Identity and Access Mgmt and electronic Identities Belgian Federal Government Walter Van Assche January 16 th, 2012 Chisinau.

Slides:



Advertisements
Similar presentations
1 Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM( final) {SWD(2012)
Advertisements

© fedict All rights reserved Legal aspects Belgian electronic identity card Samoera Jacobs – November 2008.
Open Grid Forum 19 January 31, 2007 Chapel Hill, NC Stephen Langella Ohio State University Grid Authentication and Authorization with.
PEPPOL is owned by OpenPEPPOL AISBL OpenPEPPOL – Making Procurement Better André Hoddevik Head of e-procurement unit, Agency for Public Management.
17 March 2010 Workshop on Efficient and Effective eGovernment FASTeTEN : a Flexible Technology in Different European Administrative Contexts
How eID and eSignatures work in a cross-border setting Wendy Carrara SPOCS Deputy Programme Director eID workshop Reaping the benefits of eID in different.
Current trends and perspectives on e-Services for Public Services in Europe European Network Technical Seminar on Efficient e-Services in social security.
Research and Innovation Participant Portal Concept for electronic-only grant management in Horizon 2020 Peter HÄRTWICH
“e-LEGISLATION” Jos DUMORTIER March 19, 2012 Ministerstwo Administracji i Cyfryzacji Warsaw.
The Austrian Governmental eDelivery System Technical Aspects Ankara, March 17th, 2015 Christian Maierhofer, EGIZ The E-Government Innovation Center is.
Stork 2.0 is an EU co-funded project INFSO-ICT-PSP Robert Scharinger & Gottfried Heider (Ministry of Health, AT) WP 5.4 eHealth pilot - epSOS OpenNCP.
TDL Meeting 7-8 April 2014 //Vienna Sprint Proposal The key of a legal on line signature The key of a legal on line signature: The inseparable link between.
Setting Processes for Electronic Signature 1 The ”W-SPES Project” and the “Leuven Report on the Electronic Signatures Directive” – Putting the Project.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
1 ARPA A regional infrastructure for secure role-based access to RTRT services Ing. Laura Castellani Tuscany Region.
BELGIAN PUBLIC SECTOR INTEROPERABILITY Frank LEYMAN January 16th, 2012 Chisinau.
Designing and Implementing Secure ID Management Systems: BELGIUM’s Experience Washington - September 27 th, 2010 Frank LEYMAN © fedict All rights.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
SESSION D: What You Know - What You Have - What You Are: The Role of Hardware Technologies to Provide Identity Assurance BELGIUM’s Experience Washington.
Stork is an EU co-funded project INFSO-ICT-PSP STORK PRESENTATION STORK Presentation Lithuania March 2010.
W-SPES Gravestone Permission Alexander Krock, Bremerhaven, Germany.
E-Business Romania Adriana Ţicău State Secretary for Information Technology Conferinţele Piaţa Financiară Bucharest, the 26 th of March 2002.
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Integrated Electronic User and Access Management in the Belgian Public, Social and Health Care Sector Frank Robben General manager Crossroads Bank for.
Middleware challenges to service providers, the Nordic view TERENA, Ingrid Melve, UNINETT.
Trust 2 ™ Share your confidential information assets without headaches about unauthorized leakage WIM COULIER, SENIOR PROJECT MANAGER CERTIPOST
Connecting Europe Facility: Digital Service Infrastructures How Europe's Public Services get connected Sofia, 20 September 2012 Dr Mechthild Rohen Head.
How can I trust the rest of Europe ? Requirements and a possible organisation with regard to epSOS and eHealth Frank Robben General manager eHealth platform.
1 How to overcome Isolated PKI Approaches PKI Forum Munich June 2001 Hubertus SOQUAT German Federal Ministry of Economics and Technology.
Secure Management of Information across multiple Stakeholders SEMIRAMIS – CIP-ICT PSP SEMIRAMIS General Presentation.
Slide 1 Smart Cards for eGovernment and Health Insurance - Status in Austria.
Citizen Centric Public Service Delivery: the Belgian approach International Symposium on “connected Governance” SSPA – Roma – 21-22/11/2009 Frank LEYMAN.
© Fedict All rights reserved Fedict and e-government in Belgium Bert Beyl - Sam Van den Eynde Euro India summit - 14/10/2011.
Ministry of Transport, Information Technology and Communications
IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015.
Towards a European network for digital preservation Ideas for a proposal Mariella Guercio, University of Urbino.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
SGCC 6.1 Kick-off Project Setup. Introduction Tour de Table –Who’s who –Attendance list, s Scope of CC 6.1.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
1 European eGovernment Awards 2007 European eGovernment Awards 2007 Workshop for Finalists July, Brussels LIMOSA Belgium Reference project number.
SWEB SWEB Security and Privacy Technologies – Implementation Aspects Venue:SWEB Day in APV, Novi Sad Author(s):Dr. Milan Marković Organisations:MISANU.
Zetes : Be eID applications & readers Belgian eID : applications & card readers Microsoft Event June Bart Symons
Belgian EID Card 15/12/2004 Derette Willy eID program manager.
EID Awareness Session for Financial Services Microsoft’s initiatives related to Electronic Identity Card (eID) eID Excitement Wave for Financial Services.
1 Development of e-governement in France Perica SUČEVIĆ - Перица СУЧЕВИЧ Head of the legal department of the DGME ESAP - Moscow, 05-08/12/2007.
Identity Management and Enterprise Single Sign-On (ESSO)
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
The social, economical and political impact of the eID Jan DEPREST – L-SEC – 19-may-2005.
E-CODEX e-Justice Communication via Online Data Exchange e-Justice - European solutions for an international data exchange Cairo,
Strategy and experience of Spain in interoperability for eGovernment.
19-20 October 2010 IT Directors’ Group meeting 1 Item 6 of the agenda ISA programme Pascal JACQUES Unit B2 - Methodology/Research Local Informatics Security.
IAM VISION OUR CREATIVE INSPIRATION IAM STRATEGY & ROADMAP TEAM JUNE 3, 2015.
AAI needs of the Distributed Computing Infrastructures - CLARIN Dieter Van Uytvanck Max Planck Institute for Psycholinguistics
Citizen Centric Public Service Delivery: the Belgian approach TAIEX Multi-country seminar on eGovernment - April 27 th, 2010 Session: Putting public services.
E-Government in Germany: The Example of Process Chains Federal Chancellery Better Regulation Unit
Radu Boncea – ICI Bucharest Monica Anghel – ICI Bucharest SPOCS – Simple Procedures for Cross-Border Services Bucharest 10 February 2012.
Stork is an EU co-funded project INFSO-ICT-PSP STORK PRESENTATION Frank LEYMAN Manager International Relations 04/06/2009.
Networks ∙ Services ∙ People Ann Harding Networkshop 44, Manchester Thinking globally, acting locally Trust and Identity in the GÉANT project.
The Future Digital Identity Landscape in Europe Timothée Mangenot, chairman 14th of December, 2015 ACSIEL partners day.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
Frank Schipplick Work Package Coordinator WP1 - eSignatures.
Identity and Access Management
Introduction to AAI Services
Joint Seminar Brussels 2017.
ESign Aashutosh.
PRESENTATION OF MONTENEGRO
SPOCS : Simple Procedures Online for Crossborder Services
HIMSS National Conference New Orleans Convention Center
Una herramienta para la gestión de identidad, el control de acceso y uso compatible con la regulación de identidad europea eIDAS.
UNECE International Conference
Presentation transcript:

Identity and Access Mgmt and electronic Identities Belgian Federal Government Walter Van Assche January 16 th, 2012 Chisinau

ELECTRONIC IDENTITY (CARD)

Goal eID project To give Belgian citizens an electronic identity card enabling them to authenticate themselves towards diverse applications and to put digital signatures Proof of identity Signature tool

eID partners

The eID as an e-gov. building block

Belgian eID Project Time line 22 Sept 2000: Council of Ministers approves eID card concept study July 2001: Council of Ministers approves basic concepts (smart card, citizen- certificates, no integration with SIS card, is responsible for RRN’s infrastructure, pilot municipalities, helpdesk, card production, legal framework,… for certification services 19 July 2001: Council of Ministers approves basic concepts (smart card, citizen- certificates, no integration with SIS card, Ministry of Internal Affairs is responsible for RRN’s infrastructure, pilot municipalities, helpdesk, card production, legal framework,… Fedict for certification services 2001 Start of 2009: an eID card Start of 2009: all citizens have an eID card Dec 1999: European Directive 1999/93/EC on Electronic Signatures Jan 2002: Council of Ministers assigns RRN’s infrastructure to 3 Jan 2002: Council of Ministers assigns RRN’s infrastructure to NV Steria Sept 2002: Council of Ministers assigns card production to, certificate services to 27 Sept 2002: Council of Ministers assigns card production to NV Zetes, certificate services to NV Belgacom May 2003: starts issuing eID cards 9 May 2003: first pilot municipality starts issuing eID cards 25 July 2003: started 25 July 2003: eleventh pilot municipality started 31 March 2003: issued to civil servants 31 March 2003: first 4 eID cards issued to civil servants January 2004: start of 25 January 2004: start of pilot phase evaluation September 2005: September 2005: all newly issued ID cards are eID cards September 2004: start of 27 September 2004: start of nation-wide roll-out

The eID “product family”  Kids-ID  Foreigner-ID  eID

8 The eID: results eID: –More than 8.6 Million cards issued (2nd wave) Kids-ID: –Potential: 1,3 Million cards –More than cards issued since March 2009 Foreigner-ID: – Potential: 1,5 Million cards –More than cards issued since 2008

How does it work?

Alternatives with different security levels Different security levels : –level 0 : Public access –level 1 : User name + Password –level 2 : User name + Password + Token –level 3 : Electronic identity card Future evolutions (based on eID) : –Mobile Identity –One Time Password Generators ? Level 0 Level 1 Level 2 Level 3

IDENTITY AND ACCESS MANAGEMENT IN EGOV

User Application Getting access © Fedict All rights reserved | p. 12 What is IAM? A simple story…

User Application Identification & authentication Getting access © Fedict All rights reserved | p. 13 What is IAM? A simple story…

User Application Identification & authentication Attributes (Name, Company,…) NRN KBO Notarissen … … Getting access What is IAM? A simple story…

User Applications Identification & authentication Attributes (Name, company,…) NRN KBO Notarissen … … Getting access What is IAM? A simple story… Permissions Roles

Chief Security Mgr User Application Identification & authentication Attributes (Name, Company,…) NRN KBO Notarissen … … Getting access Legal Representative KBO Granting access © Fedict All rights reserved | p. 16 What is IAM? A simple story… Permissions Workflow Security Manager Roles

© Fedict All rights reserved | p. 17 IAM …. In a complex reality Manage Identity Manage Virtual Identity Attestation Reporting Risk Definition Relying Party Management Auditing Manage Organizationa l Membership Manage Role Definition Manage Permission Mandate Management Manage Domains Manage Contexts Request Permission Authenticate Process overview

© Fedict All rights reserved | p. 18 Relevance of IAM within eGovernment context Transparance: Granting of transparant access to different applications and information sources of the Belgian government Security: Avoid unauthorized access to information sources and applications of the federal government Trust and trustworthy: Decent service provider Autonomy: Ensure the “uniqueness” of each of the partners Governance structure: The rules and agreements within an IAM context

© Fedict All rights reserved | p. 19 Security management >> An historical agreement  An agreement is being defined between Belgian government partners, providing a basis for an integrated security management  A joint security management platform will be offered as a managed service  All partners can participate in the steering group of the joint platform …..

Federated context >> co-existance

Context of OCMWContext of Federale governmentContext of local governments © Fedict All rights reserved | p. 21 Federated context: Example >> Digiflow User Digiflow Identification & authentication Attributes (Name, Company,…) NRN KBO Notarissen … … Permissions Getting access

User Tax on web Identification & authentication Attributes (Name, Company,…) NRN KBO … … Getting access Legal represetative Head Security Mgr Permissions Security Mgr Roles Workflo w KBO Granting access © Fedict All rights reserved | p. 22 Federated context: Example >> Tax on Web for accountants Mandate Mgt

Fedict IAM offering Trusted Third Party Authentic sources Circle of Trust FAS Role Admin Application A Application X RR BIS KBO User Relying Party Admin … …

Fedict IAM evolution Current building blocks Optimized building blocks

EU pilots that work on cross-border interoperability © fedict All rights reserved

eDelivery eSafe Company Dossier Citizen ID Company ID eSignature Privacy Transport Infrastructure Transport Infrastructure eDoc Containers eDoc Containers eID legal entities eID legal entities Visible Digital Signatures Syndication, eDirectories Syndication, eDirectories Transport Infrastructure Overview of LSP’s Collaborations

Thank you Fedict Maria-Theresiastraat 1/3 Rue Marie-Thérèse Brussel 1000 Bruxelles TEL | FAX |