...
Obtain an accurate situation point on the current status of e-SENS eID BB integration on the OpenNCP V2.4.0;
Propose a plan for next activities regarding e-SENS eID BB integration on the OpenNCP (without being limited by March 2016 - end of e-SENS, if not extended);
- [Post Pone to next meeting] Discussion on regarding the eID and CEF articulation. CEF eID DSI, CEF eHealth DSI (not time sensitive)
- Next Steps
Location:
- AdobeConnect:
...
LEVEL | Description | BB Dev STATUS | OpenNCP Integration Status | Open Issues | ||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Level 0 – manual input of ID – traditional epSOS | This is the most basic level of identification. It only requires the Health Professional to identify the patient by requesting his/her ID, and enter it manually in the system. This is the approach used in the epSOS pilot. The main advantage of this level is in an emergency setting where no other method of identification and authentication is available. |
|
|
| ||||||||||||||||||||
Level 1 – Passive read of eID token – e-SENS LARMS | This level requires the existence of an eID token, usually this token is a smart card. The token has identification attributes that can be publicly read. In the eSENS project the asset used provide this level is the e-SENS Local Attribute Mapping and Retrieval Service (LARMS). This level is safer than the previous, because of the input of the identification is automatic and not manual. |
|
|
| ||||||||||||||||||||
Level 2 – Localy signed eID with token – e-SENS LAM | This level also requires the existence of an eID token, as the previous on, but this token has to be capable of patient authentication, usually by entering a PIN code. In the eSENS project the asset used provide this level is e-SENS Local Authentication Module (e-SENS LAM) with the Digital Signature Add-On (DSig). Signing of a patient consent is made possible with the introduction of this level. This level is safer than the previous, because the introduction of the identification attributes is authenticated by the patient. In this level, as well in the previous ones, a network connection is not needed. The inexistence of a network connection, and thus the connectivity to a PKI (Public Key Infrastructure) to validate this authentication is a liability, which, however, can be mitigated by the signature and certificate validation performed through the ACS in country-A. Consequently, it is possible to issue a mismatched data disclosure request (e.g. signing with a certificate of someone else) or using an irregular certificate (e. g. suspended) in country-B but it should not be able to successfully pass ACS inspection in A. |
(maintenance) |
1st Step:
2nd Step:
| Issues identified on:..... | ||||||||||||||||||||
Level 3 – Localy signed eID with realtime validation – LAM+ | This level has the same functionality of the previous, but with the availability of a network connection and connectivity to the required PKI infrastructures. This level mitigates the liability introduced in the previous level. So the validation of the authentication of identification and patient consents is possible.- Full advantage of having access to Country A to validate the identification and signature of certificates. |
Ready but not yet Released. |
| - Codification of attributes, with STorK and eIDAS there is a limitation on the attributes can be coded (Doctor name), that causes loss of semantic on the exchange of the information. - Wow can the eIDAS token support this requirements? "http://www.futureid.eu/attributes/common/cardIssuerCountry":"it", "http://www.futureid.eu/attributes/cardType":"it-cns", "http://www.futureid.eu/attributes/common/healthInsuranceId":{"urn:oid:1.2.3.4.5.6.7.8.9":"030225BM526"}, "http://www.stork.gov.eu/1.0/surname":"INCONTATTOZERO",
| ||||||||||||||||||||
Level 4 – Distributed Cross-Border Authentication (DCA) | This level introduces the e-SENS Authentication Broker, that is leveraged by the STORK 2.0/ eIDAS infrastructure. All authentication and authorisation activities are fulfilled outside of the local environment based on an initial authentication information acquired locally from an eID token. |
|
| Access to Stork 2 instance (DE is not part of the system)
For sake of integration, can we work with a citizen from a different nationality with a Stork 2 system running.
| ||||||||||||||||||||
Level 5 – Virtual eID (mobile eID) | This level leverages the previous by giving the possibility of authentication and authorisation on without the need of a physical eID token, just using a mobile app a smartphone with a virtual token, specifically developed for this. |
|
|
|
...
...
...
- ....
- Biweekly meeting:
- 16:00 CET
- 16:00 CET
- Other e-SENS / EC relevant meetings to follow/attend:
- ....
- e-SENS workshop 4th and 5th February;
- Webinar on 9th February - Consolidation strategy for the different solutions; AliceV: invite the group to attend;
- Biweekly meeting:
- What can be tested?
- December: we tested the eID, but the Change Proposal was not delivered in time.
- February: DG Sante is taking over the the CP that can be incorporate in the Specifications;
- April:
- eID Level 3;
- More MS testing the eID;
- Who's willing to attend?
- To early to answer...
- What can be tested?