SlideShare a Scribd company logo
1 of 22
eIDAS
European Regulation for eID and Trust
Services for Electronic Transactions
Overview of eIDAS
eIDAS Electronic Trust Services and types of digital signature
Becoming an Qualified Trust Service Provider
Meeting eIDAS use cases with Gemalto solutions
Topics Covered
2 Security, convenience & mobility
What is eIDAS
3 Complying with eIDASS
What is eIDAS?
4
Source: The Authentication and Identity Management Index
The Regulation of Electronic Identification and Trust Services
for Electronic Transactions in the Internal market (eIDAS) is a
European regulation aimed at creating a framework for cross-
border electronic identification and transactions across EU
member countries
Complying with eIDASS
What are the goals of eIDAS?
5
Open up access to public services &
ensure secure online transactions
across borders of EU member countries
Improve security and convenience
when doing business online
Encourage digital transaction
growth and dematerialization
Enable cross-border trust
Complying with eIDASS
Primary Regulations of eIDAS?
6
EU Member States
are required to
mutually recognize
each other’s
electronic
identification (eID)
systems when
accessing online
services
Electronic Trust
Services (eTS),
including electronic
signatures, electronic
seals, time stamps,
electronic registered
delivery service and
website authentication,
will work across borders
and will have the same
legal status as paper-
based processes
Interoperability
of Government
Issued ID
Single Digital
Market
Complying with eIDASS
eIDAS Timeline
7
2014 2015 2016 2017 2018 2019
September 2014 - Entry into force of the Regulation
September 2015 - Voluntary recognition of eIDs*
1st July 2016 - eIDAS Regulation replaces eSignature
Directive **
September 2018 - Mandatory cross border recognition of eIDs
**
•Certificates issued to natural persons under the eSignature Directive
remain valid until expiry and
•Certification Service Providers are allowed a 1 year time frame to
submit a conformity assessment report and as consequence are
considered as qualified Trust Service Providers under the new
eIDAS regulation.
*Adoption of 6 implementing acts on:
•MS cooperation
•Interoperability framework
•eID levels of assurance
•Formats of advanced electronic signature & seals
•Technical specifications of the national trusted lists
•EU Trust mark
Complying with eIDASS
Electronic Trust Services
8 Complying with eIDASS
Electronic Trusted Services (eTS) Benefits
9
Improved customer
experience
Increase trust and
confidence
Efficiency—faster
processes
New business
opportunities with
cross-border reach
Efficiency—
paperless and
error reduction
Facilitate regulatory
compliance
Complying with eIDASS
Types of Electronic Trusted Services (eTS)
10
1 2 3 4 5
Issued to and
used by legal
persons to
ensure origin
and integrity of
data /docs.
NOT an
eSignature of
the legal person
The date and
time on an
electronic
document which
proves that the
document
existed at a
point-in-time
and that it has
not changed
since then
Storage and
transfer of
documents
online. eIDAS
sets the
principle of non-
discrimination
of the legal
effects and
admissibility of
electronic
documents in
legal
proceedings
The process of
determining a
person/entity's
identity by using
electronic
means
Infrastructure
for the transfer
of documents
(or data)
between two
entities or
systems
electronically
6
Electronic
Seals
Time
Stamps
The electronic
equivalent of a
handwritten
signature
Electronic
Documents eID
Electronic
Delivery
Electronic
Signature
7
Trusted
information on a
website (e.g. a
certificate)
which allows
users to verify
the authenticity
of the website
and its link to
the entity or
person behind
the
website.industry
.
Website
Authentication
Complying with eIDASS
Electronic
Signature
6
Types of Electronic Signature Defined by eIDAS
11
Standard
Electronic
Signatures
Advanced
Electronic
Signatures
(AdES)—
Qualified
Electronic
Signatures
(QES)—
• Basic signatures in electronic form
• eSignatures are recognized legally
and can’t be denied legal
acceptance, just because they are
digital.
• Require a higher level of security,
typically met with certificate-based
digital IDs, including,
• unique identifying info that
links to the signatory
• signatory has sole control of
data used to create signature
• capable of identifying if data
as been tampered
• Based on qualified certificates that
can only be issued by CA
accredited and supervised by EU
designated authorities
• Qualified certificates must also be
stored on a qualified signature
creation device (QSCD), such as a
USB token, smart card or HSM
• In order to provide qualified
eSignature services, a trust
service provider must be granted
qualified status
Complying with eIDASS
eIDAS Electronic Signature Use Cases
Security, convenience & mobility12
Local Signing Use Cases
The user’s keys are held on a Qualified Signature Creation Devices
(QSCDs) in the form of a eIDAS compliant smartcard or USB token.
The user signs locally with the smart card or USB token.
eIDAS specifies that the smart card or USB token used as the QSCD in
local signing use cases has to be Common Criteria certified.
Remote Use Cases
The user’s keys are held securely inside a Hardware Security Module
(HSM) attached to a signing server. The signer's key is held securely on a
trusted server and generated remotely.
The eIDAS regulation does NOT specify any standards relating to the HSM
used in remote server signing.
Qualified Trusted Service Provider
13 Complying with eIDASS
14
Qualified trust service providers render
services which ensure a higher level of
security. They comply with specific
requirements as laid down in the
Regulation and are submitted to an
enhanced supervision mechanism.
Complying with eIDASS
Qualified Trust Service Provider
What is a Qualified trust service provider?
“
”
15
Only qualified trust service providers are
part of the EU’s Trust List, which
contains the providers and services that
are given qualified status. If an entity is
not on that list, they are not permitted to
provide qualified trust services
Because of stringent process to become
a qualified trust service provider, the
trust services they provide have a
higher legal certainty and higher
security of electronic transactions than
non-qualified trust services
Only qualified trust service
providers may use the powerful
Trust Mark to advertise or market
their services
Only qualified trust service
providers have a standard level of
security in Europe and comply
with the requirements defined in
the eIDAS Regulation
Complying with eIDASS
Benefits of Becoming a Qualified Trusted Service Provider
How to Become a Qualified Trust Service Provider (TSP)
16
Business needs to get an assessment report
issued by an accredited conformity assessment
body. This assessment will verify the business
and the services it provides meet the
requirements to be qualified.
Trust Service Provider sends the report with
letter of intent to the national supervisory body in
the member state where the business is located.
Supervisory body has three weeks to determine
if the report proves compliance.
If qualified status is granted, the Trust Service
Provider, together with the qualified trust services
it provides are added to the Trusted List. These
Lists are established, published and maintained
by the Member States.
1). Assessment
2). Approval
3). Trust List
4). Trust Mark After the Trust Service Provider is deemed
Qualified, the Trust Mark is provided and clearly
differentiates them from other trust services.
Complying with eIDASS
Electronic Trust Services Use Cases
17
eHealth eTax Filing eBankingeProcurement ContractseEducation
Complying with eIDASS
The eIDAS single digital market will create an abundance of opportunities for qualified Trust
Service Providers who can attract customers looking for the highest security channel available to
conduct their business
• eEducation: eIDAS simplifies access to public administrations, allowing students to complete foreign
college applications without submitting in person. Student uses eID to authenticate, uses a digital signature
to securely sign the application and the record is preserved digitally
• eProcurement: With eIDAS, a cross border call for tenders is easier, allowing businesses to easily and
securely respond to the request with a digital submission that includes electronic registered delivery, a time
stamp to prove it was submitted on time, and eSignature to formalize
• eTax: A citizen who moves from one EU country to another, can easily file the previous years’ taxes without
traveling. eID is used to authenticate and digital signature securely files the taxes
Gemalto Solutions for eIDAS Compliance
18 Complying with eIDASS
Gemalto Solutions for eIDAS Electronic Signature Use Cases
19
Local Use Cases
The eIDAS regulation requires CC certified smart cards for local
or client-side digital signing use cases. Gemalto meets the
requirements of the local signing use case with the IDPrime
smart card family.
Remote Use Cases
The eIDAS regulation does NOT specify any standards relating
to the HSM used in remote server signing, and it is up to
individual countries to determine which certification is required.
As such, suitability of Gemalto HSMs for use in remote signing
use cases will depend on a per-country decision based on local
legislation. For example, Poland is proposing using our HSMs as
an SSCD.
Gemalto Compliant PKI Smart Cards for Local Signing Use Cases
20
IDPrime MD 840 and 3840 are PKI-based
smart cards that address a wide range of use
cases requiring PKI security, including secure
access, email encryption, secure data
storage, and digital signature. Both cards are
common criteria certified and have the
following features:
• CC EAL5+ / PP Java Card certified for the
java platform and CC EAL5+ / PP QSCD
certified for the combination of Java
platform plus PKI applet. The CC EAL5+ /
PP QSCD certification is based on the
Protection Profiles EN 419211 part 1 to 6,
as mandated by eIDAS regulations
• Enhanced cryptographic support with both
RSA and elliptic curves
The IDPrime MD 840
• Contact smart card
IDPrime MD 3840
• Contactless smart card
Complying with eIDASS
Common Criteria
Security, convenience & mobility21
eIDAS and CC
CC certification is a pre-requisite for qualified digital signatures under the eIDAS regulation
What is Common Criteria (CC)?
An international set of guidelines and specifications for evaluating information security products, specifically to
ensure they meet an agreed-upon security standard for government deployments
Key components of CC
Protection Profiles and Evaluation Assurance
Gemalto products
IDPrime MD 840 and the IDPrime 3840 are both CC EAL5+ / PP Java Card certified for the Java platform and
CC EAL5+ / PP QSCD certified for the combination of Java platform plus PKI applet. The CC EAL5+ / PP QSCD
certification is based on the Protection Profiles EN 419211 part 1 to 6, as mandated by eIDAS regulations
Thank You!
22 Complying with eIDASS

More Related Content

What's hot

Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importancesvm
 
Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructureAditya Nama
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT securityPriyab Satoshi
 
Blockchain & the IoT
Blockchain & the IoTBlockchain & the IoT
Blockchain & the IoTMat Keep
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityHeather Vescent
 
비트코인으로 이해하는 블록체인 기술
비트코인으로 이해하는 블록체인 기술비트코인으로 이해하는 블록체인 기술
비트코인으로 이해하는 블록체인 기술Seong-Bok Lee
 
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...Sirius
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI InfrastructureShubham Sharma
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...SSIMeetup
 
Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsJack Nichelson
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor AuthenticationRonnie Isherwood
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Venkatesh Jambulingam
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signaturejolly9293
 
Technical seminar blockchain.pptx
Technical seminar blockchain.pptxTechnical seminar blockchain.pptx
Technical seminar blockchain.pptxKristipatiThoyajaksh
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution briefNozomi Networks
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensicsanupriti
 
Encryption and Decryption
Encryption and DecryptionEncryption and Decryption
Encryption and DecryptionRajaKrishnan M
 

What's hot (20)

Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructure
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT security
 
Blockchain & the IoT
Blockchain & the IoTBlockchain & the IoT
Blockchain & the IoT
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
 
비트코인으로 이해하는 블록체인 기술
비트코인으로 이해하는 블록체인 기술비트코인으로 이해하는 블록체인 기술
비트코인으로 이해하는 블록체인 기술
 
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
Bit coin
Bit coinBit coin
Bit coin
 
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
Decentralized Identifiers (DIDs): The Fundamental Building Block of Self-Sove...
 
SSL And TLS
SSL And TLS SSL And TLS
SSL And TLS
 
Information Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security MetricsInformation Security Metrics - Practical Security Metrics
Information Security Metrics - Practical Security Metrics
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
 
Wazuh Security Platform
Wazuh Security PlatformWazuh Security Platform
Wazuh Security Platform
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Technical seminar blockchain.pptx
Technical seminar blockchain.pptxTechnical seminar blockchain.pptx
Technical seminar blockchain.pptx
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution brief
 
Cloud-forensics
Cloud-forensicsCloud-forensics
Cloud-forensics
 
Encryption and Decryption
Encryption and DecryptionEncryption and Decryption
Encryption and Decryption
 

Viewers also liked

E-government eIDAS - June 2016
E-government eIDAS - June 2016E-government eIDAS - June 2016
E-government eIDAS - June 2016Link to WhatsApp
 
Role of a Qualified Trust Service Provider in Europe
Role of a Qualified Trust Service Provider in EuropeRole of a Qualified Trust Service Provider in Europe
Role of a Qualified Trust Service Provider in EuropeNamirial GmbH
 
Whitepaper E-Signing at the Inhouse Pos
Whitepaper E-Signing at the Inhouse PosWhitepaper E-Signing at the Inhouse Pos
Whitepaper E-Signing at the Inhouse PosNamirial GmbH
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Evolution of digital government services and trust services in the basque gov...
Evolution of digital government services and trust services in the basque gov...Evolution of digital government services and trust services in the basque gov...
Evolution of digital government services and trust services in the basque gov...PEGIP2020
 
OpenShift: Java EE in the clouds
OpenShift: Java EE in the cloudsOpenShift: Java EE in the clouds
OpenShift: Java EE in the cloudsMax Andersen
 
Case study: JBoss Developer Studio, an IDE for Web, Mobile and Cloud applicat...
Case study: JBoss Developer Studio, an IDE for Web, Mobile and Cloud applicat...Case study: JBoss Developer Studio, an IDE for Web, Mobile and Cloud applicat...
Case study: JBoss Developer Studio, an IDE for Web, Mobile and Cloud applicat...Max Andersen
 
DevOps on Steroids Featuring Red Hat & Alantiss - Pop-up Loft Tel Aviv
DevOps on Steroids Featuring Red Hat & Alantiss - Pop-up Loft Tel AvivDevOps on Steroids Featuring Red Hat & Alantiss - Pop-up Loft Tel Aviv
DevOps on Steroids Featuring Red Hat & Alantiss - Pop-up Loft Tel AvivAmazon Web Services
 
Pulkovo Airport Roof Detail
Pulkovo Airport Roof DetailPulkovo Airport Roof Detail
Pulkovo Airport Roof DetailAlexey Chikovskiy
 
Mobile Internet Moscow
Mobile Internet MoscowMobile Internet Moscow
Mobile Internet MoscowMikhail Zarin
 
Whitepaper Mobile E-Signing
Whitepaper Mobile E-SigningWhitepaper Mobile E-Signing
Whitepaper Mobile E-SigningNamirial GmbH
 
xyzmo Overview Russian
xyzmo Overview Russianxyzmo Overview Russian
xyzmo Overview RussianNamirial GmbH
 
SIGNificant ColorPad 6
SIGNificant ColorPad 6SIGNificant ColorPad 6
SIGNificant ColorPad 6Namirial GmbH
 
Whitepaper Online E-Signing
Whitepaper Online E-SigningWhitepaper Online E-Signing
Whitepaper Online E-SigningNamirial GmbH
 
Docker Tooling for Eclipse
Docker Tooling for EclipseDocker Tooling for Eclipse
Docker Tooling for EclipseMax Andersen
 
Electronic identification
Electronic identificationElectronic identification
Electronic identificationBozhidar Bozhanov
 
xyzmo Company Overview
xyzmo Company Overviewxyzmo Company Overview
xyzmo Company OverviewNamirial GmbH
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2SafeNet
 
ProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudSafeNet
 

Viewers also liked (20)

E-government eIDAS - June 2016
E-government eIDAS - June 2016E-government eIDAS - June 2016
E-government eIDAS - June 2016
 
Role of a Qualified Trust Service Provider in Europe
Role of a Qualified Trust Service Provider in EuropeRole of a Qualified Trust Service Provider in Europe
Role of a Qualified Trust Service Provider in Europe
 
Whitepaper E-Signing at the Inhouse Pos
Whitepaper E-Signing at the Inhouse PosWhitepaper E-Signing at the Inhouse Pos
Whitepaper E-Signing at the Inhouse Pos
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Evolution of digital government services and trust services in the basque gov...
Evolution of digital government services and trust services in the basque gov...Evolution of digital government services and trust services in the basque gov...
Evolution of digital government services and trust services in the basque gov...
 
OpenShift: Java EE in the clouds
OpenShift: Java EE in the cloudsOpenShift: Java EE in the clouds
OpenShift: Java EE in the clouds
 
Case study: JBoss Developer Studio, an IDE for Web, Mobile and Cloud applicat...
Case study: JBoss Developer Studio, an IDE for Web, Mobile and Cloud applicat...Case study: JBoss Developer Studio, an IDE for Web, Mobile and Cloud applicat...
Case study: JBoss Developer Studio, an IDE for Web, Mobile and Cloud applicat...
 
Portfolio
PortfolioPortfolio
Portfolio
 
DevOps on Steroids Featuring Red Hat & Alantiss - Pop-up Loft Tel Aviv
DevOps on Steroids Featuring Red Hat & Alantiss - Pop-up Loft Tel AvivDevOps on Steroids Featuring Red Hat & Alantiss - Pop-up Loft Tel Aviv
DevOps on Steroids Featuring Red Hat & Alantiss - Pop-up Loft Tel Aviv
 
Pulkovo Airport Roof Detail
Pulkovo Airport Roof DetailPulkovo Airport Roof Detail
Pulkovo Airport Roof Detail
 
Mobile Internet Moscow
Mobile Internet MoscowMobile Internet Moscow
Mobile Internet Moscow
 
Whitepaper Mobile E-Signing
Whitepaper Mobile E-SigningWhitepaper Mobile E-Signing
Whitepaper Mobile E-Signing
 
xyzmo Overview Russian
xyzmo Overview Russianxyzmo Overview Russian
xyzmo Overview Russian
 
SIGNificant ColorPad 6
SIGNificant ColorPad 6SIGNificant ColorPad 6
SIGNificant ColorPad 6
 
Whitepaper Online E-Signing
Whitepaper Online E-SigningWhitepaper Online E-Signing
Whitepaper Online E-Signing
 
Docker Tooling for Eclipse
Docker Tooling for EclipseDocker Tooling for Eclipse
Docker Tooling for Eclipse
 
Electronic identification
Electronic identificationElectronic identification
Electronic identification
 
xyzmo Company Overview
xyzmo Company Overviewxyzmo Company Overview
xyzmo Company Overview
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
ProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudProtectV - Data Security for the Cloud
ProtectV - Data Security for the Cloud
 

Similar to eIDAS Reference Guide

Securing eHealth, eGovernment and eBanking with Java - JCON Conference
 Securing eHealth, eGovernment and eBanking with Java - JCON Conference Securing eHealth, eGovernment and eBanking with Java - JCON Conference
Securing eHealth, eGovernment and eBanking with Java - JCON ConferenceThodoris Bais
 
Securing eHealth, eGovernment and eBanking with Java - DWX '21
Securing eHealth, eGovernment and eBanking with Java - DWX '21Securing eHealth, eGovernment and eBanking with Java - DWX '21
Securing eHealth, eGovernment and eBanking with Java - DWX '21Werner Keil
 
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 ConferenceSecuring eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 ConferenceThodoris Bais
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified IdentitiesUbisecure
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peteritnewsafrica
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityGareth Niblett
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airportsChas Yap
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airportsRexcy
 
globalsign-131113043043-phpapp01
globalsign-131113043043-phpapp01globalsign-131113043043-phpapp01
globalsign-131113043043-phpapp01Paul van Brouwershaven
 
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature  (e-Sign) Cloud Network & eCommerce ApplicationControls for Digital Signature  (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce ApplicationMufaddal Nullwala
 
Digital Signature
Digital Signature Digital Signature
Digital Signature Vakilsearch
 
TrustIDNow broshure
TrustIDNow broshureTrustIDNow broshure
TrustIDNow broshureTrustIDnow
 
Electronic Signatures Guidance - by BEIS
Electronic Signatures Guidance - by BEISElectronic Signatures Guidance - by BEIS
Electronic Signatures Guidance - by BEISZeev Shetach
 
Best practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFsBest practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFsiText Group nv
 
HCE cloud payments internet services August 2015
HCE cloud payments internet services August 2015HCE cloud payments internet services August 2015
HCE cloud payments internet services August 2015Chandra Patni
 
Session 1. e-ID_esign
Session 1. e-ID_esignSession 1. e-ID_esign
Session 1. e-ID_esigne-SENS project
 

Similar to eIDAS Reference Guide (20)

PPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDAS
PPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDASPPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDAS
PPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDAS
 
PPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
PPT - SIGMA-GIZ Academies - Topic 2 - eID_KaskPPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
PPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
 
Securing eHealth, eGovernment and eBanking with Java - JCON Conference
 Securing eHealth, eGovernment and eBanking with Java - JCON Conference Securing eHealth, eGovernment and eBanking with Java - JCON Conference
Securing eHealth, eGovernment and eBanking with Java - JCON Conference
 
Securing eHealth, eGovernment and eBanking with Java - DWX '21
Securing eHealth, eGovernment and eBanking with Java - DWX '21Securing eHealth, eGovernment and eBanking with Java - DWX '21
Securing eHealth, eGovernment and eBanking with Java - DWX '21
 
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 ConferenceSecuring eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified Identities
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - Identity
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
globalsign-131113043043-phpapp01
globalsign-131113043043-phpapp01globalsign-131113043043-phpapp01
globalsign-131113043043-phpapp01
 
Belgian mobile ID presents itsme
Belgian mobile ID presents itsmeBelgian mobile ID presents itsme
Belgian mobile ID presents itsme
 
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature  (e-Sign) Cloud Network & eCommerce ApplicationControls for Digital Signature  (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
 
Digital Signature
Digital Signature Digital Signature
Digital Signature
 
TrustIDNow broshure
TrustIDNow broshureTrustIDNow broshure
TrustIDNow broshure
 
Electronic Signatures Guidance - by BEIS
Electronic Signatures Guidance - by BEISElectronic Signatures Guidance - by BEIS
Electronic Signatures Guidance - by BEIS
 
Best practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFsBest practices in Certifying and Signing PDFs
Best practices in Certifying and Signing PDFs
 
HCE cloud payments internet services August 2015
HCE cloud payments internet services August 2015HCE cloud payments internet services August 2015
HCE cloud payments internet services August 2015
 
Session 1. e-ID_esign
Session 1. e-ID_esignSession 1. e-ID_esign
Session 1. e-ID_esign
 

More from SafeNet

Whose Cloud is It Anyway - Data Security in the Cloud
Whose Cloud is It Anyway - Data Security in the CloudWhose Cloud is It Anyway - Data Security in the Cloud
Whose Cloud is It Anyway - Data Security in the CloudSafeNet
 
Whose Cloud Is It Anyway: Exploring Data Security Ownership and Control
Whose Cloud Is It Anyway: Exploring Data Security Ownership and ControlWhose Cloud Is It Anyway: Exploring Data Security Ownership and Control
Whose Cloud Is It Anyway: Exploring Data Security Ownership and ControlSafeNet
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldSafeNet
 
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and MobilityNot Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and MobilitySafeNet
 
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business Model
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business ModelCloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business Model
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business ModelSafeNet
 
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeNet
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsSafeNet
 
Securing Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSecuring Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSafeNet
 
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...SafeNet
 
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...SafeNet
 
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...SafeNet
 
Hardware Security Modules: Critical to Information Risk Management
Hardware Security Modules: Critical to Information Risk ManagementHardware Security Modules: Critical to Information Risk Management
Hardware Security Modules: Critical to Information Risk ManagementSafeNet
 
Strong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessStrong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessSafeNet
 
Building Trust into eInvoicing: Key Requirements and Strategies
Building Trust into eInvoicing: Key Requirements and StrategiesBuilding Trust into eInvoicing: Key Requirements and Strategies
Building Trust into eInvoicing: Key Requirements and StrategiesSafeNet
 
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...SafeNet
 
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetPayment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetSafeNet
 
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...SafeNet
 
SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet
 
Building Trust into DNS: Key Strategies
Building Trust into DNS: Key StrategiesBuilding Trust into DNS: Key Strategies
Building Trust into DNS: Key StrategiesSafeNet
 
Charting Your Path to Enterprise Key Management
Charting Your Path to Enterprise Key ManagementCharting Your Path to Enterprise Key Management
Charting Your Path to Enterprise Key ManagementSafeNet
 

More from SafeNet (20)

Whose Cloud is It Anyway - Data Security in the Cloud
Whose Cloud is It Anyway - Data Security in the CloudWhose Cloud is It Anyway - Data Security in the Cloud
Whose Cloud is It Anyway - Data Security in the Cloud
 
Whose Cloud Is It Anyway: Exploring Data Security Ownership and Control
Whose Cloud Is It Anyway: Exploring Data Security Ownership and ControlWhose Cloud Is It Anyway: Exploring Data Security Ownership and Control
Whose Cloud Is It Anyway: Exploring Data Security Ownership and Control
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative World
 
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and MobilityNot Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility
 
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business Model
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business ModelCloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business Model
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business Model
 
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise Applications
 
Securing Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSecuring Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security Guide
 
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
 
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
 
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
 
Hardware Security Modules: Critical to Information Risk Management
Hardware Security Modules: Critical to Information Risk ManagementHardware Security Modules: Critical to Information Risk Management
Hardware Security Modules: Critical to Information Risk Management
 
Strong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessStrong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling Business
 
Building Trust into eInvoicing: Key Requirements and Strategies
Building Trust into eInvoicing: Key Requirements and StrategiesBuilding Trust into eInvoicing: Key Requirements and Strategies
Building Trust into eInvoicing: Key Requirements and Strategies
 
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
 
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetPayment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
 
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
 
SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server Encryption
 
Building Trust into DNS: Key Strategies
Building Trust into DNS: Key StrategiesBuilding Trust into DNS: Key Strategies
Building Trust into DNS: Key Strategies
 
Charting Your Path to Enterprise Key Management
Charting Your Path to Enterprise Key ManagementCharting Your Path to Enterprise Key Management
Charting Your Path to Enterprise Key Management
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo GarcĂ­a Lavilla
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

eIDAS Reference Guide

  • 1. eIDAS European Regulation for eID and Trust Services for Electronic Transactions
  • 2. Overview of eIDAS eIDAS Electronic Trust Services and types of digital signature Becoming an Qualified Trust Service Provider Meeting eIDAS use cases with Gemalto solutions Topics Covered 2 Security, convenience & mobility
  • 3. What is eIDAS 3 Complying with eIDASS
  • 4. What is eIDAS? 4 Source: The Authentication and Identity Management Index The Regulation of Electronic Identification and Trust Services for Electronic Transactions in the Internal market (eIDAS) is a European regulation aimed at creating a framework for cross- border electronic identification and transactions across EU member countries Complying with eIDASS
  • 5. What are the goals of eIDAS? 5 Open up access to public services & ensure secure online transactions across borders of EU member countries Improve security and convenience when doing business online Encourage digital transaction growth and dematerialization Enable cross-border trust Complying with eIDASS
  • 6. Primary Regulations of eIDAS? 6 EU Member States are required to mutually recognize each other’s electronic identification (eID) systems when accessing online services Electronic Trust Services (eTS), including electronic signatures, electronic seals, time stamps, electronic registered delivery service and website authentication, will work across borders and will have the same legal status as paper- based processes Interoperability of Government Issued ID Single Digital Market Complying with eIDASS
  • 7. eIDAS Timeline 7 2014 2015 2016 2017 2018 2019 September 2014 - Entry into force of the Regulation September 2015 - Voluntary recognition of eIDs* 1st July 2016 - eIDAS Regulation replaces eSignature Directive ** September 2018 - Mandatory cross border recognition of eIDs ** •Certificates issued to natural persons under the eSignature Directive remain valid until expiry and •Certification Service Providers are allowed a 1 year time frame to submit a conformity assessment report and as consequence are considered as qualified Trust Service Providers under the new eIDAS regulation. *Adoption of 6 implementing acts on: •MS cooperation •Interoperability framework •eID levels of assurance •Formats of advanced electronic signature & seals •Technical specifications of the national trusted lists •EU Trust mark Complying with eIDASS
  • 8. Electronic Trust Services 8 Complying with eIDASS
  • 9. Electronic Trusted Services (eTS) Benefits 9 Improved customer experience Increase trust and confidence Efficiency—faster processes New business opportunities with cross-border reach Efficiency— paperless and error reduction Facilitate regulatory compliance Complying with eIDASS
  • 10. Types of Electronic Trusted Services (eTS) 10 1 2 3 4 5 Issued to and used by legal persons to ensure origin and integrity of data /docs. NOT an eSignature of the legal person The date and time on an electronic document which proves that the document existed at a point-in-time and that it has not changed since then Storage and transfer of documents online. eIDAS sets the principle of non- discrimination of the legal effects and admissibility of electronic documents in legal proceedings The process of determining a person/entity's identity by using electronic means Infrastructure for the transfer of documents (or data) between two entities or systems electronically 6 Electronic Seals Time Stamps The electronic equivalent of a handwritten signature Electronic Documents eID Electronic Delivery Electronic Signature 7 Trusted information on a website (e.g. a certificate) which allows users to verify the authenticity of the website and its link to the entity or person behind the website.industry . Website Authentication Complying with eIDASS Electronic Signature 6
  • 11. Types of Electronic Signature Defined by eIDAS 11 Standard Electronic Signatures Advanced Electronic Signatures (AdES)— Qualified Electronic Signatures (QES)— • Basic signatures in electronic form • eSignatures are recognized legally and can’t be denied legal acceptance, just because they are digital. • Require a higher level of security, typically met with certificate-based digital IDs, including, • unique identifying info that links to the signatory • signatory has sole control of data used to create signature • capable of identifying if data as been tampered • Based on qualified certificates that can only be issued by CA accredited and supervised by EU designated authorities • Qualified certificates must also be stored on a qualified signature creation device (QSCD), such as a USB token, smart card or HSM • In order to provide qualified eSignature services, a trust service provider must be granted qualified status Complying with eIDASS
  • 12. eIDAS Electronic Signature Use Cases Security, convenience & mobility12 Local Signing Use Cases The user’s keys are held on a Qualified Signature Creation Devices (QSCDs) in the form of a eIDAS compliant smartcard or USB token. The user signs locally with the smart card or USB token. eIDAS specifies that the smart card or USB token used as the QSCD in local signing use cases has to be Common Criteria certified. Remote Use Cases The user’s keys are held securely inside a Hardware Security Module (HSM) attached to a signing server. The signer's key is held securely on a trusted server and generated remotely. The eIDAS regulation does NOT specify any standards relating to the HSM used in remote server signing.
  • 13. Qualified Trusted Service Provider 13 Complying with eIDASS
  • 14. 14 Qualified trust service providers render services which ensure a higher level of security. They comply with specific requirements as laid down in the Regulation and are submitted to an enhanced supervision mechanism. Complying with eIDASS Qualified Trust Service Provider What is a Qualified trust service provider? “ ”
  • 15. 15 Only qualified trust service providers are part of the EU’s Trust List, which contains the providers and services that are given qualified status. If an entity is not on that list, they are not permitted to provide qualified trust services Because of stringent process to become a qualified trust service provider, the trust services they provide have a higher legal certainty and higher security of electronic transactions than non-qualified trust services Only qualified trust service providers may use the powerful Trust Mark to advertise or market their services Only qualified trust service providers have a standard level of security in Europe and comply with the requirements defined in the eIDAS Regulation Complying with eIDASS Benefits of Becoming a Qualified Trusted Service Provider
  • 16. How to Become a Qualified Trust Service Provider (TSP) 16 Business needs to get an assessment report issued by an accredited conformity assessment body. This assessment will verify the business and the services it provides meet the requirements to be qualified. Trust Service Provider sends the report with letter of intent to the national supervisory body in the member state where the business is located. Supervisory body has three weeks to determine if the report proves compliance. If qualified status is granted, the Trust Service Provider, together with the qualified trust services it provides are added to the Trusted List. These Lists are established, published and maintained by the Member States. 1). Assessment 2). Approval 3). Trust List 4). Trust Mark After the Trust Service Provider is deemed Qualified, the Trust Mark is provided and clearly differentiates them from other trust services. Complying with eIDASS
  • 17. Electronic Trust Services Use Cases 17 eHealth eTax Filing eBankingeProcurement ContractseEducation Complying with eIDASS The eIDAS single digital market will create an abundance of opportunities for qualified Trust Service Providers who can attract customers looking for the highest security channel available to conduct their business • eEducation: eIDAS simplifies access to public administrations, allowing students to complete foreign college applications without submitting in person. Student uses eID to authenticate, uses a digital signature to securely sign the application and the record is preserved digitally • eProcurement: With eIDAS, a cross border call for tenders is easier, allowing businesses to easily and securely respond to the request with a digital submission that includes electronic registered delivery, a time stamp to prove it was submitted on time, and eSignature to formalize • eTax: A citizen who moves from one EU country to another, can easily file the previous years’ taxes without traveling. eID is used to authenticate and digital signature securely files the taxes
  • 18. Gemalto Solutions for eIDAS Compliance 18 Complying with eIDASS
  • 19. Gemalto Solutions for eIDAS Electronic Signature Use Cases 19 Local Use Cases The eIDAS regulation requires CC certified smart cards for local or client-side digital signing use cases. Gemalto meets the requirements of the local signing use case with the IDPrime smart card family. Remote Use Cases The eIDAS regulation does NOT specify any standards relating to the HSM used in remote server signing, and it is up to individual countries to determine which certification is required. As such, suitability of Gemalto HSMs for use in remote signing use cases will depend on a per-country decision based on local legislation. For example, Poland is proposing using our HSMs as an SSCD.
  • 20. Gemalto Compliant PKI Smart Cards for Local Signing Use Cases 20 IDPrime MD 840 and 3840 are PKI-based smart cards that address a wide range of use cases requiring PKI security, including secure access, email encryption, secure data storage, and digital signature. Both cards are common criteria certified and have the following features: • CC EAL5+ / PP Java Card certified for the java platform and CC EAL5+ / PP QSCD certified for the combination of Java platform plus PKI applet. The CC EAL5+ / PP QSCD certification is based on the Protection Profiles EN 419211 part 1 to 6, as mandated by eIDAS regulations • Enhanced cryptographic support with both RSA and elliptic curves The IDPrime MD 840 • Contact smart card IDPrime MD 3840 • Contactless smart card Complying with eIDASS
  • 21. Common Criteria Security, convenience & mobility21 eIDAS and CC CC certification is a pre-requisite for qualified digital signatures under the eIDAS regulation What is Common Criteria (CC)? An international set of guidelines and specifications for evaluating information security products, specifically to ensure they meet an agreed-upon security standard for government deployments Key components of CC Protection Profiles and Evaluation Assurance Gemalto products IDPrime MD 840 and the IDPrime 3840 are both CC EAL5+ / PP Java Card certified for the Java platform and CC EAL5+ / PP QSCD certified for the combination of Java platform plus PKI applet. The CC EAL5+ / PP QSCD certification is based on the Protection Profiles EN 419211 part 1 to 6, as mandated by eIDAS regulations
  • 22. Thank You! 22 Complying with eIDASS

Editor's Notes

  1. Types of eTS. Gemalto authentication helps with Esignature