How to introduce a unified authentication module using VISS infrastructure? For state institutions and local governments.

Slides:



Advertisements
Similar presentations
Taxpayers registration and e-services provided by the Estonian Tax and Customs Board Karin Aleksandrov Chief Expert Service Management Department.
Advertisements

Digital Certificate Installation & User Guide For Class-2 Certificates.
Statewide Vendor Registration Instructions
Digital Certificate Installation & User Guide For Class-2 Certificates.
SECURE SITES. A SECURE CONNECTION TERMS Secure Sockets Layer (SSL) An older Internet protocol that allows for data transmission between server and client.
Lori Fitterling LI843 SSL Secured Sockets Layer. What is Secure Sockets Layer (SSL)? It is protection of data transferred over the Internet using encryption.
(4.4) Internet Protocols Layered approach to Internet Software 1.
1 Computerised National Land Book of Latvia Ints Lukss Project Manager MikroKods Ltd.
E-tax system stages 1.Stage 1 - Information: online information about public services 2.Stage 2 - Interaction: downloading of forms 3.Stage 3: Two-way.
How to get your free Windows Store Access
Ministry for Economic Development of the Russian Federation March 2010 Oleg Pak, Head of the Department for State Regulation of the Economy Formation of.
Ministry of Transport, Information Technology and Communications Technological base: Interoperability Tsvetanka Kirilova Ministry of TITC Bulgaria.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Use of Electronic Digital Signature in the Russian Federation.
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
X-Road (X-tee) A platform-independent secure standard interface between databases and information systems to connect databases and information systems.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Ministry of State Administration and Administrative Reform 1 eGovernance LEFIS Workshop 5 th Meeting Sofia 2-3 June 2006 Alexander Ognianov Ministry of.
“NATIONAL CHAMBER OF PRIVATE BAILIFF OFFICERS ” in the new era of the online execution SIAIP INTRODUCTION 16 th of December 2014.
Collaboration and Content Customer solution case study The Yaroslavl region Government creates knowledge base of public authorities of the Yaroslavl region.
May 28, 2002Mårten Trolin1 Protocols for e-commerce Traditional credit cards SET SPA/UCAF 3D-Secure Temporary card numbers Direct Payments.
E-Gov SLO 1 of 29 A to Z of the Slovenian e-Government Boštjan Tovornik, M.Sc Ministry of public administration.
Frequently Encountered Errors Idaho State Department of Education October 20, 2011.
Secure Electronic Transaction (SET)
One stop shop: e-VEM E- extension of the car registration Teja Batagelj Ministry of Public Administration.
Agency for Restructuring and Modernisation of Agriculture eFarmer Central European Conference January – 1 February 2007 Budapest SAPS claim submission.
Archiving of Electronic Records Inta Feldmane Directorate General of Latvia State Archives.
Results of audit “Quality of public services in the information society” Markko Kard Alo Lääne The 9th Annual Meeting of the Representatives of the Baltic,
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
INTEGRATION OF MAIN STATE REGISTERS - LITHUANIAN EXPERIENCE
NEW SOLUTIONS IN LAND CADASTRE AND REGISTER: LITHUANIAN EXPERIENCE Kestutis Sabaliauskas, Director General, State Enterprise Centre of Registers
Electronic data collection system eSTAT in Statistics Estonia: functionality, authentication and further developments issues 4th June 2007 Maia Ennok,
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Information Asset Registries of Latvia Secretariat of e-government affairs Riga | 26 th October, 2007.
Chapter 11 Working with Credit Card Methods of Processing Credit Cards Preparing for Cyber Cash Authoring a Credit card Transaction.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
In order for Cardholders to enroll in the internet Payment Center tool, they need to copy and paste the following URL in the address bar:
Creating and Managing Digital Certificates Chapter Eleven.
Ministry of State Administration and Administrative Reform 1 eGovernment International Workshop on e-Government and its Spatial Dimension Sofia 9 June.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Information System ‘Treasury-Client’ 2015 Treasury Committee, Ministry of Finance of the Republic of Kazakhstan.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
1 Israeli Government e-Payment Services David Forsher November 2009.
For state institutions and local governments How to introduce a payment module using VISS infrastructure?
How can an institution join the document integration environment? For state institutions and local governments.
For state institutions and local governments How to introduce an e-service, using VISS infrastructure?
Copyright 2013 Exostar LLC.| All Rights Reserved.| Proprietary and Confidential1 Identity Proofing Service United Technologies Corporation September 26.
For inhabitants and entrepreneurs What is ?. Contents Introduction What is Latvija.lv? How can the Public Service Directory be useful? What are the possibilities.
For state institutions and local governments How to organise data exchange solutions using VISS infrastructure?
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
State Regional Development Agency services for state and local government institutions What is State Information System Integrator?
NEW TECHNOLOGIES FOR CITIZENS AND TAX SYSTEM ELECTRONIC TAX RETURN FILING SYSTEM July, 2000 GRUPPO TELECOM ITALIA - FINSIEL.
company registration, india trademark registration, trademark attorneys india, patent attorneys india, patent registration india company registration,
Munix Bus WiFi Authentication, Log Management, Internet Security, Content Filter & VPN Service Internet Gateway & Business Intelligence
Unification of Cadastre and Registry
Creating a new Central Data Exchange (CDX) Account (to access NetDMR)
Efficient and secure transborder exchange of patient data
PRESENTATION OF MONTENEGRO
StudentTranscripts Service Overview
Getting Started: BCeID Sign Up
StudentTranscripts Service Overview
StudentTranscripts Service Overview
Creating a new Central Data Exchange (CDX) Account (to access NetDMR)
Archiving of Electronic Records
StudentTranscripts Service Overview
StudentTranscripts Service Overview
StudentTranscripts Service Overview
SIMPLIFIED MEASURES FOR CUSTOMER’S IDENTIFICATION
Presentation transcript:

How to introduce a unified authentication module using VISS infrastructure? For state institutions and local governments

Introduction What is unified authentication and what are it's possibilities? Unified authentication main steps How to introduce unified authentication module step by step? Frequently asked questions Useful information sources Contact information 2 Contents

What is the data exchange solution and what are its possibilities? 3

Unified authentication – a part of VISS infrastructure 4 State Information System Integrator State registers and state information systems Public environment Working environment Single login module Payment module Commercial banks e-signature eID card E-servicesPublic Service Directory

5 What is unified application? Unified application ensures the possibility to identify the portal users using identification provider's (OCMA - e-ID card, LSRCT - e-signature, credit institution payment systems) authentication means

Authentication number in 2015 More than 2.2 million times used in 2015 (+155% compared to year 2014) Used in 26 portals Number of authentications via the single login module in ,609 24, ,257 1,062,112 1,338,252 Construction IS of the Ministry of Economics Portal of the State Unified Computerised Land Register Portal of the Road Traffic Safety Directorate SRS Electronic Declaration System Latvija.lv portal 6

The most active users of the single login module Culture information system center State Regional Development Agency Courts administration Expert application system of the State Culture Capital Foundation Project application system of the State Culture Capital Foundation Joint catalogue of national museum collection Digital culture map of Latvia Geolatvija.lv Latvija.lv VISS.gov.lv Electronic auction portal Tiesas.lv Portal of the State Unified Computerised Land Register 7

Advantages of single login 8 Convenient and secure identification: on Latvija.lv; on other portals of institutions. There is no need to create new solutions and enter into cooperation agreements with other identification providers. There are two identification ways available: with an eID card and e-signature; via the Internet banking system (currently, 7 Internet banking systems). Single sign-on – with single identification, a user can conveniently access the portals where a unified login module with this solution is integrated

New unified login solutions are planned for 2016 Right now physical persons can authenticate, but in 2016 authentication for legal persons will be introduced: It is also planned to develop cross-border authentication Signatory persons Authorized person Heads of institutions 9

What is the functionality of a unified logon module? 10

The involved in a unified logon module introduction InstitutionSRDA Banks OCMA LVRTC SRDA provides cooperation with identification providers 11

12 Client (E-services User) Credit institution (internet banking which the client has chosen) 5. Inform VISS about an identified client/forward a client to Portal 6. Receive on e-service Portal 4. Identify a client 2. Show an authentication form 1. In the portal a credit institution is chosen with which identification will be performed 3. Input authentication information VISS The functioning of the single login module

13 How to introduce unified authentication module step by step?

How the unified authenticatio introduction works: This step can be omitted Institution liability SRDA liability * Maintenance Introduction into products Development* Co-operation Agreement Initiation of cooperation Accept testing Signing an acceptance deed 2. 14

1. Initiation of cooperation 15 Responsible person: Institution To be performed: Institution addresses SRDA using an motivating the usage aim and necessity If SRDA accepts* provision of the service, an institution sends a filled in cooperation event registration blank (institution also chooses, which identification providers are necessary) Banks reply to SRDA or accept the cooperation with the institution SRDA registers a cooperation and starts together with an institution to create connections *A module can be used by state institutions and municipalities that provide public service, SRDA evaluated for example the provision for corporations

Connection establishment Development SRDA coordinates connection establishment and informs the institution about: An institution sends: Testing Introduction into products IP addresses from which the module will be initiated URL address to which the module will have to hand over the data of the identified user Both parties have to exchange the certificates (Within the module on the level of messages the encoding is performed, X.509 standard and at least 2048 bit key length appropriate third party issued certificate or a certificate signing request) SRDA unified logon module service test environment address SRDA party certificates which a client has to import on their side of the servers VRAA sends a REALM unique connection identifier 16

2. CO-OPERATION AGREEMENT 17 Responsible person: SRDA and an institution To be performed: Before the introduction of the unified authentication it is necessary to conclude a cooperation agreement between the institution* and SRDA using the typical interagency agreement form provided by SRDA Advantage for an institution - it is not necessary to sign an agreement separately with each identification provider *In accordance with State Administration Structure Law interagency agreement institution has to be agreed upon with it's superior institution (ministry), that is why this process intends more timeState Administration Structure Law

3. Development* 18 Responsible person: Institution To be performed: An institution organizes the process of development in accordance with the available documentation of VISS SRDA provides consultative support Programmer's manual (VISS Safety talon service) This step can be omitted*

4. Acceptance testing 19 Responsible person: Institution To be performed: An institution performs accept tests and informs SRDA about the completion of the tests SRDA VISS test environment perform the verification - if during the time mentioned by the institution there have been successful authentication attempts, an institution can prepare an acceptance test act

5. Signing an acceptance deed 20 Responsible person: Institution To be performed: An institution fills in SRDA act template SRDA complements, coordinates an act and after it's signing invites the institution to send information for connection establishment in the production environment Act on E-service «Unified authenticationAct on E-service «Unified authentication»

6. Introduction into production 21 Responsible person: SRDA and an institution To be performed: Connection establishment term is defined by the concluded agreement between SRDA and institution

7. Maintenance 22 Responsible person: Institution To be performed: An institution is responsible for the introduced solution action control SRDA can if necessary provide consultative support

The most common problems ! ! In PHP environment it is possible to correctly use the additional message encoding level, that is why for problem solution the development in a different development environment shall be performed or you have to abandon an additional encoding. In order to solve these mistakes an in addition to the additional parameter input you have to make sure that they match with the ones sent by SRDA. Solution introduction peculiarities in PHP development environment In the configuration the the parameters are not indicated precisely thus causing the mistakes 23

24 Frequently asked questions What is additional encoding? It is encoding of the data to be broadcast in order to provide a full protection of the transferred data.

Find out more: 25 State information system integrator Unified authentication module documentation as_komponentes/Vienotas_pieteiksanas_modulis as_komponentes/Vienotas_pieteiksanas_modulis

Contact information For communication with the specialists of the Information System Development Department: 26

How to introduce a unified authentication module using VISS infrastructure? For state institutions and local governments

The basic functionality of a unified logon module Sign in (sign-in) Sign out (sign-out)

Sign in Service provider (SP) Unified authentication (UA)Authentication provider (AP) SP server UA moduleAP usage Access request POST (talon) POST (talon) 2 34 Talon request (browser redirect) Authenti- cation request (browser redirect) Personal data (browser redirect) Protected resource Internet browser

Sign out Requestor Browser Requestor IP/STS WS Resource Access Sign-Out at Resource Request Sign-Out Perform Sign-Out Sign-Out complete Perform Sign-Out