top of page

Security for Your IRIS T24 Applications

  • Writer: Josef Mayrhofer
    Josef Mayrhofer
  • 8 hours ago
  • 2 min read

The performance of your core banking system is essential to ensure high-quality service for your customers. More importantly, however, is ensuring that all their information and account access remain fully secure.

Since one of the primary ways to expose your T24 banking services is via APIs, this section covers the key security mechanisms Temenos provides for your IRIS APIs.


Basic Authentication Filter Implementation

In an HTTP transaction, Basic Access Authentication allows a client (such as a web browser) to send a username and password as part of the request.

HTTP Basic Authentication relies on standard header fields, eliminating the need for additional handshakes.


To enable Basic Authentication for IRIS APIs, you must configure the t24SecurityFilter in the applicationContext.xml

<bean id="t24SecurityFilter" class="com.temenos.irf.comms.security.defaultimpl.T24BasicAuthenticationCheck"></bean>

Once the credentials are provided in the request header, the transaction will pass through T24 successfully and return a response.



Token-Based Security Filter Implementation

IRIS Data Services can also act as an intermediary for authenticated requests using JWT or SAML tokens. These tokens serve as authentication and identification mechanisms.



Configuration

To enable JWT-based authentication in IRIS, the following configurations must be applied to the WAR file:


  • Enable the classpath resource


  • Enable the Spring Security Filter


  • Configure spring-jwt-iris-authenticator.xml


  • Enable Spring Security in applicationContext.xml


  • Adjust clock drift tolerance


  • Exclude static resources from JWT validation


  • Enable JWT-based authentication for external users


Generate JWT Token

Deploy the irf-auth-token-generation-container.war file in the application server.

Provide Basic Authentication credentials and access the URL shown on screen to generate the token.


Decode the Token

Go to JWT.IO  and decode the generated token.

The issuer should appear as TEMENOS.


Test JWT Token Filter

When the JWT token is included in the request header, the transaction will pass through T24 and return the appropriate response.



XACML Authorization for IRIS

The IRIS Framework uses the Temenos Security Framework to apply attribute-based access control (ABAC) policies at IRIS API endpoints (GET/POST/PUT) before the business function is executed.XACML policies are stored at runtime and enforced before any API is processed by T24.


The PDP (Policy Decision Point) engine evaluates the relevant policy and returns an authorization decision, which IRIS enforces at the API layer, before reaching the business logic.


Configuration

  • Enable the XACML bean in applicationContext.xml

  • Generate the required policy XML files based on the authorization rules for each API endpoint


Test XACML Authorization

The roleId defined in iris-admin-policy.xml must be sent in the request header, for example:roleId: ADMIN


When the roleId is provided correctly, the transaction will pass through T24 and return a response.


At Performetriks, we prioritize information security just as much as the performance of your banking systems. If you need support implementing security processes in your services, don’t hesitate to contact us. At Performetriks, it will be our pleasure to assist you.

Happy Performance Engineering!



Comments


bottom of page