GTR Travel Rule Provider
The GTR Travel Rule Provider was added to CAS in version 20251001.
This Provider is an open alliance and available to all users.
Configuration Overview
- 1 A) Create a GTR profile
- 2 B) Create a reverse proxy server
- 3 C) Create a certificate request file (CSR) and Private Key
- 4 D) Create the GTR API key
- 5 E) Install the GTR API credentials
- 6 F) Configure the CAS API for Global Travel Rule.
- 7 G) Test the configuration.
- 8 H) Configure the Travel Rule Settings in CAS
A) Create a GTR profile
The files downloaded here will be needed here (below): Install the GTR API credentials
Navigate to: https://www.globaltravelrule.com/en/account/sign-up
Signup for an account.
Receive your VASP code (used in Step D below).
B) Create a reverse proxy server
A reverse proxy must be configured to receive the incoming communication from GTR.
Specific reverse proxy instructions: https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/4504944641
The Reverse Proxy must be functioning before moving forward.
The chosen subdomain must be used in the CSR generated in the next step.
C) Create a certificate request file (CSR) and Private Key
These 2 files are created from your Linux CLI or CAS console in the current working directory. Switch to the desired folder in the CLI before executing this command:
openssl req -new -newkey rsa:4096 -nodes -keyout PRIVATE.key -out CSR.csrYou’ll be asked for the certificate details. Provide accurate information that aligns with your company. The CSR is required for a PRODUCTION API key (versus TESTING).
Mistake? Just repeat the process.
The 2 files are created in the current folder:
PRIVATE.key
CSR.csr
IMPORTANT: Common Name
Input any subdomain name!
Example: gtr.yourcasdomain.com
This field identifies the domain for the callback service, so verify the domain is correctly mapped to your callback server.
D) Create the GTR API key
GTR forces you to engage the API in 2 steps. First, you have to implement the “test” environment, THEN after you are approved by GTR, you may implement the “production” environment. Each step is slightly different and both are outlined for clarity.
1. TEST ENVIRONMENT
Login to GTR & navigate to: Travel rule Info → Create API key
Purpose for the API key creation: Test Environment Usage
Download the zip folder named: “Test_env_key_and_certificate”
Extract the compressed files from that folder:
Api key
certificate.pemclient-truststore.pemprivateKey.pem
Navigate to Setting → Public key.
Add Public key for Test Environment Usage.
It will create an folder named: key_pair_XXXX.zip,
which is necessary to extract for Public and Private keys.
Add your CAS host IP address for Test env.
2. PRODUCTION ENVIRONMENT
Login to GTR & navigate to: Travel rule Info → Create API key
Select Purpose for the API key creation: Production Environment Usage
Upload the CSR file you created in Step B (above).
Download the zip file named: “key_and_certificate”
Extract the compressed files from that file:
Api key
certificate.pemclient-truststore.pemprivateKey.pem
Navigate to Setting → Public key.
Add Public key for Test Environment Usage.
It will create an folder named: key_pair_XXXX.zip,
which is necessary to extract for Public and Private keys.
Add your CAS host IP address for Test env.
E) Install the GTR API credentials
The credentials you downloaded in (previous) Step D must now be placed in their required folders. This process will vary depending upon where you downloaded it, the name you gave it, and the OS you’re using. There is no single valid command to illustrate the process, but they must be extracted/decompressed and available in their native formats for this step.
Create a directory named certs in: /etc/nginx and restrict the folder permissions:
sudo mkdir /etc/nginx/certs
sudo chmod 0700 /etc/nginx/certsMove the extracted files: certificate.pem, client-truststore.pem and privateKey.pem to that folder on the CAS host.
Set the correct permissions and protect the files:
sudo chown -R root:root /etc/nginx/certs
sudo chmod 0600 /etc/nginx/certs/*Lastly, restart CAS. See: https://generalbytes.atlassian.net/wiki/x/ToC1O
F) Configure the CAS API for Global Travel Rule.
Navigate to: CAS → Travel rule → Providers → Add
Global Travel Rule Provider should now be listed as an option.
Using the files from this step (above): Create a GTR profile
Add the Public and Private key from your key_pair_XXXX file,
Client ID and Client Secret from your API key.csv file,
Client ID = Access key,
Client secret = Secret key
VASP DID is the VASP listed in your profile at GTR.
Save it.
G) Test the configuration.
Use TEST CONFIGURATION to verify all is set correctly.
H) Configure the Travel Rule Settings in CAS
See: https://generalbytes.atlassian.net/wiki/x/AYCACwE https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/4066672644