eID motivation, a little history STORK Project Environment - - PowerPoint PPT Presentation

eid motivation a little history
SMART_READER_LITE
LIVE PREVIEW

eID motivation, a little history STORK Project Environment - - PowerPoint PPT Presentation

STORK PRESENTATION Challenges of eID interoperability: What we learn(ed) from the STORK journey? Primelife Summerschool, Helsingborg, 3.8.2010 Herbert.Leitold@egiz.gv.at Stork is an EU co-funded project INFSO-ICT-PSP-224993 Present at ion


slide-1
SLIDE 1

Stork is an EU co-funded project INFSO-ICT-PSP-224993

STORK PRESENTATION

Challenges of eID interoperability: What we learn(ed) from the STORK journey?

Primelife Summerschool, Helsingborg, 3.8.2010 Herbert.Leitold@egiz.gv.at

slide-2
SLIDE 2

Present at ion Overview

  • eID motivation, a little history
  • STORK Project Environment
  • Interoperability Models and Integration
  • Technology
slide-3
SLIDE 3

ID - what if something goes wrong …

  • Digital twins, identity theft, …
slide-4
SLIDE 4
  • Early birds started late 1990’s early 2000

 Finish eID card:

December 1999

 Estonian eID card: from January 2002  Austrian citizen card: from 2003, mass-rollouts 2005  Italian CIE / CNS:

test phase 2003 (CIE)

 Belgian eID card:

from 2nd half 2003

Government eID projects …

slide-5
SLIDE 5
  • Early birds started late 1990’s early 2000

 Finish eID card:

December 1999

 Estonian eID´card: from January 2002  Austrian citizen card: from 2003, mass-rollouts 2005  Italian CIE / CNS:

test phase 2003 (CIE)

 Belgian eID card:

from 2nd half 2003

Government eID projects …

slide-6
SLIDE 6

National eIDs landscape

  • Heterogeneous in various dimensions

 Technology

  • Smartcards: AT, BE, EE, ES, FI, GE, IT, PT, SE, …..
  • Mobile eID: AT, EE, FI, LU, NL, NO, UK, …
  • Soft certif.:

ES, SE, SI, …

  • usern./pass.: NL, UK, …

 Operational

  • Issued by public sector, private sector, combined
  • Issued at federal, local, regional level
  • Use of identifiers

 Legal

  • (limited) use of identifiers; flat, sectoral, combined
slide-7
SLIDE 7

Cross-border cases

  • A few examples …

 Student mobility  Migrant workers  E-Health  Services Directive  Moving house  Social security …

… and many, many more private sector applications!

slide-8
SLIDE 8

… discussed the identifier models of MS

APP 1 FLAT MODEL SECTORAL MODEL SEPARATED MODEL

ID

APP 2

ID

APP 3

ID

APP 1

ID1

APP 2

ID2

APP 3

ID3 ID

ONE WAY FUNTIONS

APP 1

ID1

APP 2

ID2

APP 3

ID3

A European eID model must coexist with all three models not :: compromising privacy eID MUST NOT ADD ADDITIONAL PRIVACY RISKS TO EXISTING APPLICATIONS

A little history: eID ad-hoc-group ( 2004 - 2005)

slide-9
SLIDE 9

… discussed possible interoperability models A little history: eID ad hoc-group ( 2004 - 2005)

slide-10
SLIDE 10

… developed signposts with a roadmap A little history: eID ad hoc-group ( 2004 - 2005)

2010

eID Terminology Definition of eID Authentication Model & Levels Personal Data Ownership Model eID Role Management Equal Treatment of national eIDs Common eID Framework Federated eID Management EU provisions: Recognition of national eIDs

2009 2008 2007 2006 ADAPTING THE INFRASTRUCTURE eGovernment eID and Authentication

slide-11
SLIDE 11

Manchest er Minist erial C onf erence, 24 N ov. 2005

By 2010 European citizens and businesses shall be able to benefit from secure means of electronic identification that maximise user convenience while respecting data protection regulations. Such means shall be made available under the responsibility of the Member States but recognised across the EU

slide-12
SLIDE 12

eIDs in STORK ( t hose pilot ing in 1 s t phase )

Country & sec. level Token Types Relation to 1999/93/EC Token Issuer

# of cred. Smart card mobile eiD soft.- certif. qualified cert

(signature-cert)

is a SSCD public sector private sector

Austria 3 yes yes

  • all

all yes yes (all. qual.c.) Belgium 1 yes

  • all

all yes

  • Estonia

2 yes yes

  • all

all yes

  • Germany

1 yes

  • ptional

all yes

(opt. qual.certs.)

Iceland 2 yes

  • all

all

  • yes

Italy 2 yes

  • all

all yes

yes (sig.-card)

Luxembourg 3 yes yes

  • all

all

  • yes

Portugal 1 yes

  • all

all yes

  • Slovenia

3 yes

  • yes

all yes (QAA 4) yes yes Spain 1+80 yes

  • yes

yes (QAA 3-4) yes (QAA 4) yes (QAA 3-4) yes (QAA 3-4) Sweden 12+ yes

  • yes
  • tbc

yes yes

slide-13
SLIDE 13

Present at ion Overview

  • eID motivation, a little history
  • STORK Project Environment
  • Interoperability Models and Integration
  • Technology
slide-14
SLIDE 14

eGovernment object ives ( IC T- PSP call 2007)

eProcurement eID interoperability eHealth

Type A

Electronic documents Accessible & inclusive eGovernment Combined delivery

  • f social services

Type B

eParticipation Impact & user satisfaction Brokering pan-EU eGov solutions & services online

Thematic Networks

slide-15
SLIDE 15

STORK – Member State involvement

Member States/EEA – STORK

Member States Ref Group STORK-2 (original plan)

slide-16
SLIDE 16

The B asis

  • Member States have eID projects
  • planned, deploying, or operational
  • Heterogenous environment
  • Technology: smartcards, username/passwords
  • Operational: e.g. centralized, decentralized
  • Legal: e.g. persistant identifiers, sector-specific IDs
  • STORK does not change the MS situation,

but aims at interoperability on top of it

slide-17
SLIDE 17

Issues to be tackled

  • Consensus needed
  • Legal

 e.g. MS limit use of national identifiers  can prohibit using the identifier cross-border

  • Data protection

 Processing needs to be legitimate

  • Liability

 What if something goes wrong?

  • Trust

 MoUs, Accreditation, self-assessment ??

slide-18
SLIDE 18

Project’s structure

Project Management (ATOS) Communication and Sustainability (Gov2U)

eID inventory, trust & application groups (NL MOI) eID and upcoming technologies (AT TUG)

DEFINITION AND ANALYSIS DESIGN OF INTEROPERABLE FLOWS & ARCHITECTURES

Common specifications and Stork's eID models (FEDICT BE; MAP ES)

eID process flows (UK IPS)

National integration of Stork models and Common specifications (FEDICT BE, MAP ES)

CONSTRUCTION AND IMPLEMENTATION TESTING & EVALUATION Pilots TIME

slide-19
SLIDE 19

STORK – Roadmap “the way ahead”

Functional Design Construction & Implementation Exploitation - Pilots Evaluation Quality authenticator scheme eID PROCESS FLOWS Cross-border authentication platform Assessment on common specifications on eID Framework mapping Legal interoperability priority technologies Design Technical

Common, SAML 2.0 - based specifications have been agreed by the STORK consortium

slide-20
SLIDE 20

Pilots

Pilot 1 – Cross border authentication Pilot 2 – safer chat Pilot 3 – eID Student Mobility Pilot 4 – eID electronic delivery Pilot 5 – EU Citizen Change of Address

slide-21
SLIDE 21

Further services

  • A2A services as additional deployments

√ Defined as part of the work programme √ First focused on specific applications, but …

  • Integration with ECAS

√ Obvious option for doing the A2A services with EC √ Demonstrator as a first step

  • Establishing as a full STORK pilot (the 6th pilot)
slide-22
SLIDE 22

Present at ion Overview

  • eID motivation, a little history
  • STORK Project Environment
  • Interoperability Models and Integration
  • Technology
slide-23
SLIDE 23

One problem tackled: Trust levels

Different technologies and security levels:

  • Smart cards
  • Software certificates
  • Mobile Phones
  • Username-password
slide-24
SLIDE 24

Approach: Mapping to QAA levels

slide-25
SLIDE 25

STOR K – W P5 H igh - Level B usiness Processes

PEPS

STORK assumes the citizen has online-access with eID. Four use cases:

  • 1. Authentication: in an online access to a service provider
  • 2. Attribute Transfer
  • STORK defines eID as the identifier (e.g. national citizen ID),
  • “the rest” (name, date of birth, qualification, …) are attributes
  • 3. Attribute Verification: is a certain attribute presented by the

citizen correct?

  • 4. Certificate Verification: for electronic signatures
slide-26
SLIDE 26

STOR K – Int eroperabilit y Models

PEPS

One Interoperability Framework, Two Basic Models

STORK will investigate and pilot two interoperability models:

  • 1. Middleware (MW)
  • 2. Pan-European Proxy Services (PEPS)

.. and combine them (MWMW, PEPSPEPS, MWPEPS, PEPSMW) The common specifications have been designed so that major components operate on the same protocols, irrespective of the model or its combinations.

slide-27
SLIDE 27

STOR K – H igh Level A rchit ectural A pproach 1

PEPS

Middleware Integration at the Service Provider with smart-cards as means of eID

slide-28
SLIDE 28

STOR K – Example of Middlew are A rchit ect ures

Bürgerkartenumg.

(Client-Middleware)

eID Server

(Server-Middleware)

Application Ausweis App

(Client-Middleware)

Internet

Client Domain MOA-ID

(Server-Middleware)

Application

Internet

Service Provider Domain

slide-29
SLIDE 29

STOR K – C ommunalit ies: Middlew are C oncept

Bürgerkartenumg.

(Client-Middleware)

eID Server

(Server-Middleware)

Application Ausweis App

(Client-Middleware)

Internet

MOA-ID

(Server-Middleware)

Application

Internet

MIDDLEWARE, SPWare

slide-30
SLIDE 30

STORK – Making Governments to co -operate

slide-31
SLIDE 31

STORK STORK PEPS data flow (logical)

slide-32
SLIDE 32

STORK

Protocol: Federated Identity (SAML 2.0)

slide-33
SLIDE 33

The “combination hat trick” V-IDP

Virtual Identity Provider

  • provide a MW

access at a PEPS or

  • a PEPS interface

at the SPware

PEPS V-IDP

slide-34
SLIDE 34

STORK – Middleware Interoperability Model MW  MW example: Austrian student at German University

DE Service

MOA-ID

slide-35
SLIDE 35

STORK – PEPS Interoperability Model

IP IP UK Service

PEPS example: Swedish student at UK university Central national PEPSs

UK PEPS SE PEPS

slide-36
SLIDE 36

STORK – combined model MW  PEPS example: Austrian student at Swedish university, “Virtual IDP” concept

IP SE Service

MOA-ID

vIP SE PEPS

slide-37
SLIDE 37

General considerations

  • Middleware

 No intermediaries

between user & SP

 SP remains data controller

 Needs to integrate all

tokens (pure model)

 End-to-end security

  • PEPS

 Third party

 Liability shift  Data processor or data controller

 Hides national

complexity

 Segmented trust-

relationships In both cases consent as basis for data processing legitimacy

slide-38
SLIDE 38

Service providers STORK Layer (centralized) Foreign eID

Integration model “PEPS country”

V-IDP PEPS PEPS

MS-specific connector MS-specific connector

middleware

slide-39
SLIDE 39

Service providers STORK Layer (decentralized) Foreign eID

Integration model “MW country”

PEPS

MS-specific connector MS-specific connector

middleware V-IDP V-IDP

slide-40
SLIDE 40

Present at ion Overview

  • eID motivation, a little history
  • STORK Project Environment
  • Interoperability Models and Integration
  • Technology
slide-41
SLIDE 41

Case 1: Service Provider in PEPS State

V-IDP STORK interface - PEPS STORK interface – V-IDP STORK interface – V-IDP STORK interface - PEPS Browser PEPS AB

MOA-ID eCardAPI (Server) +

  • acc. cert.

STORK delegation component

eGov Service in PEPS country

eCardAPI (Client) Thin-Client Middleware

Credential Client- Middleware Proxy and IDP Server

Internet Internet Internet PEPS XY Internet

username password

  • ther

token

PKCS#11, CSP, TLS-Fed, ... Internet Internet Internet Internet

PEPS Plug-In STORK interface - PEPS

IDP

slide-42
SLIDE 42

Case 2: Service Provider in MW State

V-IDP STORK interface - PEPS STORK int.- PEPS PEPS Plug-In STORK delegation component

eGov Service in MW country

eCardAPI (Server) +

  • acc. cert.

eCardAPI (Client) MOA-ID Thin-Client Middleware

username password

  • ther

token

Browser PKCS#11, CSP, TLS-Fed, ... PEPS XY

Credential Client- Middleware Proxy and IDP Server

CardInfo

IDP STORK interface – V-IDP Internet Internet Internet Internet Internet Internet

slide-43
SLIDE 43

MS A Resident, Identity Provider and PEPS in MS A, Service Provider and PEPS in MS B

Authentication Process Flow: WP4.1 Diagram A

MS A Resident

MS B Specific MS A Specific

MS A Identity Provider MS A PEPS MS B PEPS Service Provider MS B

yes no yes Identification phase Select to authenticate to Service Provider in MS B Provide list of MS A eIDs with trust level >= x Create assertion with the authentication

  • statement. Including

unique, minimum, persistent representation of a persons identity Process End Service selection phase MS A specific interaction with the user for validating

  • eID. Include

Consent Assertion Validation Select MS from the provided list. User choice Which MS issued your eID for authentication? Request eID with trust level >=x Proceed with Service Validation Assertion validation and login phase Select eID Authentication interaction with IDP Redirect to MS A PEPS. Authentication request and trust level User interacts with service Convert assertion to internal MS B standard Provides Consent Inform User I&A failed yes no no no

STOR K – Process Flow PEPS - PEPS A ut hent icat ion

PEPS

MS-specific elements remain MS-specific elements remain

slide-44
SLIDE 44

MS A Resident, Identity Provider and PEPS in MS A, Service Provider and PEPS in MS B

Member State Specific Identification Phase WP 4.1 Diagram B

MS A Resident

EG UK EG SPAIN

MS A Identity Provider MS A PEPS MS B PEPS Service Provider MS B

yes Validation of provided eID Validation Forward provided credentials to the IdP for validation User selects data to be transmitted Authentication Request Uses credentials to authenticate Select eID yes Validation Select eID

STOR K – Process Flow PEPS - PEPS MS - specif ic

PEPS

slide-45
SLIDE 45

MS A Resident, Middleware from MS A, Service Provider and PEPS in MS B

Authentication Process Flow: WP4.1 Diagram C

MS A resident

MS B Specific

MS A SPware

MS A Specific MS A Specific

Virtual IDP MS B PEPS Service Provider MS B

no no no yes yes yes no yes Delegate to VIDP including the trust level, SP_ID, attributes Select MS from the provided list. User choice Token access initialization MS A specific interaction with the token Convert assertion to internal MS B standard Service selection phase Inform user I&A failed. END Delegate to SPware if the trust level >= x Provide token for seleted eID Create assertion with the authentication statement Proceed with Service Validation Which MS issued your eID for authentication? User interacts with service Validation of Provided eID Select to login/ register to Service Provider in MS B Select attributes, enter PIN MS A specific interaction with the user for validating

  • eID. Show list of

attributes Assertion validation and login phase Identification phase Request eID with trust level >=x, gather needed attributes

STOR K – Process Flow MW - PEPS A ut hent icat ion

PEPS

MS-specific elements remain MS-specific elements remain MS-specific elements remain

slide-46
SLIDE 46

Identity Provider and PEPS in MS A with PEPS and Service Provider in MS B

Attribute Transfer Process Flow: WP4.3 Diagram D

Identity and Attribute Provider MS A

MS Decision on Session

MS A Resident

MS A defined Process MS Specific Defined User Consent MS B Specific

PEPS MS A PEPS MS B Service Provider MS B

MS Defined User Consent yes Sends the attributes to the MS A PEPS as a response to the request Receive attribute, pre-fill form and display to the

  • user. Request user to

submit attributes Request Attributes Displays the Terms and Conditions Send Attributes to Service Provider Receives Attribute

  • Request. Passes

request to MS A PEPS Displays attributes to the user. Service requires attributes. Displays list

  • f the

required attributes Collate Attributes and sends to the user’s browser User selects attributes to be transferred. Resident Interacting with SP in a Authenticated session Stores Attributes Displays the Attributes that it is capable of sending to the service provider. Receives Attribute Request. Passes request to correct Attribute Provider Process end Provides Consent no Confirms that the attributes are correct and that the service provider can store them yes no Transfer attributes Authentication interaction with IDP MS A specific interaction with the user for validating eID. Include Consent Validation yes no no Re- Authentication yes

STOR K – Process Flow PEPS A t t ribut e Transf er

PEPS

slide-47
SLIDE 47

STOR K – Process Flow MW - PEPS A t t ribut e Transf .

PEPS

MS A Resident, Middleware from MS A, Service Provider and PEPS in MS B

Authentication Process Flow: WP4.1 Diagram C

MS A SPware MS A resident

MS B Specific MS A Specific MS A Specific

Virtual IDP MS B PEPS Service Provider MS B

no no no yes yes yes no yes User interacts with service Identification phase Convert assertion to internal MS B standard Select attributes, enter PIN Inform user I&A failed. END Service requires attributes. Displays list of the required attributes and terms and conditions Resident Interacting with SP in a Authenticated session MS A specific interaction with the token Attribute request, delegate to VIDP, include eID. Assertion validation and login phase Token access initialization Create assertion with the authentication statement Validation of Provided eID MS A specific interaction with the user for validating

  • eID. Show list of

attributes Proceed with Service Validation Provide token for seleted eID Service selection phase Delegate to SPware User selects to continue No

slide-48
SLIDE 48

Common MW architecture

slide-49
SLIDE 49

PEPS Architecture

slide-50
SLIDE 50

Securit y A ssert ion Markup Language ( SA ML)

  • XML-based standard for exchanging

authentication and authorization data between security domains

  • Typical Use Cases:

√ Web Single Sign-On (SSO) √ Identity Federation √ Attribute-Based Authorization √ Securing Web Services

slide-51
SLIDE 51

SAML architecture

Source: SAML 2.0 Technical Overview SSO Profiles, Single Logout Profile, Attribute Profiles, … SOAP Binding, HTTP- Artifact, HTTP-Redirect, HTTP-Post Binding, … Authentication Request Protocol, Single Logout Protocol, … Authentication, Attribute, Authorization Decision Assertion

slide-52
SLIDE 52

SAML example

  • SAML via SOAP over HTTP

Source: SAML 2.0 Technical Overview

slide-53
SLIDE 53

SAML and STORK

Web Browser SSO Profile, Holder of Key Web Browser SSO Profile HTTP-Post Binding, SOAP Binding Authentication Request Protocol (amended to include Attribute Query) Authentication and Attribute Assertion

slide-54
SLIDE 54

PEPS – Environment and Frameworks

  • Linux/Windows
  • Java 1.5
  • Application Servers – Web application

√ Tomcat 5/6 √ JBoss 5 √ Glassfish V3

  • Frameworks:

√ Spring √ Struts √ OpenSAML √ log4j

slide-55
SLIDE 55

VIDP – Environment and Frameworks

  • Linux/Windows
  • Java 1.5
  • Application Servers – Enterprise application

√ Glassfish V2

  • Frameworks:

√ EJB √ Velocity (Web presentation, JSP) √ OpenSAML √ slf4j/log4j √ JAXB/JAX-WS

slide-56
SLIDE 56

Present at ion Overview

  • eID motivation, a little history
  • STORK Project Environment
  • Interoperability Models and Integration
  • Technology
slide-57
SLIDE 57

N ext st ep: D igit al A genda ( May 2010) Key Action 3: In 2011 propose a revision of the eSignature Directive with a view to provide a legal framework for cross-border recognition and interoperability of secure eAuthentication systems; Key Action 16: Propose by 2012 a Council and Parliament Decision to ensure mutual recognition of e- identification and e-authentication across the EU based

  • n online 'authentication services' to be offered in all

Member States (which may use the most appropriate

  • fficial citizen documents – issued by the public or the

private sector);

slide-58
SLIDE 58

Conclusions

slide-59
SLIDE 59

STORK – eID interoperability

THANK YOU FOR YOUR ATTENTION info@eid-stork.eu