Next-Generation PKI Platform

Enterprise-Grade Trust Infrastructure Built for Scale

A production-ready, cloud-native PKI platform powered by 46 specialized microservices, designed for organizations that demand security, scalability, and compliance at enterprise scale.

46
Microservices
<50ms
Signing Performance
99.9%
Uptime SLA

What Makes This Platform Unique?

đŸ—ïž

Microservices Architecture

46 specialized services working in concert for maximum flexibility and scalability

⚡

Sub-50ms Performance

HSM session pooling and goroutine concurrency for lightning-fast operations

🔒

Zero OS Vulnerabilities

Container-based deployment with minimal attack surface on Kubernetes

✅

Regulatory Compliance

eIDAS, GDPR, ISO 27001, SOC 2, PCI DSS built-in from day one

🔄

Production Patterns

Saga, idempotency, circuit breakers, distributed locking

🏱

Enterprise Features

Multi-tenancy, audit trails, RBAC, policy engine

Enterprise-Grade Architecture Patterns

Battle-tested distributed system patterns for mission-critical operations

⚡ Multi-Cluster High Availability Architecture

Global Load Balancer GeoDNS + Anycast 🌍 Datacenter 1 (EU) 🌍 Datacenter 2 (US) 🌍 Datacenter 3 (APAC) Kubernetes Cluster 1 Nodes (Servers): node-eu-01 node-eu-02 node-eu-03 node-eu-04 Microservices (47 services): API Gateway: CA Service: Cert Issuance: Signing Service: OCSP Service: TSA Service: HSM Proxy: + 40 more services (each with 3-4 pods) Data Layer: PostgreSQL Primary Replica Replica +2 replicas Redis Cluster Master Master Slave RabbitMQ Node 1 Node 2 Node 3 HSM Cluster HSM 1 HSM 2 HSM 3 ✓ Active Kubernetes Cluster 2 Nodes (Servers): node-us-01 node-us-02 node-us-03 node-us-04 Microservices (47 services): API Gateway: CA Service: Cert Issuance: Signing Service: OCSP Service: TSA Service: HSM Proxy: + 40 more services (each with 2-3 pods) Data Layer: PostgreSQL Primary Replica Replica +2 replicas Redis Cluster Master Master Slave RabbitMQ Node 1 Node 2 Node 3 HSM Cluster HSM 1 HSM 2 HSM 3 ✓ Active Kubernetes Cluster 3 Nodes (Servers): node-ap-01 node-ap-02 node-ap-03 node-ap-04 Microservices (47 services): API Gateway: CA Service: Cert Issuance: Signing Service: OCSP Service: TSA Service: HSM Proxy: + 40 more services (each with 2-3 pods) Data Layer: PostgreSQL Replica Replica Replica Read replicas Redis Cluster Master Master Slave RabbitMQ Node 1 Node 2 Node 3 HSM Cluster HSM 1 HSM 2 HSM 3 ✓ Active Cross-cluster sync Cross-cluster sync 🎯 High Availability Summary Multi-Region Setup: ✓ 3 independent Kubernetes clusters (EU, US, APAC) ✓ 12 physical servers (4 per region) ✓ GeoDNS routing for lowest latency ✓ Automatic failover between regions (<5s) ✓ RPO <1min, RTO <3min Service Distribution: ✓ 47 microservices in each cluster ✓ 10 pods per service = 470 pods/cluster ✓ 1,410 total pods across all clusters ✓ Every service exists in every cluster ✓ Zero single point of failure Data Replication: ✓ PostgreSQL cross-region replication ✓ Redis Sentinel with cross-DC sync ✓ RabbitMQ federation ✓ HSM key backup across sites ✓ Eventual consistency (max 2s lag) Capacity: ✓ 300K concurrent requests ✓ 30K signatures/second ✓ 99.99% uptime SLA ✓ Auto-scale to 20 pods/service ✓ Sub-100ms p99 latency
✓ HPA (CPU/Memory) ✓ 100K+ concurrent requests ✓ 10K signatures/second ✓ ClusterIP load balancing 📈 Observability ✓ Prometheus + Grafana ✓ Distributed tracing (Jaeger) ✓ SLO: 99.9% uptime ✓ p99 latency < 100ms ✓ Error rate < 0.01% 🔒 Security ✓ mTLS service-to-service ✓ NetworkPolicy isolation ✓ RBAC + Pod Security ✓ Secrets in Vault ✓ CVE scanning
1

Idempotency: Safe Retries at Scale

Challenge: In distributed systems, network failures can cause duplicate requests. Without idempotency, this leads to duplicate charges, double signatures, or data corruption.

Our Solution: Multi-layered idempotency protection

Business Impact:

  • ✅ Safe automatic retries
  • ✅ No duplicate billing
  • ✅ Consistent state across failures
  • ✅ Client-side retry without risk
2

Saga Pattern: Distributed Transactions

Challenge: In microservices, traditional ACID transactions don't work across service boundaries. How do you ensure consistency?

Our Solution: Saga pattern with compensating transactions

1

Validate Subscription

Check subscription exists and is active

→
2

Check Plan & Limits

Retrieve plan quotas and limits

→
3

Check Quota

Verify usage within limits

→
4

Create Usage Record

Record successful transaction

Business Impact:

  • ✅ Consistent state across services
  • ✅ Automatic compensation on failure
  • ✅ Business rule enforcement
  • ✅ Clear audit trail of distributed transactions
3

Transaction Locking: Preventing Race Conditions

Challenge: When multiple admins or processes modify the same resource simultaneously, how do you prevent data corruption?

Our Solution: Both optimistic and pessimistic locking strategies

Optimistic Locking

Version-based compare-and-swap

Use case: High read, low contention scenarios

Pessimistic Locking

SELECT FOR UPDATE database locks

Use case: Critical operations like key rotation

Distributed Locking

Redis-based distributed locks (Redlock)

Use case: Multi-admin collision prevention

Business Impact:

  • ✅ No lost updates
  • ✅ Multi-admin safety
  • ✅ Cross-service coordination
  • ✅ Clear error messages on conflicts
4

Fault Tolerance: Resilience by Design

Challenge: External services fail, networks are unreliable, and dependencies have outages. How do you keep the system running?

Our Solution: Circuit breakers, bulkheads, retries, and timeouts

Circuit Breaker

Automatically stop calling failing services

CLOSED → OPEN → HALF_OPEN

Bulkhead Pattern

Resource isolation prevents cascading failures

Separate connection pools per service

Exponential Backoff

Smart retry logic with increasing delays

1s → 2s → 4s → 8s → 16s

Adaptive Timeouts

Different timeouts for different operations

Fast ops: 5s, Crypto ops: 30s

Business Impact:

  • ✅ Graceful degradation under load
  • ✅ Automatic recovery from transient failures
  • ✅ Resource isolation prevents cascading failures
  • ✅ 99.9%+ uptime despite external dependencies

⚡ Go Performance & Scalability

Built with Go for unparalleled performance and efficient resource utilization

Why Go for Enterprise PKI?

🚀

Native Concurrency

Goroutines and channels for efficient parallelism

đŸ’Ÿ

Low Memory Footprint

~25MB per service vs. 200MB+ for JVM

⚡

Fast Startup

<1 second vs. 10-30 seconds for Java

📩

Single Binary Deployment

No runtime dependencies

🔒 Security Excellence

Multiple layers of security from infrastructure to application

❌ Traditional VM Deployment

  • 200+ OS packages
  • systemd, bash, networking tools
  • OS-level vulnerabilities (CVEs)
  • Requires constant patching
  • Large attack surface

✅ Our Container Deployment

  • Minimal container (distroless)
  • No shell, no package manager
  • Only application binary
  • Immutable infrastructure
  • Minimal attack surface

🔐 HSM Integration

Hardware-backed cryptographic operations with FIPS 140-2 Level 3 certification. Private keys never leave the HSM.

🏱 Multi-Tenant Isolation

Complete tenant data isolation at database, network, and application levels. Row-level security policies enforce separation.

🔑 Key Management & Rotation

Automated key rotation with version tracking and rotation history. Pessimistic locking prevents concurrent modifications.

đŸ›Ąïž Network Policies

Kubernetes NetworkPolicy for micro-segmentation. Services can only communicate with authorized peers.

✅ Compliance & Regulatory Framework

Built-in compliance with major international standards and regulations

đŸ‡ȘđŸ‡ș

eIDAS

Electronic Identification, Authentication and Trust Services

  • Qualified Electronic Signatures (QES)
  • Qualified Timestamps (TST)
  • Qualified Certificate for Electronic Seals
  • PAdES-B-LTA long-term archival
🔒

GDPR

General Data Protection Regulation

  • Art. 15: Right to Access
  • Art. 17: Right to Erasure (Right to be Forgotten)
  • Art. 20: Right to Data Portability
  • Art. 30: Record of Processing Activities
📋

ISO 27001

Information Security Management

  • A.9.2.1: User registration and de-registration
  • A.12.4.1: Event logging
  • A.18.1.5: Regulation of cryptographic controls
  • Comprehensive ISMS controls
✓

SOC 2 Type II

Trust Service Criteria

  • CC6.1: Logical access controls
  • CC6.6: Encryption in transit and at rest
  • CC7.2: System monitoring
  • A1.2: Data retention and disposal
💳

PCI DSS

Payment Card Industry Data Security Standard

  • Req 3: Protect stored cardholder data
  • Req 4: Encrypt transmission
  • Req 8: Identify and authenticate access
  • Req 10: Track and monitor all access
🌐

Certificate Transparency

RFC 6962

  • Public audit trail of all issued certificates
  • Detection of misissued certificates
  • Cryptographic proof of inclusion (Merkle tree)
  • Browser trust requirements

🏱 47 Specialized Microservices

Each service is a focused, production-ready component designed for a specific domain

00

Database Initialization Service

Infrastructure

Purpose: Automated database schema initialization and migration management.

Creates and manages database schemas, tables, indexes, and initial data. Handles version migrations with Flyway/Liquibase-style versioning. Ensures idempotent schema deployment across multiple database instances.

Schema Versioning Idempotent Migrations Rollback Support
Schema Migration

VerziĂłkezelĂ©si technika adatbĂĄzis sĂ©mĂĄhoz: minden mĂłdosĂ­tĂĄs (Ășj tĂĄbla, index, oszlop) egy verziĂłval van ellĂĄtva. A rendszer automatikusan alkalmazza a hiĂĄnyzĂł verziĂłkat sorrendben.

Idempotency

Olyan mƱvelet, amit többször is el lehet vĂ©gezni anĂ©lkĂŒl, hogy megvĂĄltoztatnĂĄ az eredmĂ©nyt. PĂ©ldĂĄul: "CREATE TABLE IF NOT EXISTS" - ha lĂ©tezik a tĂĄbla, nem csinĂĄl semmit.

Flyway/Liquibase

NĂ©pszerƱ database migration eszközök. SQL fĂĄjlokat verziĂłz (V1__initial.sql, V2__add_users.sql) Ă©s automatikusan futtatja Ƒket a megfelelƑ sorrendben.

01

Certificate Authority (CA) Management Service

Core PKI

Purpose: Complete lifecycle management of Certificate Authorities (Root CA, Intermediate CA, Issuing CA).

Manages the CA hierarchy (Root → Intermediate → Issuing CAs). Handles CA certificate generation, key ceremony workflows, CA certificate renewal, and revocation. Implements optimistic locking for concurrent CA operations and maintains complete audit trails. Key Technology: X.509 certificate chain management, PKCS#10 CSR processing.

CA Hierarchy Key Ceremony Optimistic Locking Audit Trail
CA Hierarchy

TanĂșsĂ­tvĂĄnykibocsĂĄtĂłk hierarchiĂĄja: Root CA (legfelsƑ, offline) → Intermediate CA (köztes) → Issuing CA (kibocsĂĄtĂł). Ha egy szintet kompromittĂĄlnak, csak azt kell visszavonni, a felette lĂ©vƑket nem.

Key Ceremony

Formålis, auditålt eljårås CA kulcsok generålåsåra és tårolåsåra. Több személy jelenlétét, videó dokumentåciót és fizikai biztonsågi intézkedéseket (pl. HSM) igényel.

Optimistic Locking

VerziĂł-alapĂș konkurencia kezelĂ©s: minden rekord van egy verziĂł szĂĄm. MentĂ©snĂ©l ellenƑrzi, hogy vĂĄltozott-e. Ha igen, hibĂĄt dob. Jobb teljesĂ­tmĂ©ny, mint a pessimistic lock.

X.509 Certificate

SzabvĂĄnyos digitĂĄlis tanĂșsĂ­tvĂĄny formĂĄtum (RFC 5280). Tartalmazza: tulajdonos, kibocsĂĄtĂł, publikus kulcs, Ă©rvĂ©nyessĂ©gi idƑ, digitĂĄlis alĂĄĂ­rĂĄs, extensions (kulcshasznĂĄlat, stb.).

02

Certificate Issuance Service

Core PKI

Purpose: Issues X.509 digital certificates for users, devices, and services.

Processes Certificate Signing Requests (CSR), validates identity information, applies certificate profiles (QCP-n, QCP-l, QCP-n-qscd for eIDAS), and issues certificates. Supports qualified certificates for eIDAS compliance. Integrates with HSM (Service 14) for private key operations. Implements certificate templates with configurable validity periods, key usage, and extended key usage fields.

CSR Processing Certificate Profiles eIDAS QES HSM Integration
CSR (Certificate Signing Request)

TanĂșsĂ­tvĂĄny kĂ©relem: tartalmazza a kĂ©relmezƑ publikus kulcsĂĄt Ă©s adatait (nĂ©v, szervezet, domain). A CA ezt ellenƑrzi Ă©s alĂĄĂ­rja, Ă­gy lesz belƑle tanĂșsĂ­tvĂĄny.

eIDAS Qualified Certificate

EU szabvĂĄnyĂș minƑsĂ­tett tanĂșsĂ­tvĂĄny (QES - Qualified Electronic Signature). Jogi Ă©rtelemben egyenĂ©rtĂ©kƱ a kĂ©zzel Ă­rt alĂĄĂ­rĂĄssal. SzigorĂș identity ellenƑrzĂ©st Ă©s HSM hasznĂĄlatot igĂ©nyel.

Certificate Profile

TanĂșsĂ­tvĂĄny sablon: definiĂĄlja az Ă©rvĂ©nyessĂ©gi idƑt, kulcshasznĂĄlatot (signing, encryption), algoritmusokat, Ă©s az X.509 extensionöket. PĂ©ldĂĄul: "TLS Server" vs "Email Signing".

Key Usage vs Extended Key Usage

Key Usage: alapvetƑ cĂ©lok (digitalSignature, keyEncipherment). Extended Key Usage: specifikus cĂ©lok (serverAuth, clientAuth, emailProtection, codeSigning).

03

Document Signing Service

Digital Signatures

Purpose: Signs documents with legally binding electronic signatures.

Supports multiple signature formats: PAdES (PDF signatures), CAdES (CMS Advanced Electronic Signatures), XAdES (XML signatures). Implements PAdES-B-LTA for long-term archival with embedded timestamps and validation data. Uses hash-based idempotency (signature_hash UNIQUE constraint) to prevent duplicate signatures. Coordinates with TSA Service (13) for RFC 3161 timestamps.

PAdES-B-LTA CAdES XAdES TSA Integration
PAdES (PDF Advanced Electronic Signature)

PDF-specifikus alåíråsi szabvåny (ETSI EN 319 142). A dokumentumba beågyazza az alåíråst, timestamp-et, és validåciós adatokat. A PDF låthatóan módosul (digitålis alåírås jelenik meg).

CAdES (CMS Advanced Electronic Signature)

ÁltalĂĄnos alĂĄĂ­rĂĄsi formĂĄtum bĂĄrmilyen fĂĄjlhoz (ETSI EN 319 122). Az alĂĄĂ­rĂĄs kĂŒlön fĂĄjlkĂ©nt vagy beĂĄgyazva tĂĄrolhatĂł. Nem mĂłdosĂ­tja az eredeti fĂĄjlt.

XAdES (XML Advanced Electronic Signature)

XML dokumentumokra specializĂĄlt alĂĄĂ­rĂĄsi formĂĄtum (ETSI EN 319 132). Az alĂĄĂ­rĂĄs XML elemkĂ©nt beĂĄgyazhatĂł a dokumentumba vagy kĂŒlön ĂĄllhat.

Hash-based Idempotency

Adatbåzis UNIQUE constraint a dokumentum hash-én: ugyanazt a dokumentumot nem lehet kétszer alåírni. SHA-256 hash az alåírt tartalomról, ami egyedi azonosítóként mƱködik.

04

Certificate Lifecycle Service

Core PKI

Purpose: Manages the complete lifecycle of issued certificates (renewal, revocation, suspension).

Handles certificate renewal before expiration (configurable warning periods: 90/60/30 days), certificate revocation with CRL reason codes (RFC 5280), and certificate suspension (temporary hold). Implements saga pattern for multi-step revocation: notify CRL service (06), update OCSP responder (05), log audit event (17). Maintains certificate status history.

Auto-Renewal Revocation Suspension Saga Pattern
Certificate Renewal

Új tanĂșsĂ­tvĂĄny kibocsĂĄtĂĄsa a rĂ©gi lejĂĄrata elƑtt. A folyamat sorĂĄn Ășj kulcspĂĄr generĂĄlĂłdik (vagy ĂșjrahasznĂĄljuk a rĂ©git), Ășj CSR-t kĂŒldĂŒnk, Ă©s Ășj tanĂșsĂ­tvĂĄnyt kapunk hosszabb Ă©rvĂ©nyessĂ©ggel.

Certificate Revocation

TanĂșsĂ­tvĂĄny visszavonĂĄsa lejĂĄrat elƑtt (privĂĄt kulcs kompromittĂĄlĂłdott, felhasznĂĄlĂł tĂĄvozott, stb.). RFC 5280 reason code-ok: keyCompromise, affiliationChanged, superseded, cessationOfOperation.

Saga Pattern (Distributed Transaction)

Több lĂ©pĂ©sbƑl ĂĄllĂł tranzakciĂł mikroszerviz környezetben. Minden lĂ©pĂ©s sikeres vagy kompenzĂĄlĂł mƱveletet hajt vĂ©gre hiba esetĂ©n. PĂ©lda: revocation → CRL update → OCSP update → audit log.

Certificate Suspension (Hold)

Ideiglenes felfĂŒggesztĂ©s: a tanĂșsĂ­tvĂĄny ĂĄtmenetileg Ă©rvĂ©nytelen, de kĂ©sƑbb reaktivĂĄlhatĂł. Reason code: certificateHold. HasznĂĄlat: gyanĂșs aktivitĂĄs vizsgĂĄlata, elveszett kulcs keresĂ©se.

05

OCSP Responder Service

Core PKI

Purpose: Provides real-time certificate status validation via OCSP (RFC 6960).

Responds to Online Certificate Status Protocol (OCSP) requests with signed responses (good/revoked/unknown). Uses Redis caching for sub-10ms response times. Implements OCSP stapling support for TLS servers. Pre-computes OCSP responses for high-volume certificates. Supports OCSP nonces for replay attack prevention. Performance: 8ms p50 latency, 125 ops/sec throughput.

RFC 6960 Redis Cache 8ms Response OCSP Stapling
OCSP (Online Certificate Status Protocol)

ValĂłs idejƱ tanĂșsĂ­tvĂĄny stĂĄtusz lekĂ©rdezĂ©s (RFC 6960). Kliens elkĂŒldi a tanĂșsĂ­tvĂĄny serial number-Ă©t, az OCSP responder vĂĄlaszol: good (Ă©rvĂ©nyes), revoked (visszavont), unknown (ismeretlen).

OCSP Stapling

TLS kiszolgĂĄlĂł elƑre lekĂ©rdezi sajĂĄt OCSP vĂĄlaszĂĄt Ă©s a TLS handshake-ben elkĂŒldi a kliensnek. ElƑny: kliens nem kell kĂŒlön OCSP kĂ©rĂ©st csinĂĄljon, gyorsabb, kevesebb privacy leak.

OCSP Nonce

Egyszer hasznĂĄlatos random szĂĄm az OCSP kĂ©rĂ©sben. A vĂĄlasznak tartalmaznia kell ugyanazt a nonce-t. VĂ©d replay attack ellen: rĂ©gi OCSP vĂĄlaszt nem lehet ĂșjrafelhasznĂĄlni.

Pre-computed OCSP Response

OCSP vĂĄlaszok elƑre generĂĄlĂĄsa Ă©s cache-elĂ©se. Nagy forgalmĂș tanĂșsĂ­tvĂĄnyokhoz (1M+ lekĂ©rdezĂ©s/nap) nem lehet minden kĂ©rĂ©sre generĂĄlni. ElƑre kĂ©szĂ­tjĂŒk Ă©s Redis-be tesszĂŒk.

06

CRL Distribution Service

Core PKI

Purpose: Generates and distributes Certificate Revocation Lists (CRL).

Creates Certificate Revocation Lists per CA with configurable refresh intervals (hourly/daily). Implements Delta CRLs for bandwidth optimization. Publishes CRLs to HTTP/HTTPS endpoints with CDN support. Handles CRL number sequencing and versioning. Coordinates with Certificate Lifecycle Service (04) for revocation updates. Supports both DER and PEM formats.

Delta CRL CDN Distribution Auto-Generation Version Tracking
CRL (Certificate Revocation List)

Visszavont tanĂșsĂ­tvĂĄnyok listĂĄja, amit a CA periodikusan publikĂĄl (RFC 5280). Tartalmazza a serial number-eket, revocation date-et, Ă©s reason code-ot. Kliens letölti Ă©s ellenƑrzi a tanĂșsĂ­tvĂĄnyt.

Delta CRL

Csak az Ășj revocation-öket tartalmazĂł CRL a legutĂłbbi teljes CRL Ăłta. Kisebb mĂ©ret, gyorsabb letöltĂ©s. HasznĂĄlat: teljes CRL naponta, Delta CRL ĂłrĂĄnkĂ©nt. Kliens kombinĂĄlja Ƒket.

CRL Number

NövekvƑ sorszĂĄm minden CRL kiadĂĄshoz. SegĂ­t a kliensnek ellenƑrizni, hogy naprakĂ©sz CRL-t hasznĂĄl-e. PĂ©ldĂĄul: CRL #1234 rĂ©gebbi mint CRL #1235.

CRL Distribution Point (CDP)

URL a tanĂșsĂ­tvĂĄnyban (X.509 extension), ahonnan a CRL letölthetƑ. PĂ©ldĂĄul: http://crl.example.com/ca1.crl. A kliens ezt olvassa Ă©s letölti a CRL-t.

07

File Storage Service

Infrastructure

Purpose: S3-compatible object storage for documents, certificates, and binary data.

Provides S3-compatible API for storing signed documents, certificate bundles, audit log archives, and KYC documents. Implements multipart upload for large files (>5GB). Supports versioning and lifecycle policies (auto-deletion after retention period). Uses MinIO or cloud object storage (AWS S3, Azure Blob, GCS). Implements content-addressable storage with SHA-256 hashing for deduplication.

S3-Compatible Multipart Upload Versioning Deduplication
S3-Compatible API

Amazon S3 API kompatibilis object storage. PUT/GET/DELETE mƱveletek HTTP-n keresztĂŒl. MinIO, Ceph, vagy valĂłdi AWS S3. ElƑny: könnyen cserĂ©lhetƑ provider anĂ©lkĂŒl, hogy a kĂłdot mĂłdosĂ­tanĂĄnk.

Multipart Upload

Nagy fĂĄjlok (>5GB) feltöltĂ©se darabokban (chunks). Minden chunk kĂŒlön feltöltƑdik (5MB-100MB rĂ©szek), vĂ©gĂ©n összefƱzzĂŒk. ElƑny: retry csak a hibĂĄs chunk-ra, nem az egĂ©sz fĂĄjlra, gyorsabb parallel upload.

Object Versioning

Minden mĂłdosĂ­tĂĄskor Ășj verziĂł kĂ©szĂŒl, rĂ©gi verziĂłk megmaradnak. FĂĄjl törlĂ©se nem valĂłdi törlĂ©s, csak delete marker. VisszaĂĄllĂ­tĂĄs korĂĄbbi verziĂłra: list versions → restore. VĂ©delem vĂ©letlen törlĂ©s ellen.

Content-Addressable Storage

FĂĄjlok tĂĄrolĂĄsa hash-ĂŒk alapjĂĄn (SHA-256). Ugyanaz a tartalom = ugyanaz a hash = egyszer tĂĄrolva. Automatikus deduplikĂĄciĂł: 1000 pĂ©ldĂĄny ugyanarrĂłl a PDF-rƑl = 1x tĂĄrolĂĄs.

08

Queue Management Service

Infrastructure

Purpose: Asynchronous job queuing and message broker for distributed processing.

Manages job queues using Redis Streams or RabbitMQ. Supports multiple queue priorities (high/normal/low). Implements dead letter queues (DLQ) for failed jobs. Provides at-least-once delivery guarantees with acknowledgments. Handles bulk signing jobs, certificate renewal batches, and compliance checks. Coordinates with Worker Orchestration (09) for job execution. Pattern: Producer-consumer with worker pools.

Redis Streams Priority Queues DLQ At-Least-Once
Redis Streams

Redis adatstruktĂșra message queue-hoz. Append-only log, consumer groups, acknowledgments. Gyorsabb mint RabbitMQ egyszerƱ use case-ekhez, beĂ©pĂ­tett persistence, cluster support.

Dead Letter Queue (DLQ)

KĂŒlön queue a sikertelen job-oknak. Ha egy job 5x megprĂłbĂĄlva is sikertelen, DLQ-ba kerĂŒl. ManuĂĄlis vizsgĂĄlat: mi okozta a hibĂĄt? Fix utĂĄn Ășjra feldolgozhatĂł. Nem blokkolja a normĂĄl queue-t.

At-Least-Once Delivery

GarantĂĄlja hogy minden ĂŒzenet legalĂĄbb egyszer feldolgozĂĄsra kerĂŒl (de lehet többször is). Worker vesz egy job-ot, feldolgozza, ACK-ot kĂŒld. Ha ACK nem Ă©rkezik (crash), job Ășjra queue-ba kerĂŒl.

Priority Queue

Több priority level: high (azonnal), normal (vĂĄrhatĂł), low (kĂ©sƑbb). High priority job-ok elƑre kerĂŒlnek. HasznĂĄlat: urgent signing request elƑre, batch operations hĂĄtra.

09

Worker Orchestration Service

Infrastructure

Purpose: Distributed worker management for background job processing.

Manages worker lifecycle (registration, heartbeats, health checks). Implements distributed locking (Redis Redlock) to prevent duplicate job processing. Provides exponential backoff retry logic (1s → 2s → 4s → 8s → 16s). Monitors worker health with 30-second heartbeat intervals. Supports graceful shutdown (wait for current job completion). Uses goroutines for concurrent job processing. Tracks job status: pending → processing → completed/failed.

Distributed Lock Exponential Backoff Heartbeat Graceful Shutdown
Distributed Lock (Redis Redlock)

Lock mechanizmus elosztott környezetben Redis-szel. Több worker közĂŒl csak 1 dolgozhatja fel ugyanazt a job-ot. SET NX PX paranccsal: set if not exists, expire after X ms. Redlock algoritmus: 3/5 Redis node.

Exponential Backoff

ÚjraprĂłbĂĄlkozĂĄs növekvƑ vĂĄrakozĂĄsi idƑvel hiba esetĂ©n. 1. prĂłba utĂĄn 1s vĂĄr, 2. utĂĄn 2s, 3. utĂĄn 4s, stb. MegakadĂĄlyozza hogy azonnal Ășjra prĂłbĂĄlkozzon (ami tĂșlterhelheti a rendszert), ad idƑt a recovery-nek.

Heartbeat

Worker 30 mĂĄsodpercenkĂ©nt jelzi hogy Ă©l (timestamp update Redis-ben). Orchestrator ellenƑrzi: ha 60s-nĂ©l rĂ©gebbi a heartbeat, worker crashed, job-jai visszakerĂŒlnek a queue-ba. Health monitoring.

Graceful Shutdown

Worker leĂĄllĂ­tĂĄskor befejezi a current job-ot, nem fogad Ășj job-okat. SIGTERM signal → finish current work → close connections → exit. ElkerĂŒli a fĂ©lig kĂ©sz job-okat Ă©s adatvesztĂ©st.

10

Notification Service

Business Services

Purpose: Multi-channel notification delivery (email, SMS, webhooks, push notifications).

Sends notifications via SMTP (email), Twilio/Vonage (SMS), webhooks, and push notifications. Uses templating engine (HTML/text templates with i18n support). Implements retry logic for failed deliveries. Tracks delivery status and bounce handling. Supports batch notifications (e.g., certificate expiry warnings to 1000 users). Integrates with third-party services (SendGrid, Amazon SES, Mailgun).

Multi-Channel Templates Retry Logic Batch Delivery
SMTP (Simple Mail Transfer Protocol)

Email kĂŒldĂ©si protokoll. Service SMTP szerverre csatlakozik (SendGrid, SES, Gmail), autentikĂĄl, Ă©s elkĂŒldi az email-t. Port 587 (TLS), 465 (SSL). Bounce handling: delivery failure notification.

Template Engine

Dinamikus tartalom generĂĄlĂĄs sablonokbĂłl. Sablon: "Szia {{name}}, tanĂșsĂ­tvĂĄnyod {{days}} nap mĂșlva lejĂĄr." Engine behelyettesĂ­ti a vĂĄltozĂłkat. TĂĄmogatja az i18n-t (multi-language), HTML/text formĂĄtumokat.

Webhook

HTTP POST kĂ©rĂ©s egy kĂŒlsƑ URL-re esemĂ©ny bekövetkeztekor. Payload: JSON adatok az esemĂ©nyrƑl. KĂŒlsƑ rendszer fogadja Ă©s feldolgozza. Retry: exponential backoff ha a webhook endpoint nem Ă©rhetƑ el.

Batch Notification

Több cĂ­mzettnek egyszerre kĂŒld notification-t (1000 user). Nem kĂŒlön 1000 request, hanem batch API. SendGrid: 1000 email 1 API call-ban. Rate limiting figyelembevĂ©tel, progress tracking, partial failure handling.

11

Authentication Service

Security & Auth

Purpose: User authentication with OAuth2, OIDC, MFA, and SSO support.

Implements OAuth 2.0 and OpenID Connect (OIDC) protocols. Supports Multi-Factor Authentication (MFA) with TOTP (RFC 6238), SMS, and email codes. Provides Single Sign-On (SSO) with SAML 2.0 and OIDC. Issues JWT tokens with configurable expiration (15min access, 7day refresh). Implements session management with Redis. Supports password policies and account lockout after failed attempts.

OAuth2 / OIDC MFA (TOTP) SSO (SAML) JWT Tokens
OAuth 2.0

AuthorizĂĄciĂłs protokoll: lehetƑvĂ© teszi hogy az app hozzĂĄfĂ©rjen user adataihoz a user jelszava nĂ©lkĂŒl. Flow: user bejelentkezik → engedĂ©lyt ad → app kap access token-t. Token-nel elĂ©ri a vĂ©dett resource-okat.

TOTP (Time-based One-Time Password)

2FA kĂłd generĂĄlĂĄs RFC 6238 alapjĂĄn. Közös secret (QR code), current time, HMAC-SHA1 → 6 szĂĄmjegyƱ kĂłd. 30 mĂĄsodpercenkĂ©nt vĂĄltozik. App: Google Authenticator, Authy. Offline mƱködik, nincs SMS cost.

SSO (Single Sign-On)

Egyszer bejelentkezĂ©s, több app hasznĂĄlata. Identity Provider (IdP) centralizĂĄlja az auth-ot. SAML 2.0 vagy OIDC protokoll. User bejelentkezik IdP-be → megkapja a token-t → app-ok elfogadjĂĄk.

JWT (JSON Web Token)

ÖnĂĄllĂł, alĂĄĂ­rt JSON token auth-ra. Tartalmazza: user_id, role, exp (lejĂĄrat). Base64 encoded, digitĂĄlisan alĂĄĂ­rva. Server nem tĂĄrol session-t, mindent a token tartalmaz. Stateless auth, könnyen skĂĄlĂĄzhatĂł.

12

Authorization Service

Security & Auth

Purpose: Fine-grained access control with RBAC and ABAC.

Implements Role-Based Access Control (RBAC) with hierarchical roles (admin → manager → user) and Attribute-Based Access Control (ABAC) for complex policies. Evaluates permissions in <5ms with Redis caching. Supports resource-level permissions (user can sign document X but not Y). Uses policy engine with boolean logic (AND/OR/NOT). Integrates with Policy Compliance Engine (46) for advanced rules.

RBAC ABAC Policy Engine <5ms Eval
RBAC (Role-Based Access Control)

JogosultsĂĄgok szerepkörök alapjĂĄn. User → Role → Permissions. PĂ©ldĂĄul: "admin" role → all permissions, "viewer" role → read-only. Hierarchia: admin > manager > user (öröklĂ©s). EgyszerƱ, könnyen kezelhetƑ.

ABAC (Attribute-Based Access Control)

JogosultsĂĄgok attribĂștumok alapjĂĄn. User attribĂștumok (department, clearance level), resource attribĂștumok (classification, owner), environment (time, location). Policy: "IF user.dept == 'Finance' AND doc.type == 'invoice' THEN allow".

Policy Engine

Rule-based motor policy-k kiĂ©rtĂ©kelĂ©sĂ©re. Boolean logika: (role == 'admin' OR dept == 'IT') AND time < '18:00'. JSON policy definition, gyors evaluation (<5ms), cache-elhetƑ eredmĂ©nyek. Flexible, programozhatĂł permissions.

Resource-Level Permission

Részletes jogosultsåg konkrét resource-okra. Nem csak "user can sign documents", hanem "user can sign document #12345". Tårolås: permissions tåbla (user_id, resource_id, action). Hasznålat: document sharing, multi-tenancy.

13

Time Stamp Authority (TSA) Service

Trust Services

Purpose: RFC 3161 compliant timestamping for proof of existence.

Issues RFC 3161 timestamps (TST tokens) proving document existence at a specific time. Uses NTP-synchronized clocks with atomic time sources. Supports Qualified Timestamps (QTST) for eIDAS compliance. Implements TSA certificate chain separate from signing certificates. Provides 12ms p50 latency for timestamp generation. Critical for PAdES-B-LTA long-term archival and legal compliance.

RFC 3161 QTST (eIDAS) 12ms Latency NTP Sync
RFC 3161 Timestamp

DigitĂĄlis timestamp: bizonyĂ­tja hogy egy dokumentum lĂ©tezett egy adott idƑpontban. TSA alĂĄĂ­rja a dokumentum hash-Ă©t Ă©s a pontos idƑpontot. Nem lehet visszadatĂĄlni, nem lehet mĂłdosĂ­tani. Kritikus: long-term signatures.

QTST (Qualified Time Stamp)

EU minƑsĂ­tett timestamp szolgĂĄltatĂĄs eIDAS szerint. SzigorĂș követelmĂ©nyek: atomi Ăłra, audit, HSM, qualif ied TSA certificate. Jogi Ă©rtĂ©k: bĂ­rĂłsĂĄgon elfogadott bizonyĂ­tĂ©k. DrĂĄgĂĄbb, mint a sima TSA.

NTP (Network Time Protocol)

Óra szinkronizĂĄciĂłs protokoll. TSA szerver NTP-vel szinkronizĂĄl atomi ĂłrĂĄkhoz (NIST, PTB). PontossĂĄg: ±1ms. RedundĂĄns NTP forrĂĄsok, health monitoring. GarantĂĄlja a timestamp pontossĂĄgĂĄt.

TST Token

Time Stamp Token: ASN.1 DER encoded structure. Tartalmazza: hash algorithm, hash value, timestamp, TSA signature, TSA certificate chain. BeĂĄgyazhatĂł PAdES-be, CAdES-be. VerifikĂĄlhatĂł a TSA publikus kulcsĂĄval.

14

HSM Proxy Service

Security & Auth

Purpose: Hardware Security Module integration for cryptographic operations.

Interfaces with Hardware Security Modules (HSM) via PKCS#11 API. Manages HSM session pool (10-50 concurrent sessions) for <50ms signing performance. Provides key generation, signing, encryption, and random number generation operations. Implements FIPS 140-2 Level 3 compliance. Uses channel-based worker pool for parallel operations. Private keys never leave the HSM. Tracks signature counters and HSM health metrics.

PKCS#11 Session Pool <50ms Signing FIPS 140-2
HSM (Hardware Security Module)

Fizikai kriptogråfiai eszköz (USB dongle vagy rack-mount). A privåt kulcsok SOHA nem hagyjåk el, minden kriptogråfiai mƱvelet (alåírås, titkosítås) bent történik. Tamper-proof (fizikai védelem).

PKCS#11

Public-Key Cryptography Standard #11 - szabvĂĄnyos API HSM-ek programozĂĄsĂĄhoz. FunkciĂłkat definiĂĄl: kulcs generĂĄlĂĄs, alĂĄĂ­rĂĄs, titkosĂ­tĂĄs, session management. Platform-fĂŒggetlen.

Session Pool

HSM kapcsolatok ĂșjrafelhasznĂĄlĂĄsa (connection pooling). Új session lĂ©trehozĂĄsa lassĂș (100-200ms), ezĂ©rt 10-50 session-t elƑre lĂ©trehozunk Ă©s ĂșjrahasznĂĄljuk. Go channels-szel kezeljĂŒk.

FIPS 140-2 Level 3

USA kormĂĄnyzati kriptogrĂĄfiai szabvĂĄny. Level 3: fizikai tamper protection (Ă©rzĂ©kelƑk), identity-based authentication, belĂ©ptetĂ©s logolĂĄsa. Magasabb mint Level 2 (software), alacsonyabb mint Level 4 (környezeti vĂ©delem).

15

API Gateway Service

Infrastructure

Purpose: Unified API entry point with routing, authentication, and rate limiting.

Single entry point for all API requests with request routing, load balancing, and service discovery. Implements rate limiting (per-user, per-IP, per-endpoint) with Redis. Provides API versioning (/v1, /v2). Handles CORS, request validation, and response transformation. Integrates with Authentication (11) for JWT validation. Supports circuit breaker pattern for upstream services. Observability: Distributed tracing with OpenTelemetry.

Rate Limiting Load Balancing Circuit Breaker OpenTelemetry
API Gateway Pattern

EgysĂ©ges belĂ©pĂ©si pont a mikroszervizekhez. Routing: /api/certs → Service 02, /api/sign → Service 03. Központi auth, rate limiting, logging. Kliens 1 endpointot lĂĄt, belĂŒl 47 service. EgyszerƱsĂ­ti a kliens oldalt.

Rate Limiting (Token Bucket)

KĂ©rĂ©sek korlĂĄtozĂĄsa idƑegysĂ©genkĂ©nt. Redis sliding window: 100 req/min per user, 1000 req/min per IP. Ha tĂșllĂ©pi → 429 Too Many Requests. VĂ©d DDoS ellen, biztosĂ­tja fair hasznĂĄlatot, megĂłvja backend-et.

Circuit Breaker

VĂ©delem upstream service failure ellen. 3 state: closed (OK), open (service down, instant fail), half-open (prĂłba). Ha 5 error/10 req → open state → nem hĂ­vja a service-t 30s. VĂ©d cascade failure ellen.

OpenTelemetry

Distributed tracing Ă©s metrics collection. Trace ID követi a request-et service-eken ĂĄt. LĂĄtszik: Gateway → Auth → Cert Issuance → HSM → total 250ms. SegĂ­t bottleneck-eket talĂĄlni.

16

User Management Service

Business Services

Purpose: User profiles, organization management, and user lifecycle.

Manages user profiles (name, email, phone, preferences), organization hierarchies (parent/child orgs), and user-organization relationships. Implements user invitation workflows with email verification. Handles user deactivation and deletion (soft delete with 30-day retention). Provides user search with full-text indexing. Integrates with GDPR Rights Service (37) for data export/erasure. Multi-tenancy: Row-level security (org_id filter).

User Profiles Org Hierarchy Invitations Soft Delete
Organization Hierarchy

Szervezeti fa struktĂșra: parent company → subsidiaries → departments. PostgreSQL: parent_org_id foreign key. Recursive query-k: WITH RECURSIVE... HasznĂĄlat: billing aggregĂĄciĂł, permission inheritance, resource sharing.

Soft Delete

Logikai törlés: deleted_at timestamp beållítåsa NULL-ról értékre. Record megmarad, de query-k kihagyjåk (WHERE deleted_at IS NULL). 30 nap utån permanent delete. Véd véletlen törlés ellen, compliance (audit trail).

User Invitation Workflow

Új user meghĂ­vĂĄs: admin elkĂŒldi email-t → user kap link-et (token) → regisztrĂĄciĂł token-nel → account aktivĂĄlĂĄs. Token: random UUID, expire 7 nap. Security: token-t csak 1x lehet hasznĂĄlni, email validation.

Row-Level Security (RLS)

PostgreSQL policy: minden query automatikusan WHERE org_id = current_user.org_id-t kap. Database szinten biztosítja a tenant isolation-t. User nem låthatja mås org adatait még SQL injection-nel sem.

17

Audit & Compliance Service

Compliance

Purpose: Comprehensive audit logging for ISO 27001, SOC 2, PCI DSS compliance.

Logs all security-relevant events (authentication, authorization, data access, modifications) with structured JSON format. Implements immutable audit trail (append-only, tamper-evident). Stores before/after values for compliance. Provides JSONB queries for flexible searching. Streams logs to external SIEM (Splunk, ELK, DataDog, Sumo Logic). Retention: 90 days hot storage, 7 years archive. Standards: ISO 27001 A.12.4.1, SOC 2 CC7.2, PCI DSS Req 10, GDPR Art. 30.

Immutable Logs JSONB Search SIEM Integration 7yr Retention
Immutable Audit Trail

Append-only log: insert mƱveletek megengedettek, update/delete tiltottak. Database constraint vagy permission. Tamper-evident: hash chain minden entry-re (elƑzƑ hash rĂ©sze a jelenlegi hash-nek). UtĂłlag nem mĂłdosĂ­thatĂł.

JSONB (PostgreSQL)

JSON tárolás bináris formátumban PostgreSQL-ben. IndexelhetƑ, query-elhetƑ (WHERE data->>'action' = 'login'). Flexible schema: minden event típushoz más mezƑk. Gyorsabb mint text JSON parsing.

SIEM (Security Information and Event Management)

Központi log aggregåció és security analysis. Real-time monitoring, anomaly detection, alerting. Eszközök: Splunk, ELK Stack, DataDog. Log shipping: Filebeat, Fluentd, vagy direct API.

Before/After Values

Audit log tartalmazza a vĂĄltozĂĄs elƑtti Ă©s utĂĄni Ă©rtĂ©keket. PĂ©lda: {before: {role: 'user'}, after: {role: 'admin'}}. Compliance: ki, mit, mikor mĂłdosĂ­tott. Rollback lehetƑsĂ©g. SOC 2, ISO 27001 követelmĂ©ny.

18

Key Management Service

Security & Auth

Purpose: Cryptographic key generation, rotation, escrow, and lifecycle management.

Manages key lifecycle: pending → active → rotated → deactivated → destroyed. Implements automated key rotation with configurable schedules (90/180/365 days). Uses pessimistic locking (SELECT FOR UPDATE) for rotation operations. Provides key escrow for enterprise backup/recovery. Tracks key usage (signature count, encryption operations). Integrates with HSM Proxy (14) for key generation. Maintains key rotation history with old/new key IDs. Supports key derivation (HKDF, PBKDF2).

Auto-Rotation Pessimistic Lock Key Escrow Usage Tracking
Key Rotation

RĂ©gi kulcs cserĂ©je Ășj kulcsra biztonsĂĄg Ă©rdekĂ©ben. Scheduled rotation: 90 naponta automatikus. RĂ©gi kulcs: deactivated de megmarad (rĂ©gi alĂĄĂ­rĂĄsok validĂĄlĂĄsĂĄhoz). Új kulcs: active (Ășj mƱveletek).

Pessimistic Locking

SELECT FOR UPDATE: sor zårolås a tranzakció végéig. Mås tranzakció vår. Hasznålat: key rotation (biztosítja hogy csak 1 worker rotålja a kulcsot). Lassabb mint optimistic lock, de garancia a consistency.

Key Escrow

Kulcsok biztonsågos backup-ja harmadik félnél vagy secure storage-ban. Enterprise use case: employee tåvozåsa utån data recovery. Encryption key escrow: titkosított adatok visszafejtése.

HKDF (HMAC-based Key Derivation)

Master key-bƑl szĂĄrmaztatunk több kulcsot (RFC 5869). 1 master key → encryption key, signing key, MAC key. ElƑny: csak 1 kulcsot kell tĂĄrolni biztonsĂĄgosan, többit runtime generĂĄljuk. Determinisztikus.

19

Monitoring & Alerting Service

Infrastructure

Purpose: Prometheus metrics, Grafana dashboards, and intelligent alerting.

Collects metrics (counters, gauges, histograms) via Prometheus. Monitors performance (latency p50/p95/p99), errors (error rate, 5xx responses), business metrics (signatures/day, certificates issued), and resource usage (CPU, memory, disk I/O). Provides Grafana dashboards with real-time visualization. Sends alerts via email, SMS, Slack, PagerDuty for: SLA violations, error spikes, certificate expiry, HSM failures. Alerting rules: p99 latency > 1s, error rate > 1%, disk > 80%.

Prometheus Grafana Alertmanager SLA Monitoring
Prometheus

Time-series metric database. Pull-based: Prometheus scrape-eli a /metrics endpoint-okat (15s interval). Metric tĂ­pusok: counter (növekvƑ), gauge (aktuĂĄlis Ă©rtĂ©k), histogram (eloszlĂĄs). PromQL query language.

Percentile (p50, p95, p99)

Latency eloszlås: p50 = median (50% gyorsabb), p95 (95% gyorsabb), p99 (99% gyorsabb). Példa: p50=20ms, p95=100ms, p99=500ms. P99 fontos: outlier-ek (worst case) låthatóak. SLA-ban definiålt.

Alertmanager

Prometheus alert routing Ă©s notification. Alert rule: IF p99_latency > 1s FOR 5m THEN alert. Routing: critical → PagerDuty, warning → Slack. Grouping, silencing, inhibition. ElkerĂŒli az alert flood-ot.

Grafana Dashboard

VizuĂĄlis dashboard metrics-hez. Panels: time-series graph, gauge, heatmap, table. Variables: környezet, service. Drill-down: klikk egy spike-ra → rĂ©szletes log. Real-time refresh, shareable link. NOC (Network Operations Center) hasznĂĄlja.

20

Signature Verification Service

Digital Signatures

Purpose: Validates digital signatures across multiple formats (PAdES, CAdES, XAdES).

Verifies cryptographic signatures, validates certificate chains up to trusted root CAs, checks revocation status (OCSP/CRL), and validates timestamps. Supports long-term validation (LTV) for archived documents. Implements European Signature Validation Algorithm (ETSI TS 102 853). Returns detailed validation reports (signature valid, certificate status, timestamp valid, trust anchor). Handles multiple signatures per document and counter-signatures.

Multi-Format Chain Validation LTV Support ETSI TS 102 853
Certificate Chain Validation

TanĂșsĂ­tvĂĄny lĂĄnc ellenƑrzĂ©se a trusted root CA-ig. Leaf certificate → Intermediate CA → Root CA. Minden lĂ©pĂ©sben: signature valid? period valid? revoked? chain of trust builds up. Trusted root: pre-installed vagy explicit.

LTV (Long-Term Validation)

ArchivĂĄlt dokumentumok validĂĄlĂĄsa Ă©vek mĂșlva. BeĂĄgyazott timestamp, OCSP/CRL response, certificate chain. MĂ©g ha a CA megszƱnt is, a dokumentum validĂĄlhatĂł. PAdES-B-LTA tĂĄmogatja. Kritikus: legal documents.

Counter-Signature

AlĂĄĂ­rĂĄsra tett alĂĄĂ­rĂĄs. User1 alĂĄĂ­r dokumentumot → User2 counter-signĂĄlja User1 alĂĄĂ­rĂĄsĂĄt (idƑbĂ©lyeg, notary). BizonyĂ­tja hogy User1 alĂĄĂ­rĂĄsa adott idƑpontban lĂ©tezett. Nested signatures: signature of signature.

ETSI TS 102 853

European szabvåny signature validation algoritmushoz. Definiålja a validation policy-ket, validation constraints-eket, és a validation report formåtumot. EU-szerte egységes signature verification.

21

QTSP Integration Service

Trust Services

Purpose: Integrates with external Qualified Trust Service Providers (eIDAS).

Connects to external QTSPs for qualified signatures when local platform is not qualified. Implements remote signing workflows with user authorization (OTP, mobile app). Supports CSC API (Cloud Signature Consortium) for standardized remote signing. Handles signature activation data (SAD) securely. Coordinates with multiple QTSP providers for redundancy. Tracks QTSP transaction costs and usage quotas.

QTSP Integration Remote Signing CSC API SAD Handling
QTSP (Qualified Trust Service Provider)

EU minƑsĂ­tett szolgĂĄltatĂł eIDAS szerint. Jogosult qualified certificates, qualified timestamps, qualified signatures kibocsĂĄtĂĄsĂĄra. SzigorĂș audit, supervision, liability insurance. ListĂĄn: EU Trusted List.

Remote Signing

AlĂĄĂ­rĂĄs tĂĄvoli HSM-mel, privĂĄt kulcs a QTSP-nĂ©l. User autorizĂĄlja (OTP, mobile app push), QTSP alĂĄĂ­r a user nevĂ©ben. ElƑny: nincs helyi HSM szĂŒksĂ©g, QTSP certified. HĂĄtrĂĄny: network dependency, per-signature cost.

CSC API (Cloud Signature Consortium)

SzabvĂĄnyos REST API remote signing-hoz. Workflow: credentials/list → credentials/authorize → signatures/signHash. Multi-provider support: 1 API, több QTSP. Elterjedt EU-ban remote signing platformokhoz.

SAD (Signature Activation Data)

AlĂĄĂ­rĂĄs aktivĂĄlĂĄsi adat: OTP, biometric, PIN, ami autorizĂĄlja a remote signing-ot. BizonyĂ­tja hogy a user valĂłban akarta az alĂĄĂ­rĂĄst. eIDAS követelmĂ©ny qualified signatures-hez. Secure channel-en (TLS) kĂŒldve.

22

KYC (Know Your Customer) Service

Business Services

Purpose: Identity verification workflows for qualified certificate issuance.

Implements identity verification workflows: document upload (ID card, passport), liveness detection (video selfie), document OCR extraction, and identity matching algorithms. Integrates with third-party KYC providers (Onfido, Jumio, Veriff) via Service 31. Supports multi-level verification (basic, enhanced, qualified). Maintains verification status: pending → verified → rejected. Stores verification evidence for audit trails. Required for eIDAS qualified certificates.

Document OCR Liveness Check Third-Party Integration eIDAS Compliance
Liveness Detection

BizonyĂ­tja hogy Ă©lƑ szemĂ©ly van a kamera elƑtt, nem fĂ©nykĂ©p. Video selfie: user mozdĂ­tja fejĂ©t, pislog. AI analĂ­zis: 3D depth detection, texture analysis. VĂ©d photo spoofing, video replay ellen. KYC kritikus komponens.

Document OCR

Optical Character Recognition: text extraction szemĂ©lyi igazolvĂĄnybĂłl, ĂștlevĂ©lbƑl. Machine learning (Tesseract, cloud API). Kinyert adatok: nĂ©v, szĂŒletĂ©si dĂĄtum, szemĂ©lyi szĂĄm. ValidĂĄciĂł: checksum, format, expiry. AutomatizĂĄlja a KYC-t.

Identity Matching

Selfie vs ID photo face matching. Facial recognition AI: similarity score 0-100%. Threshold: >85% = match. BiztosĂ­tja hogy a dokumentum tulajdonosa van jelen. Kritikus: identity fraud prevention.

Verification Levels (eIDAS)

Basic: email verification. Enhanced: document upload + OCR. Qualified: enhanced + liveness + video interview. Qualified szĂŒksĂ©ges QES-hez (Qualified Electronic Signature). Minden level növeli a trust level-t Ă©s a cost-ot.

23

Certificate Selection Service

Core PKI

Purpose: Helps users discover and select appropriate certificates for signing operations.

Provides certificate discovery based on user identity, organization, and purpose. Filters certificates by validity period, key usage (digitalSignature, nonRepudiation), and certificate type (qualified, advanced, simple). Implements certificate ranking (prefer qualified over advanced, newer over older). Checks revocation status before presenting certificates. Supports certificate preview (subject DN, issuer, validity). Used in signing workflows to present valid certificates to users.

Discovery Filtering Ranking Status Check
Certificate Discovery

User-hez tartozĂł tanĂșsĂ­tvĂĄnyok felderĂ­tĂ©se. Query: user_id + valid + not_revoked. Filter by purpose (signing, encryption, auth). Result: lista a hasznĂĄlhatĂł tanĂșsĂ­tvĂĄnyokrĂłl. UI: dropdown "Select certificate for signing".

Key Usage (X.509 Extension)

TanĂșsĂ­tvĂĄny extension: mire hasznĂĄlhatĂł a kulcs. digitalSignature (signing), nonRepudiation (nem tagadhatĂł alĂĄĂ­rĂĄs), keyEncipherment (titkosĂ­tĂĄs), dataEncipherment, keyAgreement. Critical extension: csak ezekre hasznĂĄlhatĂł.

Certificate Ranking Algorithm

TanĂșsĂ­tvĂĄnyok rendezĂ©se preferencia szerint. Score: qualified (+100), validity remaining (+days/365), newer issued_at (+points). Legmagasabb score kerĂŒl elsƑ helyre. User lĂĄtja a legjobb vĂĄlasztĂĄst default-kĂ©nt. JavĂ­tja UX-et.

Subject DN (Distinguished Name)

TanĂșsĂ­tvĂĄny tulajdonosĂĄnak azonosĂ­tĂłja X.509-ben. Format: CN=John Doe, OU=Engineering, O=Company, C=US. CN=Common Name (nĂ©v), OU=Organizational Unit, O=Organization, C=Country. Hierarchikus struktĂșra.

24

Pseudonymous Certificate Service

Core PKI

Purpose: Issues privacy-preserving certificates without revealing user identity.

Issues pseudonymous certificates where subject DN contains pseudonym instead of real name. Maintains identity mapping (pseudonym ↔ real identity) in secure, encrypted storage. Supports multiple pseudonyms per user for different contexts. Implements pseudonym rotation for enhanced privacy. Used for whistleblower platforms, anonymous surveys, and privacy-sensitive applications. Complies with GDPR privacy-by-design principles. Can reveal identity with court order/legal process.

Privacy-Preserving Pseudonym Mapping Rotation GDPR Compliant
Pseudonymous Certificate

TanĂșsĂ­tvĂĄny ĂĄlnĂ©vvel valĂłdi nĂ©v helyett. Subject DN: CN=User_47a3b9, nem CN=John Doe. AlĂĄĂ­rĂĄsok validĂĄlhatĂłk de a signer szemĂ©lye nem nyilvĂĄnos. Use case: whistleblower, anonymous voting, privacy-first apps.

Identity Mapping (Encrypted)

AdatbĂĄzis tĂĄbla: pseudonym ↔ real_user_id. TitkosĂ­tva (AES-256) master key-vel. Access control: admin only, audit log. BĂ­rĂłsĂĄgi vĂ©gzĂ©ssel feltĂĄrhatĂł. GDPR Art. 32: technical measures for pseudonymization.

Pseudonym Rotation

Pseudonym vĂĄltĂĄsa idƑvel privacy fokozĂĄshoz. User_47a3b9 → User_8d21f4 (3 hĂłnap utĂĄn). RĂ©gi tanĂșsĂ­tvĂĄny revoke, Ășj kibocsĂĄt. NehezĂ­ti a long-term tracking-et. Enhanced privacy.

GDPR Privacy-by-Design (Art. 25)

Privacy beépítése a rendszer design-jåba (nem utólag). Pseudonymization: data minimization, purpose limitation. Default: privacy-friendly. Technical és organizational measures. GDPR compliance by design.

25

Content Upload Management Service

Infrastructure

Purpose: Handles large file uploads with chunked/multipart upload support.

Manages chunked uploads for files >100MB with resume capability. Implements presigned URLs for direct-to-S3 uploads (bypass backend). Provides upload progress tracking with websockets/SSE. Validates file size limits (max 5GB) and allowed MIME types. Performs virus scanning (ClamAV integration) and malware detection before accepting files. Generates SHA-256 checksums for integrity verification. Coordinates with File Storage (07) for final storage.

Chunked Upload Presigned URLs Virus Scanning Resume Support
Chunked Upload

Nagy fĂĄjl feltöltĂ©se kis darabokban (chunks). 1GB fĂĄjl = 100x 10MB chunk. Minden chunk kĂŒlön HTTP request. Server összerakja a vĂ©gĂ©n. ElƑny: retry csak a failed chunk-ot, nem az egĂ©szet. Progress tracking könnyebb.

Presigned URL (S3)

IdƑkorlĂĄtozott URL direct S3 upload-hoz. Backend generĂĄlja (15 perc TTL), kliens direct S3-ba tölt. ElƑny: backend nem proxy-zza a fĂĄjlt (bandwidth spĂłrolĂĄs), gyorsabb upload. Signing: HMAC-SHA256 AWS credentials.

ClamAV Virus Scanner

Open-source antivirus engine. Stream-based scanning: fĂĄjl chunk-onkĂ©nt scan-elve memĂłriĂĄban. Virus signature database (daily update). Integration: socket vagy REST API. Infected file → reject + notify.

Resume Capability

Upload folytatĂĄsa megszakĂ­tĂĄs utĂĄn. Server tĂĄrolja: file_id, uploaded_chunks (bitset vagy list). Kliens ĂșjracsatlakozĂĄskor: "which chunks are missing?" → folytatja. Critical: nagy fĂĄjlok, lassĂș network.

26

Content Verification Service

Infrastructure

Purpose: Verifies file integrity, detects tampering, and validates checksums.

Computes cryptographic hashes (SHA-256, SHA-512) for uploaded files. Verifies file integrity by comparing computed hash with provided hash. Detects file tampering and corruption. Validates digital signatures embedded in files (PDF signatures, Office document signatures). Checks metadata consistency (file size, modification time). Integrates with Format Detection (38) to identify file types. Provides verification reports (hash match, signature valid, no tampering detected).

Hash Verification Tamper Detection Signature Check Integrity Reports
Cryptographic Hash (SHA-256)

EgyirĂĄnyĂș hash fĂŒggvĂ©ny: input → 256-bit fingerprint. Ugyanaz az input = ugyanaz a hash. 1 bit vĂĄltozĂĄs → teljesen mĂĄs hash. Collision-resistant: gyakorlatilag lehetetlen 2 kĂŒlönbözƑ input-nak ugyanaz a hash. File integrity check alapja.

Tamper Detection

FĂĄjl mĂłdosĂ­tĂĄs Ă©szlelĂ©se. Upload-kor hash-t szĂĄmolunk Ă©s tĂĄroljuk. KĂ©sƑbb ĂșjraszĂĄmoljuk Ă©s összehasonlĂ­tjuk. Hash mismatch = fĂĄjl megvĂĄltozott (tampered, corrupted). Critical: signed documents, evidence files.

Embedded Digital Signature

Fájlba beágyazott signature (PDF /ByteRange, Office XML signature). Verification: extract signature → validate certificate chain → verify signature bytes → check revocation. Report: valid/invalid/unknown.

Metadata Consistency Check

File metadata validĂĄlĂĄsa: file size (Content-Length vs actual), modification time (realistic?), format (extension vs magic bytes). Inconsistency = file corruption, malicious upload, spoofing attempt. Security + integrity control.

27

Bulk Operations Service

Business Services

Purpose: Batch processing for signing, issuance, and revocation operations.

Handles batch signing (sign 1000 documents in parallel), batch certificate issuance (IoT device onboarding), and batch revocation (compromised key scenario). Uses worker pool pattern with configurable concurrency (10-100 workers). Implements progress tracking (45/100 documents signed) and partial failure handling (continue on error). Provides batch status API (queued → processing → completed/failed). Generates batch reports (summary, failed items, success rate). Performance: 125 ops/sec for batch PDF signing.

Parallel Processing Progress Tracking Partial Failure 125 ops/sec
Worker Pool Pattern

Fix szĂĄmĂș worker goroutine (pl. 50) feldolgozza a job-okat. Job channel: buffered channel (capacity 1000). Workers: for range channel loop. Concurrency limit: vĂ©d tĂșlterhelĂ©s ellen. Go: goroutines + channels.

Progress Tracking

Batch job ĂĄllapotĂĄnak követĂ©se. DB: batch_id, total_count, completed_count, failed_count, status (processing/completed). Update minden job completion-nĂ©l (atomic increment). API: GET /batch/{id}/progress → 45/100 (45% done). Real-time UI update.

Partial Failure Handling

Batch job nem ĂĄll meg elsƑ hiba utĂĄn, folytatja a többi item-et. Failed items: kĂŒlön listĂĄzva (reasons). Success rate: 95/100 = 95%. Retry: failed items kĂŒlön batch-kĂ©nt. Critical: IoT bulk onboarding (1000s devices).

Batch Report

Summary report batch job befejezésekor. Tartalmaz: total, success, failed, success rate, duration, throughput (ops/sec). Failed items detail: item_id, error message. Export: PDF, CSV. Email notification: admin-oknak. Audit trail.

28

Encrypted Document Service

Digital Signatures

Purpose: Document encryption/decryption with key management.

Provides document encryption using hybrid cryptography (RSA/ECC for key exchange, AES-256-GCM for content). Supports multi-recipient encryption (encrypt once, decrypt by multiple authorized users). Implements envelope encryption (data encryption key wrapped by key encryption key). Handles key escrow for enterprise recovery scenarios. Provides decryption APIs with access control checks. Supports encrypted email (S/MIME) and encrypted PDFs. Integrates with Key Management (18) for KEK storage.

AES-256-GCM Multi-Recipient Key Escrow S/MIME
Hybrid Cryptography

Asymmetric (RSA/ECC) + Symmetric (AES) kombinĂĄciĂłja. Symmetric gyors de shared key kell. Asymmetric lassĂș de key exchange biztonsĂĄgos. MegoldĂĄs: AES-sel titkosĂ­tunk, AES kulcsot RSA-val titkosĂ­tjuk. Best of both: sebessĂ©g + biztonsĂĄg.

AES-256-GCM

Advanced Encryption Standard, 256-bit kulcs, Galois/Counter Mode. GCM: authenticated encryption (titkosĂ­tĂĄs + integrity check). Gyors (hardware acceleration), biztonsĂĄgos (NIST approved). GCM tag: tamper detection. Industry standard.

Envelope Encryption

Data Encryption Key (DEK) titkosĂ­tja az adatokat. Key Encryption Key (KEK) titkosĂ­tja a DEK-et. ElƑny: KEK rotation nem igĂ©nyli az adatok ĂșjratitkosĂ­tĂĄsĂĄt, csak a DEK-et. AWS KMS, GCP KMS hasznĂĄlja.

Multi-Recipient Encryption

1 dokumentum, több cĂ­mzett. DEK-kel titkosĂ­tunk 1x. DEK-et minden cĂ­mzett publikus kulcsĂĄval titkosĂ­tjuk. Envelope: DEK_Alice, DEK_Bob, DEK_Charlie (mindegyik ugyanaz a DEK, de kĂŒlönbözƑ KEK-kel). Efficient.

29

PAdES/C2PA Signature Service

Digital Signatures

Purpose: Advanced PDF signatures and media provenance (C2PA) for images/videos.

Implements PAdES (PDF Advanced Electronic Signatures) with all profiles: PAdES-B-B (basic), PAdES-B-T (with timestamp), PAdES-B-LT (long-term with validation data), PAdES-B-LTA (archival with archive timestamps). Supports visible signatures (signature appearance on PDF page) and invisible signatures. Implements C2PA (Coalition for Content Provenance and Authenticity) for image/video authenticity and provenance tracking. Embeds content credentials in media files. Critical for combating deepfakes and ensuring media authenticity.

PAdES-B-LTA Visible Signature C2PA Media Provenance
PAdES Profiles

PAdES-B-B: basic (signature + cert). B-T: + timestamp. B-LT: + validation data (OCSP, CRL) long-term-hez. B-LTA: + archive timestamp (Ășjabb timestamp Ă©vekkel kĂ©sƑbb). LTA: 10-20 Ă©v mĂșlva is validĂĄlhatĂł.

Visible Signature (PDF)

Signature appearance PDF oldalon: signer neve, dåtum, reason, grafika (kézjegy image). Annotation object a PDF-ben. User låtja hogy alåírt dokumentum. Invisible: csak metadata, nincs visual representation. Vålasztható.

C2PA (Content Authenticity)

Coalition for Content Provenance and Authenticity. Metadata manifest beågyazåsa képekbe, videókba: ki készítette, mikor, hol, milyen eszközzel, történt-e AI editing. Chain of custody. Deepfake detection, news authenticity.

Content Credentials

C2PA manifest: JSON-LD format, digitĂĄlisan alĂĄĂ­rva. Tartalmaz: author, timestamp, edits (crop, filter), AI usage, device info. BeĂĄgyazva EXIF-be vagy video metadata-ba. Viewer tools: verify authenticity, show provenance chain.

30

Workflow Management Service

Business Services

Purpose: Business process automation and multi-party signing workflows.

Orchestrates multi-step workflows (document review → approval → signing → archival). Supports sequential signing (Alice signs → Bob signs → Charlie signs) and parallel signing (all three sign independently). Implements workflow states (draft → in-progress → completed → rejected) with state machine pattern. Provides workflow templates (contract approval, expense approval, HR onboarding). Handles notifications (Service 10) and reminders for pending tasks. Tracks SLA compliance (task due in 48 hours).

Sequential Signing State Machine Templates SLA Tracking
State Machine

Workflow ĂĄllapotok Ă©s ĂĄtmenetek (transitions) definiĂĄlĂĄsa. Draft → (submit) → Review → (approve) → Signing → (sign) → Completed. ValidĂĄciĂł: csak megengedett transition-ök (nem lehet Draft-bĂłl Completed-be). Go: switch/case, state pattern.

Sequential vs Parallel Signing

Sequential: sorrendben (Alice → Bob → Charlie). Bob nem kezdheti el amíg Alice nem fejezte be. Parallel: mindenki egyszerre, order nem számít. Parallel gyorsabb, sequential biztosítja az order-t (pl. manager approval before CEO).

Workflow Template

ElƑre definiĂĄlt workflow steps Ă©s participants. "Contract Approval": Legal review (2 days) → Finance approval (1 day) → CEO sign. Template instantiation: Ășj document → template alapjĂĄn workflow lĂ©trehozĂĄs. Reusable, consistent process.

SLA (Service Level Agreement) Tracking

Task-ok hatĂĄridƑ követĂ©se. Task created_at + SLA duration (48h) = due_date. Monitoring: overdue tasks (due_date < now). Alerts: 24h before due, at due, 24h after due. Escalation: auto-reassign ha late. KPI: SLA compliance %.

31

KYC Partner Platform Service

Business Services

Purpose: Integration layer for third-party KYC/AML providers.

Provides unified API for multiple KYC providers (Onfido, Jumio, Veriff, Trulioo, Sumsub). Implements adapter pattern to normalize different provider APIs. Handles webhook callbacks from providers for async verification results. Provides fallback logic (try provider A, if fails try provider B). Tracks verification costs and provider performance (success rate, avg duration). Implements provider routing rules (use provider X for EU, provider Y for US). Caches verification results to avoid duplicate checks.

Multi-Provider Adapter Pattern Fallback Logic Cost Tracking
Adapter Pattern

Design pattern: kĂŒlönbözƑ interface-ek egysĂ©gesĂ­tĂ©se. Minden KYC provider interface → közös internal interface. Code: VerifyIdentity(user) → provider-specific API call → common Response struct. Új provider: Ășj adapter, nem mĂłdosĂ­tjuk a core logic-ot.

Webhook Callback

Async verification: request → pending → provider callback (webhook) → update status. Provider POST /webhook/kyc/{provider}. Payload: verification_id, status, details. Validate: HMAC signature. Update DB: pending → verified/rejected. Non-blocking.

Fallback Logic (Circuit Breaker)

Primary provider fail → try secondary. Onfido down → Jumio. Circuit breaker: ha 5 error/10 req → open (skip provider 60s). Automatic failover: high availability. Cost optimization: cheaper provider first, expensive fallback.

Provider Routing Rules

Geo-based routing: EU users → Veriff (GDPR compliant, EU servers), US users → Trulioo (US local). Rule engine: IF user.country IN ['DE', 'FR'] THEN provider='Veriff'. Config-driven, nem hardcoded. Regulatory compliance.

32

Organization Multi-Tenancy Service

Business Services

Purpose: Enterprise tenant management with hierarchical organizations.

Manages organization hierarchies (parent company → subsidiaries → departments). Implements tenant isolation at database level (WHERE org_id = ? on every query) and network level (Kubernetes NetworkPolicy). Supports resource sharing (parent org shares CA with child orgs) and billing aggregation (roll up usage to parent). Provides org switching for users belonging to multiple orgs. Handles org lifecycle (create → active → suspended → deleted). Implements row-level security (RLS) in PostgreSQL for additional isolation.

Hierarchy Tenant Isolation Resource Sharing RLS (PostgreSQL)
Multi-Tenancy

1 application instance, több tenant (szervezet). Tenant isolation: minden tenant adatai elkĂŒlönĂ­tve (org_id). Shared database, shared schema, de WHERE org_id filter mindenhol. Efficient: 1 deployment, skĂĄlĂĄzhatĂł. SaaS model basis.

Tenant Isolation

Biztosítja hogy Org A nem låthassa Org B adatait. Database: minden query WHERE org_id = current_org. Network: Kubernetes NetworkPolicy (pod-ok közti traffic filter). Code: middleware inject org_id minden request-be. Security critical.

Resource Sharing (Parent-Child)

Parent org erƑforrĂĄsai elĂ©rhetƑk child org-oknak. PĂ©lda: parent CA → child org-ok hasznĂĄlhatjĂĄk certificate issuance-hez. Permission: shared_with_children flag. Query: org_id = child OR (org_id = parent AND shared = true). Hierarchical access.

Billing Aggregation

HasznĂĄlat összesĂ­tĂ©se parent org-hoz. Child1: 100 signatures, Child2: 200 signatures → Parent invoice: 300 total. Recursive query: WITH RECURSIVE orgs AS (SELECT ... parent_org_id). Enterprise billing: 1 invoice, több department.

33

Sharing & Access Control Service

Business Services

Purpose: Document sharing with granular permissions and access links.

Enables document sharing with external users via shareable links (public, password-protected, expiring). Implements granular permissions (view, download, sign, admin). Supports access groups (share with "Finance Team" instead of individual users). Tracks access logs (who accessed what, when). Provides link expiration (expire after 7 days or 10 views). Implements watermarking for sensitive documents. Handles access revocation (immediately invalidate all active links).

Shareable Links Granular Permissions Access Groups Expiration
Shareable Link

URL token-nel: https://app.com/share/a3f9b2c1. Token: random UUID vagy JWT. No auth kell, bĂĄrki aki ismeri a linket. Types: public (no password), password-protected (kell password), expiring (TTL). Use case: external collaboration.

Granular Permissions

Részletes permission levels: view (read only), download (save local), sign (add signature), admin (manage permissions). Permission matrix: user_id x resource_id x action. Check: canUserPerformAction(user, resource, 'download').

Access Group

User-ek csoportosítása: "Finance Team", "Legal Department". Share with group: 1 operation, minden member kap access-t. Group membership: users_groups join table. Query: user IN group members → has access. Simplifies management.

Dynamic Watermarking

PDF-re user-specifikus watermark runtime generĂĄlĂĄsa: "Viewed by john.doe@company.com 2024-01-15". Prevent leaks: ha screenshot/print leak, lĂĄtszik ki volt. On-the-fly PDF modification: text overlay. Deterrent.

34

Webhook & Event Service

Business Services

Purpose: Event-driven integrations with external systems via webhooks.

Publishes events (certificate_issued, signature_created, quota_exceeded) to external systems via webhooks. Implements retry logic (exponential backoff: 1s, 2s, 4s, 8s, 16s) for failed deliveries. Provides webhook signing (HMAC-SHA256) for authenticity verification. Supports event filtering (only subscribe to specific event types). Tracks delivery status and failure reasons. Implements webhook management UI (register, test, view logs). Handles high-volume events with queue buffering.

Event Publishing Retry Logic HMAC Signing Event Filtering
Event-Driven Architecture

Rendszer komponensek event-ekkel kommunikálnak. Service publikál event (certificate_issued) → Subscribers reagálnak (notification, audit log, analytics). Loose coupling: services nem ismerik egymást directly. Async, scalable.

Webhook Retry Logic

Webhook delivery fail → retry exponential backoff-fal. 1. attempt fail → wait 1s → 2. attempt fail → wait 2s → stb. Max 5 attempts. After: move to DLQ. Status tracking: attempt_count, last_error, next_retry_at. Ensures delivery.

HMAC-SHA256 Signature

Webhook authenticity verification. Sender szĂĄmĂ­t HMAC(secret, payload) → X-Signature header. Receiver ugyanazt szĂĄmol, összehasonlĂ­t. Match = authentic webhook, nem fake. Prevent: malicious webhook injection. GitHub, Stripe hasznĂĄlja.

Event Filtering

Subscription-ok event type alapjĂĄn. User subscribe: ['certificate_issued', 'certificate_revoked'], nem kell 'signature_created'. Filter: IF event.type IN subscription.event_types THEN send webhook. Reduce noise, save bandwidth, relevant notifications only.

35

Authentication Security Service

Security & Auth

Purpose: Advanced security controls: rate limiting, brute-force protection, anomaly detection.

Implements rate limiting (per-user: 100 req/min, per-IP: 1000 req/min) using Redis sliding window. Provides brute-force protection (lock account after 5 failed login attempts). Detects anomalous behavior (login from unusual location, unusual time, new device). Implements CAPTCHA integration (reCAPTCHA, hCaptcha) for suspicious requests. Tracks failed login attempts and suspicious IPs. Provides security alerts (email on login from new device). Supports IP whitelisting and blacklisting.

Rate Limiting Brute-Force Protection Anomaly Detection CAPTCHA
Sliding Window Rate Limit

Redis-based rate limiting: ZSET (sorted set) timestamp-ekkel. Count requests in [now-60s, now] window. Remove old entries (ZREMRANGEBYSCORE), add new (ZADD), count (ZCOUNT). If count > 100 → rate limit. Accurate, memory efficient.

Brute-Force Protection

Login attempts tracking: failed_attempts counter (Redis). 5 failed → lock account 15 min. Unlock: time-based (TTL expire) vagy admin unlock. Protection: credential stuffing, dictionary attacks. Essential security.

Anomaly Detection

ML-based vagy rule-based unusual activity Ă©szlelĂ©s. Features: login location (GeoIP), time (usual hours?), device fingerprint. Score: 0-100 (suspicious). High score → MFA challenge, alert. Example: user normally Germany, suddenly China login → suspicious.

CAPTCHA (reCAPTCHA v3)

Bot detection: user interaction score 0.0-1.0 (1.0 = human, 0.0 = bot). Invisible challenge (no checkbox). Integration: frontend widget → backend verify token (Google API). Score < 0.5 → block or require v2 (checkbox). Spam prevention.

36

Subscription & Usage Service

Business Services

Purpose: Billing, quotas, metering, and usage tracking.

Manages subscription plans (Free, Professional, Enterprise) with quotas (100 signatures/month). Tracks usage (signatures created, certificates issued, storage used) with idempotent recording (resource_id prevents duplicates). Implements saga pattern for usage tracking: validate subscription → check quota → record usage → trigger alerts. Provides usage analytics (daily/monthly reports). Handles quota enforcement (block operation if quota exceeded). Integrates with billing systems (Stripe, Chargebee). Generates invoices based on usage.

Quota Management Idempotent Tracking Saga Pattern Usage Analytics
Quota Management

Limit tracking: plan quotas (Free: 100 signatures/month) vs current usage (used: 85/100). Check before operation: IF usage >= quota THEN block + "Upgrade plan". Reset: monthly cron job (usage = 0). Tiered pricing basis.

Idempotent Usage Recording

Usage event UNIQUE constraint (resource_id): ugyanaz a signature ne szĂĄmĂ­tson kĂ©tszer. INSERT ... ON CONFLICT DO NOTHING. Retry-safe: ha request retry → nem dupla billing. Critical: accurate metering.

Usage-Based Billing

Billing alapja: actual usage (pay-as-you-go). Metering: count operations (signatures, certificates, GB storage). Invoice generation: usage_records aggregate → line items → Stripe invoice. Flexible pricing: $0.10/signature.

Usage Analytics

Dashboard: daily/monthly/yearly usage trends. Metrics: signatures per day (time series), top users (bar chart), usage by service (pie chart). Data warehouse: usage_events → analytics DB (ClickHouse, BigQuery). Business intelligence.

37

GDPR Rights Service

Compliance

Purpose: GDPR compliance automation (access, erasure, portability, rectification).

Implements GDPR rights: Art. 15 (access - export all user data), Art. 16 (rectification - correct errors), Art. 17 (erasure - right to be forgotten), Art. 18 (restriction - hold account), Art. 20 (portability - export in JSON/XML), Art. 21 (object - opt-out marketing). Manages request workflow: pending_review → approved/rejected → in_progress → completed. Uses pessimistic locking (SELECT FOR UPDATE) during approval. Implements identity verification before processing requests. Generates data exports in machine-readable formats. Handles data anonymization for erasure.

Art. 15-21 Request Workflow Data Export Anonymization
GDPR Art. 15 (Right to Access)

User kĂ©rheti összes szemĂ©lyes adatĂĄt. Service összegyƱjti: profile, documents, certificates, audit logs, usage history. Export: JSON vagy XML (machine-readable). Delivery: secure download link vagy email. 1 hĂłnapon belĂŒl teljesĂ­tendƑ.

GDPR Art. 17 (Right to Erasure)

"Right to be forgotten": user kĂ©rheti adatai törlĂ©sĂ©t. Anonymization: personal data → anonymized (hash, generic). Retention exceptions: legal obligation (audit logs 7 years), contract (active subscription). Hard delete vs anonymize.

GDPR Art. 20 (Data Portability)

User kérheti adatait structured, machine-readable format-ban (JSON, XML, CSV). Mås service provider-hez åtviheti. Include: user-provided data, generated data (preferences). Exclude: inferred data (analytics). Interoperability.

Data Anonymization

Personal data irreversibly removal. Techniques: hashing (SHA-256), generalization (age 34 → 30-40), suppression (delete field). Result: not personal data anymore (GDPR not applicable). Use: erasure request de audit trail retention kell.

38

Format Detection Service

Infrastructure

Purpose: Automatic document format identification and MIME type detection.

Identifies file formats by analyzing magic bytes (file header signatures) and file structure. Detects 200+ formats: PDF, Office docs (DOCX, XLSX, PPTX), images (JPEG, PNG, TIFF), archives (ZIP, TAR), etc. Validates file integrity (corrupted PDFs, truncated images). Provides detailed format info (PDF version 1.7, JPEG with EXIF metadata). Prevents MIME type spoofing (file extension .pdf but actually .exe). Uses libmagic library for detection. Critical for security (reject dangerous file types).

Magic Bytes 200+ Formats Integrity Check Spoofing Prevention
Magic Bytes

File header elsƑ bájtjai azonosítják a formátumot. PDF: %PDF, PNG: 89 50 4E 47, JPEG: FF D8 FF, ZIP: 50 4B 03 04. Extension (.pdf) nem megbízható (átnevezhetƑ), magic bytes: valódi formátum. libmagic library: signature database.

MIME Type Spoofing

Attack: malware.exe átnevezve document.pdf. Browser vagy app megnyitja → execute. Defense: magic bytes check (ez egy EXE, nem PDF) → reject. Content-Type header vs actual format validation. Security critical.

libmagic

Unix `file` command library. Magic signature database (20MB+, 1000s patterns). C library, Go binding: github.com/rakyll/magicmime. Input: byte stream → Output: MIME type + description. Fast (<1ms), accurate, battle-tested.

File Integrity Check

Structure validation: PDF-ben valid xref table? ZIP-ben valid central directory? Truncated file detection (file size vs expected size). Corruption detection: parse error → invalid file. Reject before processing.

39

Certificate Validation Service

Trust Services

Purpose: Validates X.509 certificate chains up to trusted root CAs.

Performs certificate chain validation: validate signature → check validity period → verify key usage → check revocation (OCSP/CRL) → validate chain up to trusted root. Implements path building (find valid chain from intermediate to root). Validates certificate policies and policy constraints. Checks name constraints and basic constraints (CA:TRUE for intermediates). Handles cross-certificates and bridge CAs. Provides validation reports (chain valid, revocation status, trust anchor). Algorithm: RFC 5280 path validation.

Chain Building RFC 5280 OCSP/CRL Check Policy Validation
Certificate Chain Building

Path finding: leaf cert → intermediate CA(s) → root CA. AIA (Authority Information Access) extension: URL intermediate cert-hez. Download intermediates, build chain. Multiple paths possible: valid path selection.

Basic Constraints (CA:TRUE)

X.509 extension: CA:TRUE (can issue certs), CA:FALSE (end-entity). Path length constraint: max intermediate levels. Validation: intermediate-nek kell CA:TRUE. Leaf cert: CA:FALSE. Véd: end-entity cert nem adhat ki cert-eket.

Name Constraints

CA extension: korlåtozza milyen domain-ekre adhat ki cert-et. Permitted: .example.com, Excluded: internal.example.com. Validation: leaf subject DN within permitted subtrees. Véd: CA nem ad ki cert måsik org domain-jére.

Bridge CA

2 PKI hierarchy összekapcsolĂĄsa cross-certificate-tel. PKI A Ă©s PKI B nem bĂ­znak egymĂĄsban directly. Bridge CA: mindkettƑ trust. A → Bridge ← B. Use case: government PKIs, international trust.

40

Key Escrow & Recovery Service

Security & Auth

Purpose: Enterprise key backup and recovery for business continuity.

Provides key escrow (secure backup of encryption keys) for enterprise scenarios (employee leaves, device loss, regulatory compliance). Implements M-of-N key splitting (split key into 5 shares, require 3 to recover). Uses Shamir's Secret Sharing algorithm. Stores key shares in separate HSMs for security. Implements key recovery workflow: request → approval (multi-party) → recovery → audit log. Requires dual control (two admins) for recovery operations. Maintains recovery audit trail. Use case: Recover encrypted documents after employee departure.

M-of-N Splitting Shamir's Secret Dual Control Audit Trail
Shamir's Secret Sharing

KriptogrĂĄfiai algoritmus: secret split N rĂ©szre, M-bƑl összeĂĄllĂ­thatĂł. 3-of-5: secret → 5 share, bĂĄrmelyik 3-bĂłl recover. Polynomial interpolation (Lagrange). Security: 2 share → semmit nem tudunk, 3 share → teljes secret. Distributed trust.

Key Escrow

Encryption key backup harmadik fĂ©lnĂ©l vagy secure storage-ban. Enterprise: employee encryption key escrowed. Employee tĂĄvozik → company recover key → decrypt documents. Regulatory: law enforcement access (controversial).

Dual Control

2 admin szĂŒksĂ©ges kritikus mƱvelethez. Admin1 kezdemĂ©nyezi key recovery → Admin2 jĂłvĂĄhagyja → operation proceeds. Neither alone can recover. Prevents: rogue admin, insider threat. Banking: dual control wire transfers. High security.

Key Recovery Workflow

Multi-step process: request (reason, justification) → approval (manager + security) → identity verification → recovery (combine shares) → key usage → audit log (who, when, why). Compliance: SOX, HIPAA.

41

Certificate Inventory Service

Core PKI

Purpose: Certificate discovery, inventory management, and expiration monitoring.

Provides certificate inventory (all certificates issued, pending, revoked, expired). Implements certificate discovery (scan networks for TLS certificates, find shadow IT). Monitors expiration dates and sends alerts (30/7/1 days before expiry). Provides certificate search (by subject DN, serial number, thumbprint, validity period). Tracks certificate usage (which services use which certificates). Generates inventory reports (certificates by org, by type, expiring soon). Implements full-text search with PostgreSQL indexes. Use case: Prevent outages from expired certificates.

Discovery Expiry Monitoring Full-Text Search Usage Tracking
Certificate Discovery (Network Scan)

HĂĄlĂłzat scan TLS certificate-ekĂ©rt: nmap, openssl s_client minden IP:443-ra. Extract cert → parse → inventory-ba. Find shadow IT (unauthorized services), rogue certificates. Scheduled job: weekly scan.

Expiry Monitoring & Alerting

Daily cron job: SELECT certs WHERE expires_at - now() < 30 days. Alert levels: 30d (warning), 7d (urgent), 1d (critical). Notification: email, Slack, PagerDuty. Auto-renewal trigger. Prevents: expired cert → service outage.

Certificate Thumbprint

SHA-1 vagy SHA-256 hash certificate-rƑl (DER encoding). Egyedi azonosító (fingerprint). Usage: certificate pinning (mobile app csak ezt a cert fogadja el), inventory search, deduplication. Short, human-readable (hex).

Full-Text Search (PostgreSQL)

tsvector + tsquery: search certificate subject DN, issuer, san (Subject Alternative Name). GIN index gyors keresĂ©shez. Query: "certificate for *.example.com" → full-text match. Multi-field search, relevance ranking.

42

Remote Attestation Service

Trust Services

Purpose: TPM/SGX attestation for secure device enrollment and trusted computing.

Verifies device integrity using Trusted Platform Module (TPM) and Intel SGX enclaves. Implements remote attestation protocols: device generates attestation quote → service validates quote against trusted baseline → issues certificate if valid. Validates boot measurements (UEFI Secure Boot, OS integrity). Supports TPM 2.0 and SGX EPID/DCAP attestation. Issues device identity certificates (AIK, DAA keys). Use case: IoT device onboarding, confidential computing, zero-trust networks. Integrates with Certificate Issuance (02).

TPM 2.0 Intel SGX Boot Measurement Device Identity
TPM (Trusted Platform Module)

Hardware chip (vagy firmware) a mainboard-on kriptogråfiai mƱveletekhez. Secure storage: encryption keys soha nem hagyjåk el. Platform measurement: boot process hash-ek (PCR registers). Attestation: quote generation (digitålisan alåírt report).

Remote Attestation

Bizonyítja távolról hogy egy device megbízható állapotban van. Device: TPM quote (PCR values + nonce + signature) → Server: validate quote (signature OK? PCR match baseline?). Valid → issue cert, Invalid → block. Zero-trust networking.

Intel SGX (Software Guard Extensions)

CPU feature: secure enclave (protected memory region). Code + data enclave-ben: OS sem lĂĄtja (encrypted RAM). Attestation: enclave quote (prove code integrity). Use case: confidential computing (ML model secure execution).

Boot Measurement (Secure Boot)

UEFI Secure Boot: bootloader, kernel hash measurement boot közben. TPM PCR registers tåroljåk. Golden measurement: trusted baseline. Attest: current PCR vs golden. Mismatch = compromised boot (malware, rootkit).

43

ACME Server

Trust Services

Purpose: RFC 8555 ACME protocol server (Let's Encrypt-compatible) for automated TLS certificate issuance.

Implements ACME protocol (RFC 8555) for automated certificate lifecycle management. Supports domain validation challenges: HTTP-01 (place file at /.well-known/acme-challenge), DNS-01 (add TXT record), TLS-ALPN-01 (TLS handshake). Provides automatic renewal (certbot, acme.sh integration). Issues TLS certificates for web servers (nginx, Apache, IIS). Handles wildcard certificates (*.example.com). Implements rate limiting to prevent abuse. Use case: Automated TLS certificate management for DevOps.

RFC 8555 HTTP-01 / DNS-01 Auto-Renewal Wildcard Certs
ACME Protocol (RFC 8555)

Automated Certificate Management Environment. Workflow: account registration → order creation → authorization (domain validation challenges) → CSR submit → certificate issuance. REST API (JSON), JWS signed requests.

HTTP-01 Challenge

Domain ownership bizonyĂ­tĂĄs: ACME server token-t ad → client file-t hoz lĂ©tre http://domain/.well-known/acme-challenge/TOKEN → server HTTP GET ellenƑrzi. Success → domain validated. Limitation: port 80 szĂŒksĂ©ges, no wildcard support.

DNS-01 Challenge

DNS TXT record: _acme-challenge.domain.com TXT "token". ACME server DNS query-vel ellenƑrzi. Advantage: wildcard certificate support, nem kell port 80. Limitation: DNS API access szĂŒksĂ©ges (automation).

Certbot

EFF ACME kliens: automated cert issuance + renewal. Command: certbot --nginx -d example.com → HTTP-01 challenge → cert install nginx config-ba. Cron job: auto-renewal 30 nap elƑtt. Most popular ACME client. Python.

44

Certificate Transparency Log

Trust Services

Purpose: RFC 6962 public certificate transparency log for audit and monitoring.

Implements Certificate Transparency (RFC 6962) - public, append-only log of all issued certificates. Uses Merkle tree for cryptographic proof of inclusion. Issues Signed Certificate Timestamps (SCT) that must be embedded in TLS certificates. Provides audit endpoints (get-entries, get-proof-by-hash, get-sth). Enables certificate monitoring (detect misissued certificates for your domains). Required for browser trust (Chrome, Safari require CT). Publishes Signed Tree Head (STH) every hour. Use case: Detect rogue CAs issuing certificates for your domain.

RFC 6962 Merkle Tree SCT Browser Trust
Certificate Transparency (CT)

Public audit log: minden CA ĂĄltal kibocsĂĄtott cert bekerĂŒl CT log-ba. Transparency: bĂĄrki monitorozhatja domain-jĂ©t. Prevent: rogue CA misissued cert (pl. NSA fake Google cert). Browser-ek: CT kötelezƑ Chrome/Safari-ban (SCT required).

Merkle Tree

Hash tree: leaf nodes = cert hashes, parent = hash(left + right), root = tree hash. Inclusion proof: log(N) hashes bizonyĂ­tjĂĄk hogy egy cert a tree-ben van. Tamper-proof: root hash vĂĄltozik ha bĂĄrmi mĂłdosul. Efficient verification.

SCT (Signed Certificate Timestamp)

CT log Ă­gĂ©rete: cert be fog kerĂŒlni a log-ba X idƑn belĂŒl (Maximum Merge Delay: 24h). DigitĂĄlisan alĂĄĂ­rt timestamp. TLS handshake-ben: SCT embedded cert-be vagy OCSP stapled. Browser validation: legalĂĄbb 2 SCT different logs-tĂłl.

Certificate Monitoring

CT log-ok scan-elĂ©se domain-edre kibocsĂĄtott cert-ekĂ©rt. Service: crt.sh, Facebook CT monitor. Alert ha Ășj cert: expected (te kibocsĂĄtottad) vagy suspicious (rogue CA). Early detection: misissued cert before attack.

45

SPIFFE/SPIRE Server

Trust Services

Purpose: Service mesh identity (SPIFFE) for zero-trust microservice authentication.

Implements SPIFFE (Secure Production Identity Framework For Everyone) for workload identity. Provides SPIRE (SPIFFE Runtime Environment) server for identity issuance and validation. Issues SVID (SPIFFE Verifiable Identity Document) - short-lived X.509 certificates (1-hour validity) for services. Supports workload attestation (verify service identity via Kubernetes SA, AWS IAM role, Unix process). Enables mutual TLS (mTLS) between microservices. Implements automatic rotation of SVIDs. Use case: Service-to-service auth in Kubernetes, Istio, Envoy service mesh.

SPIFFE/SPIRE SVID (X.509) mTLS Service Mesh
SPIFFE ID

URI-based service identity: spiffe://trust-domain/path/to/workload. Példa: spiffe://example.com/backend/api. Trust domain: PKI root. Path: hierarchikus namespace (org/team/service). SVID Subject Alt Name extension-ben.

SVID (X.509 Short-Lived Certificate)

1 ĂłrĂĄs Ă©rvĂ©nyessĂ©gƱ service certificate. Auto-rotation: 30 perc mĂșlva Ășj SVID kĂ©rĂ©s. Subject: SPIFFE ID. mTLS: mindkĂ©t service validĂĄlja egymĂĄs SVID-jĂĄt. Compromise window: max 1 Ăłra. No long-term secrets.

Workload Attestation

Bizonyítja a workload identity-t. Kubernetes: ServiceAccount token → SPIRE verify → issue SVID. AWS: IAM role → instance metadata → verify. Unix: process PID → parent PID chain → validate. Zero-trust basis.

Mutual TLS (mTLS)

TLS handshake: mindkét fél bemutatja cert-et (nem csak a server). Client + Server authentication. Verify: cert valid? SPIFFE ID authorized? Service mesh: minden service-to-service call mTLS-sel. Zero-trust network.

46

Policy & Compliance Engine

Compliance

Purpose: Rule-based policy enforcement and compliance checking.

Implements policy engine with rule evaluation (boolean logic: AND, OR, NOT). Defines policies (certificate_key_length >= 2048, certificate_validity <= 365 days, signature_algorithm != SHA1). Evaluates policies using context data (certificate fields, user attributes, organization settings). Supports operators: ==, !=, <, >, REGEX, CONTAINS, STARTS_WITH. Provides compliance checks (run all policies, generate compliance score). Records policy violations with detailed messages. Runs saga pattern: create check → evaluate policies → record violations → update check status. Use case: Enforce company security policies, regulatory compliance.

Rule Evaluation Boolean Logic Compliance Score Violation Tracking
Policy Engine

Rule-based decision motor. Policies JSON-ben: rules (conditions + actions). Evaluation: context data + rules → decision (allow/deny). Engine: Rego (Open Policy Agent), CEL (Common Expression Language), vagy custom Go logic. Flexible, auditable.

Boolean Logic (AND/OR/NOT)

Complex rules composition. (key_length >= 2048 AND algorithm != "SHA1") OR (is_qualified_cert = true). Nested conditions, precedence, short-circuit evaluation. Expression tree parsing and evaluation.

Compliance Score

Percentage: passed policies / total policies. 85/100 policies passed = 85% compliance score. Weighted score: critical policy (10 points), warning (1 point). Dashboard: compliance trend over time. KPI for audits.

Policy Violation Tracking

Record minden failed policy check: violation_id, policy_id, resource_id, timestamp, details (why failed). Remediation workflow: violation → assign to team → fix → re-check. Audit trail: prove compliance to auditors.