SuperID certificates

In this article

    Public Key Infrastructure (PKI) certificates are absolutely necessary in today's connected world. SuperOffice CRM Online requires that all applications support a secure SSL environment. There are various ways to ensure that your applications are able to exchange information with SuperOffice CRM Online in a safe and secure manner.

    Certificates are necessary to validate SuperOffice CRM Online issued tokens to partner application for the 3 online environments: SuperOffice Online Development (SOD), Stage and Production.

    The different environments have different certificates used for signing and validating security tokens.

    Certificate dependency tree


    SuperOffice Online Root Certificate Authority (CA) is the root container for all SuperOffice Online certificates. 

    Environmental certificates establish a trust for their environment of responsibility: Development, stage or production. Each environmental certificate depends on the SuperOffice Online Root CA and cannot be used without it.

    At the lowest level, the subject certificates establish trust for each environment's login services.

    • each environmental certificate has a dependency on each federated login certificate
    • each federated login certificate depends on its corresponding environmental certificate

    Supported trust types

    There are 3 main types of certificate trust:

    • Chain
    • Peer
    • None

    SuperOffice Online supports both PeerTrust and None. 


    The SuperIdTokenHandler class is responsible for validating security tokens. By default, the handler is configured to use PeerTrust.

    1. The handler looks up the source certificate thumbprint in the application settings.
    2. The handler tries to find a certificate with a matching thumbprint in the Trusted People certificate store of the local computer. The source thumbprint must be defined in the application configuration settings.
        <add key="SuperIdCertificate" value="16b7fb8c3f9ab06885a800c64e64c97c4ab5e98c" />
    3. If a match is found, the next step is to validate the certificate.

    If no certificate with a matching thumbprint is found, the ID4037 exception is thrown:

    "ID4037: The key needed to verify the signature could not be resolved from the 
    following security key identifier 'SecurityKeyIdentifier."

    This means that no certificate with a matching thumbprint was found. The only known reasons this might happen are:

    1. the certificates are not configured correctly

    2. there are hidden characters in the value field - such as an "&shy;" character