Digitalisation and electronic signatures

Size: px
Start display at page:

Download "Digitalisation and electronic signatures"

Transcription

1 Digitalisation and electronic signatures eidas - a game changer Cryptomathic All rights reserved

2 Agenda Digitalisation - a global trend Key challenges in the implementation of digital Signatures Cryptomathic Signer Solution overview 2

3 Agenda Digitalisation A global trend Market requirements for a successful signing service Key challenges in the implementation of digital Signatures Cryptomathic Signer Solution overview 3

4 Where is the trend? Product distribution of simple products (e.g. Cards and Accounts) Product distribution of complex products (e.g. Investing and Mortgages) Branch only 70% Multichannel 70% 45% 10% Digital only Today In 5 years Today In 5 years Source: McKinsey. Study in the US and Western Europe 4

5 Digital journey The major growth drivers of the digital signature market include - Reduced business operational costs - Superior customer experience - Enhanced security and control 5

6 Where do we see market needs? Banking and finance PSD 2 reinforces the importance of non repudiation in electronic transfers Digitalisation incl. digital on-boarding and digital client relationship egov Greater efficiency in online public services Legally binding exchange with residents and citizens (tax, civil rights, applications) Legal documents Insurance claims, contracts between multiple parties, (new) service subscription Exchange of information where integrity is a must (pharma, deeds) 6

7 Key to success of the signing service Secure transmission Legally binding No mailing expenses International recognition Instant availability CO² friendly Strong nonrepudiation Convenience, Security & Efficiency The Signing' process is easy to use and has an extended range of benefits 7

8 edias framework for trust services Trust Services (liability, supervision, Interoperability, security, data protection, qualified, prior authorisation, Trusted lists and EU trust mark Electronic Signatures (incl. validation and preservation on service) Electronic Seals (qualified) sealing incl. validation and preservation Time Stamping Delivery services (edelivery) Website authentication (low, substantial, high) 8

9 Client analysis of the market needs (perceived by UBS) 1 Web based (e-gov, e-banking, e-health) 2 Highest possible non-repudiation 3 No additional hardware requirements for client 4 Simple user experience (UX) and integrable in existing processes 9

10 Agenda Digitalisation A global trend Market requirements for a successful signing service Key challenges in the implementation of digital Signatures Pre requisites Compliance check list Cryptomathic Signer Solution overview 10

11 Before start an implementation Identity of the signatory To what extent do I know my customer? Integrity Is there a way to tamper with the document contents Do my clients have means to authenticate Do they have a strong authentication mean? User perception From before the document is created until 10 years after the documents was signed Volume and metrics Size matters 11

12 How are esignatures implemented? 12

13 validation 13

14 Now you know roughly in which direction to go You can decide to Become a TSP Use a managed service Consume trust services 14

15 Diving deeper ahead of the implementation? User Experience Preferably an unbroken UX where the user can provide consent (the signature ceremony) Security Protect most sensitive digital assets Ensure sole control and allow for non repudiation Legal admissibility What the assurance level that I target? In which jurisdiction shall it be valid? Integration effort Review existing environment and method (DMS, CA, IdP, Auth Services) Scalability extendibility Does my architecture scale up? 15

16 Agenda Cryptomathic in the remote signature space Digital Signatures (drivers and regulation) Cryptomathic Signer Solution overview Architecture (overview and functional modules) Integration Non repudiation and certification 16

17 Signer and WYSIWYS in a nutshell Input: Data to be signed Output: Signed data (QES level) In the middle: we provide the necessary technology for the signing experience and can leverage the existing environment and procedures (KYC, IdM, DMS, Auth services etc.) See demo

18 Turnkey solution 18

19 WYSIWYS Signing Experience Navigation (with custom branding) Signature Authorisation pane Provide comparable experience on multiple devices Establishes trust and confidence The signatory is able to visually identify what is being signed The signatory can inspect the result (the signed document) The signed document will be recognizable to the signatory afterwards Room for thumbnails 19

20 WYSIWYS Signing Experience JavaScript WYSIWYS client running in browser or embedded in mobile app Easy to deploy servlets for hosting WYSIWYS browser client resources * and running signing services Brokering services for Document retrieval and storage PDF document rendering Electronic signatures through Cryptomathic Signer Providing PDF signature functionality * ipad WYSIWYS Client is self-contained 20

21 Signer leverages 2 Factor Authentication Either using Cryptomathic Authenticator Versatile authentication server supporting almost all crypto based authentication techniques (OATH, SMS based, etc.) Signing protocol is readily supported User provides a static and dynamic password verified by Signer/Authenticator Or using SAML or OpenID Connect from an IdP Assertions are used to retain sole control Signing protocol is based on session keys derived from the signing request User leverages legacy authentication techniques 21

22 External integration points: Interface with User Management Signer RA exposes a RESTful API to Create User, Establish certificate, revoke cert Built-in functionality to integrate with internal or external CA services (either long-lived key or one-time use) Interface with Document Management System WYSIWYS Server allows to plug-in any DMS using our Java IC interface (to get DTBS as input (formatted in PDF and optionally XML) and return signed data Built-in functionality to convert documents to PDF/A, built signature profile with calls out to time stamping and OCSP Services Front End- API for WYSIWYS and Signing JavaScript APIs to Signer and WYSIWYS abstracting the complexity of the signature workflow Clients can build their own WYSIWYS client (trusted viewer) using our SDK Authentication IdP JavaScript based - leverages SAML 2.0 (and OpenID Connect in the future) Designed for 2-step authentication (to login and to authorise a signature operation) 22

23 eidas Standards Framework

24 Signer A new experience for remote QES signatures Guillaume Forget Guillaume.Forget@cryptomathic.com Cryptomathic All rights reserved

Intro to central signing and Cryptomathic Signer

Intro to central signing and Cryptomathic Signer Intro to central signing and Cryptomathic Signer A new signing experience 2016 Copyright reserved What do these 2 things have in common? Signature The traditional function of a signature is to give evidence

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information

eidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal?

eidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal? eidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal? public 1 AGENDA 1. eidas Strategic View 2. Website Certificates 3. Electronic Seals

More information

European Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the EU internal market

European Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the EU internal market European Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the EU internal market Gérard GALLER Policy Officer European Commission -

More information

Transforming the Document Signing Process

Transforming the Document Signing Process July 2015 Transforming the Document Signing Process Copyright Ascertia 2015 Sam Crook Key Account Manger Agenda About us Why are digital signatures inevitable? What are digital signatures? What can you

More information

ETSI ESI and Signature Validation Services

ETSI ESI and Signature Validation Services ETSI ESI and Signature Validation Services Presented by: Andrea Röck For: Universign and ETSI STF 524 expert 24.10.2018 CA day ETSI 2018 Agenda Update on standardisation under eidas Signature validation

More information

Digital Austria = egov best practice in d Europe

Digital Austria = egov best practice in d Europe Digital Austria = egov best practice in d Europe egovernment ICT Digital Agenda - Digital Roadmap eidas Univ.Lect. Christian Rupp, CMC ICT in the public sector is like a large vessel - it needs clear

More information

Better Security By Design

Better Security By Design Better Security By Design DeliverySlip is superior to conventional encryption. Secure Messaging Database & Transport Better security starts with the storage of information in a Secure Messaging Database.

More information

Cryptomathic Signer. Guillaume Forget. All rights reserved. Copyright Cryptomathic 2013

Cryptomathic Signer. Guillaume Forget. All rights reserved. Copyright Cryptomathic 2013 Cryptomathic Signer Guillaume Forget All rights reserved. Copyright Cryptomathic 2013 What signature should I trust most? VERSUS Why the walrus? He thinks he is safe but is he really? How does the architecture

More information

eidas Regulation eid and assurance levels Outcome of eias study

eidas Regulation eid and assurance levels Outcome of eias study eidas Regulation eid and assurance levels Outcome of eias study Dr. Marijke De Soete Security4Biz (Belgium) ETSI eidas Workshop 24 June 2015 Sophia Antipolis eidas Regulation Regulation on electronic identification

More information

Electronic and digital signatures in Adobe Sign for government.

Electronic and digital signatures in Adobe Sign for government. Electronic and digital signatures in Adobe Sign for government. Adobe Sign lets you comply with local and international regulations using one scalable signature solution. A White Paper September 2017 TABLE

More information

PSD2/EIDAS DEMONSTRATIONS

PSD2/EIDAS DEMONSTRATIONS PSD2/EIDAS DEMONSTRATIONS Chris Kong, Azadian Kornél Réti, Microsec Luigi Rizzo, InfoCert All rights reserved Overview for this Presentation As previously reported and reviewed at ERPB, with ECB and EC,

More information

Identity Ecosystem Design challenges. Wim Coulier eidas Expert Belgian Mobile ID

Identity Ecosystem Design challenges. Wim Coulier eidas Expert Belgian Mobile ID Identity Ecosystem Design challenges Wim Coulier eidas Expert Belgian Mobile ID Belgian Mobile ID respects the guidelines provided by is the reference for digital identification and authentication in Belgium

More information

Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition

Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition 1 Soshi Hamaguchi, 1 Toshiyuki Kinoshita, 2 Satoru Tezuka 1 Tokyo University of Technology, Tokyo, Japan,

More information

eidas-compliant signing of PDF

eidas-compliant signing of PDF PDF Days Europe 2018 eidas-compliant signing of PDF Technical implications of eidas conformance in PDF processing Bernd Wild intarsys AG, Member of the Board of A Presentation 2018 by!11 72% of EU individuals

More information

Utimaco eidas Update. June Thorsten Groetker CTO. Utimaco HSM Business Unit Aachen, Germany 2017 Utimaco eidas Update, June 2017 Page 1

Utimaco eidas Update. June Thorsten Groetker CTO. Utimaco HSM Business Unit Aachen, Germany 2017 Utimaco eidas Update, June 2017 Page 1 Utimaco eidas Update June 2017 Thorsten Groetker CTO Utimaco HSM Business Unit Aachen, Germany 2017 Utimaco eidas Update, June 2017 Page 1 eidas Agenda Recap eidas, Trust Services, Standardization Signature

More information

Security Strategy for Mobile ID GSMA Mobile Connect Summit

Security Strategy for Mobile ID GSMA Mobile Connect Summit Security Strategy for Mobile ID GSMA Mobile Connect Summit Singapore, 22 nd November 2017 G+D Mobile Security G+D Mobile Security: Managing Billions of Connected Digital Identities Today 660 million contactless

More information

PRICE LIST TRUST SERVICE PRODUCTS. Price List Version 5.9 Berlin, April Copyright 2018, Bundesdruckerei GmbH. Seite 1/9

PRICE LIST TRUST SERVICE PRODUCTS. Price List Version 5.9 Berlin, April Copyright 2018, Bundesdruckerei GmbH. Seite 1/9 PRICE LIST TRUST SERVICE PRODUCTS Price List Version 5.9 Berlin, April 2018 Copyright 2018, Bundesdruckerei GmbH Seite 1/9 Qualified Single Signature Cards D-TRUST Card 3.0 EU Signature card according

More information

Electronic signature framework

Electronic signature framework R E P U B L I C O F S E R B I A Negotation Team for the Accession of Republic of Serbia to the European Union Working Group for Chapter 10 Information society and media Electronic signature framework Contents

More information

Sparta Systems Stratas Solution

Sparta Systems Stratas Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

Digital Certificates. PKI and other TTPs. 3.3

Digital Certificates. PKI and other TTPs. 3.3 Digital Certificates. PKI and other TTPs. 3.3 1 Certification-service providers Spanish Law 59/03 Art. 2.2 or Directive 1999/93/EC Art. 2.11: Certification-service providers means an entity or a legal

More information

Sparta Systems TrackWise Solution

Sparta Systems TrackWise Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

Cosmos POFESSIONALS OF SAFETY ENGINEERING

Cosmos POFESSIONALS OF SAFETY ENGINEERING Japan-Europe Comparison of Legal Frameworks for Electronic Signatures July 4 th, 2017@Japan-Europe Internet Trust Symposium Soshi Hamaguchi, Corporation eidas Regulation and e-signature Act Definition

More information

MUTUAL RECOGNITION MECHANISMS. Tahseen Ahmad Khan

MUTUAL RECOGNITION MECHANISMS. Tahseen Ahmad Khan MUTUAL RECOGNITION MECHANISMS Tahseen Ahmad Khan TABLE OF CONTENTS Background: Why Mutual Recognition is important? Electronic Data and its inherent nature Scope of mutual recognition, need to go beyond

More information

Sparta Systems TrackWise Digital Solution

Sparta Systems TrackWise Digital Solution Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities

More information

User Guide. esign Emcee is a trademark of esign Emcee. All other trademarks are the property of their respective owners.

User Guide. esign Emcee is a trademark of esign Emcee. All other trademarks are the property of their respective owners. User Guide esign Emcee is a trademark of esign Emcee. All other trademarks are the property of their respective owners. www.esignemcee.com Copyright 2016 esign Emcee Table of Contents 1.0 esign Emcee Introduction

More information

Adobe Sign and 21 CFR Part 11

Adobe Sign and 21 CFR Part 11 Adobe Sign and 21 CFR Part 11 Today, organizations of all sizes are transforming manual paper-based processes into end-to-end digital experiences speeding signature processes by 500% with legal, trusted

More information

Singapore s National Digital Identity (NDI):

Singapore s National Digital Identity (NDI): Singapore s National Digital Identity (NDI): Leaving no one behind Kwok Quek Sin Director, National Digital Identity Programme Government Technology Agency PART 1 INTRODUCTION TO NDI Better Living For

More information

ArcGIS Server and Portal for ArcGIS An Introduction to Security

ArcGIS Server and Portal for ArcGIS An Introduction to Security ArcGIS Server and Portal for ArcGIS An Introduction to Security Jeff Smith & Derek Law July 21, 2015 Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context

More information

eid Applications Cross Border Authentication

eid Applications Cross Border Authentication eid Applications Cross Border Authentication 07 November 2017 Mr. Gary Yeung, MH Hon Secretary Chairman, eid Committee Smart City Consortium Smart City Consortium Background What is Smart City Consortium?

More information

Certificate Enrollment for the Atlas Platform

Certificate Enrollment for the Atlas Platform Certificate Enrollment for the Atlas Platform Certificate Distribution Challenges Digital certificates can provide a secure second factor for authenticating connections from MAP-wrapped enterprise apps

More information

PKI is Alive and Well: The Symantec Managed PKI Service

PKI is Alive and Well: The Symantec Managed PKI Service PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions

More information

Identity management. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014

Identity management. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014 Identity management Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 Outline 1. Single sign-on 2. SAML and Shibboleth 3. OpenId 4. OAuth 5. (Corporate IAM) 6. Strong identity 2

More information

GDPR Workflow White Paper

GDPR Workflow White Paper White Paper The European Union is implementing new legislation with the objective of protecting personal data of citizens within the EU and giving them more control over how their data is used. Hefty fines

More information

Single Sign-On. Introduction

Single Sign-On. Introduction Introduction DeliverySlip seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single

More information

eidas compliant Trust Services with Utimaco HSMs

eidas compliant Trust Services with Utimaco HSMs eidas compliant Trust Services with Utimaco HSMs March 15, 2018 Dieter Bong Product Manager Utimaco HSM Business Unit Aachen, Germany 2018 eidas-compliant Trust Services with Utimaco HSMs Page 1 eidas

More information

eidas Regulation (EU) 910/2014 eidas implementation State of Play

eidas Regulation (EU) 910/2014 eidas implementation State of Play eidas Regulation (EU) 910/2014 eidas implementation State of Play CA-Day 19 September 2016 Elena Alampi DG CONNECT, European Commission elena.alampi@ec.europa.eu eidas The Regulation in a nutshell 2 MAIN

More information

Electronic registered delivery services (ERDS) in light of the eidas regulation. Warsaw Common Sign Conference 2015

Electronic registered delivery services (ERDS) in light of the eidas regulation. Warsaw Common Sign Conference 2015 Electronic registered delivery services (ERDS) in light of the eidas regulation Warsaw Common Sign Conference 2015 ! 1. e-delivery and the eidas regulation - EU legislative framework - French legislative

More information

All about SAML End-to-end Tableau and OKTA integration

All about SAML End-to-end Tableau and OKTA integration Welcome # T C 1 8 All about SAML End-to-end Tableau and OKTA integration Abhishek Singh Senior Manager, Regional Delivery Tableau Abhishek Singh Senior Manager Regional Delivery asingh@tableau.com Agenda

More information

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1 Inside Symantec O 3 Sergi Isasi Senior Manager, Product Management SR B30 - Inside Symantec O3 1 Agenda 2 Cloud: Opportunity And Challenge Cloud Private Cloud We should embrace the Cloud to respond to

More information

Guidance for Requirements for qualified trust service providers: trustworthy systems and products

Guidance for Requirements for qualified trust service providers: trustworthy systems and products Guidance for Requirements for qualified trust service providers: trustworthy systems and products Note on using the guidance: examples are used throughout they are not normative or exclusive, but there

More information

NextGenPSD2 Conference 2017

NextGenPSD2 Conference 2017 THE Berlin GROUP A EUROPEAN STANDARDS INITIATIVE NextGenPSD2 Conference 2017 General Approach of the Berlin Group PSD2 API Detlef Hillen, SRC Content 1 Services supported by the XS2A interface Core services

More information

The Cloud Identity Crisis

The Cloud Identity Crisis The Cloud Identity Crisis Strategies for Identity-based Access Control for Cloud Applications Marty Jost Symantec Product Marketing Jim Brigham O3 Product Management 1 Agenda Cloud Customer Experiences

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS 03 EXECUTIVE OVERVIEW 05 INTRODUCTION 07 MORE CLOUD DEPLOYMENTS MEANS MORE ACCESS 09 IDENTITY FEDERATION IN

More information

eidas Interoperability Architecture Version November 2015

eidas Interoperability Architecture Version November 2015 eidas Interoperability Architecture Version 1.00 6. November 2015 1 Introduction This document specifies the interoperability components of the eidas-network, i.e. the components necessary to achieve interoperability

More information

OASIS Electronic Trial Master File Standard Technical Committee

OASIS Electronic Trial Master File Standard Technical Committee OASIS Electronic Trial Master File Standard Technical Committee Electronic and Digital Signatures Discussion March 3, 2014 9:00 10:00 AM PST Introducing Electronic and Digital Signatures Agenda Topic Presenter

More information

Technical guidelines implementing eidas

Technical guidelines implementing eidas Technical guidelines implementing eidas Sławek Górniak CA/Day Berlin 19 th September 2016 European Union Agency for Network and Information Security About ENISA 2 Positioning ENISA activities 3 ENISA and

More information

Secure E-Signature. The first truly secure way to easily and quickly sign and exchange digitally approved documents

Secure E-Signature. The first truly secure way to easily and quickly sign and exchange digitally approved documents The first truly secure way to easily and quickly sign and exchange digitally approved documents Electronic signature functionality is rapidly becoming an essential tool in every business, with users increasingly

More information

BEST PRACTICES IN USE OF DIGITAL SIGNATURE. Presented by, Vicky Shah

BEST PRACTICES IN USE OF DIGITAL SIGNATURE. Presented by, Vicky Shah BEST PRACTICES IN USE OF DIGITAL SIGNATURE Presented by, Vicky Shah AGENDA Issues in E-Contracts Concerns Myths and Reality Legal Recognition of Digital Signature Digital Certificate Digital Signature

More information

Cross border eservices STORK 2.0

Cross border eservices STORK 2.0 Cross border eservices STORK 2.0 Frank LEYMAN EEMA / BCS Thought Leadership Seminar December 2nd, 2014, London Stork 2.0 is an EU co funded project INFSO ICT PSP 297263 STORK Phase 1 Key facts Project

More information

Spanish Information Technology Security Evaluation and Certification Scheme

Spanish Information Technology Security Evaluation and Certification Scheme Spanish Information Technology Security Evaluation and Certification Scheme IT-009 Remote Qualified Electronic Signature Creation Device Evaluation Methodology Version 1.0 January 2017 Documento del Esquema

More information

Minnesota State Colleges and Universities System Procedures Chapter 5 Administration

Minnesota State Colleges and Universities System Procedures Chapter 5 Administration Minnesota State Colleges and Universities System Procedures Chapter 5 Administration 5.25.1 Use of Electronic Part 1. Purpose. This procedure establishes requirements for the consistent, secure implementation

More information

Cirius Secure Messaging Single Sign-On

Cirius Secure Messaging Single Sign-On Cirius Secure Messaging seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single

More information

User Authentication Best Practices for E-Signatures Wednesday February 25, 2015

User Authentication Best Practices for E-Signatures Wednesday February 25, 2015 User Authentication Best Practices for E-Signatures Wednesday February 25, 2015 Agenda E-Signature Overview Legality, Authentication & Best Practices Role of authentication in e-signing Options and applications

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications

More information

UPDATE ON CEN & ETSI STANDARDISATION ON SIGNATURES

UPDATE ON CEN & ETSI STANDARDISATION ON SIGNATURES UPDATE ON CEN & ETSI STANDARDISATION ON SIGNATURES Workshop eidas Trust Services: 6 months on after the switch-over 19 December 2016 Riccardo Genghini, TC ESI chairman Topics eidas Standards Status ETSI

More information

Test Signature Policy Version 1.0

Test Signature Policy Version 1.0 Test Signature Policy Version 1.0 This document describes the policy requirements for the creation of test signatures. 04-10-2018 Name COMPL_POL_TestSignaturePolicy OID 1.3.6.1.4.1.49274.1.1.5.1.0 Applicable

More information

Keynote: The Future of Data Leakage Prevention

Keynote: The Future of Data Leakage Prevention Keynote: The Future of Data Leakage Prevention ISSS Zürcher Tagung 2010 1.6.2010, WIDDER Hotel, Zürich Sandy Porter Head of Identity and Security, Avoco Secure Information Security Society Switzerland

More information

Handwritten signatures are EOL Panos Vassiliadis

Handwritten signatures are EOL Panos Vassiliadis Handwritten signatures are EOL Panos Vassiliadis Managing Director The use of paper would be reduced and maybe eliminated in offices by 1995 and all documents would be on computer and electronic due to

More information

Establishing Trust Across International Communities

Establishing Trust Across International Communities Establishing Trust Across International Communities 6 Feb 2013 info@federatedbusiness.org www.federatedbusiness.org Proprietary - British Business Federation Authority 1 Strategic Drivers - Industry 1.

More information

ITU Workshop on Security Aspects of Blockchain (Geneva, Switzerland, 21 March 2017) Blockchains risk or mitigation?

ITU Workshop on Security Aspects of Blockchain (Geneva, Switzerland, 21 March 2017) Blockchains risk or mitigation? ITU Workshop on Security Aspects of Blockchain (Geneva, Switzerland, 21 March 2017) Blockchains risk or mitigation? Patrick Curry OBE CEng Director, BBFA: patrick.curry@bbfa.info Director, Kyckr; patrick.curry@kyckr.com

More information

Top. Reasons Legal Teams Select kiteworks by Accellion

Top. Reasons Legal Teams Select kiteworks by Accellion Top 10 Reasons Legal Teams Select kiteworks by Accellion Accellion Legal Customers Include: Top 10 Reasons Legal Teams Select kiteworks kiteworks by Accellion enables legal teams to manage their increasing

More information

Efficient, broad-based solution for a Swiss digital ID

Efficient, broad-based solution for a Swiss digital ID Press release November 21, 2017 Government and private sector produce joint solution Efficient, broad-based solution for a Swiss digital ID The people of this country should have a simple, secure and unambiguous

More information

Single Sign-On. Introduction. Feature Sheet

Single Sign-On. Introduction. Feature Sheet Feature Sheet Single Sign-On Introduction CipherPost Pro seamlessly integrates into your enterprise single sign-on (SSO) to give your users total email security and an extra set of robust communications

More information

e-sign and TimeStamping

e-sign and TimeStamping e-sign and TimeStamping Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore Under the Aegis of Controller of Certifying Authorities (CCA) Government of India 1 Recent Developments:

More information

Direct, DirectTrust, and FHIR: A Value Proposition

Direct, DirectTrust, and FHIR: A Value Proposition Direct, DirectTrust, and FHIR: A Value Proposition August 10, 2017 Authors: Grahame Grieve, HL7 Product Director for FHIR; David Kibbe, Luis Maas, Greg Meyer, and Bruce Schreiber, members of the DirectTrust

More information

Business Advantages. In this age of heightened awareness of information security issues...

Business Advantages. In this age of heightened awareness of information security issues... In this age of heightened awareness of information security issues... Businesses of every size, in every industry both regulated and nonregulated are recognizing the critical value of DeliverySlip. DELIVERYSLIP.COM

More information

THE LEGALITY OF THE ELECTRONIC SIGNATURE IN THE EUROPEAN UNION

THE LEGALITY OF THE ELECTRONIC SIGNATURE IN THE EUROPEAN UNION THE LEGALITY OF THE ELECTRONIC SIGNATURE IN THE EUROPEAN UNION 1 INDEX 03 07 14 16 Introduction Current law in Europe: the Regulation (EU) No 910/2014 (eidas) 07 10 11 12 13 Repercussion in Europe Definitions:

More information

Security Aspects of Trust Services Providers

Security Aspects of Trust Services Providers Security Aspects of Trust Services Providers Please replace background with image European Union Agency for Network and Information Security 24 th September 2013 www.enisa.europa.eu Today s agenda 09:30-10:00

More information

Retain, search, review and produce government mobile text messages

Retain, search, review and produce government mobile text messages Retain, search, review and produce government mobile text messages Employees are now using mobile phones for business communications just as much, if not more than, their desk phones. At the same time,

More information

Trusted Identities That Drive Global Commerce

Trusted Identities That Drive Global Commerce Trusted Identities That Drive Global Commerce For information of the BCS/EEMA Community A truly Federated Trust Network - Building upon core competences of the worlds banks & payments systems Governance

More information

ShareFile Technical Presentation

ShareFile Technical Presentation ShareFile Technical Presentation Joerg Vosse Senior Systems Engineer - Citrix ShareFile CEE joerg.vosse@citrix.com ShareFile Enterprise Architecture Overview ShareFile Document Cloud ShareFile.com ShareFile.eu

More information

Secure E-Signature. The first truly secure way to easily and quickly sign and exchange digitally approved documents. Feature Sheet

Secure E-Signature. The first truly secure way to easily and quickly sign and exchange digitally approved documents. Feature Sheet Feature Sheet Secure E-Signature The first truly secure way to easily and quickly sign and exchange digitally approved documents Electronic signature functionality is rapidly becoming an essential tool

More information

EXBO e-signing Automated for scanned invoices

EXBO e-signing Automated for scanned invoices EXBO e-signing Automated for scanned invoices Signature Policy Document OID: 0.3.2062.7.2.1.12.1.0 Approval Status: Approved Version: 1.0 Page #: 1 of 13 1. Introduction 1.1. Scope This document covers

More information

Countdown to eidas. Date: 19/04/2016 Auteur: CTIE Révision: 1.0 Ref: EIDAS_CTIE_4 Page 1

Countdown to eidas. Date: 19/04/2016 Auteur: CTIE Révision: 1.0 Ref: EIDAS_CTIE_4 Page 1 Countdown to eidas Date: 19/04/2016 Auteur: CTIE Révision: 1.0 Ref: EIDAS_CTIE_4 Page 1 About CTIE (Centre des Technologies de l'information de l'etat) Provides centralised IT services for all public administrations

More information

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products CIAM: Need for Identity Governance & Assurance Yash Prakash VP of Products Key Tenets of CIAM Solution Empower consumers, CSRs & administrators Scale to millions of entities, cloud based service Security

More information

Accelerate innovation around your banking services

Accelerate innovation around your banking services Accelerate innovation around your banking services Temenos and KBC Ireland 18 May 2016 Agenda 1. The Interaction Framework 2. Demo: Design Studio for APIs 3. KBC Ireland use-case 4. Demo: User-Experience

More information

Cloud SSL Certificate Services

Cloud SSL Certificate Services Cloud SSL Certificate Services Security Beyond the Certificate 0844 334 3347 www.cloudssl.co.uk Why Cloud SSL? Trusted by more than 5,000 organizations in 85 countries Complete line of digital certificates

More information

eidas Workshop Return on Experience from Conformity Assessment Bodies - EY June 13, 2016 Contacts: Arvid Vermote

eidas Workshop Return on Experience from Conformity Assessment Bodies - EY June 13, 2016 Contacts: Arvid Vermote eidas Workshop Return on Experience from Conformity Assessment Bodies - EY June 13, 2016 Contacts: Arvid Vermote arvid.vermote@be.ey.com EY eidas Certification scheme Scheme EY CertifyPoint B.V. is currently

More information

Vendor Questions. esignatures Request for information AssureSign

Vendor Questions. esignatures Request for information AssureSign AssureSign Vendor Questions 1. Legal Compliance Questionnaire This section corresponds to legal requirements as outlined in the CSIO esignatures Advisory Report prepared by Fasken Martineau LLP. 1. Signing

More information

Identity & security CLOUDCARD+ When security meets convenience

Identity & security CLOUDCARD+ When security meets convenience Identity & security CLOUDCARD+ When security meets convenience CLOUDCARD+ When security meets convenience We live in an ever connected world. Digital technology is leading the way to greater mobility and

More information

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security White Paper The Impact of Payment Services Directive II (PSD2) on Authentication & Security First Edition June 2016 Goode Intelligence All Rights Reserved Published by: Goode Intelligence Sponsored by:

More information

Sándor Szőke, Dr. Microsec Ltd. Migration of national PKI Services to eidas conformant Trust Services case study in Hungary

Sándor Szőke, Dr. Microsec Ltd. Migration of national PKI Services to eidas conformant Trust Services case study in Hungary Sándor Szőke, Dr. Microsec Ltd. Migration of national PKI Services to eidas conformant Trust Services case study in Hungary Introduction Private Hungarian IT company since 1984 Custom specific IT system

More information

VAM. ADFS 2FA Value-Added Module (VAM) Deployment Guide

VAM. ADFS 2FA Value-Added Module (VAM) Deployment Guide VAM ADFS 2FA Value-Added Module (VAM) Deployment Guide Copyright Information 2018. SecureAuth is a registered trademark of SecureAuth Corporation. SecureAuth s IdP software, appliances, and other products

More information

Interagency Advisory Board Meeting Agenda, August 25, 2009

Interagency Advisory Board Meeting Agenda, August 25, 2009 Interagency Advisory Board Meeting Agenda, August 25, 2009 1. Opening Remarks 2. Policy, process, regulations, technology, and infrastructure to employ HSPD-12 in USDA (Owen Unangst, USDA) 3. Policy and

More information

CEN & ETSI standards & eidas Compliance

CEN & ETSI standards & eidas Compliance CEN & ETSI standards & eidas Compliance Nick Pope - Thales Vice Chair, ETSI TC Electronic Signature & Infrastructures Jan Ulrik Kjærsgaard Cryptomathic Editor CEN EN 419 241-2 (Remote Signing) eidas and

More information

Oracle Access Manager Oracle FLEXCUBE Universal Banking Release [May] [2017]

Oracle Access Manager Oracle FLEXCUBE Universal Banking Release [May] [2017] Oracle Access Manager Oracle FLEXCUBE Universal Banking Release 12.4.0.0.0 [May] [2017] Table of Contents 1. INTRODUCTION... 1-1 2. BACKGROUND AND PREREQUISITES... 2-1 2.1 PRE-REQUISITES... 2-1 2.1.1 Software

More information

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Making the Case for Digital Signatures

Making the Case for Digital Signatures Making the Case for Digital Signatures Save time, money & resources by replacing physical signatures [Partner logo] STAY ENGAGED Type your questions and comments. We ll answer them all at the end of the

More information

ArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith

ArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith ArcGIS Enterprise Security: An Introduction Gregory Ponto & Jeff Smith Agenda ArcGIS Enterprise Security Model Portal for ArcGIS Authentication Authorization Building the Enterprise Encryption Collaboration

More information

UELMA Exploring Authentication Options Nov 4, 2011

UELMA Exploring Authentication Options Nov 4, 2011 UELMA Exploring Authentication Options Nov 4, 2011 A U T H E N T I C A T I O N M E T H O D S P R E L I M I N A R Y R E P O R T B R A D L E E C H A N G X C E N T I A L G R O U P B R A D @ X C E N T I A

More information

Trusted National Identity Schemes. Coralie MESNARD

Trusted National Identity Schemes. Coralie MESNARD Trusted National Identity Schemes Coralie MESNARD Worldwide digital transactions are booming Digitization The number of G2C digital transactions is said to grow 30% by 2020 Privacy - Convenience Citizens

More information

Joint Initiative on a PSD2 Compliant XS2A Interface NextGenPSD2 XS2A Framework Operational Rules

Joint Initiative on a PSD2 Compliant XS2A Interface NextGenPSD2 XS2A Framework Operational Rules Joint Initiative on a PSD2 Compliant XS2A Interface NextGenPSD2 XS2A Framework Operational Rules 02.10.2017 Notice This Specification has been prepared by the Participants of the Joint Initiative pan-european

More information

Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing. Janne Jutila, Head of Business Development, GSMA

Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing. Janne Jutila, Head of Business Development, GSMA Exploring the potential of Mobile Connect: From authentication to identity and attribute sharing Janne Jutila, Head of Business Development, GSMA Fragility of passwords No matter what you tell them, users

More information

PKI Credentialing Handbook

PKI Credentialing Handbook PKI Credentialing Handbook Contents Introduction...3 Dissecting PKI...4 Components of PKI...6 Digital certificates... 6 Public and private keys... 7 Smart cards... 8 Certificate Authority (CA)... 10 Key

More information

ETSI Electronic Signatures and Infrastructures (ESI) TC

ETSI Electronic Signatures and Infrastructures (ESI) TC ETSI Electronic Signatures and Infrastructures (ESI) TC Presented by Andrea Caccia, ETSI/ESI liaison to ISO SC27 ( a.caccia @ kworks.it ) ETSI 2011. All rights reserved ETSI TC ESI - Electronic Signatures

More information

Identity Provider for SAP Single Sign-On and SAP Identity Management

Identity Provider for SAP Single Sign-On and SAP Identity Management Implementation Guide Document Version: 1.0 2017-05-15 PUBLIC Identity Provider for SAP Single Sign-On and SAP Identity Management Content 1....4 1.1 What is SAML 2.0.... 5 SSO with SAML 2.0.... 6 SLO with

More information

Oracle Insurance Policy Administration Configuration of SAML 1.1 Between OIPA and OIDC

Oracle Insurance Policy Administration Configuration of SAML 1.1 Between OIPA and OIDC Oracle Insurance Policy Administration Configuration of SAML 1.1 Between OIPA and OIDC Version 10.1.0.0 Documentation Part Number: E55027-01 June, 2014 Copyright 2009, 2014, Oracle and/or its affiliates.

More information

BT Assure Cloud Identity Annex to the General Service Schedule

BT Assure Cloud Identity Annex to the General Service Schedule 1 Defined Terms The following definitions apply, in addition to those in the General Terms and Conditions and the General Service Schedule of the Agreement. Administrator means a Customer-authorised person

More information