eid/authentication/digital signatures in Denmark
|
|
|
- Caitlin Elliott
- 10 years ago
- Views:
Transcription
1 eid/authentication/digital signatures in Denmark 8. July 2008 Nikolas Triantafyllidis / Charlotte Jacoby Special Advisors Centre for Digital Signatures National IT- and Telecom Agency
2 Authentication and eid Services Def.: Authentication (including eid) constitutes the process of verifying a person s identity to be authentic. In e-government authentication is an essential mechanism ensuring that a user is the person he claims to be. No national eid in Denmark under the notion of a national identification card Instead a national digital signature infrastructure based on PKI National digital signature standard called OCES (Public Certificates for Electronic Services) Based on the national central personal register (CPR) Based on the national central company register (CVR)
3 Background History: EU Electronic Signatures Directives December 13, 1999 Act on Electronic Signatures October 1, 2000 Public tender on security solutions May 2001 Barriers for the usage of Electronic Signatures Lack of Standardisation Demand for Personal Presence for Identification Expensive and Difficult Accessible Hardware Solutions Lack of Electronic Services using Electronic Signatures Lack of a Feasible Business Case and Business Models
4 Goal and foundation of the OCES project OCES: Public Certificates to Electronic Services Goal: Establishing a general open, scalable and transparent security infrastructure based on PKI, controlled by the state and operated by private Certificate authorities (CA) Foundation: Defining a state-owned Certificate Policies (CP) and an open architecture based on international standards called OCES CP EU-Tender with a public private partnership in mind Establishing a non-discrimination approval process for potential OCES CA Broad dialogue with relevant partners
5 Security Level: OCES I ( ) Software based digital signature (with mandatory password usage) Issued without the demand of personal presence for identification CA responsibility: Extended responsibility towards citizens Private businesses may rely on separate agreements Authorisation and controlling as in the Danish Act on Electronic Signatures Issued as: Personal certificates PID (a unique number related to civil registration number) Employee certificates RID/CVR (Employee number/central company number) Business certificates CVR (Central company number) Function certificates CVR/deviceID Other relevant information: EU-tender (Total funding: 6,7 million) Contract with TDC February 6, 2003 The contract between the Ministry and TDC will be in force with an option for one more year Business model: The receiving partner is paying a flat rate: per certificate per year free of charge for citizens Corporate agreement covering receiving certificates for all public institutions in central government, counties and municipalities
6 OCES II ( ) Centrally stored private keys (mobility) Real 2-factor security solution (enhanced security) Username + personal password OTP (One-time password) card Fully independent of PC (user-friendliness) Acquisition of smartcard/etoken/mobile phone possible Joint infrastructure with the Danish banks Consistent user experience regardless where the signature is used The public sectors share in the infrastructure: 27,3 million over 5 years (1/3 state institutions, 1/3 municipalities, 1/3 regions) Free of charge for citizens
7 Number of digital signatures issued (8. July 2008) Personal signatures: Employee signatures: Business signatures: Function signatures: 115 Total:
8 Examples of electronic services using digital signatures Sundhed.dk the public sector s health portal The National Tax Authority The State Education Fund The City of Copenhagen Borger.dk A portal for citizen used by all local authorities TDC On-line online telecom resource (potential 700,000 users) danmark the private Danish health insurance company (1.7 million customers) Virk.dk the common public sector portal for companies (potential companies) ATP - the Danish supplementary labour market pension fund (1.9 million customers) The Ministry of Education: Central Education Admission Portal (60,000 people per year) Many more
9 Key success factors in the implementation of the project Establishing a standard (CP etc.) Easy rollout and usability Balancing security and cost Public/private partnership The business model The public sector as a driver
10 Lessons Learned It takes time to establish an open infrastructure in large scale for digital signatures and to get people to use it The electronic services are the driver for the rollout of digital signatures Marketing complexity And focus on how to get citizens and companies to use them What is the benefit for the users? PIN-code solutions are still in use and they work Important to get the private sector involved
11 Challenges on in international perspective Crossborder issues Trust issues Interoperability issues (certificate semantics, national ID s) Different security levels Many different EU-projects with different goalsand focusareas
12 References and links (only in Danish) (certificate policies also in English) (official site for National IT and Telecom Agency)
13 Charlotte Jacoby Nikolas Triantafyllidis
Introduction to NemID and the NemID Service Provider Package
Nets DanID A/S Lautrupbjerg 10 DK 2750 Ballerup T +45 87 42 45 00 F +45 70 20 66 29 [email protected] www.nets-danid.dk CVR no. 30808460 Introduction to NemID and the NemID Service Provider Package Page 1
Terms and conditions of business for a NemID administrator of commercial NemID
Terms and conditions of business for a NemID administrator of commercial NemID 1 Background...2 2 Scope and object...3 3 Administrator and Certificates...3 3.1 General obligations of the Customer...3 3.2
D.I.M. allows different authentication procedures, from simple e-mail confirmation to electronic ID.
Seite 1 von 11 Distributed Identity Management The intention of Distributed Identity Management is the advancement of the electronic communication infrastructure in justice with the goal of defining open,
eauthentication in Estonia and beyond Tarvi Martens SK
eauthentication in Estonia and beyond Tarvi Martens SK E-stonia? Population: 1.35M Internet usage: 56% Internet banking: 88% Mobile penetration: >100% 1000+ Free Internet Access points PKI penetration:
Global eid Developments. Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa
Global eid Developments Detlef Eckert Chief Security Advisor Microsoft Europe, Middle East, and Africa Agenda Country View on eid initiatives Trustworthy Identity Scenarios Microsoft eid update Summary
You can also find the conditions at www.nemid.nu.
NemID conditions for online banking and public digital signatures, v.5 1 Introduction NemID is a security solution that you can use for accessing your online banking service, public authority websites
esign Online Digital Signature Service
esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities
End-User Manual. for. e-pramaan: A National e-authentication Service. Submitted to
e-pramaan: A National e-authentication Service End User Manual version 0.1 1 End-User Manual for e-pramaan: A National e-authentication Service Submitted to Department of Electronics & Information Technology
Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration
Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Horst Bliedung Director International Sales CEE Siemens IT Solutions and Services
OECD workshop on digital identity management BELGIAN approach
OECD workshop on digital identity management BELGIAN approach FEDICT Frank LEYMAN Trondheim - 08/05/2007 Information security in Belgium > Government disposes of data: Identification data, fiscal data,
A Conceptual Model of Practitioner Authentication Prior to Providing Telemedicine Services in Developing Countries
A Conceptual Model of Practitioner Authentication Prior to Providing Telemedicine Services in Developing Countries Leonie Spoerer, Yashik Singh and Maurice Mars Dept of TeleHealth, University of KwaZulu-Natal
Open Source Software and the Public Sector
> Open Source Software and the Public Sector This publication can be downloaded from: http://www.itst.dk Published by: The National IT and Telecom Agency The National IT and Telecom Agency Holsteinsgade
ONE SINGLE ADDRESS FOR ALL YOUR ONLINE PROCEDURES. as part of your professional activity. Business Portal
ONE SINGLE ADDRESS FOR ALL YOUR ONLINE PROCEDURES as part of your professional activity Business Portal WHY CHOOSE MYGUICHET? MyGuichet is a secure interactive platform available on guichet.lu. It allows
Secure and simple authentication via mobile phone
Mobile ID Secure and simple authentication via mobile phone Mobile ID provides your employees and customers with a convenient and secure way to login to applications and online portals. It also makes it
COMMISSION OF THE EUROPEAN COMMUNITIES
EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 28.11.2008 COM(2008) 798 final COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE
French Justice Portal. Authentication methods and technologies. Page n 1
French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication
How much do you pay for your PKI solution?
Information Paper Understand the total cost of your PKI How much do you pay for your PKI? A closer look into the real costs associated with building and running your own Public Key Infrastructure and 3SKey.
Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015
Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction
secure user IDs and business processes Identity and Access Management solutions Your business technologists. Powering progress
secure Identity and Access Management solutions user IDs and business processes Your business technologists. Powering progress 2 Protected identity through access management Cutting costs, increasing security
Identity and Access Management
Cut costs. Increase security. Support compliance. www.siemens.com/iam Scenarios for greater efficiency and enhanced security Cost pressure is combining with increased security needs compliance requirements
LEGAL FRAMEWORK FOR E-SIGNATURE IN LITHUANIA AND ENVISAGED CHANGES OF THE NEW EU REGULATION
LEGAL FRAMEWORK FOR E-SIGNATURE IN LITHUANIA AND ENVISAGED CHANGES OF THE NEW EU REGULATION Aušra Kumetaitienė Head of Information Society Development Division Tomas Jakimavičius Telecommunications and
One-Time Password Contingency Access Process
Multi-Factor Authentication: One-Time Password Contingency Access Process Presenter: John Kotolski HRS Security Officer Topics Contingency Access Scenarios Requesting a Temporary One-Time Password Reporting
European Electronic Identity Practices
European Electronic Identity Practices Country Update of Austria Speaker: Herbert Leitold Date: 9 Nov 2004 PART I: Overview Table of contents Overview of Citizen Card initiatives and its status (Summary
Certificate Policy for OCES Employee Certificates (Public Certificates for Electronic Services) Version 5
Certificate Policy for OCES Employee Certificates (Public Certificates for Electronic Services) Version 5 - 2 - Contents Rights...4 Preface...5 Introduction...6 1 Overview and scope...7 2 References...8
ISA Work Programme SECTION I
ISA Work Programme SECTION I TABLE OF CONTENTS INTRODUCTION...4 1. THE CONTEXT...4 1.1. The need for the ISA programme...4 1.2. The political context...4 2. THE ISA PROGRAMME...5 3. THE EUROPEAN INTEROPERABILITY
Processo civile telematico «on line civil trial»
Processo civile telematico «on line civil trial» Giulio Borsari IT Officer Department of Judicial Organization, Personnel and Services Civil justice in Italy: huge numbers! 140 tribunals 26 Courts of Appeals
Revised edition. OIO Web SSO Profile V2.0.8 (also known as OIOSAML 2.0.8) Includes errata and minor clarifications
OIO Web SSO Profile V2.0.8 (also known as OIOSAML 2.0.8) Revised edition Includes errata and minor clarifications Danish Agency for Digitisation December 2011 Contents > 1 Introduction 8 1.1 Referenced
CONCEPT. International Comparison eid Means
CONCEPT International Comparison eid Means International Comparison eid Means Final report DISCLAIMER This study was commissioned by the Dutch Ministry of the Interior and Kingdom Relations. The authors
Feasibility Study for a EU Pension Fund for Researchers. European Commission Research Directorate-General
Feasibility Study for a EU Pension Fund for Researchers European Commission Research Directorate-General Executive Summary n RTD/DirC/C4/2009/026879 1 Executive Summary This report covers the main results
Modinis Study on Identity Management in egovernment
Prepared for the egovernment Unit DG Information Society and Media European Commission Modinis Study on Identity Management in egovernment The Status of Identity Management in European egovernment initiatives
A KIND OF IMPLEMENT ABOUT MOBILE SIGNATURE SERVICE BASED ON MOBILE TELEPHONE TERMINAL
A KIND OF IMPLEMENT ABOUT MOBILE SIGNATURE SERVICE BASED ON MOBILE TELEPHONE TERMINAL Wangjian, Xu Guoai, Zhangmiao National Engineering Laboratory for Disaster Backup and Recovery, Beijing University
Identity, Credential, and Access Management. Open Solutions for Open Government
Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management www.idmanagement.gov Open Solutions for Open Government Judith Spencer Co-Chair, ICAM
Sign-On projektet. HL7-CCOW Context Management: A National Sign-on Profile
Sign-On projektet HL7-CCOW Context Management: A National Sign-on Profile Version Dato Ansvarlig Kommentarer 0.1 22/10-2009 CHE Minimal profilering, 1 side med nødvendige SSO specifikationer til HL7-CCOW
Securing Identities & Trust
Securing Identities & Trust Agenda About Safelayer Identities & Trust eidas (eid, Authentication and Signature) Use case: Izenpe Mobile eidas services Safelayer Demo Portal Q& A? WWW.SAFELAYER.COM 2 About
KNPC esourcing Portal. Getting Started - Registration & Authentication. KNPC esourcing Registration & Authentication
Getting Started - Registration & Authentication Supplier Registration & Authentication Process Any new Supplier (Local or International) who wishes to get Prequalified or participate in Tenders run by
OIO Web SSO Profile V2.0.5
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?
esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents
Using big data in product design. Executive Director Jesper N. Pedersen
Using big data in product design Executive Director Jesper N. Pedersen Agenda The challenge is Big data a Big thing? Danish Innovation approach 1. Product innovation 2. New online services 3. Smart city
EDI legal aspects in Estonia
EDI legal aspects in Estonia Sharing the experience: einvoicing Riga, ECR Baltic seminar, April 15, 2010 Taavi Valdlo Department of State Information Systems Ministry of Economic Affairs and Communications
Articles of Association of Bang & Olufsen a/s CVR no. 41 25 79 11
Articles of Association of Bang & Olufsen a/s CVR no. 41 25 79 11 Article 1. The Company s name is Bang & Olufsen a/s. Article 2. The registered office of the Company is situated in the Municipality of
The Government Gateway UK Best Practice on Infrastructure and Identity Management. Chris Haynes Director of the EDT Cabinet Office UK Government
The Government Gateway UK Best Practice on Infrastructure and Identity Management Chris Haynes Director of the EDT Cabinet Office UK Government 1 1 A beginners guide to the Government Gateway What is the
esignature building block Introduction to the Connecting Europe Facility DIGIT Directorate-General for Informatics
Introduction to the Connecting Europe Facility esignature building block DIGIT Directorate-General for Informatics DG CONNECT Directorate-General for Communications Networks, Content and Technology February
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
Working and living in Denmark A brief introduction to tax, social security and immigration. Tax 2015
Working and living in Denmark A brief introduction to tax, social security and immigration Tax 2015 1. Introduction This booklet contains brief information about the main aspects of individual taxation,
Hungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue
Hungarian Electronic Public Administration Interoperability Framework (MEKIK) Technical Standards Catalogue Zsolt Sikolya Ministry of Informatics and Communications (IHM) Tel: +3614613366, Fax: +3614613548
Corporate Governance in the ATP Group
Corporate Governance in the ATP Group ATP s activities are regulated by statute. ATP is thus an independent, statutory institution, the aim of which is to administer the ATP pension scheme. Alongside the
Offer to the shareholders for the buy-back of Class B shares
Page 1 of 6 24 November 2015 Offer to the shareholders for the buy-back of Class B shares in Auriga Industries A/S (CVR no. 34629218) Finlandsgade 14 8200 Aarhus N Denmark This Share Buy-back Offer is
MULTI-FACTOR AUTHENTICATION SET-UP
MULTI-FACTOR AUTHENTICATION SET-UP DepositPartner Desktop Application TABLE OF CONTENTS Click the link below to go to the section you need: First Time Enrollment Enrolled User Contact information on file
Encryption-based 2FA for Server-side Qualified Signature Creation
S C I E N C E P A S S I O N T E C H N O L O G Y Encryption-based 2FA for Server-side Qualified Signature Creation Christof Rath, [email protected] Institute for Applied Information Processing
Congratulations on starting a business in Denmark
Congratulations on starting a business in Denmark The Start-up Denmark Secretariat would like to inform you about doing business in Denmark. In this letter, you will find information about Setting up a
Questions/Answers about NemID, mandatory digital self-service and Digital Post. NemID FAKTAARK HJÆLP TIL KOMMUNIKATIONEN MED BORGEREN
Questions/Answers about NemID, mandatory digital self-service and Digital Post NemID What is NemID? NemID is Denmark s common logon solution for public self-service, online banking, etc. Who can get NemID?
VASCO: Compliant Digital Identity Protection for Healthcare
VASCO: Compliant Digital Identity Protection for Healthcare Compliant Digital Identity Protection for Healthcare The proliferation of digital patient information and a surge in government regulations are
Government of India Ministry of Communications & Information Technology Department of Electronics & Information Technology (DeitY)
Government of India Ministry of Communications & Information Technology Department of Electronics & Information Technology (DeitY) Title of Policy: Policy on Open APIs for Government of India Preamble:
Serge Novaretti IDABC DIGIT European Commission
European W3C Symposium on egovernment 2007 February 2 IDABC Programme European Interoperability Framework Serge Novaretti IDABC DIGIT European Commission 1 Disclaimers This presentation provides technical
Revised edition. OIO Web SSO Profile V2.0.9 (also known as OIOSAML 2.0.9) Includes errata and minor clarifications
OIO Web SSO Profile V2.0.9 (also known as OIOSAML 2.0.9) Revised edition Includes errata and minor clarifications Danish Agency for Digitisation September 2012 Contents > 1 Introduction 8 1.1 Referenced
The value of Danish address data:
7 July 2010 /mli-ebst The value of Danish address data: Social benefits from the 2002 agreement on procuring address data etc. free of charge Summary Addresses play a fundamental role in society. Addresses
ACH fraud: The problem Why ACH? Why now? Security evolution How to protect ACH. Combating the Newest Attack Method ACH Fraud Webinar agenda
Combating the Newest Attack Method ACH Fraud Webinar agenda ACH fraud: The problem Why ACH? Attack methods Dynamics of ACH Why now? Action taken Weakness exposed Security evolution How to protect ACH Webinar:
CoSign by ARX for PIV Cards
The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response
COMESA Guidelines on Free and Open Source Software (FOSS)
COMESA Guidelines on Free and Open Source Software (FOSS) Introduction The COMESA Guidelines on Free and Open Source Software are a follow-up to the COMESA Regional FOSS Framework of 2009 whose main objective
e. House Tax / Urban Development Tax (Paid) Receipt.
Online applying Steps for Fire NOC (Temporary/ Final - Pre-construction/Post-construction) 1. For Single Window Clearance System or Single Sign On Browse the URL http://swcs.rajasthan.gov.in/ or http://sso.rajasthan.gov.in/
How To Use Pki On A Pc (For A Non-Profit)
Using PKI for PC Security Public Key Infrastructure (PKI) is an important foundation for network and information security. In essence, PKI provides an enterprise infrastructure for managing the keys necessary
Digital signature and e-government: legal framework and opportunities. Raúl Rubio Baker & McKenzie
Digital signature and e-government: legal framework and opportunities Raúl Rubio Baker & McKenzie e-government concept Utilization of Information and Communication Technologies (ICTs) to improve and/or
Strong Authentication for Secure VPN Access
Strong Authentication for Secure VPN Access Solving the Challenge of Simple and Secure Remote Access W H I T E P A P E R EXECUTIVE SUMMARY In today s competitive and efficiency-driven climate, organizations
End-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments
End-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory
Overview of the national laws on electronic health records in the EU Member States National Report for Lithuania
Overview of the national laws on electronic health records in the EU Member States and their interaction with the provision of cross-border ehealth services Contract 2013 63 02 Overview of the national
Standard Summary Project Fiche IPA centralised programmes
Standard Summary Project Fiche IPA centralised programmes Project number 15: Implementation of Hospital Information System (HIS) 1 BASIC INFORMATION 1.1 CRIS Number: 2008/020-406 1.2 Title: Implementation
