Emirates Identity Authority (EIDA), Abu Dhabi
|
|
- Marybeth Young
- 7 years ago
- Views:
Transcription
1 Emirates Identity Authority Strategic Initiatives National Vision... For Better Future Emirates Identity Authority (EIDA), Abu Dhabi هيي ة اتحادية Authority Federal Our Vision: To be a role model and reference point in proofing individual identity and build wealth informatics that guarantees innovative and sophisticated services for the benefit of UAE Emirates Identity Authority. All rights reserved
2 Presentation Outline 1 EIDA Strategy Overview 2 Key Projects of National Importance 3 Project Status and Roadmap 4 Conclusion Federal Authority 2010 Emirates Identity Authority. All rights reserved هيي ة اتحادية 2
3 EIDA Strategy Overview 3
4 EIDA s strategic direction has been defined and aims for national and individual security, simplification of transactions, facilitation of innovative e-services and overall organizational service excellence Mission EIDA STRATEGY To contribute to stability, security and national prosperity through the provision of personal identity, an accurate population register and innovative electronic services Vision To be the principal reference for establishing personal identity and providing population data in the United Arab Emirates Strategic Intents 1 Contribute to National and individual security as the primary identity provider in the UAE 2 Simplify government service delivery and facilitate transactions 3 Facilitate the delivery of innovative electronic services 4 Develop a world class service organization Strategic Objectives Enroll and maintain an accurate, comprehensive and up-to-date population register Develop a secure, and integrated infrastructure enabling data access and exchange Establish the ID card as the most valued card Ensure that all central administrative services are of high quality, efficient, transparent and timely Federal Authority 2010 Emirates Identity Authority. All rights reserved هيي ة اتحادية
5 UAE Citizen ID Card- Capabilities Identification Smart ID card - Government trusted identity verification infrastructure Authentication Smart Card Biometrics Digital Certificate PIN Confidentiality & Integrity Public key Infrastructure Digital Certificate Non-Repudiation Digital Signature Time-Stamping Federal Authority 2010 Emirates Identity Authority. All rights reserved هيي ة اتحادية 5
6 Key Projects of National Importance 6
7 EIDA Current ICT Project Portfolio EIDA Strategic Objective Health of Project Completed On schedule Feasibility Assessment Enroll and maintain an accurate, comprehensive and up-todate population register Establish ID Card as the Most Valued Card Develop a secure, and integrated infrastructure enabling data access and exchange Achieve administrative Service Excellence Completed On schedule Feasibility Assessment Enrollment ID Card as the Most Valued Card Integrated Infrastructure Emirates Service Identity Excellence Authority- Key Projects of National Importance 7
8 EIDA Current ICT Project Portfolio 8
9 Key Projects of National Importance Public Key Infrastructure & Federated Identity Management Integration Platform Implementation ID Card Integration Tool Kit/ SDK E-Services Implementation 9
10 Key Projects of National Importance Strategic Objectives Enroll and maintain an accurate, comprehensive and up-to-date population register Develop a secure, and integrated infrastructure enabling data access and exchange Establish the ID card as the most valued card Ensure that all central administrative services are of high quality, efficient, transparent and timely Key Strategic Projects Public Key Infrastructure & Federated Identity Management Integration Platform Implementation ID Card Integration Tool Kit/ SDK E-Services Implementation Public Key Infrastructure & Federated Identity Management serves all the four strategic objectives achievement 10
11 EIDA PKI & FIM PROJECT Strategic Objective Project Strategic Outcome Project Outline 1 Enroll and maintain an accurate, comprehensive and up-to-date population register Public Key Infrastructure & Federated Identity Management Provide secure Identity Verification, Validation and Authentication Services Enabling citizens and residents to carry out secure e-transactions Facilitate secure G2G communications and transactions online. Enabling multiple Government Services to be accessible securely by residents and citizens of the country using seamless ID Authentication and Verification. The Public Key Infrastructure (PKI) includes setting up the Root Certification Authority (CA), and a Population CA (enabling digital signatures and encrypted communications using the digital certificates provided to citizens and residents as a part of their Identity. ) Issue Digital Certificates to the individuals so that the ID card contains PKI and biometrics data The initiative Implements a full-fledged PKI system based on modern off-the-shelf products and technologies.. And also includes an Implementation of an Identity Provider infrastructure enabling EIDA to offer authentication as a service to government organizations. This Infrastructure supports PKI and biometric authentication and provides Federated Single-Sign-On to the government domain 11
12 EIDA= ROOT CA EIDA= POPULATION (SUB) CA PKI INFRASTRUCTURE= EIDA EIDA- Sub CA- Population CA Online EIDA PKI & FIM PROJECT EIDA- ROOT CA Offline EIDA- Sub CA Government CA Transactions 1. EIDA PKI verifies signature for transaction 2. Federated Identity provides access to services 3. Digital Signature Authority is at Application Level 4. G2C Transactions only enabled- Time Stamping Required for Legitimacy 5. EIDA is the OCSP for these transactions Residents with Personal Certificates on Cards EIDA- Sub CA Service 1. EIDA PKI establishes ID 2. Digital Signature enables transaction at personal level 3. Application level Authority for signing of transaction 4. s for communication with digital signatures- Can be provided with addition Certificate Server On Site Identification Physical Biometric PIN Digital Signature Uses SAM/HSM Federal Authority هيي ة اتحادية 2010 Emirates Identity Authority. All rights reserved 4/10/2012 ١٢.....
13 EIDA INTEGRATION PLATFORM Strategic Objective Project Strategic Outcome Project Outline 2 Develop a secure, and integrated infrastructure enabling data access and exchange Integration Platform Implementation Allows authorized entities to have single authentic access to population information Provide Live Event Updates for registered population providing near real time information Provide data and information services to Government Authorities on personal profiles for G2C, G2G and G2B Provide Identity Verification Services Design and Implement a Secure Integration Platform to integrate different EIDA Stake holders at the data layer, network layer, business logic layer as well as UI layer Update data from identified data owners of personal data in real time Integrate identified stakeholders/ data owners with EIDA as part of implementation Deploy processes for on-boarding of service providers- Government and Private to integrate with EIDA to avail of data and information services. 13
14 EIDA Integration Platform MOI IMM Existing business logic loosely coupled with EIDA POLICE FNC SHJ GOV PORTAL ADSIC EIDA DUB GOV PORTAL CNIA CPC Generic Business Logic for Data Access- ID Verification, Validation, Authentication Coordination Process for message brokering FUJ GOV DUB GOV UAQ GOV SHJ GOV RAK GOV Web Based Interfaces for Transaction and Data Exchange Federal Authority هيي ة اتحادية 2010 Emirates Identity Authority. All rights reserved 4/10/2012 ١٤
15 EIDA INTEGRATION PLATFORM EIDA Stakeholders EIDA s Customers Ministry of Interior Ministry of presidential affairs Ports & Customs Financial Institutions Crown Prince Court Municipalities & Utilities Ministry of Justice Ministry of Higher Education & Scientific Research Other Institutions Government Entities Birth Nationality Education Name Qualifications Marriage Residency Health Record Marital Status Occupation Info Divorce Death Family Book Disability Passport Info Update Information Provide Verification Data Services EIDA Integration Platform The Electronic Integration Between the Government Entities ensures the independence of individual government entities and enable them to work together Federal Authority هيي ة اتحادية 2010 Emirates Identity Authority. All rights reserved 4/10/2012 ١٥
16 EIDA ID CARD TOOL KIT Strategic Objective Project Strategic Outcome 3 Establish the ID card as the most valued card ID Card Integration Tool Kit/ SDK Technical ability to integrate UAE National ID to be used across different services and entities Hassle free development of citizen ID centric applications through well defined set of APIs to access the card data and low level functions for Identity Verification, Validation, Authentication Availability of tools, samples, detailed manuals and step-by-step guides to catalyze the easy adoption of the National ID Card in Identity Verification applications by developers Project Outline Together with PKI project, this enables the rollout of the UAE ID card as the unified token for conducted secure online e-government transaction Development and distribution of a Tool Kit comprising the Software Development Kit that would enable Service Providers to integrated with the National ID card in their applications for delivering services. Free Distribution of the tool kit from EIDA Portal Promoting Developer s Community to enable problem sharing and setup a robust development environment for National ID 16
17 EIDA ID CARD TOOL KIT ID Card Tool Kit/ SDK Biometric Operations Read & Validate Cardholder Data PKI Functions Read Relevant Card Attributes Read BITs Capture Fingerprint Match on Card Verify card is genuine Read and validate public data Export Certificates Digital Signing Authenticate Read card # serial Read chip serial # Match off Card Certificate Validation Federal Authority 2010 Emirates Identity Authority. All rights reserved هيي ة اتحادية
18 EIDA ID CARD TOOL KIT Desktop- Client Server 3 Tier Architecture Java,.Net, C# Support Federal Authority 2010 Emirates Identity Authority. All rights reserved هيي ة اتحادية
19 EIDA E-SERVICES PROGRAM Strategic Objective Project Strategic Outcome 4 Ensure that all central administrative services are of high quality, efficient, transparent and timely E-Services Implementation A structured ID Services Framework and a well defined ID Services Catalog of EIDA Services - Service Delivery Strategy, including delivery model, operating model and revenue model - SLA with Service Level Targets for all the services - e-enablement of the services with detailed strategy and roadmap for the e-services Project Outline A prioritized detailed list of Identity based services ICT service delivery, aligned/ cross-referenced with current ICT strategy. Service Support Process Incident, Problem, Change, configuration and Service Level management processes. Define leading practices and benchmarking with industry accepted leading practices for ID Services and IT Services. Multi Channel delivery of 10 e-services in first phase Web, Kiosks, Mobile Phones, Social Networks, Call Centers Service enablement for: Registration and Renewal of Card Applications E-Scheduler for scheduling registration appointments PIN Reset Information Services like card tracking 19
20 EIDA ID Service Framework Remote Identification On Site Identification Transactions PKI Federated Identity Digital Signatures... Authentication Verification Validation PKI Federated Identity Digital Signatures... On Site Identification Transactions 1. Biometric 2. PIN 3. Digital Signature Physical Biometric PIN Digital Signature.... G2C, C2G G2B, B2G B2C, C2B G2G C2C, B2B 20
21 EIDA E-Services # Services Service Delivery Channels 1 2 Call Center IVR Kiosk Mobile Internet E-scheduler- Re-Schedule the appointments for enrollment at Service Centres Locate the Service Point- Graphical interface with maps 3 Update non critical data ( like address ) 4 Application submission for Lost Card Replacement, Card Freeze ٥ Submission of request to Change the card collecting place before printing ٦ Suggestions and complaints system ٧ Change service point ٨ ID card Tracking System ٩ PIN Reset ١٠ RefundME
22 ICT Strategic Projects Status Key Projects Jan Feb Mar Apr May 2012 Jun Jul Aug Sep Oct Nov Dec PKI Implementation Wave I Live with ADSIC FIM Digital Sign Service Integration Platform Implementation RFP for Implementation Select Implementer Pilot On-boarding Of entities Live & Operation Toolkit Enhancement- V2 ToolKit V2 Ready R3 Testing Completion Identity Services and e-services Service Identify Key Framework Services Service Design Complete Service Delivery Implementation 10 e-service Ready on 5 Channels EIDA Customer Services Kiosk POC Complete Deployment PIN Reset Additional E-Services Federal Authority 2010 Emirates Identity Authority. All rights reserved هيي ة اتحادية ٢٢
23 EIDA- ICT Roadmap Organizational Maturity National ID Provider ID & ID Services Provider ID + ID Services + Transaction Facilitator Organizational Transformation Strategic ID Services Consultant- Information Intelligence Objectives Initiatives Projects Target: 8 Million Registrations Target: ICAM Framework, SOA, PKI & Basic ID Services Target: SOA, National ID Portal and full ID Management Services Target: Mature ID Services for External Government Tie-Ups 23
24 Q&A / Discussion Federal Authority 2010 Emirates Identity Authority. All rights reserved هيي ة اتحادية
25 EIDA Projects of National Importance CONCLUSION
26 UAE Citizen ID Card: Government Sector Applications Secured Access to Networks & Applications Confidentiality, Integrity and nonrepudiation of transactions Secured Single Sign On (SSO) Internal Employees Citizens Online e- Governance interactions Benefits and Subsidies Delegations Registrations Filing (Fees Payments, etc ) Permits & Licenses Businesses Other Government Agencies Secure File and/or Data exchange Federal Authority 2010 Emirates Identity Authority. All rights reserved هيي ة اتحادية
27 UAE Citizen ID Card: Banking and Financial Sector Application Secured Access to Networks & Applications Confidentiality, Integrity and nonrepudiation of transactions Secured Single Sign On (SSO) Mobile Banking Internal Employees Customers Over The Counter (OTC) transactions Internet Banking Government/ Secured File and/or Data exchange Businesses/ Government Agencies Other Banks Secure File and/or Data Exchange Federal Authority 2010 Emirates Identity Authority. All rights reserved هيي ة اتحادية
28 UAE Citizen ID Card: Education Sector Applications Secured Access to Networks & Applications Confidentiality, Integrity and nonrepudiation of transactions Secured Single Sign On (SSO) Internal Employees (Administrative Staff) Teaching Staff Access to e- Learning portals Examinations & Results Registrations Scholarships Examinations Access to e- Learning portals Library Students Government Agencies Secure File and/or Data Exchange Online applications for grants, etc Federal Authority 2010 Emirates Identity Authority. All rights reserved هيي ة اتحادية
29 UAE Citizen ID Card: Health Sector Applications Secured Access to Networks & Applications Confidentiality, Integrity and nonrepudiation of transactions Secured Single Sign On (SSO) Internal Employees (Administrative Staff) Citizens/Patients Registrations Health Benefits and Subsidies Health Records Medical Benefits status and monitoring Government Doctors & Nurses Access Patients databases Medical Certificates Medical Research Portals Federal Authority 2010 Emirates Identity Authority. All rights reserved هيي ة اتحادية
30 UAE Citizen ID Card: Insurance Sector Applications Secured Access to Networks & Applications Confidentiality, Integrity and nonrepudiation of transactions Secured Single Sign On (SSO) Internal Employees (Administrative Staff) Citizens/businesses Online Claims Policy Applications Secure data exchange Government Insurance Agents Online Policy delivery Federal Authority 2010 Emirates Identity Authority. All rights reserved هيي ة اتحادية
31 UAE National ID Card A National level Infrastructure and an Authentication vehicle Federal Authority 2010 Emirates Identity Authority. All rights reserved هيي ة اتحادية
32 UAE Citizen ID Card Integrated Identity and Access Management Platform
33 UAE Citizen ID Card: Core IAM Platform Certificate Authority (CA) -EIDA Identity & Role Management Policy Management PKI & Time Stamping Services Monitoring Service UAE Citizen ID card Hot-List DB Access Management Single Sign-On Audit & Reporting Workflow Management Identity Repository Audit Logs Hot-List Database Policy Repository Federal Authority 2010 Emirates Identity Authority. All rights reserved هيي ة اتحادية National ID Card as the enabler for e-government
34 Regulatory Compliance Logs, alerts and centralized audit management Separation of duties Support of Digital Signing & Time Stamping Approvals Records every action performed on IAM by critical users Supports Multi- Factor Authentication Regulatory Compliance Secure cryptographic key management Federal Authority 2010 Emirates Identity Authority. All rights reserved هيي ة اتحادية National ID Card as the enabler for e-government
35 UAE National ID Card Usage Internal Governance of Organisations Convenience Of Businesses Enforcement And Legal Coverage Citizen Services & Benefits Federal Authority 2010 Emirates Identity Authority. All rights reserved هيي ة اتحادية National ID Card as the enabler for e-government
Enterprise Integration Strategy
Emirates Identity Authority Enterprise Integration Strategy Partners in Building UAE's Security & Economy Emirates Identity Authority Enterprise Integration Strategy Real wealth lies in sincere and diligent
More informationRole Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration
Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Horst Bliedung Director International Sales CEE Siemens IT Solutions and Services
More informationesign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?
esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents
More informationSecurity Model in E-government with Biometric based on PKI
Security Model in E-government with Biometric based on PKI Jaafar.TH. Jaafar Institute of Statistical Studies and Research Department of Computer and Information Sciences Cairo, Egypt Nermin Hamza Institute
More informationThe Role of Digital Certificates in Contemporary Government Systems: the Case of UAE Identity Authority
The Role of Digital Certificates in Contemporary Government Systems: the Case of UAE Identity Authority Dr. Ali M. Al-Khouri Emirates Identity Authority, Abu Dhabi, United Arab Emirates Abstract Digital
More informationMobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
More informationManaging Open Source Code Best Practices
Managing Open Source Code Best Practices September 24, 2008 Agenda Welcome and Introduction Eran Strod Open Source Best Practices Hal Hearst Questions & Answers Next Steps About Black Duck Software Accelerate
More informationesign Online Digital Signature Service
esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities
More informatione Governance ULB Level Reform
ULB Level Reform 1. The Reform e-governance is a form of public administration making use of information and communication technologies (ICT) to enhance the access and delivery of government services to
More informationAT&T Global Network Client for Windows Product Support Matrix January 29, 2015
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network
More informationNICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
More informationA Conceptual Model of Practitioner Authentication Prior to Providing Telemedicine Services in Developing Countries
A Conceptual Model of Practitioner Authentication Prior to Providing Telemedicine Services in Developing Countries Leonie Spoerer, Yashik Singh and Maurice Mars Dept of TeleHealth, University of KwaZulu-Natal
More informationThe Way to SOA Concept, Architectural Components and Organization
The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new
More informationPRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
More informationEgyptian Best Practices Securing E-Services
Egyptian Best Practices Securing E-Services Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA Agenda Security Measures for E-Services Examples of E- Services Threats
More informationIDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach
IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement
More informationImplementation of e-signature in the ESCWA Region: Status and Next Steps. By Matthew Perkins
Implementation of e-signature in the ESCWA Region: Status and Next Steps By Matthew Perkins Understanding e-signature How do we identify ourselves online? Electronic records of real-world authenticators
More informationThe Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
More informationSSDG Operational Manual Draft version: 0.1. Operational Manual For SSDG
Operational Manual For SSDG 1 Table of Contents ABBREVIATIONS... 5 SECTION 1: INTRODUCTION... 6 1 INTRODUCTION... 7 1.1 INTENDED USER... 7 1.2 HOW TO USE... 7 1.3 ORGANIZATION OF THE MANUAL... 8 1.4 HELPDESK...
More informationGovernment Service Bus
Government Service Bus The GSB (Government Service Bus) is intended to become the central platform of integration and services for the provision of government electronic services and transactions, and
More informationRights and Scheduling: Vision Broadcast Master. Lee Sheppard, Product Line Manager Client Conference, March 2013
Rights and Scheduling: Vision Broadcast Master Lee Sheppard, Product Line Manager Client Conference, March 2013 Broadcast Master and Vision Rights and Scheduling: Objectives Managing Rights Scheduling
More informationProcess Validation Workshops. Overview Session
Process Validation Workshops Overview Session 2 Session Objectives: Prepare staff for participating in a Process Validation Workshop Clarify the Purpose of Process Validation Workshops Clarify Expected
More informationStatus: Final. Form Date: 30-SEP-13. Question 1: OPDIV Question 1 Answer: OS
Status: Final Form Date: 30-SEP-13 Question 1: OPDIV Question 1 Answer: OS Question 2: PIA Unique Identifier (UID): Question 2 Answer: P-2277902-798208 Question 2A: Name: Question 2A Answer: Identity and
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationCABINET 9 th February 2006. Report of the Director of Partnerships and Customer Services
CABINET 9 th February 2006 Report of the Director of Partnerships and Customer Services ITEM 11 CRM DEVELOPMENT Purpose of the Report To seek approval to the replacement for the Council s Customer Relationship
More informationMeeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4
More informationX-Road. egovernment interoperability framework
X-Road egovernment interoperability framework Serving e-nation over 10 years Backbone of the Estonian egovernment 12 years of active duty, no downtime Over 2000 connected e-services More than 900 connected
More informationCase 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007
More informationWHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com info@usher.com Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
More informationSmart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
More informationL@Wtrust Class 3 Registration Authority Charter
Class 3 Registration Authority Charter Version 1.0 applicable from 09 November 2010 Building A, Cambridge Park, 5 Bauhinia Street, Highveld Park, South Africa, 0046 Phone +27 (0)12 676 9240 Fax +27 (0)12
More informationArkansas Department of Information Systems Arkansas Department of Finance and Administration
Arkansas Department of Information Systems Arkansas Department of Finance and Administration Title: Electronic Signature Standard Document Number: SS 70 011 Effective Date: Act 722 of 2007 requires state
More informationCard Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
More informationMicrosoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes
More informationSolution & Design Architecture
Solution & Design Architecture Agenda Key Requirements Independence to ULBs Workflow : Administrator Activities Solution To Address Key Requirements Flexibility in selection of services Application Usage
More informationThe Unique Alternative to the Big Four. Identity and Access Management
The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing
More informationB2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value
B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All
More informationIDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation
IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Author: Creation Date: Last Updated: Version: I. Bailey May 28, 2008 March 23, 2009 0.7 Reviewed By Name Organization
More informationSigMo Platform based approach for automation of workflows in large scale IT-Landscape. Tarmo Ploom 2/21/2014
SigMo Platform based approach for automation of workflows in large scale IT-Landscape 2/21/2014 Agenda Starting situation Problem Solution variants Friction of project based approach Platform approach
More informationBusiness opportunities for the IT industry with LSP solutions The IT industry perspective
Business opportunities for the IT industry with LSP solutions The IT industry perspective IBM Point of View - Niels Pagh-Rasmussen, Executive Architect IBM - Antonio Pelliccia, European Union core team
More information24x7 Help Desk Services Questions & Answers for RFP 40016_21030705
24x7 Help Desk Services Questions & Answers for RFP 40016_21030705 1. What % of the call volume that was listed in the RFP was related to LMS (BB and Moodle) support? See Table 5 2. What is the number
More informationOffice of the Secretary of State
General Office Overview Assembly Government Affairs, February 25, 2011 Office of the Secretary of State Commercial Recordings Securities Notary Division Elections State Business License Domestic Partnership/Athletes
More information2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.
Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout
More informationEMA SPOR master data management roadmap
EMA SPOR master data management roadmap EU ISO IDMP Task Force meeting For information March 2015 Presented by: Kepa Amutxastegi Business Data and Support Department An agency of the European Union Roadmap
More informatione-governance Password Management Guidelines Draft 0.1
e-governance Password Management Guidelines Draft 0.1 DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S.
More informationBuilding an Effective Roadmap
Building an Effective Roadmap Jason Tanner Senior Consultant, Enthiosys Motivated from Within Thank you to our sponsors 2 Agenda What is an effective roadmap? What are roadmap benefits? Why do roadmaps
More informationPROTECT YOUR WORLD. Identity Management Solutions and Services
PROTECT YOUR WORLD Identity Management Solutions and Services Discussion Points Security and Compliance Challenges Identity Management Architecture CSC Identity Management Offerings Lessons Learned and
More information5 Day Imprivata Certification Course Agenda
Class time consists of a break in the morning and afternoon as well as an allotted time for lunch. Lengths of breaks are at the discretion of the instructor based on the time to cover material. 5 Day Imprivata
More informationOptimizing Identity and Access Management (IAM) Frameworks
Optimizing Identity and Access Management (IAM) Frameworks Ali M. Al-Khouri Emirates Identity Authority, Abu Dhabi, United Arab Emirates Email: ali.alkhouri@emiratesid.ae ABSTRACT Organizations in both
More informationIn accordance with risk management best practices, below describes the standard process for enterprise risk management (ERM), including:
Enterprise Risk Management Process and Procedures Scope In accordance with risk management best practices, below describes the standard process for enterprise risk management (ERM), including: Risk identification
More informationDecision on adequate information system management. (Official Gazette 37/2010)
Decision on adequate information system management (Official Gazette 37/2010) Pursuant to Article 161, paragraph (1), item (3) of the Credit Institutions Act (Official Gazette 117/2008, 74/2009 and 153/2009)
More informationE-Government Strategy 2013-2017 Implementation
2013-2017 Implementation Mr Hawabhay Rajnish Ag. Director Central Informatics Bureau Ministry of Information and Communication Technology 19 th February 2014 2013-2017 2013-2017 aims at increasing: the
More informationIdentity Management and Single Sign-On
Delivering Oracle Success Identity Management and Single Sign-On Al Lopez RMOUG Training Days February 2012 About DBAK Oracle Solution Provider and License Reseller Core Technology and EBS Applications
More informationInformation Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
More informationUbisecure. White Paper Series. e-service Maturity Model
Ubisecure White Paper Series e-service Maturity Model 2 e-service Maturity Model What we ve seen when we ve been dealing with the extranets and e-services, where companies can offer always available, easy-to-use
More informationTask Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare
CIO-SP 3 Task Areas Ten task areas constitute the technical scope of this contract: Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare The objective of this task area is
More informationCase Studies. National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system
Case Studies National Identity Management Commission (NIMC), Nigeria eid Consulting for national ID system Royal Oman Police (ROP) of the Sultanate of Oman eid Consulting for e-passport system Federal
More informationPublic Key Infrastructure for a Higher Education Environment
Public Key Infrastructure for a Higher Education Environment Eric Madden and Michael Jeffers 12/13/2001 ECE 646 Agenda Architectural Design Hierarchy Certificate Authority Key Management Applications/Hardware
More informationE-government Bulgaria Brussels, 5.10.2004
E-government Bulgaria Brussels, 5.10.2004 e-government Strategy from 2003 to 2005 The Action Plan envisions actions which will serve to attain the strategic objectives outlined in the Strategy for E-Government
More informationORDINANCE ON THE ELECTRONIC SIGNATURE CERTIFICATES IN THE. Chapter One GENERAL PROVISIONS
ADMINISTRATIONS Effective as of 13 June 2008 Adopted by Decree of the Council of Ministers No 97 of 16 May 2008 Promulgated SG, No. 48 of 23 May 2008 Chapter One GENERAL PROVISIONS Article 1. This Ordinance
More informationEstablishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology
Establishing A Multi-Factor Authentication Solution Report to the Joint Legislative Oversight Committee on Information Technology Keith Werner State Chief Information Officer Department of Information
More informationDepartment of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT
Department of Veterans Affairs VA DIRECTIVE 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Directive defines the policy and responsibilities to
More informationAn Introduction to Entrust PKI. Last updated: September 14, 2004
An Introduction to Entrust PKI Last updated: September 14, 2004 2004 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In
More informationIDaaS: Managed Credentials for Local & State Emergency Responders
IDaaS: Managed Credentials for Local & State Emergency Responders NextgenID ID*TRUST Platform NextgenID - Headquarters USA 10226 San Pedro, Suite 100 San Antonio, TX 78216 +1 (210) 530-9991 www.nextgenid.com
More informationWhite Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
More informationAnalysis One Code Desc. Transaction Amount. Fiscal Period
Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00
More informationOracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
More informationJISC data.bris project & EPSRC Platform project: progress against workplan (October 2012)
Project Name : data.bris DBSG/5/2 JISC data.bris project & EPSRC Platform project: progress against workplan (October 2012) WORKPACKAGES Month: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Oct 11 Nov Dec
More informationIdentity and Access Management
Cut costs. Increase security. Support compliance. www.siemens.com/iam Scenarios for greater efficiency and enhanced security Cost pressure is combining with increased security needs compliance requirements
More informationAPI Architecture. for the Data Interoperability at OSU initiative
API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models
More informationE-Government Service Delivery. Samir Said General Manager Microsoft Algeria
E-Government Service Delivery Samir Said General Manager Microsoft Algeria Microsoft e-government Strategy E-Government Definition egovernment is a spectrum of technology-inspired strategies adopted by
More informationNOORUDDIN BHATTI PROFESSIONAL EXPERIENCE. Sharjah City Municipality. TACME (Technical Art Concepts) Oct 2011 - Jun 2013
NOORUDDIN BHATTI PROFESSIONAL SUMMARY Over 8+ years of Experience in the field of Information Technology and telecom, Working as SharePoint/MOSS Architect and Administrator/Developer and Lead in the major
More informationDelivering value to the business with IAM
Delivering value to the business with IAM IDM, 18 th June 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All statements other than statements
More informationSmart Card Business Applications Healthcare and Beyond
Smart Card Solutions - Make the Smart Choice Smart Card Business Applications Healthcare and Beyond Dmitriy Kruglyak President dkruglyak@aquave.com 650-329-0397 October 20, 2004 Patient Safety Consumer
More informationStrategy for Mobile ID
Mobile ID Devices Strategy for Mobile ID 20 September 2013 Version 2.1 Strategy for Mobile ID Solutions Contents Summary...1 Context...2 Police and immigration services...2 Mobile solutions generally...2
More informationAADHAAR E-KYC SERVICE
UIDAI Unique Identification Authority of India Planning Commission, Govt. of India, 3rd Floor, Tower II, Jeevan Bharati Building, Connaught Circus, New Delhi 110001 AADHAAR E-KYC SERVICE NOVEMBER 2012
More informationWhite paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview
White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4
More informationPKI - current and future
PKI - current and future Workshop for Japan Germany Information security Yuichi Suzuki yuich-suzuki@secom.co.jp SECOM IS Laboratory Yuichi Suzuki (SECOM IS Lab) 1 Current Status of PKI in Japan Yuichi
More informationOECD workshop on digital identity management BELGIAN approach
OECD workshop on digital identity management BELGIAN approach FEDICT Frank LEYMAN Trondheim - 08/05/2007 Information security in Belgium > Government disposes of data: Identification data, fiscal data,
More informationMasterPass Authorized Vendor. Introducing Pecunda The MasterPass Modular Wallet
MasterPass Authorized Vendor Introducing Pecunda The MasterPass Modular Wallet Context With the introduction of the MasterPass wallet, MasterCard offers merchants and consumers a new, quick and secure
More informationFrequently Asked Questions (FAQs) SIPRNet Hardware Token
Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:
More informationThe Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
More informationEuropean Electronic Identity Practices
European Electronic Identity Practices Country Update of Austria Speaker: Herbert Leitold Date: 9 Nov 2004 PART I: Overview Table of contents Overview of Citizen Card initiatives and its status (Summary
More informationGUIDE. Part 1.3: Identity Management Operations Guide PUBLIC. Market Manual 1: Market Entry, Maintenance & Exit. Issue 21.
PUBLIC IMP_GDE_0088 Market Manual 1: Market Entry, Maintenance & Exit GUIDE Part 1.3: Identity Management Operations Guide Issue 21.0 This guide describes the processes for Market Participants and the
More informationSingle Sign-On. Security and comfort can be friend. Arnd Langguth. alangguth@novell.com. September, 2006
Single Sign-On Security and comfort can be friend. Arnd Langguth alangguth@novell.com September, 2006 Identity proliferation in the enterprise Password management problem How many passwords do you have?
More informationGovernment of Canada Transformation of Pay Administration Initiative. Presentation to Financial Management Institute
Government of Canada Transformation of Pay Administration Initiative Presentation to Financial Management Institute Presented By: Brigitte Fortin, Associate Assistant Deputy Minister Accounting, Banking
More informationAuthentication: Password Madness
Authentication: Password Madness MSIT 458: Information Security Group Presentation The Locals Password Resets United Airlines = 83,000 employees Over 13,000 password reset requests each month through the
More informationSoftware Re-Engineering and Ux Improvement for ElegantJ BI Business Intelligence Suite
2011 2012 2013 2014 Q1 Q2 Q3 Q4 Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Sales Performance by Category 2014 Product
More informationSAMAY - Attendance, Access control and Payroll Software
SAMAY - Attendance, Access control and Payroll Software Welcome to a new world of comprehensive Human Capital Management (HCM) solutions from ISS. ISS SAMAY is a highly simplified HCM solution with an
More informationCustomers and Corporate Services Directorate (Corporate Support) Plan 2015-16
Appendix 2 Action Plan Due Date Status Customers and Corporate Services Directorate (Corporate Support) Plan 2015-16 CS1027 ICT Improvement Programme 31 January 2016 Objectives: CORPORATE SERVICES: ICT
More informationCoSign by ARX for PIV Cards
The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response
More informationWeb Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
More informationCA Arcot RiskFort. Overview. Benefits
PRODUCT SHEET: CA Arcot RiskFort CA Arcot RiskFort CA Arcot RiskFort provides real-time protection against identity theft and online fraud via risk based, adaptive authentication. It evaluates the fraud
More informationHSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006
HSPD-12 Implementation Architecture Working Group Concept Overview Version 1.0 March 17, 2006 Table of Contents 1 PIV Lifecycle... 3 2 High Level Component Interaction Diagram... 4 3 PIV Infrastructure
More informationRegistrar On-Boarding Process
UIDAI Unique Identification Authority of India Planning Commission, Govt. of India (GoI), 3rd Floor, Tower II, Jeevan Bharati Building, Connaught Circus, New Delhi 110001 Registrar On-Boarding Process
More informationThe Abu Dhabi Judicial Department Integrated Justice System
The Abu Dhabi Judiciary Department Integrated Justice System An Oracle White Paper September 2013 The Abu Dhabi Judicial Department Integrated Justice System The Abu Dhabi Judiciary Department Integrated
More informationEnd-User Manual. for. e-pramaan: A National e-authentication Service. Submitted to
e-pramaan: A National e-authentication Service End User Manual version 0.1 1 End-User Manual for e-pramaan: A National e-authentication Service Submitted to Department of Electronics & Information Technology
More informationHardware and Software Security
Today, with the big advancement of technology and the need to share data globally at all time. Security has become one of the most important topics when we talk about data sharing. This means that the
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
More information