SlideShare a Scribd company logo
1 of 27
Download to read offline
Identity and Access Mgmt and
     electronic Identities
 Belgian Federal Government



      Walter Van Assche
      January 16th, 2012
          Chisinau
ELECTRONIC IDENTITY
      (CARD)
Goal eID project
•   To give Belgian citizens an electronic identity   Proof of identity
    card enabling them to authenticate themselves
    towards diverse applications and to put digital
    signatures




                                                                  Signature tool
eID partners
The eID as an e-gov. building block
Belgian eID Project Time line
                          13 Dec 1999: European Directive 1999/93/EC on Electronic Signatures

                          22 Sept 2000: Council of Ministers approves eID card concept study

                          19 July 2001: Council of Ministers approves basic concepts (smart card, citizen-
                          certificates, no integration with SIS card, Ministry of Internal Affairs is
                          responsible for RRN’s infrastructure, pilot municipalities, helpdesk, card
                          production, legal framework,… Fedict for certification services

                          3 Jan 2002: Council of Ministers assigns RRN’s infrastructure to NV Steria
1999 2000 2001 2002                 2002   2003   2004 2005                                               2009


 27 Sept 2002: Council of                                     Start of 2009: all citizens have an eID
 Ministers assigns card                                       card
 production to NV Zetes,
 certificate services to NV                                   September 2005: all newly issued ID
 Belgacom                                                     cards are eID cards

 31 March 2003: first 4 eID cards                          27 September 2004: start of nation-wide roll-out
 issued to civil servants
                                                           25 January 2004: start of pilot phase evaluation
 9 May 2003: first pilot municipality
 starts issuing eID cards                                  25 July 2003: eleventh pilot municipality started
The eID “product family”

        Kids-ID




                           eID




        Foreigner-ID
The eID: results
  •     eID:
      – More than 8.6 Million cards issued (2nd wave)




  •     Kids-ID:
      – Potential: 1,3 Million cards
      – More than 100.000 cards issued since March 2009




  •     Foreigner-ID:
      – Potential: 1,5 Million cards
      – More than 150.000 cards issued since 2008



                                                          8
How does it work?
          Internet
                                               1) Request

                                           2) Redirect to ePortal
                                                Login page
                                                                                                               6) Session Creation
                                       5.2) Redirect with SAML
                                              Response
ePortal                  External Firewall
 User                                                         Web Server                   Application
                                                             External Portal                 Server
                                       5.1) Redirect with SAML
                                       Response (Posting with
                                             JavaScript)
    External Firewall

                         3) Login in ePortal
                        Authentication page


                                                                          4.1) Checking Credetials           4.2) Checking Credetials




                                                         Web Server                            Application                              LDAP
                                                        Federal ePortal                          Server
Alternatives with different security
                       levels
•        Different security levels :             Level 0

    –   level 0 : Public access                  Level 1

    –   level 1 : User name + Password           Level 2
    –   level 2 : User name + Password + Token
                                                 Level 3
    –   level 3 : Electronic identity card




•     Future evolutions (based on eID) :
    – Mobile Identity
    – One Time Password Generators?
IDENTITY AND ACCESS
MANAGEMENT IN EGOV
What is IAM?
                 A simple story…
Getting access



   User
                                                                  Application




                     © Fedict 2009. All rights reserved | p. 12
What is IAM?
                     A simple story…
Getting access



   User
                                                                             Application
              Identification
             & authentication




                                © Fedict 2009. All rights reserved | p. 13
What is IAM?
                     A simple story…
Getting access                      NRN
                                             KBO
                                Notarissen    …




   User
                                  Attributes       Application
              Identification
                                  (Name,
             & authentication
                                  Company,…)
What is IAM?
                     A simple story…
Getting access                      NRN
                                             KBO
                                Notarissen    …




   User
                                  Attributes                     Applications
              Identification                       Permissions
                                  (Name,
             & authentication
                                  company,…)



                                                                    Roles
What is IAM?
                                A simple story…
Getting access                                          NRN
                                                                       KBO
                                                 Notarissen             …




     User
                                                   Attributes                                                   Application
                         Identification                                               Permissions
                                                   (Name,
                        & authentication
                                                   Company,…)

Granting access
                                                                                                                  Roles




                                                                                                     Workflow
                                                                               Security Manager


                                   Chief Security Mgr



 Legal Representative
                           KBO

                                                        © Fedict 2009. All rights reserved | p. 16
IAM
…. In a complex reality
                                                                       Process overview

                                                                           Mandate
                                                                          Management

                                                         Attestation


                                                                            Manage
                                                                            Identity
                                             Reporting
                                                                                            Manage
                                                                                             Virtual
                                                                                            Identity
                                         Risk
                                       Definition                          Request
                                                                          Permission             Manage
                                                                                              Organizationa
                                     Relying Party                       Authenticate         l Membership
                                     Management

                                                                                        Manage Role
                                                                                         Definition
                                              Auditing
                                                                           Manage
                                                                          Permission
                                                          Manage
                                                         Contexts

                                                                           Manage
                                                                           Domains




       © Fedict 2009. All rights reserved | p. 17
Relevance of IAM within
            eGovernment context
Transparance:                  Security:                                         Trust and
• Granting of transparant      • Avoid unauthorized                              trustworthy:
  access to different            access to information                           • Decent service provider
  applications and               sources and applications
  information sources of the     of the federal government
  Belgian government


                Autonomy:                                     Governance
                • Ensure the “uniqueness”                     structure:
                  of each of the partners                     • The rules and
                                                                agreements within an IAM
                                                                context




                                    © Fedict 2009. All rights reserved | p. 18
Security management
      >> An historical agreement



                                                                                …..




An agreement is being defined between Belgian government partners, providing a
basis for an integrated security management

A joint security management platform will be offered as a managed service

All partners can participate in the steering group of the joint platform

                                   © Fedict 2009. All rights reserved | p. 19
Federated context
 >> co-existance
Federated context: Example
             >> Digiflow
Context of Federale government
           OCMW
           local governments

Getting access                         NRN
                                                      KBO
                                   Notarissen          …




    User
                                     Attributes                                     Digiflow
                 Identification                                      Permissions
                                     (Name,
                & authentication
                                     Company,…)




                                       © Fedict 2009. All rights reserved | p. 21
Federated context: Example
 >> Tax on Web for accountants
                     Mandate Mgt
Getting access                                         NRN
                                                                      KBO
                                                                       …




     User
                                                  Attributes                                                  Tax on web
                         Identification                                              Permissions
                                                  (Name,
                        & authentication
                                                  Company,…)

Granting access
                                                                                                                Roles




                                                                                                    Workflo
                                                                                                      w
                                                                                    Security Mgr


                                   Head Security Mgr



  Legal represetative
                           KBO

                                                       © Fedict 2009. All rights reserved | p. 22
Fedict IAM offering
           Trusted Third Party                  Application A




              Relying Party
                                                     …
User




                              Circle of Trust
                                                Application X




                                                                Authentic sources
                                                   RR
              FAS




                                                   BIS
            Admin
             Role




Admin
                                                  KBO
Fedict IAM evolution
Current building blocks                                                    Optimized building blocks




                                                                                                    Self                      Role Definition
                                                 CSAdmin
                                                                                                 Registration                  Management


          Citizen Admin

                                                           Role Admin
                                                                                     Self                                                          Role

                            User          Role                                    Management
                                                                                                            User          Role                  Assignment


                             Mgt          Mgt                     VOSync                                     Mgt          Mgt
                                                                                                                 Reporting
    TUM Self                                                                                                    Management
                                  Reporting                                  User Lifecycle                                                            Organization
     Service
                                                                             Management                                                                Assignment
                                                                                                                   Risk
                                                                  Magma                                         Management



                           Authentication                                                               Authentication
               Attribute
                                                       MagmaWS                                                                         Relying Party
                Service                                                                  Identification &
                                                                                          Authentication                               Management

                           FAS+               FAS1                                                               Attribute
                                                                                                                Publication
EU pilots that work on
                        cross-border interoperability




© fedict 2011. All rights reserved
Overview of LSP’s Collaborations
                                                                            Transport
                                                                            Infrastructure

                                                                               Company
                                                                               Dossier




                                                                                             Company ID
                                              Infrastructure


                                                               Citizen ID
                                              Transport



                                                                            Citizen ID
                  Transport
                Infrastructure

                   Company
                    Dossier
                                 Company ID
   Citizen ID




                Citizen ID
                                                                              Privacy
                  Privacy
Thank you
                  Fedict
  Maria-Theresiastraat 1/3 Rue Marie-Thérèse
            Brussel 1000 Bruxelles
  TEL. +32 2 212 96 00 | FAX +32 2 212 96 99
info@fedict.belgium.be | www.fedict.belgium.be

More Related Content

What's hot

SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseOKsystem
 
Identity, Security, and XML Web Services -- The Importance of Interoperable S...
Identity, Security, and XML Web Services -- The Importance of Interoperable S...Identity, Security, and XML Web Services -- The Importance of Interoperable S...
Identity, Security, and XML Web Services -- The Importance of Interoperable S...Jorgen Thelin
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introductionAvirot Mitamura
 
Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop Ericsson Labs
 
SMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales PresentationSMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales PresentationVCW Security Ltd
 
Startup Spotlight: OneID
Startup Spotlight: OneIDStartup Spotlight: OneID
Startup Spotlight: OneIDpii2011
 
India Ip & It Laws News Letter May June 2011
India Ip & It Laws News Letter May June 2011India Ip & It Laws News Letter May June 2011
India Ip & It Laws News Letter May June 2011Vijay Dalmia
 
Sxsw ppt voice-1
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1Dan Miller
 
Autdsi gvi
Autdsi gviAutdsi gvi
Autdsi gviL2MM
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust Datacard
 
Axsionics quick presentation for slideshare
Axsionics quick presentation for slideshareAxsionics quick presentation for slideshare
Axsionics quick presentation for slidesharemartine reindle
 
Information system and data modelling tools
Information system and data modelling toolsInformation system and data modelling tools
Information system and data modelling toolsMR Z
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONPankaj Rane
 
IDGate: One Solution for All EKYC Needs
 IDGate: One Solution for All EKYC Needs  IDGate: One Solution for All EKYC Needs
IDGate: One Solution for All EKYC Needs Nadine A. Jaafar
 
Annotating Microblog Posts with Sensor Data for Emergency Reporting Applications
Annotating Microblog Posts with Sensor Data for Emergency Reporting ApplicationsAnnotating Microblog Posts with Sensor Data for Emergency Reporting Applications
Annotating Microblog Posts with Sensor Data for Emergency Reporting ApplicationsDavid Crowley
 
Wayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonWayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonEduserv
 
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteitStichting ePortfolio Support
 

What's hot (20)

SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterprise
 
Identity, Security, and XML Web Services -- The Importance of Interoperable S...
Identity, Security, and XML Web Services -- The Importance of Interoperable S...Identity, Security, and XML Web Services -- The Importance of Interoperable S...
Identity, Security, and XML Web Services -- The Importance of Interoperable S...
 
Estonian Experience electronicID, mobileID
Estonian Experience electronicID, mobileIDEstonian Experience electronicID, mobileID
Estonian Experience electronicID, mobileID
 
Overall cryptography and pki introduction
Overall cryptography and pki introductionOverall cryptography and pki introduction
Overall cryptography and pki introduction
 
Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop Over the Air 2011 Security Workshop
Over the Air 2011 Security Workshop
 
SMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales PresentationSMS Passcode - Vcw Sales Presentation
SMS Passcode - Vcw Sales Presentation
 
Startup Spotlight: OneID
Startup Spotlight: OneIDStartup Spotlight: OneID
Startup Spotlight: OneID
 
India Ip & It Laws News Letter May June 2011
India Ip & It Laws News Letter May June 2011India Ip & It Laws News Letter May June 2011
India Ip & It Laws News Letter May June 2011
 
Sxsw ppt voice-1
Sxsw ppt voice-1Sxsw ppt voice-1
Sxsw ppt voice-1
 
Autdsi gvi
Autdsi gviAutdsi gvi
Autdsi gvi
 
Entrust IdentityGuard Mobile
Entrust IdentityGuard MobileEntrust IdentityGuard Mobile
Entrust IdentityGuard Mobile
 
Axsionics quick presentation for slideshare
Axsionics quick presentation for slideshareAxsionics quick presentation for slideshare
Axsionics quick presentation for slideshare
 
Chapter1 2
Chapter1 2Chapter1 2
Chapter1 2
 
Information system and data modelling tools
Information system and data modelling toolsInformation system and data modelling tools
Information system and data modelling tools
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
 
IDGate: One Solution for All EKYC Needs
 IDGate: One Solution for All EKYC Needs  IDGate: One Solution for All EKYC Needs
IDGate: One Solution for All EKYC Needs
 
Annotating Microblog Posts with Sensor Data for Emergency Reporting Applications
Annotating Microblog Posts with Sensor Data for Emergency Reporting ApplicationsAnnotating Microblog Posts with Sensor Data for Emergency Reporting Applications
Annotating Microblog Posts with Sensor Data for Emergency Reporting Applications
 
Wayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan RichardsonWayfs and Strays - Jonathan Richardson
Wayfs and Strays - Jonathan Richardson
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
 

Viewers also liked

The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelSarah Moore
 
Abc guide for foreign employees coming to belgium immigration_tax_social secu...
Abc guide for foreign employees coming to belgium immigration_tax_social secu...Abc guide for foreign employees coming to belgium immigration_tax_social secu...
Abc guide for foreign employees coming to belgium immigration_tax_social secu...Helenachn Chen
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...IBM Security
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYForgeRock
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Sverige
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)danb02
 
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.Workshop on Identity & Access Management.
Workshop on Identity & Access Management.cisoplatform
 
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CloudIDSummit
 
Nordic APIs - Building a Secure API
Nordic APIs - Building a Secure APINordic APIs - Building a Secure API
Nordic APIs - Building a Secure APITwobo Technologies
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIBM Sverige
 
Preparing for the Future of Education. Take A Look Around You.
Preparing for the Future of Education. Take A Look Around You.Preparing for the Future of Education. Take A Look Around You.
Preparing for the Future of Education. Take A Look Around You.Silvia Rosenthal Tolisano
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Sverige
 
ITIL - IAM (Access Management)
ITIL - IAM (Access Management)ITIL - IAM (Access Management)
ITIL - IAM (Access Management)Josep Bardallo
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 

Viewers also liked (18)

The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
Abc guide for foreign employees coming to belgium immigration_tax_social secu...
Abc guide for foreign employees coming to belgium immigration_tax_social secu...Abc guide for foreign employees coming to belgium immigration_tax_social secu...
Abc guide for foreign employees coming to belgium immigration_tax_social secu...
 
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
In Today's Complex Multi Perimeter World, Are You Doing Enough to Secure Acce...
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.Workshop on Identity & Access Management.
Workshop on Identity & Access Management.
 
Neo-security Stack
Neo-security StackNeo-security Stack
Neo-security Stack
 
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
CIS13: Intelligence-Driven IAM: The Next Generation of Identity and Access Go...
 
Nordic APIs - Building a Secure API
Nordic APIs - Building a Secure APINordic APIs - Building a Secure API
Nordic APIs - Building a Secure API
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
Preparing for the Future of Education. Take A Look Around You.
Preparing for the Future of Education. Take A Look Around You.Preparing for the Future of Education. Take A Look Around You.
Preparing for the Future of Education. Take A Look Around You.
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
ITIL - IAM (Access Management)
ITIL - IAM (Access Management)ITIL - IAM (Access Management)
ITIL - IAM (Access Management)
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 

Similar to Identity and Access Management and electronic Identities _ Belgian Federal Government

Mobile Authentication on the Internet
Mobile Authentication on the InternetMobile Authentication on the Internet
Mobile Authentication on the Internetevidos
 
E To The Rescue: Opportunity in Mortgage Servicing and Loss Mitigation
E To The Rescue: Opportunity in Mortgage Servicing and Loss MitigationE To The Rescue: Opportunity in Mortgage Servicing and Loss Mitigation
E To The Rescue: Opportunity in Mortgage Servicing and Loss MitigationCDB Consultancy LLC
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingOKsystem
 
SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business Jinhwan Shin
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for GovernmentCarahsoft
 
SmartCard Forum 2008 - Gemalto
SmartCard Forum 2008 - GemaltoSmartCard Forum 2008 - Gemalto
SmartCard Forum 2008 - GemaltoOKsystem
 
State-of-the-Art in Web Services Federation
State-of-the-Art in Web Services FederationState-of-the-Art in Web Services Federation
State-of-the-Art in Web Services FederationOliver Pfaff
 
O Dell Secure360 Presentation5 12 10b
O Dell Secure360 Presentation5 12 10bO Dell Secure360 Presentation5 12 10b
O Dell Secure360 Presentation5 12 10bBruce O'Dell
 
Protecting Online Identities
Protecting Online IdentitiesProtecting Online Identities
Protecting Online Identitiesgoodfriday
 
SmartCard Forum 2008 - Securing digital identity
SmartCard Forum 2008 - Securing digital identitySmartCard Forum 2008 - Securing digital identity
SmartCard Forum 2008 - Securing digital identityOKsystem
 
Protecting Online Identities
Protecting Online IdentitiesProtecting Online Identities
Protecting Online Identitiesgoodfriday
 
Telesemana ce nominum:mef
Telesemana ce nominum:mefTelesemana ce nominum:mef
Telesemana ce nominum:mefRafael Junquera
 
Blackberrymobile Application Development Casestudy
Blackberrymobile Application Development CasestudyBlackberrymobile Application Development Casestudy
Blackberrymobile Application Development Casestudydheerajkureel
 
An Overview of All Ericsson Labs APIs
An Overview of All Ericsson Labs APIsAn Overview of All Ericsson Labs APIs
An Overview of All Ericsson Labs APIsEricsson Labs
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsOlivier Potonniée
 
ITCamp 2012 - Mihai Nadas - Tackling the single sign-on challenge
ITCamp 2012 - Mihai Nadas - Tackling the single sign-on challengeITCamp 2012 - Mihai Nadas - Tackling the single sign-on challenge
ITCamp 2012 - Mihai Nadas - Tackling the single sign-on challengeITCamp
 
Protecting Online Identities - MIX09
Protecting Online Identities - MIX09Protecting Online Identities - MIX09
Protecting Online Identities - MIX09Jorgen Thelin
 

Similar to Identity and Access Management and electronic Identities _ Belgian Federal Government (20)

Mobile Authentication on the Internet
Mobile Authentication on the InternetMobile Authentication on the Internet
Mobile Authentication on the Internet
 
E To The Rescue: Opportunity in Mortgage Servicing and Loss Mitigation
E To The Rescue: Opportunity in Mortgage Servicing and Loss MitigationE To The Rescue: Opportunity in Mortgage Servicing and Loss Mitigation
E To The Rescue: Opportunity in Mortgage Servicing and Loss Mitigation
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 
Ib final project
Ib final projectIb final project
Ib final project
 
Mobile Financial Services
Mobile Financial Services Mobile Financial Services
Mobile Financial Services
 
SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business SG(Signgate) PKI Abroad Business
SG(Signgate) PKI Abroad Business
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Sms passcode
Sms passcodeSms passcode
Sms passcode
 
SmartCard Forum 2008 - Gemalto
SmartCard Forum 2008 - GemaltoSmartCard Forum 2008 - Gemalto
SmartCard Forum 2008 - Gemalto
 
State-of-the-Art in Web Services Federation
State-of-the-Art in Web Services FederationState-of-the-Art in Web Services Federation
State-of-the-Art in Web Services Federation
 
O Dell Secure360 Presentation5 12 10b
O Dell Secure360 Presentation5 12 10bO Dell Secure360 Presentation5 12 10b
O Dell Secure360 Presentation5 12 10b
 
Protecting Online Identities
Protecting Online IdentitiesProtecting Online Identities
Protecting Online Identities
 
SmartCard Forum 2008 - Securing digital identity
SmartCard Forum 2008 - Securing digital identitySmartCard Forum 2008 - Securing digital identity
SmartCard Forum 2008 - Securing digital identity
 
Protecting Online Identities
Protecting Online IdentitiesProtecting Online Identities
Protecting Online Identities
 
Telesemana ce nominum:mef
Telesemana ce nominum:mefTelesemana ce nominum:mef
Telesemana ce nominum:mef
 
Blackberrymobile Application Development Casestudy
Blackberrymobile Application Development CasestudyBlackberrymobile Application Development Casestudy
Blackberrymobile Application Development Casestudy
 
An Overview of All Ericsson Labs APIs
An Overview of All Ericsson Labs APIsAn Overview of All Ericsson Labs APIs
An Overview of All Ericsson Labs APIs
 
Securing online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applicationsSecuring online services by combining smart cards and web-based applications
Securing online services by combining smart cards and web-based applications
 
ITCamp 2012 - Mihai Nadas - Tackling the single sign-on challenge
ITCamp 2012 - Mihai Nadas - Tackling the single sign-on challengeITCamp 2012 - Mihai Nadas - Tackling the single sign-on challenge
ITCamp 2012 - Mihai Nadas - Tackling the single sign-on challenge
 
Protecting Online Identities - MIX09
Protecting Online Identities - MIX09Protecting Online Identities - MIX09
Protecting Online Identities - MIX09
 

More from E-Government Center Moldova

The nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data AnalyticsThe nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data AnalyticsE-Government Center Moldova
 
Prezentare compartiment securitatea 05 03 2013 p sincariuc
Prezentare compartiment securitatea 05 03 2013 p sincariucPrezentare compartiment securitatea 05 03 2013 p sincariuc
Prezentare compartiment securitatea 05 03 2013 p sincariucE-Government Center Moldova
 
Can e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedterCan e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedterE-Government Center Moldova
 
Driving government efficiency and innovation through cloud computing k...
Driving government efficiency and  innovation through      cloud computing  k...Driving government efficiency and  innovation through      cloud computing  k...
Driving government efficiency and innovation through cloud computing k...E-Government Center Moldova
 
Unleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranUnleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranE-Government Center Moldova
 
Government innovation through cloud computing arthur riel
Government innovation through cloud computing arthur rielGovernment innovation through cloud computing arthur riel
Government innovation through cloud computing arthur rielE-Government Center Moldova
 

More from E-Government Center Moldova (20)

The new era of smart
The new era of smart The new era of smart
The new era of smart
 
The nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data AnalyticsThe nexus of Social, Mobile, Cloud and Big Data Analytics
The nexus of Social, Mobile, Cloud and Big Data Analytics
 
Digital Transformation by Richard Baird
Digital Transformation by Richard BairdDigital Transformation by Richard Baird
Digital Transformation by Richard Baird
 
Mpay&Mcloud
Mpay&McloudMpay&Mcloud
Mpay&Mcloud
 
Presentation cert gov-md 05.03.2013
Presentation cert gov-md 05.03.2013Presentation cert gov-md 05.03.2013
Presentation cert gov-md 05.03.2013
 
Hannes astok data protection agency
Hannes astok data protection agencyHannes astok data protection agency
Hannes astok data protection agency
 
Prezentare compartiment securitatea 05 03 2013 p sincariuc
Prezentare compartiment securitatea 05 03 2013 p sincariucPrezentare compartiment securitatea 05 03 2013 p sincariuc
Prezentare compartiment securitatea 05 03 2013 p sincariuc
 
Hannes astok policy development
Hannes astok policy developmentHannes astok policy development
Hannes astok policy development
 
Digital security hannes astok
Digital security hannes astokDigital security hannes astok
Digital security hannes astok
 
Assessing cybersecurity_Anto Veldre
Assessing cybersecurity_Anto VeldreAssessing cybersecurity_Anto Veldre
Assessing cybersecurity_Anto Veldre
 
MCloud operational framework
MCloud operational frameworkMCloud operational framework
MCloud operational framework
 
Arhitectura de securitate_MCloud
Arhitectura de securitate_MCloudArhitectura de securitate_MCloud
Arhitectura de securitate_MCloud
 
Ibm smart cloud solutions m-cloud
Ibm smart cloud solutions   m-cloudIbm smart cloud solutions   m-cloud
Ibm smart cloud solutions m-cloud
 
Ibm security virtual server protection
Ibm security virtual server protectionIbm security virtual server protection
Ibm security virtual server protection
 
Can e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedterCan e government work in the cloud reichstaedter
Can e government work in the cloud reichstaedter
 
Driving government efficiency and innovation through cloud computing k...
Driving government efficiency and  innovation through      cloud computing  k...Driving government efficiency and  innovation through      cloud computing  k...
Driving government efficiency and innovation through cloud computing k...
 
Star storage m cloud week
Star storage m cloud weekStar storage m cloud week
Star storage m cloud week
 
Unleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranUnleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moran
 
Government innovation through cloud computing arthur riel
Government innovation through cloud computing arthur rielGovernment innovation through cloud computing arthur riel
Government innovation through cloud computing arthur riel
 
4 francisco garcia_moran_moldova_2013
4 francisco garcia_moran_moldova_20134 francisco garcia_moran_moldova_2013
4 francisco garcia_moran_moldova_2013
 

Recently uploaded

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Recently uploaded (20)

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

Identity and Access Management and electronic Identities _ Belgian Federal Government

  • 1. Identity and Access Mgmt and electronic Identities Belgian Federal Government Walter Van Assche January 16th, 2012 Chisinau
  • 3. Goal eID project • To give Belgian citizens an electronic identity Proof of identity card enabling them to authenticate themselves towards diverse applications and to put digital signatures Signature tool
  • 5. The eID as an e-gov. building block
  • 6. Belgian eID Project Time line 13 Dec 1999: European Directive 1999/93/EC on Electronic Signatures 22 Sept 2000: Council of Ministers approves eID card concept study 19 July 2001: Council of Ministers approves basic concepts (smart card, citizen- certificates, no integration with SIS card, Ministry of Internal Affairs is responsible for RRN’s infrastructure, pilot municipalities, helpdesk, card production, legal framework,… Fedict for certification services 3 Jan 2002: Council of Ministers assigns RRN’s infrastructure to NV Steria 1999 2000 2001 2002 2002 2003 2004 2005 2009 27 Sept 2002: Council of Start of 2009: all citizens have an eID Ministers assigns card card production to NV Zetes, certificate services to NV September 2005: all newly issued ID Belgacom cards are eID cards 31 March 2003: first 4 eID cards 27 September 2004: start of nation-wide roll-out issued to civil servants 25 January 2004: start of pilot phase evaluation 9 May 2003: first pilot municipality starts issuing eID cards 25 July 2003: eleventh pilot municipality started
  • 7. The eID “product family” Kids-ID eID Foreigner-ID
  • 8. The eID: results • eID: – More than 8.6 Million cards issued (2nd wave) • Kids-ID: – Potential: 1,3 Million cards – More than 100.000 cards issued since March 2009 • Foreigner-ID: – Potential: 1,5 Million cards – More than 150.000 cards issued since 2008 8
  • 9. How does it work? Internet 1) Request 2) Redirect to ePortal Login page 6) Session Creation 5.2) Redirect with SAML Response ePortal External Firewall User Web Server Application External Portal Server 5.1) Redirect with SAML Response (Posting with JavaScript) External Firewall 3) Login in ePortal Authentication page 4.1) Checking Credetials 4.2) Checking Credetials Web Server Application LDAP Federal ePortal Server
  • 10. Alternatives with different security levels • Different security levels : Level 0 – level 0 : Public access Level 1 – level 1 : User name + Password Level 2 – level 2 : User name + Password + Token Level 3 – level 3 : Electronic identity card • Future evolutions (based on eID) : – Mobile Identity – One Time Password Generators?
  • 12. What is IAM? A simple story… Getting access User Application © Fedict 2009. All rights reserved | p. 12
  • 13. What is IAM? A simple story… Getting access User Application Identification & authentication © Fedict 2009. All rights reserved | p. 13
  • 14. What is IAM? A simple story… Getting access NRN KBO Notarissen … User Attributes Application Identification (Name, & authentication Company,…)
  • 15. What is IAM? A simple story… Getting access NRN KBO Notarissen … User Attributes Applications Identification Permissions (Name, & authentication company,…) Roles
  • 16. What is IAM? A simple story… Getting access NRN KBO Notarissen … User Attributes Application Identification Permissions (Name, & authentication Company,…) Granting access Roles Workflow Security Manager Chief Security Mgr Legal Representative KBO © Fedict 2009. All rights reserved | p. 16
  • 17. IAM …. In a complex reality Process overview Mandate Management Attestation Manage Identity Reporting Manage Virtual Identity Risk Definition Request Permission Manage Organizationa Relying Party Authenticate l Membership Management Manage Role Definition Auditing Manage Permission Manage Contexts Manage Domains © Fedict 2009. All rights reserved | p. 17
  • 18. Relevance of IAM within eGovernment context Transparance: Security: Trust and • Granting of transparant • Avoid unauthorized trustworthy: access to different access to information • Decent service provider applications and sources and applications information sources of the of the federal government Belgian government Autonomy: Governance • Ensure the “uniqueness” structure: of each of the partners • The rules and agreements within an IAM context © Fedict 2009. All rights reserved | p. 18
  • 19. Security management >> An historical agreement ….. An agreement is being defined between Belgian government partners, providing a basis for an integrated security management A joint security management platform will be offered as a managed service All partners can participate in the steering group of the joint platform © Fedict 2009. All rights reserved | p. 19
  • 20. Federated context >> co-existance
  • 21. Federated context: Example >> Digiflow Context of Federale government OCMW local governments Getting access NRN KBO Notarissen … User Attributes Digiflow Identification Permissions (Name, & authentication Company,…) © Fedict 2009. All rights reserved | p. 21
  • 22. Federated context: Example >> Tax on Web for accountants Mandate Mgt Getting access NRN KBO … User Attributes Tax on web Identification Permissions (Name, & authentication Company,…) Granting access Roles Workflo w Security Mgr Head Security Mgr Legal represetative KBO © Fedict 2009. All rights reserved | p. 22
  • 23. Fedict IAM offering Trusted Third Party Application A Relying Party … User Circle of Trust Application X Authentic sources RR FAS BIS Admin Role Admin KBO
  • 24. Fedict IAM evolution Current building blocks Optimized building blocks Self Role Definition CSAdmin Registration Management Citizen Admin Role Admin Self Role User Role Management User Role Assignment Mgt Mgt VOSync Mgt Mgt Reporting TUM Self Management Reporting User Lifecycle Organization Service Management Assignment Risk Magma Management Authentication Authentication Attribute MagmaWS Relying Party Service Identification & Authentication Management FAS+ FAS1 Attribute Publication
  • 25. EU pilots that work on cross-border interoperability © fedict 2011. All rights reserved
  • 26. Overview of LSP’s Collaborations Transport Infrastructure Company Dossier Company ID Infrastructure Citizen ID Transport Citizen ID Transport Infrastructure Company Dossier Company ID Citizen ID Citizen ID Privacy Privacy
  • 27. Thank you Fedict Maria-Theresiastraat 1/3 Rue Marie-Thérèse Brussel 1000 Bruxelles TEL. +32 2 212 96 00 | FAX +32 2 212 96 99 info@fedict.belgium.be | www.fedict.belgium.be