- Overview
- Usage
Library for Mastercard API compliant payload encryption/decryption.
Java 11+
Before using this library, you will need to set up a project in the Mastercard Developers Portal.
As part of this set up, you'll receive:
- A public request encryption certificate (aka Client Encryption Keys)
- A private response decryption key (aka Mastercard Encryption Keys)
<dependency> <groupId>com.mastercard.developer</groupId> <artifactId>client-encryption</artifactId> <version>${client-encryption-version}</version> </dependency>dependencies{implementation "com.mastercard.developer:client-encryption:$clientEncryptionVersion" } See: https://search..org/artifact/com.mastercard.developer/client-encryption
This library requires one of the following dependencies to be added to your classpath:
- Jackson 2.5.0+
- Google Gson 2.3.1+
- Json-smart 2.5.2+
- Jettison 1.0+
- Org JSON 20070829+
You can either let the library choose for you, or force the one to be used by calling withJsonEngine on the JsonParser class. Example:
JsonParser.withJsonEngine(newJettisonJsonEngine());Available engine classes:
GsonJsonEngineJacksonJsonEngineJettisonJsonEngineJsonOrgJsonEngineJsonSmartJsonEngine
A Certificate object can be created from a file by calling EncryptionUtils.loadEncryptionCertificate:
CertificateencryptionCertificate = EncryptionUtils.loadEncryptionCertificate("<insert certificate file path>");Supported certificate formats: PEM, DER.
A PrivateKey object can be created from a PKCS#12 key store by calling EncryptionUtils.loadDecryptionKey the following way:
PrivateKeydecryptionKey = EncryptionUtils.loadDecryptionKey( "<insert PKCS#12 key file path>", "<insert key alias>", "<insert key password>");A PrivateKey object can be created from an unencrypted key file by calling EncryptionUtils.loadDecryptionKey the following way:
PrivateKeydecryptionKey = EncryptionUtils.loadDecryptionKey("<insert key file path>");Supported RSA key formats:
- PKCS#1 PEM (starts with "-----BEGIN RSA PRIVATE KEY-----")
- PKCS#8 PEM (starts with "-----BEGIN PRIVATE KEY-----")
- Binary DER-encoded PKCS#8
This library supports two types of encryption/decryption, both of which support field level and entire payload encryption: JWE encryption and what the library refers to as Field Level Encryption (Mastercard encryption), a scheme used by many services hosted on Mastercard Developers before the library added support for JWE.
- Introduction
- Configuring the JWE Encryption
- Performing JWE Encryption
- Performing JWE Decryption
- Encrypting Entire Payloads
- Decrypting Entire Payloads
- Encrypting Payloads with Wildcards
- Decrypting Payloads with Wildcards
This library uses JWE compact serialization for the encryption of sensitive data. The core methods responsible for payload encryption and decryption are encryptPayload and decryptPayload in the JweEncryption class.
encryptPayloadusage:
StringencryptedRequestPayload = JweEncryption.encryptPayload(requestPayload, config);decryptPayloadusage:
StringresponsePayload = JweEncryption.decryptPayload(encryptedResponsePayload, config);Use the JweConfigBuilder to create JweConfig instances. Example:
JweConfigconfig = JweConfigBuilder.aJweEncryptionConfig() .withEncryptionCertificate(encryptionCertificate) .withDecryptionKey(decryptionKey) .withEncryptionPath("$.path.to.foo", "$.path.to.encryptedFoo") .withDecryptionPath("$.path.to.encryptedFoo.encryptedValue", "$.path.to.foo") .withEncryptedValueFieldName("encryptedValue") .withIVSize(16) // available values are 12 or 16. If not specified, default value is 16. .build();Call JweEncryption.encryptPayload with a JSON request payload and a JweConfig instance.
Example using the configuration above:
Stringpayload = "{" + " \"path\":{" + " \"to\":{" + " \"foo\":{" + " \"sensitiveField1\": \"sensitiveValue1\"," + " \"sensitiveField2\": \"sensitiveValue2\"" + " }" + " }" + " }" + "}"; StringencryptedPayload = JweEncryption.encryptPayload(payload, config); System.out.println(newGsonBuilder().setPrettyPrinting().create().toJson(newJsonParser().parse(encryptedPayload)));Output:
{"path":{"to":{"encryptedFoo":{"encryptedValue": "eyJraWQiOiI3NjFiMDAzYzFlYWRlM….Y+oPYKZEMTKyYcSIVEgtQw" } } } }Call JweEncryption.decryptPayload with a JSON response payload and a JweConfig instance.
Example using the configuration above:
StringencryptedPayload = "{" + " \"path\":{" + " \"to\":{" + " \"encryptedFoo\":{" + " \"encryptedValue\": \"eyJraWQiOiI3NjFiMDAzYzFlYWRlM….Y+oPYKZEMTKyYcSIVEgtQw\"" + " }" + " }" + " }" + "}"; Stringpayload = JweEncryption.decryptPayload(encryptedPayload, config); System.out.println(newGsonBuilder().setPrettyPrinting().create().toJson(newJsonParser().parse(payload)));Output:
{"path":{"to":{"foo":{"sensitiveField1": "sensitiveValue1", "sensitiveField2": "sensitiveValue2" } } } }Entire payloads can be encrypted using the "$" operator as encryption path:
JweConfigconfig = JweConfigBuilder.aJweEncryptionConfig() .withEncryptionCertificate(encryptionCertificate) .withEncryptionPath("$", "$") // … .build();Example:
Stringpayload = "{" + " \"sensitiveField1\": \"sensitiveValue1\"," + " \"sensitiveField2\": \"sensitiveValue2\"" + "}"; StringencryptedPayload = JweEncryption.encryptPayload(payload, config); System.out.println(newGsonBuilder().setPrettyPrinting().create().toJson(newJsonParser().parse(encryptedPayload)));Output:
{"encryptedValue": "eyJraWQiOiI3NjFiMDAzYzFlYWRlM….Y+oPYKZEMTKyYcSIVEgtQw" }Entire payloads can be decrypted using the "$" operator as decryption path:
JweConfigconfig = JweConfigBuilder.aJweEncryptionConfig() .withDecryptionKey(decryptionKey) .withDecryptionPath("$.encryptedValue", "$") // … .build();Example:
StringencryptedPayload = "{" + " \"encryptedValue\": \"eyJraWQiOiI3NjFiMDAzYzFlYWRlM….Y+oPYKZEMTKyYcSIVEgtQw\"" + "}"; Stringpayload = JweEncryption.decryptPayload(encryptedPayload, config); System.out.println(newGsonBuilder().setPrettyPrinting().create().toJson(newJsonParser().parse(payload)));Output:
{"sensitiveField1": "sensitiveValue1", "sensitiveField2": "sensitiveValue2" }Wildcards can be encrypted using the "[*]" operator as part of encryption path:
JweConfigconfig = JweConfigBuilder.aJweEncryptionConfig() .withEncryptionCertificate(encryptionCertificate) .withEncryptionPath("$.list[*]sensitiveField1", "$.list[*]encryptedField") // … .build();Example:
Stringpayload = "{\"list\": [ " + "{\"sensitiveField1\" : \"sensitiveValue1\"}, "+ "{\"sensitiveField1\" : \"sensitiveValue2\"} " + "]}"; StringencryptedPayload = JweEncryption.encryptPayload(payload, config); System.out.println(newGsonBuilder().setPrettyPrinting().create().toJson(newJsonParser().parse(encryptedPayload)));Output:
{"list": [{"encryptedField": "eyJraWQiOiI3NjFiMDAzYzFlYWRlM….Y+oPYKZEMTKyYcSIVEgtQw"},{"encryptedField": "eyJraWQiOiI3NjFiMDAzYzFlYWRlM….Y+asdvarvasdvfdvakmkmm"} ] }Wildcards can be decrypted using the "[*]" operator as part of decryption path:
JweConfigconfig = JweConfigBuilder.aJweEncryptionConfig() .withDecryptionKey(decryptionKey) .withDecryptionPath("$.list[*]encryptedField", "$.list[*]sensitiveField1") // … .build();Example:
StringencryptedPayload = "{\"list\": [ " + "{\"encryptedField\": \"eyJraWQiOiI3NjFiMDAzYzFlYWRlM….Y+oPYKZEMTKyYcSIVEgtQw\"}, " + "{\"encryptedField\": \"eyJraWQiOiI3NjFiMDAzYzFlYWRlM….Y+asdvarvasdvfdvakmkmm\"} " + " ]}"; Stringpayload = JweEncryption.decryptPayload(encryptedPayload, config); System.out.println(newGsonBuilder().setPrettyPrinting().create().toJson(newJsonParser().parse(payload)));Output:
{"list": [{"sensitiveField1": "sensitiveValue1"},{"sensitiveField2": "sensitiveValue2"} ] }- Introduction
- Configuring the Mastercard Encryption
- Performing Mastercard Encryption
- Performing Mastercard Decryption
- Encrypting Entire Payloads
- Decrypting Entire Payloads
- Encrypting Payloads with Wildcards
- Decrypting Payloads with Wildcards
- Using HTTP Headers for Encryption Params
The core methods responsible for payload encryption and decryption are encryptPayload and decryptPayload in the FieldLevelEncryption class.
encryptPayloadusage:
StringencryptedRequestPayload = FieldLevelEncryption.encryptPayload(requestPayload, config);decryptPayloadusage:
StringresponsePayload = FieldLevelEncryption.decryptPayload(encryptedResponsePayload, config);Use the FieldLevelEncryptionConfigBuilder to create FieldLevelEncryptionConfig instances. Example:
FieldLevelEncryptionConfigconfig = FieldLevelEncryptionConfigBuilder.aFieldLevelEncryptionConfig() .withEncryptionCertificate(encryptionCertificate) .withDecryptionKey(decryptionKey) .withEncryptionPath("$.path.to.foo", "$.path.to.encryptedFoo") .withDecryptionPath("$.path.to.encryptedFoo", "$.path.to.foo") .withOaepPaddingDigestAlgorithm("SHA-256") .withEncryptedValueFieldName("encryptedValue") .withEncryptedKeyFieldName("encryptedKey") .withIvFieldName("iv") .withFieldValueEncoding(FieldValueEncoding.HEX) .build();See also:
- FieldLevelEncryptionConfig.java for all config options
Call FieldLevelEncryption.encryptPayload with a JSON request payload and a FieldLevelEncryptionConfig instance.
Example using the configuration above:
Stringpayload = "{" + " \"path\":{" + " \"to\":{" + " \"foo\":{" + " \"sensitiveField1\": \"sensitiveValue1\"," + " \"sensitiveField2\": \"sensitiveValue2\"" + " }" + " }" + " }" + "}"; StringencryptedPayload = FieldLevelEncryption.encryptPayload(payload, config); System.out.println(newGsonBuilder().setPrettyPrinting().create().toJson(newJsonParser().parse(encryptedPayload)));Output:
{"path":{"to":{"encryptedFoo":{"iv": "7f1105fb0c684864a189fb3709ce3d28", "encryptedKey": "67f467d1b653d98411a0c6d3c…ffd4c09dd42f713a51bff2b48f937c8", "encryptedValue": "b73aabd267517fc09ed72455c2…dffb5fa04bf6e6ce9ade1ff514ed6141" } } } }Call FieldLevelEncryption.decryptPayload with a JSON response payload and a FieldLevelEncryptionConfig instance.
Example using the configuration above:
StringencryptedPayload = "{" + " \"path\":{" + " \"to\":{" + " \"encryptedFoo\":{" + " \"iv\": \"e5d313c056c411170bf07ac82ede78c9\"," + " \"encryptedKey\": \"e3a56746c0f9109d18b3a2652b76…f16d8afeff36b2479652f5c24ae7bd\"," + " \"encryptedValue\": \"809a09d78257af5379df0c454dcdf…353ed59fe72fd4a7735c69da4080e74f\"" + " }" + " }" + " }" + "}"; Stringpayload = FieldLevelEncryption.decryptPayload(encryptedPayload, config); System.out.println(newGsonBuilder().setPrettyPrinting().create().toJson(newJsonParser().parse(payload)));Output:
{"path":{"to":{"foo":{"sensitiveField1": "sensitiveValue1", "sensitiveField2": "sensitiveValue2" } } } }Entire payloads can be encrypted using the "$" operator as encryption path:
FieldLevelEncryptionConfigconfig = FieldLevelEncryptionConfigBuilder.aFieldLevelEncryptionConfig() .withEncryptionCertificate(encryptionCertificate) .withEncryptionPath("$", "$") // … .build();Example:
Stringpayload = "{" + " \"sensitiveField1\": \"sensitiveValue1\"," + " \"sensitiveField2\": \"sensitiveValue2\"" + "}"; StringencryptedPayload = FieldLevelEncryption.encryptPayload(payload, config); System.out.println(newGsonBuilder().setPrettyPrinting().create().toJson(newJsonParser().parse(encryptedPayload)));Output:
{"iv": "1b9396c98ab2bfd195de661d70905a45", "encryptedKey": "7d5112fa08e554e3dbc455d0628…52e826dd10311cf0d63bbfb231a1a63ecc13", "encryptedValue": "e5e9340f4d2618d27f8955828c86…379b13901a3b1e2efed616b6750a90fd379515" }Entire payloads can be decrypted using the "$" operator as decryption path:
FieldLevelEncryptionConfigconfig = FieldLevelEncryptionConfigBuilder.aFieldLevelEncryptionConfig() .withDecryptionKey(decryptionKey) .withDecryptionPath("$", "$") // … .build();Example:
StringencryptedPayload = "{" + " \"iv\": \"1b9396c98ab2bfd195de661d70905a45\"," + " \"encryptedKey\": \"7d5112fa08e554e3dbc455d0628…52e826dd10311cf0d63bbfb231a1a63ecc13\"," + " \"encryptedValue\": \"e5e9340f4d2618d27f8955828c86…379b13901a3b1e2efed616b6750a90fd379515\"" + "}"; Stringpayload = FieldLevelEncryption.decryptPayload(encryptedPayload, config); System.out.println(newGsonBuilder().setPrettyPrinting().create().toJson(newJsonParser().parse(payload)));Output:
{"sensitiveField1": "sensitiveValue1", "sensitiveField2": "sensitiveValue2" } Wildcards can be encrypted using the "[*]" operator as part of encryption path:
FLEConfigconfig = FieldLevelEncryptionConfigBuilder.aFieldLevelEncryptionConfig() .withEncryptionCertificate(encryptionCertificate) .withEncryptionPath("$.list[*]sensitiveField1", "$.list[*]encryptedField") // … .build();Example:
Stringpayload = "{\"list\": [ " + "{\"sensitiveField1\" : \"sensitiveValue1\"}, "+ "{\"sensitiveField1\" : \"sensitiveValue2\"} " + "]}"; StringencryptedPayload = FieldLevelEncryption.encryptPayload(payload, config); System.out.println(newGsonBuilder().setPrettyPrinting().create().toJson(newJsonParser().parse(encryptedPayload)));Output:
{"list": [{"encryptedField": "eyJraWQiOiI3NjFiMDAzYzFlYWRlM….Y+oPYKZEMTKyYcSIVEgtQw"},{"encryptedField": "eyJraWQiOiI3NjFiMDAzYzFlYWRlM….Y+asdvarvasdvfdvakmkmm"} ] }Wildcards can be decrypted using the "[*]" operator as part of decryption path:
FLEConfigconfig = FieldLevelEncryptionConfigBuilder.aFieldLevelEncryptionConfig() .withDecryptionKey(decryptionKey) .withDecryptionPath("$.list[*]encryptedField", "$.list[*]sensitiveField1") // … .build();Example:
StringencryptedPayload = "{\"list\": [ " + "{\"encryptedField\": \"eyJraWQiOiI3NjFiMDAzYzFlYWRlM….Y+oPYKZEMTKyYcSIVEgtQw\"}, " + "{\"encryptedField\": \"eyJraWQiOiI3NjFiMDAzYzFlYWRlM….Y+asdvarvasdvfdvakmkmm\"} " + " ]}"; Stringpayload = FieldLevelEncryption.decryptPayload(encryptedPayload, config); System.out.println(newGsonBuilder().setPrettyPrinting().create().toJson(newJsonParser().parse(payload)));Output:
{"list": [{"sensitiveField1": "sensitiveValue1"},{"sensitiveField2": "sensitiveValue2"} ] }In the sections above, encryption parameters (initialization vector, encrypted symmetric key, etc.) are part of the HTTP payloads.
Here is how to configure the library for using HTTP headers instead.
Call with{Param}HeaderName instead of with{Param}FieldName when building a FieldLevelEncryptionConfig instance. Example:
FieldLevelEncryptionConfigconfig = FieldLevelEncryptionConfigBuilder.aFieldLevelEncryptionConfig() .withEncryptionCertificate(encryptionCertificate) .withDecryptionKey(decryptionKey) .withEncryptionPath("$", "$") .withDecryptionPath("$", "$") .withOaepPaddingDigestAlgorithm("SHA-256") .withEncryptedValueFieldName("data") .withIvHeaderName("x-iv") .withEncryptedKeyHeaderName("x-encrypted-key") // … .withFieldValueEncoding(FieldValueEncoding.HEX) .build();See also:
- FieldLevelEncryptionConfig.java for all config options
Encryption can be performed using the following steps:
- Generate parameters by calling
FieldLevelEncryptionParams.generate:
FieldLevelEncryptionParamsparams = FieldLevelEncryptionParams.generate(config);- Update the request headers:
request.setHeader(config.getIvHeaderName(), params.getIvValue()); request.setHeader(config.getEncryptedKeyHeaderName(), params.getEncryptedKeyValue()); // …- Call
encryptPayloadwith params:
FieldLevelEncryption.encryptPayload(payload, config, params);Example using the configuration above:
Stringpayload = "{" + " \"sensitiveField1\": \"sensitiveValue1\"," + " \"sensitiveField2\": \"sensitiveValue2\"" + "}"; StringencryptedPayload = FieldLevelEncryption.encryptPayload(payload, config, params); System.out.println(newGsonBuilder().setPrettyPrinting().create().toJson(newJsonParser().parse(encryptedPayload)));Output:
{"data": "53b5f07ee46403af2e92abab900853…d560a0a08a1ed142099e3f4c84fe5e5" }Decryption can be performed using the following steps:
- Read the response headers:
StringivValue = response.getHeader(config.getIvHeaderName()); StringencryptedKeyValue = response.getHeader(config.getEncryptedKeyHeaderName()); // …- Create a
FieldLevelEncryptionParamsinstance:
FieldLevelEncryptionParamsparams = newFieldLevelEncryptionParams(ivValue, encryptedKeyValue, …, config);- Call
decryptPayloadwith params:
FieldLevelEncryption.decryptPayload(encryptedPayload, config, params);Example using the configuration above:
StringencryptedPayload = "{" + " \"data\": \"53b5f07ee46403af2e92abab900853…d560a0a08a1ed142099e3f4c84fe5e5\"" + "}"; Stringpayload = FieldLevelEncryption.decryptPayload(encryptedPayload, config, params); System.out.println(newGsonBuilder().setPrettyPrinting().create().toJson(newJsonParser().parse(payload)));Output:
{"sensitiveField1": "sensitiveValue1", "sensitiveField2": "sensitiveValue2" }OpenAPI Generator generates API client libraries from OpenAPI Specs. It provides generators and library templates for supporting multiple languages and frameworks.
The com.mastercard.developer.interceptors package will provide you with some interceptor classes you can use when configuring your API client. These classes will take care of encrypting request and decrypting response payloads, but also of updating HTTP headers when needed.
Library options currently supported for the java generator:
See also:
<configuration> <inputSpec>${project.basedir}/src/main/resources/openapi-spec.yaml</inputSpec> <generatorName>java</generatorName> <library>okhttp-gson</library> <!-- … --> </configuration>ApiClientclient = newApiClient(); client.setBasePath("https://sandbox.api.mastercard.com"); List<Interceptor> interceptors = client.getHttpClient().interceptors(); interceptors.add(OkHttp2EncryptionInterceptor.from(config)); interceptors.add(newOkHttp2OAuth1Interceptor(consumerKey, signingKey)); ServiceApiserviceApi = newServiceApi(client); // …ApiClientclient = newApiClient(); client.setBasePath("https://sandbox.api.mastercard.com"); client.setHttpClient( client.getHttpClient() .newBuilder() .addInterceptor(OkHttpEncryptionInterceptor.from(config)) .addInterceptor(newOkHttpOAuth1Interceptor(consumerKey, signingKey)) .build() ); ServiceApiserviceApi = newServiceApi(client); // …<configuration> <inputSpec>${project.basedir}/src/main/resources/openapi-spec.yaml</inputSpec> <generatorName>java</generatorName> <library>feign</library> <!-- … --> </configuration>ApiClientclient = newApiClient(); ObjectMapperobjectMapper = client.getObjectMapper(); client.setBasePath("https://sandbox.api.mastercard.com"); Feign.BuilderfeignBuilder = client.getFeignBuilder(); ArrayList<RequestInterceptor> interceptors = newArrayList<>(); interceptors.add(newOpenFeignOAuth1Interceptor(consumerKey, signingKey, client.getBasePath())); feignBuilder.requestInterceptors(interceptors); feignBuilder.encoder(OpenFeignEncoderExecutor.from(config, newFormEncoder(newJacksonEncoder(objectMapper)))); feignBuilder.decoder(OpenFeignDecoderExecutor.from(config, newJacksonDecoder(objectMapper))); ServiceApiserviceApi = client.buildClient(ServiceApi.class); // …<configuration> <inputSpec>${project.basedir}/src/main/resources/openapi-spec.yaml</inputSpec> <generatorName>java</generatorName> <library>retrofit</library> <!-- … --> </configuration>ApiClientclient = newApiClient(); RestAdapter.BuilderadapterBuilder = client.getAdapterBuilder(); adapterBuilder.setEndpoint("https://sandbox.api.mastercard.com"); List<Interceptor> interceptors = client.getOkClient().interceptors(); interceptors.add(OkHttp2EncryptionInterceptor.from(config)); interceptors.add(newOkHttp2OAuth1Interceptor(consumerKey, signingKey)); ServiceApiserviceApi = client.createService(ServiceApi.class); // …<configuration> <inputSpec>${project.basedir}/src/main/resources/openapi-spec.yaml</inputSpec> <generatorName>java</generatorName> <library>retrofit2</library> <!-- … --> </configuration>ApiClientclient = newApiClient(); Retrofit.BuilderadapterBuilder = client.getAdapterBuilder(); adapterBuilder.baseUrl("https://sandbox.api.mastercard.com"); OkHttpClient.BuilderokBuilder = client.getOkBuilder(); okBuilder.addInterceptor(OkHttpEncryptionInterceptor.from(config)); okBuilder.addInterceptor(newOkHttpOAuth1Interceptor(consumerKey, signingKey)); ServiceApiserviceApi = client.createService(ServiceApi.class); // …<configuration> <inputSpec>${project.basedir}/src/main/resources/openapi-spec.yaml</inputSpec> <generatorName>java</generatorName> <library>google-api-client</library> <!-- … --> </configuration>HttpRequestInitializerinitializer = newHttpRequestInitializer(){@Overridepublicvoidinitialize(HttpRequestrequest){HttpExecuteOAuth1InterceptorauthenticationInterceptor = newHttpExecuteOAuth1Interceptor(consumerKey, signingKey); HttpExecuteEncryptionInterceptorencryptionInterceptor = HttpExecuteEncryptionInterceptor.from(config); request.setInterceptor(newHttpExecuteInterceptorChain(Arrays.asList(encryptionInterceptor, authenticationInterceptor))); request.setResponseInterceptor(encryptionInterceptor)} }; ApiClientclient = newApiClient("https://sandbox.api.mastercard.com", null, initializer, null); ServiceApiserviceApi = client.serviceApi(); // …