Identity and Access Mgmt and electronic Identities Belgian Federal Government Walter Van Assche January 16 th, 2012 Chisinau
ELECTRONIC IDENTITY (CARD)
Goal eID project To give Belgian citizens an electronic identity card enabling them to authenticate themselves towards diverse applications and to put digital signatures Proof of identity Signature tool
eID partners
The eID as an e-gov. building block
Belgian eID Project Time line 22 Sept 2000: Council of Ministers approves eID card concept study July 2001: Council of Ministers approves basic concepts (smart card, citizen- certificates, no integration with SIS card, is responsible for RRN’s infrastructure, pilot municipalities, helpdesk, card production, legal framework,… for certification services 19 July 2001: Council of Ministers approves basic concepts (smart card, citizen- certificates, no integration with SIS card, Ministry of Internal Affairs is responsible for RRN’s infrastructure, pilot municipalities, helpdesk, card production, legal framework,… Fedict for certification services 2001 Start of 2009: an eID card Start of 2009: all citizens have an eID card Dec 1999: European Directive 1999/93/EC on Electronic Signatures Jan 2002: Council of Ministers assigns RRN’s infrastructure to 3 Jan 2002: Council of Ministers assigns RRN’s infrastructure to NV Steria Sept 2002: Council of Ministers assigns card production to, certificate services to 27 Sept 2002: Council of Ministers assigns card production to NV Zetes, certificate services to NV Belgacom May 2003: starts issuing eID cards 9 May 2003: first pilot municipality starts issuing eID cards 25 July 2003: started 25 July 2003: eleventh pilot municipality started 31 March 2003: issued to civil servants 31 March 2003: first 4 eID cards issued to civil servants January 2004: start of 25 January 2004: start of pilot phase evaluation September 2005: September 2005: all newly issued ID cards are eID cards September 2004: start of 27 September 2004: start of nation-wide roll-out
The eID “product family” Kids-ID Foreigner-ID eID
8 The eID: results eID: –More than 8.6 Million cards issued (2nd wave) Kids-ID: –Potential: 1,3 Million cards –More than cards issued since March 2009 Foreigner-ID: – Potential: 1,5 Million cards –More than cards issued since 2008
How does it work?
Alternatives with different security levels Different security levels : –level 0 : Public access –level 1 : User name + Password –level 2 : User name + Password + Token –level 3 : Electronic identity card Future evolutions (based on eID) : –Mobile Identity –One Time Password Generators ? Level 0 Level 1 Level 2 Level 3
IDENTITY AND ACCESS MANAGEMENT IN EGOV
User Application Getting access © Fedict All rights reserved | p. 12 What is IAM? A simple story…
User Application Identification & authentication Getting access © Fedict All rights reserved | p. 13 What is IAM? A simple story…
User Application Identification & authentication Attributes (Name, Company,…) NRN KBO Notarissen … … Getting access What is IAM? A simple story…
User Applications Identification & authentication Attributes (Name, company,…) NRN KBO Notarissen … … Getting access What is IAM? A simple story… Permissions Roles
Chief Security Mgr User Application Identification & authentication Attributes (Name, Company,…) NRN KBO Notarissen … … Getting access Legal Representative KBO Granting access © Fedict All rights reserved | p. 16 What is IAM? A simple story… Permissions Workflow Security Manager Roles
© Fedict All rights reserved | p. 17 IAM …. In a complex reality Manage Identity Manage Virtual Identity Attestation Reporting Risk Definition Relying Party Management Auditing Manage Organizationa l Membership Manage Role Definition Manage Permission Mandate Management Manage Domains Manage Contexts Request Permission Authenticate Process overview
© Fedict All rights reserved | p. 18 Relevance of IAM within eGovernment context Transparance: Granting of transparant access to different applications and information sources of the Belgian government Security: Avoid unauthorized access to information sources and applications of the federal government Trust and trustworthy: Decent service provider Autonomy: Ensure the “uniqueness” of each of the partners Governance structure: The rules and agreements within an IAM context
© Fedict All rights reserved | p. 19 Security management >> An historical agreement An agreement is being defined between Belgian government partners, providing a basis for an integrated security management A joint security management platform will be offered as a managed service All partners can participate in the steering group of the joint platform …..
Federated context >> co-existance
Context of OCMWContext of Federale governmentContext of local governments © Fedict All rights reserved | p. 21 Federated context: Example >> Digiflow User Digiflow Identification & authentication Attributes (Name, Company,…) NRN KBO Notarissen … … Permissions Getting access
User Tax on web Identification & authentication Attributes (Name, Company,…) NRN KBO … … Getting access Legal represetative Head Security Mgr Permissions Security Mgr Roles Workflo w KBO Granting access © Fedict All rights reserved | p. 22 Federated context: Example >> Tax on Web for accountants Mandate Mgt
Fedict IAM offering Trusted Third Party Authentic sources Circle of Trust FAS Role Admin Application A Application X RR BIS KBO User Relying Party Admin … …
Fedict IAM evolution Current building blocks Optimized building blocks
EU pilots that work on cross-border interoperability © fedict All rights reserved
eDelivery eSafe Company Dossier Citizen ID Company ID eSignature Privacy Transport Infrastructure Transport Infrastructure eDoc Containers eDoc Containers eID legal entities eID legal entities Visible Digital Signatures Syndication, eDirectories Syndication, eDirectories Transport Infrastructure Overview of LSP’s Collaborations
Thank you Fedict Maria-Theresiastraat 1/3 Rue Marie-Thérèse Brussel 1000 Bruxelles TEL | FAX |