, and
defaults of its security officers and its agents.
The customer is responsible for performing a periodic verification of the security officer information
and performing an update as required.
18 March 2021 50
SWIFTNet PKI Roles and Responsibilities
Service Description
5.2.3 Agents
Appointment of agents
The customer must appoint at least one agent for each entity that is not a named individual. The
agent is responsible for the secure handling (for, and on behalf of, the customer) of the activation
secrets, certificates, private keys and passwords that relate to the entity. The agent can arrange to
automate the performance of certain obligations if this is consistent with other SWIFTNet service
offerings.
5.2.4 Entities
Role of an entity
The entity is responsible for the secure handling (for, and on behalf of, the customer) of its
activation secrets, private keys and associated passwords, and certificates.
Customer's responsibility
For the avoidance of any doubt, the customer is responsible for all acts, omissions, and defaults of
its entities.
Acceptance of certificates
Customers agree that the successful completion of the certificate issuance and publication process
described in Certificate Issuance and Publication on page 32 of this service description, constitutes
acceptance of the resulting public key certificates.
18 March 2021 51
SWIFTNet PKI Roles and Responsibilities
Service Description
18 March 2021 52
SWIFTNet PKI Roles and Responsibilities
Service Description
18 March 2021 53
SWIFTNet PKI Roles and Responsibilities
Service Description
Reliance on correspondent's business, lite, and personal token and personal HSM certificates for
signature verification
If the correspondent's certificate has met the preconditions for reliance, then customers can rely on
digital signatures related to these certificates.
The customer's reliance on the correspondent's certificate covers the following:
• The use of the private key that corresponds to the certificate can be attributed to the customer
identified (by the 8-character BIC) in the Distinguished Name (DN). This is non-repudiation of
origin at customer level.
• The signed file digest or message that relates to the digital signature has not been altered since
transmission. This is message or file integrity.
18 March 2021 54
SWIFTNet PKI Roles and Responsibilities
Service Description
For the avoidance of any doubt, this does not alter or diminish the customer's obligations under the
SWIFT contractual documentation, and SWIFT deems any act, omission, or default of a service
bureau (or those specific persons for which it is responsible) to be that of the customer concerned.
For more information about the conditions governing the use of a service bureau, see the Shared
Infrastructure Programme Policy.
5.2.9 HSM
Customer's responsibility for HSM
The selection, ordering, installation, and use of the HSM devices is the sole responsibility of the
customer. The customer must comply with any guidelines or instructions in force given by SWIFT
regarding the use of the equipment.
Authorised activities
The SWIFTNet Certification Authority is designed to perform the following activities:
• issue certificates to customers
• publish the certificates in the SWIFTNet Directory
• revoke customer certificates
• publish the Certificate Revocation List in the SWIFTNet Directory
18 March 2021 55
SWIFTNet PKI Roles and Responsibilities
Service Description
Authorised activities
The SWIFTNet Registration Authority is designed to perform the following activities:
• identify and authenticate customers
• identify and authenticate security officers
• identify and authenticate shared security officers
• revoke security officers
• revoke shared security officers
• recover security officers and shared security officers
• validate Local Registration Application requests
For more information about identification and authentication procedures, and the credentials that
customers must provide, see Certificates on page 16.
Legal entities
To support investigations that relate to digital signatures, upon a request from a customer, SWIFT
provides details of the legal entity that corresponds to any Distinguished Name (DN) in a certificate
issued on SWIFTNet.
Risk management
SWIFT periodically evaluates the security risks associated with the provision of SWIFTNet PKI that
are under SWIFT's control, and takes steps to manage such risks.
18 March 2021 56
SWIFTNet PKI Roles and Responsibilities
Service Description
Operational standards
SWIFT operates SWIFTNet PKI within a plan of organisation that provides separation of duties,
and individual or group accountability for the performance of those duties. SWIFT takes steps to
investigate and train SWIFT personnel that are directly involved in the operation of SWIFTNet PKI.
18 March 2021 57
SWIFTNet PKI Ordering and Support
Service Description
6.1 Ordering
Order SWIFT services and products
To use SWIFT services and products, a customer must subscribe to, or order, the relevant services
and products.
The first subscription to SWIFTNet messaging services includes an automatic subscription to
SWIFTNet PKI.
Related information
For information about SWIFT's online ordering facility and how to order, see [Link] >
Ordering & Support > Ordering.
Import restrictions
Due to certain import regulations, SWIFT may not be able to supply or make the HSM boxes,
tokens, cards, and readers available to customers directly (for example, in Russia or Ukraine).
Customers in those countries are then fully responsible for acquiring the HSM boxes, tokens,
cards, and readers through the third-party agent or distributor designated by SWIFT.
6.3 Support
Support for SWIFT customers
By default, SWIFT Support is the single point of contact to report all problems and queries that
relate to SWIFT services and products. SWIFT Community Support is available to all SWIFT
customers.
Individuals within a customer organisation must register on [Link] to use the Support service.
On top of the SWIFT Community Support, customers can purchase the Advanced Support and
Care Services.
Subscription to SWIFTNet PKI includes the SWIFT Community Support package.
18 March 2021 58
SWIFTNet PKI Ordering and Support
Service Description
For more information about the different services that SWIFT offers as part of the SWIFT Advanced
Support and Care Services and the procedure to order support, see Support and Care Services on
[Link].
SWIFT provides support for SWIFT services and products only. For example, SWIFT does not offer
support for the underlying hardware and software systems (operating system, third-party
messaging middleware) which are used in conjunction with the SWIFT product. In case of
problems or queries that relate to those third-party hardware or software systems, customers must
contact the responsible vendor.
Related information
For more information about Support services, see the Service Description related to the applicable
support package: Support documentation.
18 March 2021 59
SWIFTNet PKI SWIFT Training
Service Description
7 SWIFT Training
SWIFT provides training about standards, products, and services to suit different needs. From
tailored training to self-paced e-learning modules on SWIFTSmart, a range of training options are
available for all SWIFT end users.
SWIFTSmart
SWIFTSmart is an interactive, cloud-based training service that offers a large variety of courses for
different levels of knowledge. The courses contain exercises and quizzes and are available in
multiple languages. The SWIFTSmart catalogue provides a list of courses that are organised into
these learning tracks:
• General knowledge
• Work with messages
• Deploy and manage SWIFT software solutions
• Security and audit
• Compliance and shared services
SWIFTSmart is accessible from the desktop or a mobile device. No installation is required.
SWIFTSmart is available to all connected SWIFT end users and registered SWIFT partners with a
[Link] account. For more information, see How to become a [Link] user.
Tailored training
A full range of tailored programmes is available to meet specific training needs. For more
information, visit the Training web page.
18 March 2021 60
SWIFTNet PKI Contractual Framework
Service Description
8 Contractual Framework
The SWIFT General Terms and Conditions govern the provision and the use of the SWIFTNet PKI
service. For the latest available version of the SWIFT General Terms and Conditions, see
Knowledge Centre (User Handbook).
In no event shall one or more customers be able to recover more than once for the same loss.
18 March 2021 61
SWIFTNet PKI Legal Notices
Service Description
Legal Notices
Copyright
SWIFT © 2021. All rights reserved.
Restricted Distribution
Do not distribute this publication outside your organisation unless your subscription or order
expressly grants you that right, in which case ensure you comply with any other applicable
conditions.
Disclaimer
The information in this publication may change from time to time. You must always refer to the
latest available version.
Translations
The English version of SWIFT documentation is the only official and binding version.
Trademarks
SWIFT is the trade name of S.W.I.F.T. SC. The following are registered trademarks of SWIFT:
3SKey, Innotribe, MyStandards, Sibos, SWIFT, SWIFTNet, SWIFT Institute, the Standards Forum
logo, the SWIFT logo, SWIFT gpi with logo, the SWIFT gpi logo, and UETR. Other product, service,
or company names in this publication are trade names, trademarks, or registered trademarks of
their respective owners.
18 March 2021 62
The prerequisites include having a SWIFTNet connection, access to the SWIFTNet Link, and the Alliance Web Platform if storing credentials in an HSM or SNL-connected token. If using a personal token, users must complete initialization and activation through the secure IP network or Internet .
Non-repudiation of origin is achieved by providing a signature on messages sent over SWIFTNet that confirms the sender's identity, verified through a valid PKI certificate associated with the customer's BIC. It prevents denial of message origin, ensuring accountability and traceability .
Security officers within SWIFTNet PKI have two primary roles: (1) administering customer entities, keys, and certificates online using the SWIFTNet Online Operations Manager, and (2) requesting SWIFTNet PKI changes through a Secure Channel when online operations cannot be used .
The revocation status of PKI certificates must be checked to ensure they remain valid. SWIFTNet Link or Alliance Gateway Instant retrieves the Certificate Revocation List regularly. If a certificate is revoked, any reliant messages must be considered invalid. This is necessary to prevent unauthorized or fraudulent use of certificates .
SWIFTNet PKI certificates ensure integrity and authenticity by enabling the sender to sign messages using a private signing key and the receiver to verify these signatures with the sender's public verification key. The cryptographic functions provided by SWIFTNet Link or Alliance Gateway Instant ensure authentication and non-repudiation .
To enable a personal token certificate, a security officer registers the user's DN and retrieves an activation code via the SWIFTNet Online Operations Manager. The user accesses the SWIFT Certificate Centre to activate the token. Once initialized, these tokens authenticate end users and validate their identity based on their DN .
An entity is identified within the SWIFTNet Directory by its Distinguished Name (DN), which includes the customer's 8-character BIC. Entities use these DNs in their certificates and must comply with SWIFTNet naming guidelines for smooth communication in SWIFT messaging .
To update the identification details of the first two security officers within SWIFTNet, customers must use the Secure Channel. The process includes signing a paper form with the authorised customer representative and making updates through SWIFT's Secure Channel .
A customer can appoint shared security officers from another customer who is the administering institution. These officers manage customer entities and certificates on behalf of the administered institution. Shared security officers can perform their tasks both online through the SWIFTNet Online Operations Manager and offline .
Policy IDs uniquely identify business certificates and define how certificates are used and stored. Business certificates on HSMs use Policy ID 1.3.21.6.2, while those on disks use 1.3.21.6.1 for testbed environments only. Lite certificates have a Policy ID of 1.3.21.6.6.10.100.1, and encryption certificates have 1.3.21.6.6.10.100.10 .