Public private partnership concerning user and access management (UAM): the vision of the federal administration frank.robben@ksz.fgov.be @FrRobben https://www.ksz.fgov.be.

Slides:



Advertisements
Similar presentations
1 Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM( final) {SWD(2012)
Advertisements

© fedict All rights reserved Legal aspects Belgian electronic identity card Samoera Jacobs – November 2008.
Research and Innovation Participant Portal Concept for electronic-only grant management in Horizon 2020 Peter HÄRTWICH
E-ID and identity management aspects in the Belgian social sector Frank Robben General Manager Crossroads Bank for Social Security General Manager SmalS-MvM.
Rule-Making Book II EU Administrative Procedures – The ReNEUAL Draft Model Rules 2014 Brussels, May th Herwig C.H. Hofmann University of Luxembourg.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
TDL Meeting 7-8 April 2014 //Vienna Sprint Proposal The key of a legal on line signature The key of a legal on line signature: The inseparable link between.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Functional component terminology - thoughts C. Tilton.
Workshop on registered electronic mail policies and implementations (ETT 57074) Ankara, –
Security and Interoperability Danny De Cock January 16th, 2012 Moldova Slides: godot.be/slidesgodot.be/slides.
Legal Issues on PKI & qualified electronic certificates. THIBAULT VERBIEST Attorney-at-law at the Brussels and Paris Bar Professor at the Universities.
Crossroads Bank for Social Security & eHealth platform How federal institutions support Belgian social and health care sector.
Some initiatives of the Belgian government in order to stimulate E-government Frank Robben General manager Crossroads Bank for Social Security Sint-Pieterssteenweg.
The Crossroads Bank for Social Security, a model for the health care sector ? Frank Robben General manager Crossroads Bank for Social Security Sint-Pieterssteenweg.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Ministry of Transport, Information Technology and Communications Technological base: Interoperability Tsvetanka Kirilova Ministry of TITC Bulgaria.
European Electronic Identity Practices Country Update of Austria Peter F Brown Office of the CIO, Austrian Federal Chancellery Chair, CEN eGov Focus Group.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Strategic importance of identity and access management (IAM) The case of the Belgian social and health sector Frank Robben General manager Crossroads Bank.
"certification service provider" Electronic Signatures
Integrated Electronic User and Access Management in the Belgian Public, Social and Health Care Sector Frank Robben General manager Crossroads Bank for.
Österreich 2006 Austria 2006 Autriche 2006 Präsidentschaft der Europäischen Union Presidency of the European Union Présidence de L’Union européenne ★★★★★★
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
How can I trust the rest of Europe ? Requirements and a possible organisation with regard to epSOS and eHealth Frank Robben General manager eHealth platform.
Be-Health as a driving force of electronic cooperation in the Belgian health care sector, based on the experience in the social sector Frank Robben General.
Distributed systems – Part 2  Bluetooth 4 Anila Mjeda.
Electronic identity management for eGovernment Conceptual framework and objectives Frank Robben General manager Crossroads Bank for Social Security Strategic.
European Commission, Technical Assistance Information Exchange Unit (TAIEX), DG Enlargement in co-operation with The Bulgarian Chamber of Commerce and.
Europe's work in progress: quality of mHealth Pēteris Zilgalvis, J.D., Head of Unit, Health and Well-Being, DG CONNECT Voka Health Community 29 September.
1 MARKET SURVEILLANCE IN THE EUROPEAN UNION A coordinate approach for metrology Lucia Palmegiani Policy Officer, DG ENTR I.5 WELMEC, WG 5, Malta, 23 October.
European Commission Rita L’ABBATE Legal aspects linked to internal market DG Enterprise and Industry MARKET SURVEILLANCE COMMUNITY FRAMEWORK UNECE “MARS”
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Some identification needs related to workers’ mobility eGovernment – eIDM ad hoc group meeting 4-5 May 2006 CBSS Crossroads Bank for Social Security Frank.
1 European eGovernment Awards 2007 European eGovernment Awards 2007 Workshop for Finalists July, Brussels LIMOSA Belgium Reference project number.
Dr Aniyan Varghese eGovernment Unit eGovernment Unit Directorate General Information Society Dr Aniyan Varghese eGovernment.
The German eID and eIDAS
Directorate General for Enterprise and Industry European Commission The New Legislative Framework - Market Surveillance UNECE “MARS” Group meeting Bratislava,
eIDAS: current state of play and the Luxembourgish approach
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Evaluation of restrictions: art. 15 and art TAIEX Seminar on the EU Service Directive, 3 May 2007 Carlos Almaraz.
Week 12. Lecture 2. Health Law & the EU Cross-border healthcare: patients’ rights.
CLAUDIA PANAIT TAIEX Expert – European Commission Legal Adviser Ministry of Health, ROMANIA.
Harmonised use of accreditation for assessing the competence of various Conformity Assessment Bodies Dr Andreas Steinhorst, EA ERA workshop 13 April 2016,
The Future Digital Identity Landscape in Europe Timothée Mangenot, chairman 14th of December, 2015 ACSIEL partners day.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Identity and Access Management
The revised Professional Qualifications Directive
Training for developers of X-Road interfaces
Efficient and secure transborder exchange of patient data
Cross-sector and user-centric AAI
Identity on the Internet
PRESENTATION OF MONTENEGRO
New challenges for archives in Iceland
General Data Protection Regulation
European Citizens’ Initiative, Commission regulation proposal Focus on IT aspects Jérôme Stefanini DIGIT.B.2 05/06/2018.
Dan Tofan | Expert in NIS 21st Art. 13a WG| LISBON |
The Once-Only Principle Project
Legal Framework for Civil Registration, Vital Statistics
Dashboard eHealth services: actual mockup
Website authentication E-registered delivery
A practice testimony on the implementation of information security and data protection at the Crossroads Bank for Social Security and the eHealth platform.
Appropriate Access InCommon Identity Assurance Profiles
The e-government Conference main issues
Outline Background: development of the Commission’s position
Reiniger LLC.
Reiniger LLC.
E-identities (and e-signatures)
Towards a frictionless social security
Presentation transcript:

Public private partnership concerning user and access management (UAM): the vision of the federal administration frank.robben@ksz.fgov.be @FrRobben https://www.ksz.fgov.be https://www.ehealth.fgov.be https://www.frankrobben.be

Outline of the presentation UAM: strategic importance and objectives to be reached conceptual framework user expectations and critical success factors vision of the federal administration main vision identification number for every entity division of tasks related to UAM architecture: policy enforcement model concrete implementation authentication of identity for eGovernment and eHealth-applications eIDAS and Belgian regulation short appendix: legally valid electronic signature 16/11/2017

1. Strategic importance of UAM reliable exchange of personal data requires sufficient certainty about the identity of the data subjects adequate access control requires sufficient certainty about identity of the users authentication of the identity of the users verification of relevant characteristics of the users verification of relevant relationships between the users and the data subjects verification of relevant mandates of the users 16/11/2017

1. UAM: objectives to be reached be able to (electronically) identify all relevant entities (physical persons, companies, applications, machines, …) know the relevant characteristics of the entities know the relevant relationships between entities know that an entity has been mandated by another entity to perform a legal action know the authorizations of the entities in a sufficiently certain and secure way in as much relations as possible (C2C, C2B, C2G, B2B, B2G, …) using open interoperability standards 16/11/2017

2. Conceptual framework entity attribute identity someone or something that has to be identified e.g. a physical person, a company, a computer application, … attribute a piece of information about an entity identity a number or a set of attributes of an entity that allows to know precisely who or what the entity is an entity has only one identity, but this identity can be determined by several numbers or sets of attributes 16/11/2017

2. Conceptual framework characteristic relationship an attribute of an entity, other than an attribute determining its identity an entity can have several characteristics e.g. a capacity, a function, a professional qualification, ... relationship a link between two or more entities an entity can have several relationships e.g. a therapeutic relationship between a health care provider and a patient 16/11/2017

2. Conceptual framework mandate registration a right granted by an identified entity to another identified entity to perform well-defined legal actions in her name and for her account an entity can have several mandates registration the process of determining the identity, a characteristic, a relationship or a mandate of an entity with sufficient certainty before putting at the disposal means by which the identity can be authenticated, or the characteristic, the relationship or the mandate can be verified 16/11/2017

2. Conceptual framework authentication of the identity the process of checking whether the identity that an entity pretends to have, corresponds to the real identity authentication of the identity can be done based on the verification of knowledge (e.g. a password) possession (e.g. an electronic card) biometric characteristics a combination of those (multifactor authentication) 16/11/2017

2. Conceptual framework verification of a characteristic, a relationship or a mandate the process of checking whether a characteristic, a relationship or a mandate that an entity pretends to have, corresponds to a real characteristic, relationship or mandate of that entity the verification of a characteristic, a relationship or a mandate can be done by the same kind of means as those used for the authentication of the identity or, after the authentication of the identity, by consulting reliable databases (‘authentic sources’) that contain information about characteristics, relationships or mandates related to identified entities 16/11/2017

2. Conceptual framework authorization authorization group role a permission to an entity to perform a defined action or to use a defined service authorization group a group of authorizations role a group of authorizations or authorization groups related to a specific service role based access a method of assigning authorizations to entities by means of authorization groups and roles, in order to simplify the management of authorizations and their assignment to entities 16/11/2017

3. User expectations one-time registration of identity, characteristics, relationships and mandates single sign on for as many public and private sector applications as possible authentication of the identity verification of relevant characteristics, relationships and mandates electronic means for authentication of identity that can be used on as much devices as possible minimal cost of registration procedures electronic means for authentication of identity use of electronic means for authentication of identity 16/11/2017

3. Critical success factors meeting user expectations simplicity in use taking advantage of opportunities of technological evolution => evolutionary, future proof solutions accordance with the European regulatory framework sufficient applications for which electronic user management can be used 16/11/2017

4 a. Main vision evolution of the society to 'digital is the new normal' requires collaboration between the government and the private sector with respect to common vision multifunctional components and services synergies to meet user expectations division of tasks based on strengths of each one not only thinking in terms of competitive, but also in terms of cooperative strategic benefits 16/11/2017

4 b. Identification number identification number for every citizen and every company, having following characteristics unicity one entity – one identification number same identification number is not assigned to several entities exhaustivity every entity to be identified has an identification number stability through time identification number should not contain variable characteristics of the identified entity identification number should not contain references to the identification number or characteristics of other entities identification number should not change when a quality or characteristic of the identified entity changes 16/11/2017

4 c. Division of tasks registration of the identity of citizens: municipalities companies: company counters official identification document for citizens delivered by the municipalities (eID) means for the electronic authentication of identity free choice for user between means offered by the government or by the private sector, recognized by the government free of charge for user 16/11/2017

4 c. Division of tasks registration of characteristics, relationships and mandates relevant for eGovernment or eHealth by public or private bodies designated by government with quality assurance authentic sources containing characteristics, relationships and mandates relevant for eGovernment or eHealth managed by public or private bodies designated by government with SLA’s according to a federated model accessible by UAM for eGovernment and eHealth applications for private sector applications authorization is the responsibility of each service provider 16/11/2017

4 d. Policy Enforcement Model Action on application DENIED Action on application PERMITTED Policy Enforcement (PEP) User Application Action on application Decision request Decision reply Policy Decision (PDP) Policy retrieval Information request/reply Information request/reply Policy management Policy Administration (PAP) Policy Information (PIP) Policy Information (PIP) Manager Policy repository Authentic source Authentic source 16/11/2017

4 d. Policy Enforcement Point (PEP) intercepts the request for authorization with all available information about the user, the requested action, the resources and the environment passes on the request for authorization to the Policy Decision Point (PDP) and extracts a decision regarding authorization grants access to the application and provides relevant credentials Action on application DENIED Action on application PERMITTED Policy Enforcement (PEP) User Application Action on application Decision request Decision reply Policy Decision (PDP) 16/11/2017

4 d. Policy Decision Point (PDP) based on the request for authorization received, retrieves the appropriate authorization policy from the Policy Administration Point(s) (PAP) evaluates the policy and, if necessary, retrieves the relevant information from the Policy Information Point(s) (PIP) takes the authorization decision (permit/deny/not applicable) and sends it to the PEP 16/11/2017

4 d. Policy Administration Point (PAP) environment to store and manage authorization policies by authorized person(s) appointed by the application managers puts authorization policies at the disposal of the PDP Policy Decision (PDP) Policy retrieval Policy management Policy Administration (PAP) Manager Policy repository 16/11/2017

4 d. Policy Information Point (PIP) puts information at the disposal of the PDP in order to evaluate authorization policies (authentic sources with characteristics, relationships, mandates, etc.) Policy Decision (PDP) Information request/reply Information request/reply Policy Information (PIP) Policy Information (PIP) Authentic source Authentic source 16/11/2017

4 d. Federated architecture eHealth platform Social sector (CBSS) Non social FPS (BOSA) USER USER USER APPLICATIONS APPLICATIONS APPLICATIONS Role Mapper DB PDP Provider PIP Attribute RIZIV XYZ WebApp Management VAS Authen - Authorisation Authen - Authorisation Authen - Authorisation tication PEP tication PEP WebApp tication PEP WebApp Role Role Role Mapper Mapper XYZ Mapper XYZ Role Role Mapper Mapper DB DB PDP Role PDP PAP PAP Role PAP Role Provider Role Provider ‘’Kephas’’ ‘’Kephas’’ Provider DB ‘’Kephas’’ Provider DB PIP PIP PIP PIP PIP PIP Attribute Attribute Attribute Attribute Attribute Attribute Provider Provider Provider Provider Provider Provider Provider DB DB DB Management Judicial exut- ers DB DB DB Management Mandates Mandates UMAF XYZ VAS XYZ XYZ VAS 16/11/2017

4 e. Concrete implementation authentication of the identity Strong eID + PIN-code with connected card reader eID + PIN-code with wireless card reader Recognized solutions delivered by the private sector Security code via mobile app (TOTP), user-id + password Security code via SMS, user-id + password Recognized solutions delivered by the private sector Security code on paper (paper token), user-id + password User-id + password Weak 16/11/2017

4 e. Concrete implementation: TOTP Examples: Google Authenticator, Duo Mobile, Amazon AWS MFA en Authenticator, freely available 16/11/2017

5. eIDAS regulation: objectives regulation (EU) No 910/2014 of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market (“eIDAS regulation” - electronic identification, authentication and trust services) strengthen EU single market by boosting trust and convenience in secure and seamless cross-border electronic transactions three important objectives increasing the effectiveness of public and private online services, electronic business and electronic commerce in the European Union, by eliminating (legal and technical) obstacles for the functioning of the internal market => choice for a regulation enhance trust in electronic transactions , in particular cross-border transactions, by providing a common foundation for secure electronic interaction between citizens, businesses and public authorities => high level of security and better information (EU trust mark) enhance legal certainty within the use of electronic identification means and trust services regulation => direct effect on Belgian law 16/11/2017

5. eIDAS regulation: overall content mandatory recognition of some electronic identification means electronic trust services scope electronic signatures, including validation and preservation services electronic seals, including validation and preservation services time stamping electronic registered service delivery website authentication horizontal principles: security requirements, trusted lists, EU trust mark, prior authorisation, qualified services, liability, data protection, supervision, international aspects non-discrimination of electronic documents vis-à-vis paper documents as evidence in legal proceedings 16/11/2017

5. eIDAS: electronic identification possibility for MS’s to notify electronic identification schemes, provided that some conditions are met, e.g. issued by, under a mandate from or recognized by the notifying MS can be used to access at least one government service which requires electronic identification in the notifying MS meets the requirements of at least one of the assurance levels set out by the eIDAS regulation high substantial low notifying MS ensures that the person identification data uniquely representing a person is attributed in accordance with the requirements of the chosen assurance level party issuing electronic identification means ensures that electronic identification means is attributed according to the requirements of the chosen assurance level 16/11/2017

5. eIDAS: electronic identification when an electronic identification and authentication is required under national law or by administrative practice to access an online government service in a MS, the electronic identification means issued in another MS shall be recognized, provided that the electronic identification means has been notified by a MS and is included in the list of the European Commission AND the assurance level of the electronic identifications means is equal or higher than the assurance level required for online access to the online government service, provided that the assurance level is substantial or high AND (no obligatory recognition for electronic identification means of level low) the government service uses the assurance level substantial or high for access to its online service (no obligatory recognition of electronic identification means of another MS if the online government service can be accessed by electronic identification means of level low) 16/11/2017

5. eIDAS: electronic identification no obligation to implement or use a device for electronic identification on a national level, and no obligatory European notification for cross-border use obligation for the notifying MS to provide free online authentication service in case of a government service (not obligatory in case of a private service or may be paying) obligation to designate ‘points of single contact’ for cooperation with other MS’s obligation to designate a node operator for interoperability with other MS’s if security is compromised, the notifying MS has to suspend or recall the cross-border identification means and to inform other MS’s and the European Commission 16/11/2017

5. eIDAS: electronic identification liability of the notifying MS the notifying MS ensures that the person identification data uniquely representing the person in question is attributed, in accordance with the requirements of the chosen assurance level the notifying MS ensures the availability of authentication online, so that any relying party established in the territory of another MS is able to confirm the person identification data received in electronic form the notifying Member State has to organise supervision to the notified electronic identification schemes possibility to set conditions to the private sector to use the notified electronic identification schemes 16/11/2017

5. Belgian law on electronic identification Belgian law on electronic identification of 18 July 2017 completes the eIDAS Regulation some provisions: each Belgian public sector body determines the required assurance level for access to its services and informs DG DT about this DG DT determines the assurance level of the schemes to be notified to the European Commission, after consulting the Colleges of Presidents of the federal public services, the social security institutions and the federal public utility institutions DG DT is charged with offering electronic notification services within the federal authentication service (FAS) DG DT passes a minimum set of person identification data to the node of another MS (retrieved from by SSIN), when a user wants access to an online service in that other MS 16/11/2017

5. Belgian law on electronic identification some provisions the supervisory body consists of representatives of at least 3 government services and is responsible for monitoring the notified schemes and taking measures the ‘points of single contact’ and an operator of the Belgian node are designated by Royal Decree in accordance with the European Implementing Regulations private parties can provide electronic identification services recognized by DG DT after consulting Colleges of Presidents for access to Belgian government applications within the FAS (conditions for recognition are determined by Royal Decree) 16/11/2017

5. Royal decree regulating conditions for recognition of electronic identification services Royal Decree establishing the conditions, procedures and consequences of the recognition of electronic identification services for government applications was signed October 22th, 2017 some provisions conditions and procedures for recognition of private providers of electronic identification services for inclusion in the FAS for access to government applications severe criteria: liability of the service provider, security, privacy protection recognition for anyone who meets the conditions technical integration with FAS standard protocols and European standards innovation support and cost control identifications means are not determined (mobile, biometrics, …) 16/11/2017

Thank you ! Any questions ? frank.robben@ksz.fgov.be @FrRobben https://www.ehealth.fgov.be https://www.ksz.fgov.be https://www.frankrobben.be