1 / 24

eID: the gate to Flemish e-government

Electronic Identity Card: Visions, Challenges and realisations. eID: the gate to Flemish e-government. Geert Mareels, project leader e-government, Co-ordination Cell Flemish e-Government (CORVE) Tel: +32 2 553 00 29 – Fax: +32 2 553 55 36 – E-mail: geert.mareels@azf.vlaanderen.be

cachez
Download Presentation

eID: the gate to Flemish e-government

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Electronic Identity Card: Visions, Challenges and realisations eID: the gate toFlemish e-government Geert Mareels, project leader e-government, Co-ordination Cell Flemish e-Government (CORVE) Tel: +32 2 553 00 29– Fax: +32 2553 55 36 – E-mail: geert.mareels@azf.vlaanderen.be Boudewijngebouw 6B43, Boudewijnlaan 30, B-1000 Brussels, Belgium

  2. eID: the gate to Flemish e-government • The 5 principles of Flemish e-government • What the customer expects from us • What we are planning to do • eID = key to the secure government access door • How the eID can be used • Example of eID use: E-regeren

  3. The 5 principles of Flemish e-government • Accessible = “we lower the barriers as much as possible” • Right-channel access, affordable use • User-centered = “we listen as best as possible to you” • Ask beforehand, measure afterwards • Readable information, useful services • Simplified = “we ask as little as possible more than once” • Once-only data collection, multiple data usage • Streamlined processing, pro-active service offering • Integrated = “we work together as closely as possible” • Sharing data, integrating applications • Shared data sources & essential services • Secured = “we manage & protect your data as best as we can” • Respect for privacy, right to know how it’s used, safe from abuse

  4. What the customer expects from government Accessible User-centered Simplified Integrated Secured lessexpectations from government customer

  5. What government has to do for its customers Accessible User-centered Simplified Integrated Secured moreefforts by government

  6. Front-office is only the tip of the iceberg FRONT-OFFICE Accessible User-centered BACK-OFFICE Simplified Integrated Secured

  7. What we are planning to do • Financing shared essential services • government integration platform (VSB - Vlaamse Service Bus) • authentic government data sources (VKBO and VKBP - kruispuntbanken) • secure government access door (ACM - Access Control Management) • (centralized electronic forms service / electronic payments service) • Providing appropriate support for the constructionand use of the shared essential services • setting up the necessary co-operation platforms • workgroups on data exchange standards, integration competence cell • launching accompanying programs: MAGDA and KANDA • Co-financing Vlaamse Integratie Projecten (VIP) • contribute to the overall goals of Flemish e-government • make good use of the shared essential services

  8. What we are planning to do: now FEDERALGOVERNMENT MVG VOI’s LOCAL GOVERNMENT Flemish portal own website own website own website own website own website own website UME front- office front- office front- office front- office front- office front- office front- office front- office front- office information services information services information services information services information services information services information services information services information services KSZ RR back- office back- office back- office back- office back- office back- office back- office back- office back- office KBO

  9. What we are planning to do: later FEDERALGOVERNMENT FLEMISH MINISTRIES FLEMISH IVA’s Rp & EVA’s LOCAL GOVERNMENT ACM PKI Flemish portal own website own website own website own website own website own website UME front- office front- office front- office front- office front- office front- office front- office front- office front- office information services information services information services information services information services information services information services information services information services KSZ RR back- office back- office back- office back- office back- office back- office back- office back- office back- office KBO VSB VKBO VKBP

  10. What we are planning to do: later FEDERALGOVERNMENT FLEMISH MINISTRIES FLEMISH IVA’s Rp & EVA’s LOCAL GOVERNMENT ACM PKI Flemish portal own website own website own website own website own website own website UME front- office front- office front- office front- office front- office front- office front- office front- office front- office information services information services information services information services information services information services information services information services information services KSZ RR back- office back- office back- office back- office back- office back- office back- office back- office back- office KBO VSB VKBO VKBP

  11. Accessing authentic government data sources CRAB (AGIV) KBO RR KSZ authentic data sources (federal social security) authentic data sources (regional policy domainEWBL) authentic data sources (regional policy domain WVC) VKBO VKBP VSB Flemishgovernment entities

  12. Secure government access door (ACM) • Takes care of: • authentication • offer the user the possibility to prove who he/she really is • identification • find out about the user who he/she really is • authorisation through identity management • access: give the user access to certain information & services • use: allow the user to do something with that information & those services • single sign-on + personalisation • give the user access to multiple information & services by authenticatinghimself/herself only once + adapting the available offer to his/her profile • E-government information sources and services • avoid the cost of building own secure access door • are prepared for future technological evolutions

  13. Secure government access door (ACM) 6. If authentication OK, receive identity data: rijksregisternummer (RRN) 5. Send authentication data username+ password 2. Authenticate user at security level X 7. Have authenticated user, here are his/her identity data federal token 1. Log in on website to gain access to Information or service 3. Choose authentication method and identify yourself federal eID 8. Please come in 4. Give authentication data federal eID + biometry federal authentication and identity data Flemish government website ACM

  14. Secure government access door (ACM) • Advantages: • reliable authentication and identification of the government customer • all the problems of authentication and identity management, i.e. • physically delivering the federal token / electronic identity card (eID) • providing a helpdesk for solving user problems during delivery or use • eID: management of the electronic certificates (validation / revocation) are “outsourced” to the federal government • Disadvantages: • citizen needs to have a federal token or eID to get in • the application being accessed needs to have the legal authorisation to use the rijksregisternummer (RRN), i.e. comply with privacy rules • get permission, appoint security consultant, get legally covered, … • the application being accessed needs to be capable of using the RRN, i.e. the RRN has to be used as the unique identifying key

  15. How the eID can be used by citizens • What will become possible? • building e-government applications that require a secure access and that need to know and be able to use the identity of the citizen • both inside the Flemish portalas on Flemish governmentwebsites outside the portal • Examples: • applying on-line for DNA-cheques without prior paper-based registration procedure • applying on-line for study support by parent or students

  16. How the eID can be used by civil servants • What will become possible? • provide selective access to information and services • based on the roles or theproperties of the civil servant • requires identity management • know and be able to use the identity of the civil servant • both inside the Flemish portalas on Flemish governmentwebsites outside the portal • Examples: • offer Vlimpers as a HRM tool to external IVA’s and EVA’s • provide TGV as internal phone directory to civil servants from external IVA’s and EVA’s

  17. How the eID can be used by user groups • What will become possible? • provide selective access to information and services • based on the roles or theproperties of the specific user • requires identity management • know and be able to use the identity of the user • both inside the Flemish portalas on Flemish governmentwebsites outside the portal • Examples: • make Vaccinnet accessible toall Flemish pediatricians • make the Mest TransportInternet Loket accessibleto all Flemish farmers

  18. E-regeren: preparation government agenda Legistic advice Council of State Draft memo for government E-regeren Server I.F. Draft Legistic advice C.o.S SERV I.F. SERV Budget Budget

  19. Consultations and negotiations E-regeren Server E-regeren Server Draft Legistic advice C.o.S I.F. SERV • Consultations • Negotiations Budget Draft C.o.S I.F. SERV Budget

  20. Negotiations E-regeren Server Draft C.o.S Final. IKW I.F. SERV Budget

  21. Agenda & Archiving Minister-President Digital signing with EID C.o.S Chancellery Final. SERV Archive Documents & Minutes I.F. Budget Flemish government

  22. Government & Parliament Flemish parliament Flemish government Digital signature enables saving paper (and money)… …at least when there is some discipline when it comes to printing

  23. ..to boldly go… EID makes things possible : • We know the identity of the people talking to us • We can provide them with sensitive information • We can allow them inside our data and applications • We can define their roles as citizens, civil servants, lawyers, doctors, accountants… • Citizens can allow us to collect data for them • Citizens can digitally sign documents and applications Do we really want the government to use data mining ? For our “rights” only, or also for our “civic duties”?

  24. …where no man has gone before • Our wish list • Solve the remaining problems with the distribution of the EID’s • Antwerp • Activitation of the certificates • Out of the box use of EID in email, office software, … • Co-signing with 2 EID’s or more • Can a child get or give acces to the family composition of his parents? • EID’s for foreigners and for Belgians living abroad

More Related