29 research outputs found

    An identity framework for providing access to FIWARE OAuth 2.0-based services according to the eIDAS European Regulation

    Get PDF
    Secure electronic identification (eID) is one of the key enablers of data protection, privacy, and the prevention of online fraud. However, until now, the lack of common legal basis prevented European Member States from recognizing and accepting eIDs issued in the other Member States. The electronic identification and trust services (eIDAS) regulation provides a solution to these issues by ensuring the cross-border mutual recognition of eIDs. FIWARE is a European initiative that provides a rather simple yet powerful set of application programming interfaces (APIs) that ease the development of smart applications in multiple vertical sectors and oriented to the future internet. In this paper, we propose a model that enables the connection of FIWARE OAuth 2.0-based services with the eID authentication provided by eIDAS reference. Thanks to this model, services already connected with an OAuth 2.0 identity provider can be automatically connected with eIDAS nodes for providing eID authentication to European citizens. For validating the proposed model, we have deployed an instance of the FIWARE identity manager connected to the Spanish eIDAS node. Then, we have registered two services, a private videoconferencing system, and a public smart city deployment, and extended their functionalities for enriching the user experience leveraging the eID authentication. We have evaluated the integration of both services in the eIDAS network with real users from seven different countries. We conclude that the proposed model facilitates the integration of generic and FIWARE-based OAuth 2.0 services to the eIDAS infrastructure, making the connection transparent for developers

    Federated identity architecture of the european eID system

    Get PDF
    Federated identity management is a method that facilitates management of identity processes and policies among the collaborating entities without a centralized control. Nowadays, there are many federated identity solutions, however, most of them covers different aspects of the identification problem, solving in some cases specific problems. Thus, none of these initiatives has consolidated as a unique solution and surely it will remain like that in a near future. To assist users choosing a possible solution, we analyze different federated identify approaches, showing main features, and making a comparative study among them. The former problem is even worst when multiple organizations or countries already have legacy eID systems, as it is the case of Europe. In this paper, we also present the European eID solution, a purely federated identity system that aims to serve almost 500 million people and that could be extended in midterm also to eID companies. The system is now being deployed at the EU level and we present the basic architecture and evaluate its performance and scalability, showing that the solution is feasible from the point of view of performance while keeping security constrains in mind. The results show a good performance of the solution in local, organizational, and remote environments

    Providing Login and Wi-Fi Access Services With the eIDAS Network: A Practical Approach

    Get PDF
    The digital identity (or electronic identity) of a person is about being able to prove upon authentication who one is on the Internet, with a certain level of assurance, such as by means of some attributes obtained from a trustworthy Identity Provider. In Europe, the eIDAS Network allows the citizens to authenticate securely with their national credentials and to provide such personal attributes when getting access to Service Providers in a different European country. Although the eIDAS Network is more and more known, its integration with real operational services is still at an initial phase. This paper presents two eIDAS-enabled services, Login with eIDAS and Wi-Fi access with eIDAS , that we have designed, implemented, deployed, and validated at the Politecnico di Torino in Italy. The validation study involved several undergraduate students, who have run the above services with their authentication credentials and platforms and with minimal indications on their usage. The results indicate that the services were beneficial. Several advantages exist both for the users and for the Service Providers, such as resistance to some security attacks and the possibility to adopt the service without prior user registration ( e.g. for short meetings, or in public places). However, some students expressed doubts about exploiting their national eID for Wi-Fi access, mainly in connection with usability and privacy issues. We discuss also these concerns, along with advantages and disadvantages of the proposed services

    The Review of Non-Technical Assumptions in Digital Identity Architectures

    Get PDF
    The literature on digital identity management systems (IdM) is abundant and solutions vary by technology components and non-technical requirements. In the long run, however, there is a need for exchanging identities across domains or even borders, which requires interoperable solutions and flexible architectures. This article aims to give an overview of the current research on digital identity management. We conduct a systematic literature review of digital identity solution architectures and extract their inherent non-technical assumptions. The findings show that solution designs can be based on organizational, business and trust assumptions as well as human-user assumptions. Namely, establishing the trust relationships and collaborations among participating organizations; human-users capability for maintaining private cryptographic material or the assumptions that win-win business models could be easily identified. By reviewing the key findings of solutions proposed and looking at the differences and commonalities of their technical, organizational and social requirements, we discuss their potential real-life inhibitors and identify opportunities for future research in IdM

    The State of the Electronic Identity Market: Technologies, Infrastructure, Services and Policies

    Get PDF
    Authenticating onto systems, connecting to mobile networks and providing identity data to access services is common ground for most EU citizens, however what is disruptive is that digital technologies fundamentally alter and upset the ways identity is managed, by people, companies and governments. Technological progress in cryptography, identity systems design, smart card design and mobile phone authentication have been developed as a convenient and reliable answer to the need for authentication. Yet, these advances ar enot sufficient to satisfy the needs across people's many spheres of activity: work, leisure, health, social activities nor have they been used to enable cross-border service implementation in the Single Digital Market, or to ensure trust in cross border eCommerce. The study findings assert that the potentially great added value of eID technologies in enabling the Digital Economy has not yet been fulfilled, and fresh efforts are needed to build identification and authentication systems that people can live with, trust and use. The study finds that usability, minimum disclosure and portability, essential features of future systems, are at the margin of the market and cross-country, cross-sector eID systems for business and public service are only in their infancy. This report joins up the dots, and provides significant exploratory evidence of the potential of eID for the Single Digital Market. A clear understanding of this market is crucial for policy action on identification and authentication, eSignature and interoperability.JRC.DDG.J.4-Information Societ

    Smart Cross-Border e-Gov Systems: An application to refugee mobility

    Get PDF
    Smart Cross-Border e-Government Systems for citizens and business have been recently proposed to further improve everyday lives, expand business fron-tiers, and facilitate the movement of citizens by reducing the constraints imposed by existing borders between federal states. Their main advantage is their ability to be used by governmental organizations, citizens, and business, in a cross border envi-ronment, thanks to the availability of recently developed electronic authentication, identification and signature platforms. These latest technological advances may con-tribute to solving the mobility issue of legitimate refugees in various European coun-tries. This problem has at the time of writing evolved into a major crisis due to the mass movement of hundreds of thousands of Syrian and Iraqi refugees across Europe and requires immediate attention. An implementation of Smart Cross-Border e-Government Systems appears to be a very good option in supporting the management of individuals and their movement in order to address this crisis

    Insights on innovation management practices at T-Systems. Analysis of a new business model for identity services on public computer network systems

    Get PDF
    Projecte final de carrera fet en col.laboració amb T-Systems International GmbHCatalà: Aquesta monografia identifica elements de gestió de la innovació en una coneguda companyia alemanya del sector TIC (T-Systems International GmbH) i exerceix un anàlisi crític sobre ells a partir de l'estudi d'una iniciativa de negoci denominada Projecte CifraH (Citizen Interoperability Folder for Relationships based on Avatar Hosting per les seves sigles en anglès) originada en T-Systems ITC Iberia SAU, una unitat internacional de la companyia.Castellà: Esta monografía identifica elementos de gestión de la innovación en una conocida compañía alemana del sector TIC (T-Systems International GmbH) y los somete a un análisis crítico a partir del estudio de una iniciativa de negocio denominada Proyecto CifraH (Citizen Interoperability Folder for Relationships based on Avatar Hosting por sus siglas en inglés) llevada a cabo en T-Systems ITC Iberia SAU, una unidad internacional de la compañía.English: This monographic identifies innovation management elements at a major German IT services firm (T-Systems International GmbH) and subjects them to critical analysis through the study of a corporate business initiative known as Project CifraH (Citizen Interoperability Folder for Relationships based on Avatar Hosting) undertaken at an international subsidiary of the company
    corecore