Digital Identity Management: Enabling Innovation and Trust in The Internet Economy
Digital Identity Management: Enabling Innovation and Trust in The Internet Economy
Digital Identity Management: Enabling Innovation and Trust in The Internet Economy
2011
DIGITAL IDENTITY MANAGEMENT
The OECD is a unique forum where governments work together to address the
economic, social and environmental challenges of globalisation. The OECD is also
at the forefront of efforts to understand and to help governments respond to new
developments and concerns, such as corporate governance, the information
economy and the challenges of an ageing population. The Organisation provides a
setting where governments can compare policy experiences, seek answers to
common problems, identify good practice and work to co-ordinate domestic and
international policies.
The OECD member countries are: Australia, Austria, Belgium, Canada, Chile,
the Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary,
Iceland, Ireland, Israel, Italy, Japan, Korea, Luxembourg, Mexico, the Netherlands,
New Zealand, Norway, Poland, Portugal, the Slovak Republic, Slovenia, Spain,
Sweden, Switzerland, Turkey, the United Kingdom and the United States. The
Commission of the European Communities takes part in the work of the OECD.
© OECD 2011
Cover image: © kentoh – Fotolia.com
No reproduction, copy, transmission or translation of this document may be made
without written permission. Applications should be sent to OECD Publishing:
rights@oecd.org
FOREWORD – 3
Foreword
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
4 – FOREWORD
identity management, what are some illustrations of its usage and what are
the main policy considerations. The discussions in the WPISP to address
these fundamental questions revealed that much of the complexity
surrounding digital identity management was generally related to the variety
of facets of the subject matter (technical, organisational, legal, economic,
policy), to the differences of perceptions between experts with different
cultures and perspectives, and to an overarching confusion with respect to
terminology.
Finally, the “Report of the OECD Workshop on Digital Identity
Management” (Annex 3) summarises the discussions that took place at the
very beginning of this process in the above-mentioned workshop which
brought together various experts to explore the main policy issues
surrounding digital identity management.
These reports have been developed by the OECD Working Party on
Information Security and Privacy (WPISP) and declassified by its parent
body, the Committee for Information, Computer and Communications
Policy (ICCP) between 2007 and 2011. They benefited from input by
member countries and by the Business and Industry Advisory Committee
(BIAC), Civil Society Internet Society Advisory Council (CSISAC) and
Internet Technical Advisory Committee (ITAC). They built on the expertise
of the WPISP in the area of electronic authentication since 1998 and, more
generally, on its work on security of information systems and networks and
privacy protection.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
TABLE OF CONTENTS – 5
Table of contents
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
GUIDANCE FOR GOVERNMENT POLICY MAKERS – 7
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
8 – GUIDANCE FOR GOVERNMENT POLICY MAKERS
Back in the mid 1990s, in the early days of the World Wide Web, the
capacity for anybody connected to the Internet to access information, simply
by clicking on hyperlinks, was revolutionary. However, within the span of a
few years, another revolution took place: the possibility for individuals to
establish interactions with remote computer systems which were able to take
into account who they are in order to deliver information and services in a
personalised manner.
This evolution of the Web from a publishing medium to an interactive
platform for the delivery of personal services enabled electronic commerce,
electronic government, and many other rich and diverse online interactions,
from electronic health and electronic learning to social networks and the
broader participative web. The possibility for individuals to establish a
personalised interaction with, and to be recognised by, a remote computer
system has been a major step. It has ushered in a decade of innovation,
enabling Internet services to become pervasive, ubiquitous and increasingly
essential in everyday life. It has transformed our economies and societies,
serving as a building block for the Internet economy.4
How does digital identity management work?
The management of digital identity enables trusted remote interactions
between an organisation and an individual.5 Managing the digital identity
lifecycle generally involves several processes6:
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
GUIDANCE FOR GOVERNMENT POLICY MAKERS – 9
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
10 – GUIDANCE FOR GOVERNMENT POLICY MAKERS
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
GUIDANCE FOR GOVERNMENT POLICY MAKERS – 11
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
12 – GUIDANCE FOR GOVERNMENT POLICY MAKERS
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
GUIDANCE FOR GOVERNMENT POLICY MAKERS – 13
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
14 – GUIDANCE FOR GOVERNMENT POLICY MAKERS
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
GUIDANCE FOR GOVERNMENT POLICY MAKERS – 15
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
16 – GUIDANCE FOR GOVERNMENT POLICY MAKERS
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
GUIDANCE FOR GOVERNMENT POLICY MAKERS – 17
Notes
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
18 – GUIDANCE FOR GOVERNMENT POLICY MAKERS
References
Other
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 19
Annex 1
© OECD 2011
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
20 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
Key findings
Vision: the main objectives for national IdM strategies are to realise
e-government, to foster innovation in public and private e-services
and strengthen cybersecurity.
For most countries, the overarching objective or vision for the
development of a national IdM strategy is the realisation of electronic
government. In addition to e-government, most countries also aim to foster
innovation in the broader Internet economy, either explicitly or implicitly,
either immediately or in the longer term. Two countries consider cyber-
security as the fundamental objective for their strategy rather than e-govern-
ment and/or the development of the broader Internet economy. Although
their vision has a different focus, the strategy of these two countries does not
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 21
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
22 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 23
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
24 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 25
Introduction
In November 2009, the OECD Secretariat circulated a questionnaire (cf.
Appendix III) to delegations of the Working Party on Information Security
and Privacy (WPISP) to gather information on their national strategies and
policies for digital identity management. The main objectives were to
illustrate and supplement the information provided in the report developed in
2008-2009 on The Role of Digital Identity Management in the Internet
Economy: A Primer for Policymakers (hereafter “Primer”).”2 It also sought to
analyse the commonalities and differences in national strategies for IdM3, in
policies for the implementation of these national strategies and in the
challenges faced by governments.
Eighteen countries responded to the survey: Australia, Austria, Canada,
Chile, Denmark, Germany, Italy, Japan, Korea, Luxembourg, the Netherlands,
New Zealand, Portugal, Slovenia, Spain, Sweden, Turkey and the United
States4. Respondents represent a good balance in terms of geography, popula-
tion size, layers of government, diversity of cultures and styles of government.
They also represent a sample of different stages of advancement with respect
to development and implementation of IdM strategies, from preliminary
reflection or early development stage to full deployment.
Following the analysis of the responses, Appendix I includes country
summaries that have been developed to facilitate the analysis and provide a
digest knowledge base enabling further exploration of each country’s
approach. These summaries are based on responses sent by countries5 as well
as additional research carried out by the Secretariat6. Resources used to
prepare this report and cited by responding countries are listed, per country, at
the end of this report. Appendix II includes a contribution by the Internet
Technical Advisory Committee (ITAC) to the ICCP Committee in relation to
digital identity management.
The scope of this report is limited to the management of digital identity of
natural persons. With a view to ensuring a manageable output, the scope does
not include specific aspects of digital identity management related to foreign
nationals or to individuals as representatives of businesses and other
organisations, cross-border aspects of identity management7, and other issues
such as the specific aspects of identity management frameworks for businesses
or the deployment costs of digital identity management frameworks. When
information on these dimensions has been provided by respondents, it is
reflected in the country summary. It is however not taken into account in the
analysis.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
26 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
Analysis
Vision
All responding countries have developed, are developing or are
considering the development of a national IdM strategy. They are at various
stages of development and implementation.
Although all responding countries have initiated action with regards to
digital identity management, they are at various stages of development and
implementation of their strategy (cf. Table A1.1). Some are considering the
development of a strategy (Japan8) or have started to develop it (Chile, United
States), some are finalising the development of their strategy (Canada,
Luxembourg, Slovenia), some are initiating its implementation (Australia,
Germany), some are following up on an initial experience (Denmark), some
are quite advanced in the deployment of the main components of the strategy
(Italy, Korea, Portugal, Spain, Sweden) and others are already operating a
fully deployed strategy (Austria, Netherlands), and are continuously
improving it.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 27
Table A1.1 Estimated status of National IdM Strategy development and implementation
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
28 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 29
Scope
National IdM strategies provide a framework within which participants
can innovate.
IdM strategies aim to facilitate the generalisation of stronger electronic
authentication thus enabling new public and private sector services (see
Benefits section below) to be offered. The strategies aim to use the
e-government side of their strategy to modify the current strong
authentication market’s status quo which deters the deployment of online
services carrying a higher level of risk and which are also likely to have a
high value.
Strong authentication mechanisms are expensive for service providers to
deploy. Strong authentication can only be more generally adopted if the
required investment by a majority of service providers is not too high and
exponential network growth starts to appear to create a critical mass.
However, market players do not know which strong authentication
mechanism will ultimately initiate this network effect. As a result, they are
caught in a circular (or “chicken and egg”) situation whereby, on the one
hand, service providers are waiting for a critical mass of users to be
equipped and informed to use strong authentication in order to start
investing in new services that require it and, on the other hand, users are
waiting for a critical mass of services that require strong authentication in
order to adopt the technology. National IdM strategies can be seen as an
attempt by governments to break this circular problem by generating a
critical mass of users and services through e-government services (and
sometimes by distributing digital credentials themselves to the population)
and by providing a degree of harmonisation for digital identity management
at a national level that reduces uncertainty for online service providers
regarding what mechanism to offer to benefit from a network effect.
The scope of IdM strategies always encompasses public sector online
services. Some countries favour a “universal approach”, i.e. encompassing
public/private sector use of credentials to support the broader Internet
economy. Others plan to extend the use of public sector digital credentials to
the private sector – or digital credentials’ framework. Most countries
recognise the leadership role of the government for the generalisation of
better digital identity management in the Internet economy. Government
single sign-on services are only available or anticipated for public sector
services, except in two countries where it also includes (or will include)
private sector services.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
30 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 31
Table A1.2. Scope of national IdM strategies with regards to public/private use of
credentials
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
32 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 33
Benefits
National IdM strategies aim to benefit businesses, citizens and the
government. Strategies are expected to support innovation in the public and
private sectors and to foster usability. Cost reduction and productivity gains
generated by IdM for e-government are also often mentioned. Increased
identity assurance for all participants is expected to foster the development
and use of e-government and private sector services.
Benefits to businesses and governments are mostly economic: cost-
reduction, productivity and efficiency gains. For example, in many cases,
the pooling of authentication mechanisms or the availability of inter-
operability frameworks reduces the cost of developing online services for
smaller agencies and companies which are then able to keep their focus and
resources on their core business. Most IdM frameworks create conditions for
the provision of credentials that enable a high level of identity assurance.
The diffusion of these credentials enables the development of new electronic
services that would not be otherwise possible to offer (innovation). These
include higher risk services such as the creation of a private enterprise
online, including across borders, online car registration, and online crime
reporting (Portugal). Interestingly, the two countries whose vision is focused
on cybersecurity, Australia and the United States mention the reduction of
fraud as another expected benefit for the government, but this is consistent
with their overarching vision (the Netherlands also highlights the reduction
of fraud as a benefit).
Benefits to citizens include the use of new online services that facilitate
their relationship with the government and, more generally, enhanced
convenience and usability of e-government services, for example by
i) limiting the number of credentials users have to manage for their
interactions with the government (e.g. Netherlands, Portugal, New Zealand,
Sweden); ii) recognising a wide range of credentials through a federated
approach (e.g. Canada, United States); iii) deploying national electronic
credentials such as national identity cards or citizen cards (e.g. Austria,
Denmark, Germany, Italy, Luxembourg), in some instances to replace sets of
pre-existing credentials (e.g. Italy, Portugal, Spain); iv) implementing single
sign-on services across government web sites where citizens are only required
to authenticate once – generally on a government one-stop-shop portal or
gateway– to access multiple government services (see Table A1.2). Other
examples include the reduction of the requirements for citizens to provide
documents issued by other agencies in order to benefit from a service (e.g.
Slovenia). In most strategies, a digital signature created using a certificate
issued by an accredited authority12, has the same validity as a handwritten one,
enabling citizens to interact with public services electronically.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
34 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
Main components
Strategies include a large variety of key components.
Table A1.3 provides an overview of the main components of National
IdM Strategies in responding countries.
Many countries provide or plan to provide single sign-on solutions to
access public sector services (see Table A1.2).
One common objective is to reduce the requirement for users to log-in
multiple times to access the various services provided by the same large-
scale organisation (e.g. the public administration when considered as a
single very large enterprise).
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 35
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
36 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 37
Two exceptions may be noted. Germany does not consider single sign-
on to e-government services for transparency reasons: personal data from
online authentications may not be automatically forwarded to third parties.
However tokens for individual single sign-on systems can be provided to the
user on the basis of online authentication. New Zealand developed a Logon
Service where individuals are provided with one set of login/password that
works for all participating government agencies, although they can also use
multiple logons for multiple services if they wish to. Single sign-on is not
currently provided as users have to sign-on to each service, but it could be
proposed in the future through a government portal.
Almost all national IdM strategies aim to reduce or limit the number of
digital credentials that individuals have to use across a large number of
services.
To simplify user experience and reduce costs for service providers,
strategies aim to address the multiplication of credentials end users must
manage to gain access to an increasing number of services online. Most
strategies create a framework to facilitate the management of digital identity
credentials or, more precisely, to promote the use of a limited number of
digital credentials across a large number of services. However, this common
high level objective is achieved through a variety of approaches across
responding countries.
To use a metaphor, most strategies can be seen as aiming to reduce
either or both the number of digital keys or credentials Internet users have to
manage and the number of digital keyholes or gateways they are facing
when they try to access multiple government services online.
Some countries develop innovative public identity services that can be
used by the private sector.
Nevertheless, some countries develop innovative public identity services
that can be used by the private sector to support economic and social
activities. Germany provides an interesting example: although the strategy is a
building block of the 2006 E-government 2.0 programme, it includes the
development of innovative government identity services for public and private
sector use such as long term document safe, registered email with possible use
of pseudonyms and “proof of identity attributes” services whereby users can
send proof of address and age by email. Portugal provides examples of
innovative private sector benefits enabled by its citizen card such as opening a
bank account online, signing private contracts and enabling authentication on
private Web sites or workers assiduity registration.
Most countries have established a digital signature legislative frame-
work and many promote the development of a PKI market.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
38 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
Approaches
Countries follow a migratory approach to identity management rather
than a reengineering one. Governments aim to automate their existing
business processes to reduce cost, improve usability and offer new services.
At present, they do not aim to reengineer these business processes. IdM
strategies are therefore evolutionary, based on adapting and extending
existing identity practices, rather than revolutionary, involving the creation
of something completely new.
In most cases, governments develop digital identity management
strategies which extend existing offline identity management strategies to
the online world. They do not try to reengineer digital identity management
online as if nothing existed before or establish a completely new framework
for digital identity management distinct or separated from existing offline
traditions and processes. Most frameworks build upon the existing means
for identity verification offline and extend or adapt them to the online world.
They tend to minimize the creation of new processes that would imply new
habits for citizens. Thus National IdM Strategies generally follow the
principles of automation, migration and evolution of existing business
processes (see Box A1.1).
For example, countries which have launched an electronic national identity
card generally had a paper based national identity card for offline identity
validation. Their initiatives are often presented to citizens as the migration and
evolution of a paper card to an electronic card, thus enabling more services,
more convenience and reduction of government costs. Spain, for instance, is
migrating and extending its mandatory paper-based identity card to an electronic
identity card which, in addition to providing the traditional offline identity
verification, also enables electronic authentication online. Other similar
examples include Germany, Italy, Luxembourg and Portugal14.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 39
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
40 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 41
Box A1.1. The four stage journey of the migration of services online
The migration of services to an online environment, whether for electronic commerce, electronic
government or any other form of business processing (e.g. intra-enterprise processes), is generally
described as a four-stage journey:
1. Initially, organisations electronically publish information and forms that users can print, complete
and submit in paper format. At that stage, there is no need to modify identity management
approaches that follow the traditional paper-based method. The link between forms and users
continues to be established on the basis of a signature on a paper form.
2. In the next stage, organisations provide a Web interface where forms can be completed online and
submitted electronically. At this stage, some electronic registration method becomes necessary to
link the form to the person or organisation completing it. In complex organisations such as
governments or large firms, different electronic registration methods are often developed in parallel
in the various entities (silos) of the organisation, for example each ministry in a government or
each subsidiary in a multinational enterprise.
As the number of online services increases, the number of electronic registration systems multiply
and their complexity and cost increase. Eventually pressure starts to appear i) to streamline the
development and maintenance of parallel vertical identity frameworks which become a source of
unnecessary expenses and ii) to simplify access for end users who have to create and manage a
growing number of credentials and may get lost in the proliferation of interfaces to access online
services.
3. In the third stage, organisations decide to further automate their business processes. They identify
common identity management elements within each domain and try to rationalise and share them
to the extent possible. They adopt more comprehensive strategies for the management of
identities online. Portals start to appear as well as single sign-on technologies. Organisations try to
increase the number of applications users can access with a single credential.
4. In the final stage, organisations realise that innovative business processes can further reduce
costs, improve users’ experience and create opportunities to introduce new services with
consequences that extend beyond the simple rationalisation of existing processes. This business
process reengineering phase can be considered the final stage of the journey towards electronic
services.
As regards identity management, all respondents have reached, in some area or another, the third
stage of the evolution described above: the automation of pre-existing paper-based business
processes which were established a long time ago15. No respondent has mentioned their intention to
reengineer their business processes to achieve greater cost reductions (the above stage 4). It is likely
that the cost and complexity of business process reengineering on a scale as a broad as the public
administration are such that the automation of existing processes is seen as a necessary preliminary
stage. In addition, the need to maintain –during a transition period– traditional paper-based
infrastructures in parallel with the electronic ones prevents Governments from considering to
reengineer their business processes whilst migrating their services online. Business process
reengineering in the context of electronic government will probably only take place once the citizen
base has fully migrated online and electronic services reach out to the whole population.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
42 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 43
into account the effort and time that has historically been necessary to
implement and operate the existing paper-based card infrastructure on which
the new electronic card deployment will rely16.
One may consider that a good strategic approach should recognise the
specificity of the country, extend to the online world the traditions, tools and
processes with which citizens are used to operate in the offline world, and
improve their efficiency in the online context. Where offline identity
management practices have never been rationalised or centralised
historically, greater complexity is likely to emerge in migration to the digital
world.
A related key conclusion is that there does not appear to be such a thing
as a generic approach to digital identity management that could be applied
regardless of the national context: identity management approaches are
culture specific and cannot be easily transposed or transported directly from
one country to another.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
44 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
Registration policy
National Identity Management strategies are based on either a
centralised or decentralised citizen registration policy.
A citizen registration policy provides the basis for the bond and legal
binding between the individuals and their electronic identity.
One can distinguish countries with a:
• Centralised registration policy generally based on a population
register and, often, on a unique identifier (e.g. number) assigned to
all citizens or residents,
• Decentralised registration policy, where each organisation is
autonomous with respect to its registration policy. Several
registration mechanisms coexist and interoperate within frameworks
established by federation agreements.
Citizen registration policy is influenced by national history. The
development of national IdM strategies has not led countries to reconsider
their pre-existing citizen registration policy for offline identity management.
The choice of the citizen registration policy is likely to stem from many
interrelated factors specific to each country including culture, style of
government and history. Some countries have a longstanding tradition of
maintaining a national population register (Chile, Denmark, Italy, Portugal
and Spain) and identity number (Korea). As noted above, in other countries,
population registers maintained at the local level were centralised (Austria,
Germany) or networked (Netherlands) to be used for online identity
management. In a third group of countries, there is no central population
register and the citizen registration policy is based on a federated or
decentralised approach. For example, each organisation is autonomous
regarding its registration mechanism and adheres to a federation agreement
that provides a trust model enabling interoperability of credentials across
domains and single sign-on (Canada).
Table A1.4. Registration policies
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 45
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
46 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
Interoperability policy
All respondents, regardless of their registration policy, recognise the role
of standards for technical interoperability and market competition and they
encourage the use of widely recognised ones. However, IdM registration
policy influences the level of interoperability that national policies can
prescribe.
For example, in a country with a decentralised IdM citizen registration
policy such as Canada, interoperability is promoted in the context of federa-
tion agreements. The common policy objectives are described independently
of the possible technical solutions to achieve them. Organisations partici-
pating in a federation agreement have the maximum flexibility regarding
how to technically achieve the objectives. In contrast, countries following a
centralised citizen registration policy are likely to adopt a more prescriptive
approach regarding policy and technical choices. For example, the Austrian
government develops and provides open source software modules to
simplify the development of “Citizen Card” compatible online services. In
all cases, however, the role of regional and international standards for
technical interoperability is widely recognised.
Where a specific technical solution is promoted by the government, such
as in Korea with the i-PIN or Turkey with the national card, it is generally
adopted as a national technical standard.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 47
Countries which promote the use of PKI generally support PKI inter-
operability through the establishment of a legal framework with a
supervision mechanism and the recognition of standards (e.g. Korea).
Some countries develop technical infrastructures for interoperability that
include IdM features.
This is, for example, the case with the German Secure Access to
Federate E-Justice/E-government (SAFE) initiative, a technical framework
for interoperable and safe usage of digital identities across administrative
borders (“trust domains”). In Turkey, public bodies can access Identity
Information Sharing System (KPS) through a virtual private network.
Technical infrastructures to promote interoperability in both the public
and private sectors can also be developed by the government, such as with
the Spanish @firma validation platform operated by the Ministry of
Territorial Policy and Public Administration. This platform also aims to
provide validation services across borders, mainly through the EU STORK
project.
Most responses focused on technical interoperability. Few elements
were provided on the scope and scale of changes that might be necessary at
the legal or business process levels to achieve true interoperability across
diverse identity systems, beyond the technical and across the public and
private sectors.
At least two hypotheses might explain the lack of information regarding
aspects of legal or business process interoperability:
• A bias in the survey exercise for example in the formulation of the
questions; and/or
• A confirmation that since governments are essentially automating
existing government business processes, few additional legal and
business process mechanisms are required to support inter-
operability.
Some respondents address interoperability issues within the public
sector through a national e-authentication framework or national inter-
operability framework.
For example, Spain developed a national interoperability framework to
foster interoperability within the public sector. In Australia, the 2008
National e-Authentication Framework promotes the use of secure and
interoperable electronic credentials in citizen- and business-to-government
transactions and aims to assist agencies, jurisdictions and sectors in
authenticating the identity of the other party to a desired level of assurance
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
48 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
or confidence. The framework does not mandate any particular approach but
encourages interoperable e-authentication mechanisms so that individuals
can expect similar authentication processes for transactions with similar
assurance levels across all three tiers of government within Australia. To
reduce cost and increase interoperability, federal agencies are encouraged to
use the authentication infrastructure of designated lead agencies for
government-to-government, business-to-government, or “people-to-govern-
ment” authentication. New Zealand’s e-government interoperability framework
addresses interoperability of IdM systems.
Security policy
Although some respondents provided information on technical security
measures for IdM, few details were provided regarding higher level security
policy specific to IdM. One hypothesis is that IdM security stems from
broader government information security policy and is not specifically
addressed by governments at a policy level. This is, for example, the case in
Australia where IdM security is addressed through the broader 2009
Australian Government Cyber Security Strategy, various legislative and
regulatory security requirements, government standards and security manuals.
Chile is similar in this regard.
An interesting observation is that the central and critical nature of the
IdM function within the broader e-government infrastructure is not
mentioned by respondents as requiring specific policy attention.
Many countries have a policy to promote the use of PKI.
Two groups of countries support PKI: countries which develop citizen
electronic card frameworks (Austria, Germany, Italy, Portugal, Spain) and
countries which develop PKI-based electronic credentials frameworks that
are not necessarily card-based (Denmark, Korea, Luxembourg, Netherlands,
Slovenia, Spain Sweden, Turkey). Most countries have adopted a legal
framework to support PKI which includes supervision of certificate service
providers.
Most countries have a policy to promote the use of digital certificates
both for e-authentication and e-signature. Some also develop or promote
related services such as time stamping (e.g. Portugal).
Few countries, besides Korea (which highlights this as a challenge) and
Portugal, provide details on certificates’ suspension and revocation.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 49
Privacy policy
All countries mention the application of existing legal privacy protection
framework as their main policy tool to protect privacy.
This includes for example the security of personal data, including
sensitive data. Exceptions include Chile, where amendments to the privacy
legislations are expected to address this issue and Turkey, where privacy is
not specifically addressed.
Privacy Impact Assessments (PIA) are sometimes mentioned to be
applied to government IdM systems (e.g. Australia, Canada, Luxembourg,
New Zealand, and the United States). Korea is considering the modification
of its Privacy Act to include an obligation for public agencies to perform
PIA. The Dutch government and the Dutch privacy authority are also
considering PIAs.
The role of the Data Protection Agency (DPA) as a provider of IdM
guidance is sometimes highlighted, such as in Luxembourg, Portugal and
Australia where the Privacy Commissioner issued privacy guidance on PKI.
Several countries mention the importance of data minimisation in
relation to IdM. Government agencies in Canada are encouraged to comply
with a Directive which addresses the proportionality of the personal
information collected and requires the selection of “an appropriate set of
identity data (such as personal attributes or identifiers) to sufficiently
distinguish a unique identity to meet program needs, which is proportionate
to identified risks and flexible enough to allow for alternative methods of
identification, when appropriate”.
Most countries do not consider the use of pseudonyms in their strategy.
Exceptions include Australia, in specific cases such as to protect the
identity of victims of violence, Denmark which is considering it for the
future, and Germany. The Netherlands plans to introduce the use of pseudo-
nyms in its future IdM framework for business.
Privacy challenges and responses are, to a large extent, related to IdM
registration policies.
Central registration policies raise issues related to the use of a central
population register, unique identifiers and, where relevant, national card
frameworks. Challenges include the protection of the number itself, and
mechanisms to prevent its use to match individuals across multiple
organisations where there is no legal basis to do so (unlinkability), inappro-
priate access to the central register database and to data stored on the card.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
50 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 51
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
52 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 53
Notes
1. In the context of this paper, the term “universal” means across the public and
private sectors rather than across countries.
2. See www.oecd.org/dataoecd/55/48/43091476.pdf.
3. In this report, IdM is the abbreviated form of digital identity management. Non
digital identity management is explicitly referred to as “offline identity
management”.
4. In addition, the Mexican government has provided some information. See
Appendix I.
5. Country responses have been posted on the WPISP Delegates’ Workspace.
6. The work on “eID Interoperability for pan-European e-government services
(PEGS)” carried out by the European “Interoperable Delivery of European
eGovernment Services to public Administrations, Business and Citizens”
(IDABC) programme was particularly useful to complement information provided
by European countries.
7. Several European countries mentioned the EU STORK project as a key initiative
in this area.
8. In Japan, the Government has just begun to explore the possible development of
an IT strategy including the establishment of an identity and of a numbering
system to support electronic government.
9. There is a possibility that this consideration results from a bias in the way the
questionnaire was circulated within the governments. This may also be a
consequence of the fact that most countries follow a migration strategy where the
ministry of interior keeps for the electronic national identity card the responsibility
that it had for the paper-based national identity card and where responsibility and
leadership for the electronic aspects are in the hands of the ministry whose
objectives are served by the electronic features (e.g. e-government).
10. For more details, see the country summary for Korea in Annex 1. The Korean
strategy also includes the promotion of the use of PKI with a public sector
infrastructure and measures to encourage the private sector PKI market.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
54 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
11. Denmark plans to extend its single sign-on solution to private sector services in
the future, and at least to semi-public organisations (Railways) and general
practitioners in 2010.
12. Often called “qualified digital signature” or “secure electronic signatures”.
13. Respectively myhelp.gv.at and www.borger.dk.
14. An electronic identity card is also under consideration in The Netherlands.
15. It might however be possible that other government agencies than those involved
in digital identity management are actually undertaking planning for or
implementing significant business transformation that is reliant on the identity
management strategy. This survey has not explored this dimension.
16. Such an assessment, or the methodology for such an assessment, would extend far
beyond the scope of this study.
17. See country summary.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 55
References
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
56 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
58 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
Denmark
• “Danish Country Profile - eID Interoperability for PEGS: Update of
Country Profiles Study”, IDABC, August 2009-
http://ec.europa.eu/idabc/servlets/Doc?id=32303
• “Digital Signature”, National IT and Telecom Agency -
http://en.itst.dk/it-security/digital-signature
• “eID/Authentication/Digital Signatures in Denmark”, 8 July 2008,
Nikolas Triantafyllidis / Charlotte Jacoby, Ministeriet for Videnskab
Teknologi og Udvikling
www.open-
standaarden.nl/fileadmin/os/presentaties/Kop08_pres_Triantafyllidi
sJacoby.pdf
• “PKI for e-Gov. Experiences from Denmark”, Allan Fisher-Madsen,
Devoteam Consulting
www.arpt.dz/Docs/3Actualite/Communication/8-
9_12_2009/Communications/Session2/S2P1eng.pdf
• “eID and Authentication. Presentation for Forum Standaardisatie”,
Mikkel Hippe Brun, Center for Service Oriented Infrastructure,
Danish National IT and Telecom Agency, Copenhagen, 8 July 2008
- www.open-
standaarden.nl/fileadmin/os/presentaties/Kop08_pres_HippeBrun.pdf
• E-government portal - http://borker.dk
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 59
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
60 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 61
Netherlands
• “The Netherlands Country Profile - eID Interoperability for PEGS:
Update of Country Profiles “, IDABC, July 2009 -
http://ec.europa.eu/idabc/servlets/Doc?id=32286.
• “Presentation of DigiD” - www.digid.nl/english
• “DigiD”, presentation by Gerrit Jan van ‘t Eind from ICTU at the
19th WPISP meeting on 4 October 2005
• “List of public sector services using DigiD” -
www.digid.nl/burger/over-digid/wie-doen-mee/
• “The personal records database: for the authorities and for you. The
Municipal Personal Records Database”, Ministry of the Interior and
Kingdom Relations
www.bprbzk.nl/dsresource?objectid=19176&type=org
• “Bergerservicenummer - Frequently Asked Questions” -
www.burgerservicenummer.nl/veelgestelde_vragen/english_faq
• “eRecognition for Companies”
www.eoverheidvoorbedrijven.nl/afsprakenstelseleherkenning/englis
h/english.html
New Zealand
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
62 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 63
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
64 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
United States
• “Cyberspace Policy Review - Assuring a Trusted and Resilient
Information and Communications Infrastructure”, 2009
www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review
_final.pdf
• “National Strategy for Trusted Identities in Cyberspace. Creating
Options for Enhanced Online Security and Privacy”, Draft, 25 June
2010 - www.dhs.gov/xlibrary/assets/ns_tic.pdf
• “Identity Management Task Force Report 2008”, National Science
and Technology Council (NSTC) -
www.biometrics.gov/Documents/IdMReport_22SEP08_Final.pdf
• “Report to the President on Identity Management Strategy”,
National Security Telecommunications Advisory Committee
(NSTAC), 2009
www.ncs.gov/nstac/reports/2009/NSTAC%20IDTF%20Report.pdf
• “Federal Identity, Credential, and Access Management (FICAM),
Roadmap and implementation Guidance”, CIO Council, version 1.0,
10 November 2009
www.idmanagement.gov/documents/FICAM_Roadmap_Implementa
tion_Guidance.pdf
• Federal Information Security Management Act (FISMA) -
http://csrc.nist.gov/drivers/documents/FISMA-final.pdf
• NIST Standards
− “Electronic Authentication Guideline”, NIST SP-800 63, April
2006
http://csrc.nist.gov/publications/nistpubs/800-63/SP800-
63V1_0_2.pdf
− “Recommended Security Controls for Federal Information
Systems”, NIST 800-53, Revision 2
http://csrc.nist.gov/publications/nistpubs/800-53-Rev2/sp800-
53-rev2-final.pdf
− “Guide for the Security Certification and Accreditation of
Federal Information Systems”, NIST SP 800-37
http://csrc.nist.gov/publications/nistpubs/800-37/SP800-37-
final.pdf
Other
• Kantara Initiative - http://kantarainitiative.org/
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 65
Appendix I
Country summaries
Australia
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
66 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
mine border and citizenship controls. The Strategy aims to develop standards
for registration and enrolment, security for proof of identity documents,
integrity of identity data, electronic authentication and biometric inter-
operability.
A key component of the Strategy is the development and
implementation of a national Document Verification Service (DVS), a
secure electronic, online system that can be used to check the validity of
documents presented by clients as proof of identity documents in real-time.
The DVS enables government agencies to check if a document has been
issued by the issuing agency, if the details recorded on the document
correspond to those held in the issuing agencies register, if the document is
still valid (i.e. has not been cancelled or superseded), and if it has not been
lost or stolen. The DVS may provide a useful tool to facilitate online
enrolment.
The Strategy benefits from high-level leadership. It was adopted by the
Council of Australian Governments, an entity chaired by the Prime Minister
which comprises State Premiers, Territory Chief Ministers and the President
of the Australian Local Government Association and which initiates, develops
and monitors the implementation of policy reforms that are of national
significance and require co-operative action by Australian governments.
The Australian strategy is based on a decentralised registration policy:
there is no unique national identifier for Australian citizens, identity
credentials are issued for specific purposes by each agency. Agencies are
encouraged to follow a National e-Authentication Framework. The
Australian Government has also agreed to a lead agency model for the
provision of authentication services.2 The current approach focuses on face-
to-face enrolment with some services available online following registration.
Single sign-on to enable access by citizens to multiple government Web
sites without repeatedly signing in is envisaged as part of the Australian
e-government Strategy to access Federal Government Information and
Services. This is to be available via australia.gov.au, the main gateway to
government information across jurisdictions.
With respect to relationships between the public and the private sectors,
on one hand, the DVS has been designed to be accessible by Australian
Government, State and Territory agencies, and potentially by the private
sector. On the other hand, and in the context of the above-mentioned lead
agency model, two interrelated initiatives have been launched to enhance the
security, simplicity and cost-efficiency of business to government trans-
actions:
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 67
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
68 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 69
Challenges
• In lack of a single national identifier, a key challenge is how citizens
(and others) might enrol online to access services and benefits with
an acceptable level of confidence about a person’s identity. One
issue to be addressed is to what extent information, including that
relating to transactions, might be utilised to enable greater
confidence in claims about identity. Australia’s DVS may provide a
useful tool in this regard and help to facilitate online enrolment.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
70 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
Austria
The national IdM strategy provides a framework that enables public and
private bodies to develop “Citizen Cards” that individuals can use as a
means for qualified electronic signature, sector-specific identification and
representation. Citizen Cards are issued by various bodies and can be used
in public and private sector contexts. The framework is based on a
centralised registration policy relying on national identifiers but includes
robust privacy protection technical measures that prevent linkability based
on the identifier. The IdM strategy also includes single sign-on to
e-government services.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 71
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
72 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 73
Challenges
A key challenge for the development of the strategy is the mode of co-
operation between all stakeholders involved in the Strategy as all levels of
the public administration as well as private sector participants have a role to
play and no one is in a position to provide binding instructions to the others.
In 2005, the Federal Platform Digital Austria was founded to help
co-ordinate a uniform e-government strategy. The platform involves public
administration bodies at all levels, i.e. federal, provincial, municipal and
local levels as well as businesses. All projects, strategies and guidelines,
including the IdM strategy, are collectively planned, discussed, agreed and
implemented in a co-operative and voluntary manner. This is a key success
factor for Austrian e-government initiatives. As there is no national
authority which has the competence to give binding instructions to all of the
involved institutions, co-operation takes place on a voluntary basis, and
recommendations from the Platform have therefore to be agreed upon during
in-depth discussions amongst all stakeholders.
The main implementation challenges include interoperability, in
particular at the cross-border level, as well as usability and acceptance
issues:
• To facilitate technical interoperability, the government promotes the
use of widely adopted standards and provides open source modules
to be integrated to online applications9. Use of foreign electronic ID
is possible in Austria if “the application is provided with a qualified
electronic signature which is linked to an equivalent electronic
verification of that person’s unique identity in his or her country of
origin.” Tokens of eleven countries have been decreed by the
Federal Chancellor as electronic IDs equivalent to a Citizen Card
token. Austria’s participation in the European STORK project aims
to address issues related to cross-border interoperability, in
particular where e-IDs are not based on qualified signatures10.
• To increase usability, the Austrian solution is based on technologies
that do not require users to install software on their computer, a
important point for individuals who do not use their card often.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
74 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
Canada
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 75
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
76 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 77
Criminal Code and its new identity-related offences is also an element of the
legislative framework.13
A set of policies, directives and standards support security, privacy and
interoperability of identity management between federal institutions. 14 One
example is the Privacy Impact Assessment Policy15 which requires that
privacy principles are taken into account when there are proposals for, and
during the design, implementation and evolution of programmes and
services that raise privacy issues. Institutions must include the results of the
Privacy Impact Assessment (PIA) in the body of the submission or the
project brief, where applicable, to get the Treasury Board’s approval for
their project, including a summary of the actions taken or to be taken to
avoid or mitigate the privacy risks, if any, as per the Privacy Impact
Assessment. The use of PIAs in the private sector is recognised as a useful
tool for the development of IdM systems although it is not a requirement
under PIPEDA. Another example is the Directive on Identity Management16
which addresses proportionality of the personal information collected and
requires federal government departments to select “an appropriate set of
identity data (such as personal attributes or identifiers) to sufficiently
distinguish a unique identity to meet programme needs, which is
proportionate to identified risks and flexible enough to allow for alternative
methods of identification, when appropriate.” It remains a departmental
responsibility to define the necessary amount of personal information (i.e.
identity data) and the level of assurance required. Finally, the Directive on
Social Insurance Number which restricts the collection, use and disclosure
of this identifier by a government organization is also relevant17.
IdM systems will be monitored according to the Treasury Board
Secretariat (TBS) Management Accountability Framework18 which sets out
the Treasury Board’s expectations of senior public service managers for
good public service management. Federal departments’ performance would
be monitored according to the requirements set out in the Directive on
Identity Management.
It is the responsibility of each federal institution to inform users of the
benefits and risks, and of any incidents, within the existing Policy of
Government Security and Guideline for Privacy Breaches19.
Challenges
The main challenges relate to inconsistencies between the various
jurisdictions with respect to: i) legal issues regarding accountability, liability
and privacy, as there is no broadly accepted framework that directly
addresses identity management; ii) language requirements, as the federal
government is required to use both official languages whereas not all
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
78 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
Chile
The IdM strategy of Chile is based on the migration of the current paper
based national identity card to an electronic card20. The planned card is seen
as a driver for innovation. The current practice relies on the wide use by
public and private sector bodies of a national identity number established in
1969, originally for tax purposes. Electronic authentication based on this
number associated to a password is common practice in Chile. In the health
sector, biometric fingerprint identification is also available although not
extended to the whole health system.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 79
Challenges
The main current challenge is the incorporation of enhancements to the
identity card and passport. These include improving safety standards and the
incorporation of a chip including both a protected area and an open area
where personal data could be stored. The new identity card is expected to be
operational by 2012.
Denmark
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
80 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 81
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
82 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
Challenges
The main challenges faced for the development of the strategies are:
i) the need to invest resources to select or develop the most appropriate
standards and technologies is a challenge in an area where the technologies
and concepts are not yet mature; ii) the difficulty to attract resources as IdM
is often considered as a minor issue in most digital projects; iii) the lack of
knowledge about IdM in government agencies, challenging the establish-
ment of a dialogue with experts on the development of IdM initiatives;
iv) confusion regarding cross-organisational IdM versus intra-organisational
IdM that confuse stakeholders.
Implementation challenges include the involvement of many govern-
ment agencies, local governmental organizations, and their IT suppliers,
stakeholders’ learning curve to integrate IdM solutions in their applications,
interoperability issues related to digital signature, in particular regarding trust
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 83
and liability on the legal side and semantics and standards on the technical
side.
Germany
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
84 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 85
The implementation of the SAFE concept started in 2009 for e-justice with
production rollout scheduled in 2010. SAFE is based on OASIS and W3C
standards. It is a platform independent framework which is open to various
registration and authentication methods. It will be brought into the European
Commission’s project “Distributed Identity Management” (DIM) as a
baseline for implementing an authentication system in the future EU E-
Justice Portal.
Legal privacy protection is provided by the Federal Data Protection Act
which implements the EU Directive 95/46/EC. The government followed a
“privacy by design” approach for the development of the nPA and privacy
protection is seen as a key feature of the card framework.
The nPA provides several important security and privacy protection
mechanisms: i) the Internet authentication function is restricted to services
that have been awarded special “entitlement certificates” beforehand,
thereby providing a high level of assurance to the individual regarding the
identity of the connected service; ii) attributes are provided upon users’
consent and only when they match a predefined list of attributes included in
the provider’s entitlement certificate, thus offering a proportionality
mechanism. In addition, users are able to check off the transfer of certain
data. iii) the provision of data from the card is protected by a mandatory user
PIN and strong end-to-end encryption secures the exchange of data; iv) data
fields provided by the card include pseudonym and yes-no responses
regarding age limit and address information; v) consistent with the
interdiction of a unique identification number, it is explicitly forbidden to
use the document number included in the card as an identifier; and vi) the
card contains a set of attributes including biometric data (digital image and,
optionally, two fingerprints) that enable to use it as a travel document within
the EU. However, biometric data will be technically secured to be used only
in specific authorised contexts (e.g. border control), excluding e-
authentication.
The use of a contactless RFID chip for nPA has raised concerns in
Germany. A special protocol has been designed and internationally
standardised to enable secure communications from the card terminal to the
nPA.
Auditing controls are foreseen through certification procedures for
hardware and software components. The data protection framework,
including supervision by the privacy regulator, applies to the electronic
identity card.
Information regarding the benefits and risks of the IdM system are
provided to users upon registration. A hotline is available for users who
have lost their ID card.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
86 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
Challenges
Challenges highlighted by Germany include open infrastructure
character, security, privacy, usability and the need for an interdisciplinary
approach (technology, organisational, law).
Italy
The Italian national strategy for IdM is based on the migration of the
existing paper-based national identity card to an Electronic Identity Card
(EIC) intended for all citizens and on a National Service Card (NSC) which
aims to satisfy specific e-government needs. Both cards have similar and
compatible electronic features which enable electronic authentication to
e-government services, and, optionally, digital signature. However, the
service card, which is developed by regions and municipalities do not
include physical security features required by a national card used for offline
identity verification. The Italian strategy is based on a centralised policy
where registers maintained by municipalities are centralised at national level
and the fiscal code is a unique identifier across public sector databases.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 87
have to accept the EIC card although they can provide other means of e-
authentication such as with the NSC or other mechanisms. Some regions
have distributed NSCs under another name (e.g. “Carta Regionale dei
Servizi” in Lombardy).
Interoperability between the two cards is ensured by way of a common
set of requirements issued by the Ministry of Internal Affairs. For example,
an NSC issued by a region can be used to authenticate online services
offered within that region and services offered by national public sector
bodies. Both cards hold a digital certificate for authentication and can
optionally hold another certificate for electronic signature. Users have to be
equipped with a card reader and dedicated software to use the card. The
delivery of cards requires the physical presence of the individual. The cards
enable standard services provided by national or local authorities in full
autonomy. They also enable services that require further data to be uploaded
onto the card by municipalities.
A key characteristic of the Italian context is the large degree of
autonomy of the various layers of public administrations, from the national
government to municipalities including provinces and regions. While the
central state has full competence in relation to technical co-ordination of
administrative data and thus designs ICT standards to be used at national
and local levels, regions, in matters where they have competence, have
decision power over the creation and implementation of applications and
platforms. Regions, provinces and municipalities are autonomous in the
development of e-services, following centrally adopted standards. Thus
co-ordination is a key challenge, taken up at national level by the National
Agency for Digitization of Public Administration – DIGITPA (former
National Centre for IT in the Public Administration – CNIPA) which is
attached to the Prime Minister.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
88 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 89
Challenges
The large degree of autonomy of many Italian public administrations,
whether jurisdictional (regions, cities) or sectoral (e.g. health) creates a key
governance challenge for a system mostly aimed at interoperability and a
model of shared technical rules. Another challenge is raising awareness of
citizens which is seen as an opportunity to address the relationship between
e-government IdM and the private sector.
Korea
The Korean strategy is based on a dual public and private sector PKI for
the provision of digital credentials to individuals and on the establishment of
a technical framework (i-PIN) to better protect the online use of the national
register number and enhance Internet users’ responsibility while preserving
freedom of speech. The broad adoption of digital certificates is promoted by
a policy or recommendation to use them for Internet banking, online stock
trading and online shopping transactions above USD 260. Both PKI and i-
PIN are based on a centralised registration policy relying on the Resident
Registration Number.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
90 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
In this context, since 1999 the Korean IdM Strategy encourages the use
of digital credentials based on PKI and, since 2005, of a secure digital
identifier, the i-PIN. Both components of the Korean IdM strategy are based
on a centralised registration policy relying on the RRN.
The promotion of digital credentials by the governments is based on:
• Two Public Key Infrastructures: the National PKI (NPKI) which
enables the use of digital certificates for private sector transactions
and the Government Public Key Infrastructure (GPKI) for
transactions within the public sector.37
• The recommendation to use digital certificates (NPKI) for any
financial services such as Internet banking, online stock trading and
online shopping transactions above USD 260.
In parallel, the government developed a secure online identifier system,
the i-Personal Identification Number (i-Pin) to respond to a double
challenge: i) the overuse of the RRN online without appropriate protection
which led to a considerable increase in identity theft. The i-PIN aims to
provide a means for secure identification of individuals online based on the
RRN but without compromising it; ii) growing concerns that emerged
regarding an increase in privacy violations, defamation, cyber violence, and
offenses online. While recognizing the considerable benefits of the Internet
for the individuals and the Korean society, a heated debate took place in
2002 about how to tackle negative consequences of aggressive behaviour
online. Ultimately, the Parliament voted almost unanimously for the
development of an identity verification framework which aims to prevent
Internet users from abusing online anonymity by imposing some
responsibility on users38. The i-PIN is the key component of this framework
as it provides a simple and secure way to reveal the identity of a user
without requiring such identity to be exposed to the public.
The i-Pin system provides a high degree of certainty to the web site with
respect to the identity, age and gender of the end user without compromising
the RRN while still using it as a key element for identification, and without
requiring the real identity of the user to be exposed to the public.39 It can be
used to access e-government services. It has to be used for private sector
web sites with a minimum of 100 000 visitors per day.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 91
and the 2002 E-government Act for the promotion of governmental digital
certificates.
NPKI certificates are issued by five private sector accredited Certificate
Authorities (CA) and GPKI certificates by the Ministry of Public
Administration and Security (MOPAS). Korea Internet & Security Agency
(KISA) is the Root CA. NPKI certificates are provided for free when used in
a specific area (e.g. e-commerce, banking, stocks). All-purpose certificates
are provided for a small annual fee of USD 4. While the Government
Certification Management Authority acts as root CA in public areas, the
Korea Local Information Research & Development Institute provides GPKI
certificates to civil servants.
The number of digital certificates delivered is 23.6 million as of October
2010
Intersections or relationships between government and private sector
systems (GPKI and NPKI) are enhanced by a Certificate Trust List (CTL).
While the CTL mechanism is operational and does not raise specific issues,
it required a long and difficult process to reach an agreement regarding who
will operate the CTL and how to renew a certificate under the CTL system.
The “Framework for internet-Personal Identification Number Service” and
the “Message Format for i-PIN Service” have been adopted as national
standards in 2005 to enable the use of i-PIN in both sectors.
Innovative developments include a User Control Enhanced Digital
Identity Wallet System enabling users with a Digital Identity Wallet to log in
to websites without filling in ID and password information. A pilot test
service enabling the use of i-PIN with a Digital Identity Wallet is now
underway.
Korea encourages the interoperability of electronic identity credentials
by monitoring Root CA and accredited CAs to make sure they comply with
interoperability requirements. The Electronic Signature Act was modified to
introduce an obligation for private sector to comply with the NPKI standard.
Twenty-four norms for safety and reliability of a PKI certificates have been
adopted.
In addition, the Digital Identity Management Forum was founded in
2008 to enhance the interoperability of IdM, to share information and
knowledge of the technology and standards of IdM, to gather various
opinions from the private sector, and to deliver precise and explicit opinions
to policy makers. Finally, Korea is developing a way to interoperate i-PIN
and electronic certificates.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
92 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
Challenges
Korea developed a Certificate Trust List (CTL) mechanism to enable
interoperability between NPKI for private sector and GPKI for govern-
mental sector. This system, operating since 2002, did not raise particular
technical problems but it was difficult to establish and in particular it took
long time to reach an agreement regarding aspects such as who will operate
CTL and how to renew an electronic certificate based on PKI with the CTL
system.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 93
Japan
Although Japan does not have an IdM strategy, the manifesto of the
Democratic Party of Japan (August 2009) states that the possibility of
“introducing a unified serial number system for both taxation and social
security to facilitate monitoring of income” will be examined. A Cabinet
decision of 18 June 2010 states that a study has been launched regarding the
introduction of a citizens ID system that would both ensure the protection of
personal information and maintain consistency with the study for a system
for social security and tax numbers.
The Government of Japan has just begun to investigate the establish-
ment of an IT strategy under the new administration and will also examine
the relationship between the establishment of IDs, which is needed to
promote electronic government, and the number system. A Cabinet decision
of 11 May 2010 mentioned the introduction of a citizens ID system by 2013
as the common base of e-government enabling the linking of data between
central ministries and local governments, consistent with the protection of
personal information and the exploration of systems for common numbers
for social security and tax.
In order to improve information security in all Japanese government
agencies, central government agencies have to comply with “Standards for
Information Security Measures for the Central Government Computer
Systems” which includes a chapter on Identity Management. Compliance is
evaluated by inspections from the National Information Security Center.
There is no dedicated policy with regards to the protection of privacy in
relation to IdM systems so far.
Luxembourg
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
94 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 95
Challenges
Key challenges include the provision of secure solutions in a rapidly
changing technical environment, data privacy, interoperability and legal
environment. The key to an efficient deployment lies not so much in the
distribution of a large amount of electronic credentials but in their extensive
use by citizens through well-designed interoperable applications.
Netherlands42
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
96 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 97
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
98 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
Challenges
The use of the Citizen Service Number is strictly regulated to limit its
use to the public sector and it is the unique and only identifier that
government bodies have to use to provide services to citizens. The
possibility to use private sector IdM applications and credentials for public
sector services as well as the use of public sector credentials for private
sector services is therefore a challenge.
Legacy problems are also challenging: some governmental agencies
have their own IdM systems in use for companies that they will have to
replace.
The widespread use of eRecognition for companies will start when
enough governmental agencies will have migrated their services online.
During the first years the challenge will be to seduce companies to make use
of it. This implies that the private sector will be reluctant to take its part in
the agreement’s scheme because the business case for them may only be
positive once use is widespread.
New Zealand
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 99
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
100 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
igovt initiatives are aimed at public sector services and their extension to
private sector to foster the development of new online products and services
would require further assessment. Access by private sector agencies to
individuals’ identity information held on government agencies’ systems may
occur only to the extent permitted by law. In some instances, there are
specific legislative provisions governing the disclosure between government
and private sector agencies of personal information for certain purposes such
as to support the delivery of health or welfare services.
The government has also developed a Data Validation Service which
can immediately confirm whether identity data entered by users is consistent
or not with authoritative record in the database held by the Department of
Internal Affairs. This can include details on citizenship, passports and births,
deaths and marriages databases and registers. This system will be extended
to private sector organisations which meet strict security, privacy and
integrity criteria as a way of confirming identity and reducing costs. It is not
proof of identity in itself, nor is it conclusive proof that the document is
valid since a true set of data on a counterfeit document could be overlooked
by an inexperienced operator. The role of the Data Validation Service is to
support the gathering of a number of pieces of corroborating evidence to
prove identity where presentation of documents is part of the business
process.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 101
The NZ ICT Security Manual contains policies about how ICT security
for the New Zealand Government is managed, implemented and documented.
It also includes ICT security standards, principles and advice relating to
specific aspects of ICT systems, such as hardware, software and access
control.
The igovt services are designed, implemented and deployed in a security
and privacy conscious manner, compliant with the ICT Security Manual,
covering all aspects of their life cycle, including their ongoing operation and
administration. The igovt services have been designed in a privacy-
protective way, in consultation with the Privacy Commissioner. They
require neither a physical card nor a unique identifier. There is a separation
between the logon and identity verification processes, and between those
processes and the transaction that an individual undertakes with an agency.
An individual’s identity is authenticated with each authorised agency using
an identifier that is unique to that agency. There is no common unique
identifier through which any agency can find out what services an individual
has been accessing through another agency. While the Department of
Internal Affairs holds a record of all agencies where an individual has used
his or her electronic identity credential, the Department does not record
which specific services an individual has accessed at each agency.
Individuals can check their personal information before it is sent to an
authorised agency, and have control over whether or not it is sent. Only the
minimum amount of identity information is transmitted to the agency. No
biometric information, including the individual’s photograph, is sent to an
agency to authenticate the individual’s identity. Individuals can also monitor
how their personal information has been accessed and used and, if they
detect misuse, report this for investigation by the Department of Internal
Affairs. As an individual’s identity is authenticated to a high level of
confidence when creating an igovt ID, and because of the secure way it is
used, the risks of other people impersonating the individual are reduced.
The Privacy Commissioner encourages agencies to undertake Privacy
Impact Assessments for significant new initiatives involving the handling of
personal information. Privacy Impact Assessments for the igovt Logon
Service and IVS have been undertaken by independent assessors, and will
continue to be undertaken periodically. The recommendations made in those
Privacy Impact Assessments have been given effect in respect of the design,
architecture and operation of the igovt services.
The igovt logon service and IVS have both been developed in
compliance with the above mentioned Evidence of Identity Standard. Many
agencies’ services are integrated only with the Logon Service, which means
that users are able to transact pseudonymously for those services.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
102 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
Challenges
The creation of new arrangements (whether through new or existing
legislation) for sharing individuals’ personal information between govern-
ment agencies, or between government and private sector agencies must
ensure that public trust in government is not undermined. This has been a
key consideration in the design of the igovt services.There are also practical
challenges involved with the implementation of an e-authentication solution
across government, due to the variety of types of personal information held
by different agencies for different purposes. In practice, personal informa-
tion relating to the same individuals is often inconsistent and, in some cases,
of poor quality.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 103
Portugal
The main driver for the Portuguese national IdM strategy is the
modernisation of the public administration towards user-centric processes
and services. The strategy focuses on the Citizen Card project, which
consists in the replacement of several public sector traditional cards with a
single smart identity card enabling in person, Internet and telephone based
authentication as well as digital signature, both in public and private sector
contexts. The card is seen as a driver for innovation enabling new public and
private sector services. A single sign-on identity provider is being established
to enable public and private sector to offer authentication from a common and
central point based on the Citizen Card. The framework is based on a
centralised registration policy relying on the pre-existing population register.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
104 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 105
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
106 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
a PIN letter. The policy and the law have been reviewed by the National
Data Protection Authority.
The Citizen Card is highly accepted by citizens but the government
recognises the need to promote electronic services and explain the
advantages of the card such as simplicity and confidence. The government
organises communication campaigns to promote the card and, when they
receive their card, individuals are asked to sign a document that provides
information about its major benefits and risks. Citizens can report incidents
to a 24/7 support service which can manage identity suspension/revocation
in real time.
Since July 2010, the Portuguese Citizen Card can also be used for
authentication to the major European e-government portals. Interoperability
was accomplished in the context of the European STORK project that
established a European eID Interoperability Platform.58
At a national level, Portugal is currently extending its national eID
platform in order to allow additional attributes (“citizen roles”) to be
accessed using the Portuguese Citizen Card, for authentication and signature
purposes – for example “engineer role”, “public servant role”, “company
CEO role”, “teacher role”, “medical doctor role”, among others. This service
is expected to be available, in pilot phase, during 2011.
Challenges
Challenges include:
• Horizontal political support for the overall management and
business operation of the Citizen Card was a key strategic challenge.
• Putting into practice the interoperability concept. The legal consti-
tutional barrier to centralise the identification system preventing the
use of a single identification number was overcome by the adoption
of identity federation, communication through web services (WS*
standards), secure cryptographic messaging and other interoperable
standards to enable interactions between different information
systems platforms. Interoperability relies on the use of identity
federation through the Portuguese National Interoperability Platform
as well as eID open standards.
• Functional and business process optimisation along all the
workflows that support the main Portuguese identification systems:
improving data quality not only in identification processes but
mostly developing new opportunities to dematerialise processes
using e-ID potential.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 107
Slovenia
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
108 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 109
Challenges
A key challenge is the need for a critical mass of users and services in
both the private and public sectors to foster adoption and use and therefore
return on investment. The government is facing this difficulty for example
as it plans to generalise the use of mobile-based certificates.
National and cross-border interoperability are seen as key challenges for
IdM.
Spain
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
110 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
and citizenship offline. The national register number assigned to all citizens
is printed on the card and included in its qualified certificate.60 This number
is also included in all other qualified certificates issued in the country.
Nevertheless, the card should not be seen as the only or main element of
the framework. The strategy is also supported by a legal framework
including:
• The 2003 e-signature law61 which transposes the European Directive
1999/93 on a Community Framework for Electronic Signatures. It
establishes a voluntary accreditation scheme for certificate service
providers without prior authorisation and assigns the responsibility
for the supervision to the Ministry of Industry and Trade. The law
defines three levels of digital identity: electronic signature, advanced
electronic signature and qualified electronic signature (advanced
electronic signature based on a Secure Signature Creation Device or
SSCD). The law also allows public administrations to define their
own requirements for the use of digital identity in e-government
services.
• The Citizens’ Electronic Access to Public Services Law62 adopted in
2007 to foster the deployment of e-services in the public sector. The
law defines the legal requirements of the Spanish Public
Administration Digital Identity System, including the use of
electronic identities by citizens, public employees and public
administrations for e-government services. It recognises the right of
citizens to use their electronic identity card in any Spanish
e-government service and the obligation of public administration to
accept advanced signatures based on qualified certificates. In
practice, administrations can choose to ask for a simple electronic
signature (e.g. a password) or an advanced electronic signature.
Both authentication mechanisms can coexist.
The Spanish market for digital certification is relatively dynamic with
more than 15 public and private commercial certificate service providers.
Public administrations must accept qualified digital certificates regardless of
the public or private nature of the issuing service provider. Qualified
certificates delivered by private service providers are used in private sector
contexts and are equally accepted for e-government applications and
interactions with public administrations. Conversely, national identity card’s
certificates can be used for private sector applications.63 One bank allows its
clients to be identified by their national identity card when they require
financial services online and it is adapting its ATM machines to accept
identity cards instead of traditional bank cards. Interestingly, Cisco has
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 111
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
112 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 113
platform removes from its logs any personal data contained in the
verification of the certificate. Privacy principles and rules that e-government
applications have to follow for compliance with privacy legislation are also
set out in the national security framework. Biometric data can only be
requested at controlled points of access and relies on “match-on-card”
technology. The national identity number included in all certificates can be
disclosed to any e-government application. Other personal attributes can
only be disclosed and exchanged between public administrations with user
consent.
The government recognises that citizens use e-government services
when they are appealing and useful to them. For example, the main reason at
the beginning for the uptake of qualified certificates in Spain was to get a
tax refund in a shorter period of time when the citizen was entitled to it
according to the tax declaration. Several initiatives are under way to
promote the use of the national identity card in a secure way: at the issuance
point (police stations), citizens are instructed on how to use the identity card,
a major awareness campaign has been launched in Spanish media, thousands
of card readers have been distributed to citizens, several web sites are
informing citizens on how to use the card.
Challenges
The most challenging aspects of the national strategy are:
• The lack of understanding regarding the possibilities offered by the
electronic identification. Public awareness campaigns and efforts to
increase the usability of the electronic identity card are essential.
• Electronic identity for foreigners. Participation in the European
STORK project will facilitate the recognition of foreign credentials
by Spanish e-government services.
At a more operational level, challenges include:
• The great variety of standards and technical norms, especially for
smart-cards, which makes the integration of eID solutions extremely
challenging.
• User-centric identity frameworks provide technical solutions to help
users easily register with and sign on to web-based services.
However, these frameworks alone cannot solve the human problem
of establishing and maintaining trust. Convergence between user-
centric and established federation standards and the incorporation of
merged functionality into products are needed to bring user-centric
identity management functionality to the mainstream.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
114 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
Sweden
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 115
include single sign-on but all agencies accept electronic credentials from
these selected companies and users are exposed to the same user interface
regardless of the agency requiring identification. The strategy relies on a
centralised registration policy: certificate service providers access the
population register to provide their services.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
116 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
The strategy supports two types of credentials: a soft token in the form
of a file that individuals can download to their computer and a hard one,
generally a smart card. Both enable authentication and e-signature via two
digital certificates. The soft token is used in almost all transactions. The first
hard token is the “National ID card prepared for e-Legitimation” (NIDEL)
which has been issued by the police since 2005 and has been developed to
enable identification in the context of the Schengen Treaty. It includes a
chip but does not however carry a certificate at this stage. As of October
2009, 290 000 NIDEL cards had been issued. The second hard token is the
card issued by the Tax Authority since June 2009 which can optionally carry
a certificate issued by one of the four providers (Telia) and was developed to
provide an identity document to as many people as possible, including
people above the age of 13 and non-Swedish residents. All providers of soft
and hard tokens follow the same technical specifications. Certificates
include a public key, first and last name, personal identity number, date of
validity of the public key, serial number, name of the issuing company and
signature of the certificate provider.
Other forms of e-authentication are available in e-government applica-
tions such as login/password or two factor authentication (login/password +
SMS message). Each service provider decides on the authentication solution
to offer.
The legal framework supporting this approach includes a law on
qualified electronic signatures which implements the European Directive
1999/93.69 The law recognises advanced and qualified electronic signatures
but only advanced signatures are available to individuals in Sweden. Besides
electronic signatures, the law does not cover digital identity as such which is
legally addressed only in the regularly renewed public procurement
contracts. In 2008, a report from the Swedish Administrative Development
Agency (“Verva”) suggested to establish a new legal framework to regulate
digital identity including functional requirements and the obligation to
comply with European security standards. The framework would be
applicable to public and private sector applications. A new agency would
co-ordinate certificate providers and public sector bodies and act as a
European contact point.
Certificate service providers which issue qualified electronic signatures
must comply with security requirements and are supervised by the Post and
Telecom Agency (PTS) which also maintains an e-signature advisory and
discussion group with representatives from all interested parties. The
Swedish privacy regulator, the Data Inspection Board, oversees the security
of personal data used in IdM systems.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 117
Challenges
Despite the success of the strategy so far, there are some challenges such as:
− Costs for the relying parties.
− Lack of flexibility of the overall model leading to some
technical problems.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
118 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
Turkey
The Turkish Strategy for IdM is based on the promotion of digital
certificates and, in the near future, on the deployment of an electronic identity
card. It includes: i) a centralised civil registration system (MERNIS); ii) a
legal framework for electronic signature; and iii) an e-government gateway
providing single sign-on. Future plans include the migration of the current
paper-based identity card to an electronic identity card enabling secure
electronic authentication for public and private sector services. The Turkish
strategy is based on a centralised registration policy relying on the Turkish
identity number.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 119
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
120 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
agencies. A Prime Minister Circular obliges all public agencies to attach this
number in every relevant document (driver license, passport, forms, etc.)
and to associate their relevant electronic record with this identifier. Public
sector IT systems should use this number to enable electronic data exchange
with the MERNIS database.75
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 121
Challenges
The main challenge is to convince all public agencies to adopt a
common IdM system and policy and to manage and overcome resistance
from agencies to discard their pre-existing IdM systems, replace their
specific identifiers with the Turkish Republic ID number and reject plans for
specific smartcard based authentication tools particularly suited for their
own business.
Another challenge is to convince private service providers that authenti-
cation mechanisms implemented by a public agency are reliable and secure.
The e-government Gateway, for example, has a built-in single sign-on
solution but banks, who provide money transfer services for e-government
services requiring financial transactions, use their own authentication
mechanism and do not trust the Gateway’s single sign-on mechanism.
Establishing a trust environment through authentication mechanisms based
on determined standards and legal clarity regarding liabilities in using these
authentication systems is key.
United States
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
122 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 123
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
124 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 125
facilities and information systems and designates the major milestones for
implementation. The security of the applications involved in HSPD-12
implementation involves not only the physical security of the identification
cards used, but also the general security of the background architecture.
As regards the government related systems, which is a subset of the
strategy’s scope, auditing controls will be designed according to the purpose
of the individual application. The privacy, certification, and accreditation
policies for these applications will be specifically tailored. Regarding
Federal systems, Title III of the E-government Act, entitled the Federal
Information Security Management Act (FISMA)79 requires each federal
agency to develop, document, and implement an agency-wide programme to
provide information security for the information and information systems
that support the operations and assets of the agency, including those
provided or managed by another agency, contractor, or other source.
FISMA requires security certification and accreditation of information
systems to enable more consistent, comparable, and repeatable assessments
of security controls in Federal information systems. These requirements can
be found in NIST SP 800-37.80
Privacy Impact Assessments (PIAs) are conducted by Federal agencies
to implement the principles established by the E-government Act and the
Privacy Act. The goals inherent in federal PIAs will be adapted to online
IdM, but the exact method has not yet been determined.
The draft strategy emphasises privacy enhancing and voluntary identity
solutions. Identity solutions should preserve the positive privacy benefits of
offline transactions while mitigating some of the negative effects. It calls for
the full integration of the eight Fair Information Practice Principles (i.e.
reflected in the OECD privacy principles) in the identity ecosystem as a key
objective to achieve trusted identities in cyberspace. Examples of privacy
approaches supported by the strategy include the creation and adoption of
privacy enhancing technical standards that allow minimization of the
personal data transmitted and of the linkage of credential use among and
between providers; the communication of individuals’ choices regarding the
use of their data to all subsequent data holders; the limitation of personal
data retention time; the possibility for individuals to access, correct and
delete their data; auditable records regarding privacy protection and
compliance with applicable standards, laws and policies.
Voluntary participation by individuals and organisations is a key
concept whereby the Federal Government will not require organisations to
adopt specific solutions nor require individuals to obtain high assurance
digital credentials if they do not want to engage in high risk online
transactions with the government. The identity ecosystem should encompass
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
126 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
Challenges
The most challenging issues for the development of the US national IdM
strategy are i) the identification of an approach that mutually benefits
security and privacy concerns, ii) the collaborative policy development
process required by the federal system of government and the involvement
of the private sector. Other challenges are related to:
• Privacy: the approach must protect privacy and be perceived as
“privacy enhancing” or it will fail; it must be flexible, and enable
anonymity as appropriate; significant amounts of data can be liable
to breach; there is a potential for procedural mistakes, there are legal
differences between federal, state and at cross-border levels.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 127
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
128 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
Appendix II
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 129
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
130 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
Appendix III
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 131
Interoperability
Security
(Please refer to section 5.3 of the Primer)
12. What is your policy with regards to the security of IdM systems and
how is it enforced?
13. Please provide details, as appropriate, including measures taken to
ensure the robustness of e-government IdM systems.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
132 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
15. What role is foreseen for auditing controls to verify that your IdM
systems are working as intended? How do you ensure that the
security of e-government IdM systems is appropriate and fit for
purpose?
Please provide details, as appropriate.
Privacy
(Please refer to section 5.4 of the Primer)
17. What role is foreseen for privacy impact assessments for IdM
systems? To what extent do privacy impact assessments affect the
architecture, design and choices of IdM systems?
Please provide details, as appropriate.
19. What is your policy with regards to identity attributes (e.g. name,
social security number) which can be used for electronic
authentication to e-government systems? Are particular identity
attributes (e.g. national security number, biometrics) protected?
Please provide details, as appropriate
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 133
User empowerment
(Please refer to section 5.2 of the Primer)
20. How are end users/citizens made aware of the benefits and risks of
using IdM systems?
Please provide details, as appropriate
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
134 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
Notes
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 135
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
136 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
20. The current card includes the following information: name, date of birth, gender,
signature and fingerprint.
21. NCh 2777, by the National Normalization Institute
22. eID interoperability for PEGS : Update of Country Profile Study. Danish country
profile. August 2009, p. 9.
23. my page at ww.borger.dk
24. 1 592 756 digital certificates (1 318 895 personal certificates, 265 061 employee
certificates in 90 000 enterprises/government organisations, 6 533 enterprise
certificates, 2 267 function certificates
25. www.epractice.eu/en/cases/easylogin
26. See www.arpt.dz/Docs/3Actualite/Communication/8-
9_12_2009/Communications/Session2/S2P1eng.pdf
27. www.epractice.eu/en/cases/easylogin
28. www.open-standaarden.nl/fileadmin/os/presentaties/Kop08_pres_HippeBrun.pdf
29. NemID is based on a national standard based on ETSI (European
Telecommunications Standards Institute) standards. NemLog-In is based on SAML.
30. https://www.signatursekretariatet.dk/certifikatpolitikker.html
31. http://en.itst.dk/it-security/netsafe-now-campaigns
32. https://login.sikker-adgang.dk/fobslogin/visvilkaar.do
33. Most of the information provided in this section reflects the IDABC country
profile, referred to as a key resource in the German response to the questionnaire.
34. Many elements have been taken from the IDABC Italy country profile, in addition
to the response provided by Italy.
35. Legislative Decree 235/2010, published in the Italian Official Journal of 10
January 2011.
36. In addition, 3.7 million use digital signature. See “Rapporto eGov Italia 2010” –
chapter 1” -
www.innovazionepa.gov.it/comunicazione/notizie/2010/dicembre/20122010-
brunetta-rapporto-e-gov2010.aspx
37. See www.apkic.org/WebSite/PKI2007/UpFile/File28.ppt
38. “Understanding Korea’s Identity Verification System”, Byeong Gi Lee,
Commissioner, Korea Communications Commission, December 2009,
http://121.254.145.213/gisa_down.php?pfile=%2Fdata1%2Fftp%2Fgisa_downlo
ad%2F20091206_%C2%FC%B0%ED%C0%DA%B7%E1_Identity+Verification
+System+2009.12.+BGL.doc
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 137
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
138 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
47. IDABC, p. 7.
48. For a list: www.digid.nl/burger/over-digid/wie-doen-mee/
49. www.digid.nl/english
50. Many of the principles underpinning the IAF reflect those in the OECD Guidance
for Electronic Authentication, including ensuring security, privacy and usability,
and managing risk.
51 . Individuals can also use choose to use several igovt logons for several services
because these logons are pseudonymous. If they choose to have only one igovt
logon, it can be used with all participating agencies, among which there will be
some agencies that link the logon with an enduring “account” or customer record
for the purposes of doing business with just that agency. There is currently no “all-
of-government” account.
52. It is also granted to Brazilian citizens covered by the Treaty of Porto Seguro.
53. More than 10 000 companies have been created using this system, saving more
than EUR 20 million.
54. Respectively www.partalempresa.pt, www.automovelonline.mj.pt and
https://queixaselectroncias.mai.gov.pt.
55. www.portaldocidadao.pt
56. For example www.riac.azores.gov.pt
57. E.g. the Instituto Superior Téchnico https://id.ist.utl.pt
58. See https://www.eid-stork.eu/
59. Tax Procedure Act. Official Gazette of the Republic of Slovenia, No 117/06 in
24/08-ZDDKIS.
60. Additional information stored in chip include : filiation details, face picture, image
of the handwritten signature, digital fingerprint, advanced certificates for
authentication and for signature, certificate of the issuing authority and PIN code
for each certificate.
61. Ley 59/2003
62. Ley 11/2007. See also the Royal Decree RD 1671/2009.
63. For a list of private sector services, see
www.dnielectronico.es/servicios_disponibles/serv_disp_priv.html.
64. See IDABC country report.
65. This approach would change if it was decided to create a central European
validation authority in charge of cross-border validaiton services or if other EU
member states would establish a national validation authority to which it would be
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 139
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
140 – ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES
HR.2221 (Data Accountability and Trust Act), which has passed the House of
Representatives, also contains breach notification provisions.
82. www.internetac.org.
83. OpenID (www.openid.net/)
84. IMI – Identity Metasystem Interoperability (www.oasis-open.org/committees/imi/)
85. OAuth (https://datatracker.ietf.org/wg/oauth/charter/)
86. UMA – User-Managed Access
(http://kantarainitiative.org/confluence/display/uma/Home)
87. OASIS – Organization for the Advancement of Structured Information Standards
(www.oasis-open.org/)
88. IETF – Internet Engineering Task Force (www.ietf.org/)
89. OpenID Foundation (http://openid.net/foundation)
90. Kantara Initiative (http://kantarainitiative.org/)
91. X.509/PKI - ITU-T Recommendation X.509 (2005) | ISO/IEC 9594-8:2005
92. SAML – Security Assertion Markup Language (www.oasis-
open.org/committees/security/)
93. XACML – eXtensible Access Control Markup Language (www.oasis-
open.org/committees/xacml/)
94. InCommon Federation (www.incommon.org/)
95. eduroam – Education Roaming (www.eduroam.org/)
96. Janet(UK) – UK Education and Research Network (www.ja.net/)
97. STORK – Secure Identity Across Borders Linked (www.eid-stork.eu/)
98. DNSSEC – DNS Security Extensions (www.dnssec.net/)
99. DKIM – RFC 4871 DomainKeys Identified Mail (DKIM) Signatures
(http://datatracker.ietf.org/doc/rfc5672/)
100. TLS – Transport Layer Security (http://datatracker.ietf.org/wg/tls/charter/)
101. OIX – Open Identity Exchange (http://openidentityexchange.org/)
102. Seventh Framework Programme (http://cordis.europa.eu/fp7/home_en.html)
103. PrimeLife (www.primelife.eu/)
104. SWIFT (www.ist-swift.org/)
105. PMRM – Privacy Management Reference Model (in process of formation at
OASIS)
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 1: NATIONAL STRATEGIES AND POLICIES FOR DIGITAL IDENTITY MANAGEMENT IN OECD COUNTRIES – 141
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
142 – ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY
Annex 2
© OECD 2009
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY – 143
1. Introduction
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
144 – ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY – 145
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
146 – ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY
This section explains some of the key concepts and outlines some of the
basic IdM processes. The range of conceptions of identity is very broad. The
examination of the following concepts is for the purposes of this Primer only
and recognises that they may be used differently in other contexts.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY – 147
(e.g. from name, address, date of birth to credit reference to social security
number). For certain applications, the enrolment process may require other
types of personal data, including the capture of one or more types of
biometric data.
The verification requirements for enrolment can be fulfilled entirely on
line or include an offline component, for example, mailing a verification
code to the individual’s residence. More stringent enrolment processes may
require the presentation in person of physical credentials issued to the
person by other entities. These may include government-issued credentials
(e.g. passports, identity cards and drivers licenses) and/or credentials issued
by private sector entities (e.g. employee badges, mobile wireless SIM cards,
and credit cards). Government institutions such as motor vehicle depart-
ments and post offices sometimes accomplish identity verification through
this type of “in-person” proofing.” In addition, in-person proofing is
common among banks, schools, and employers in their enrolment processes.
The enrolment process is completed with the issuance by the organi-
sation of a digital credential. Credentials may be modified or suspended for
various reasons, for example, to extend or restrict their duration or reflect a
change in relevant attributes.
2.4 Biometrics
Biometrics are measurable biological and behavioural characteristics
and can be used for strong online authentication. A number of types of bio-
metrics can be digitised and used for automated recognition. Subject to
technical, legal and other considerations, biometrics that might be suitable
for IdM use include fingerprinting, facial recognition, voice recognition,
finger and palm veins.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
148 – ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY
Biometrics can help reduce identity data duplication and ensure that an
individual appears only once in any IdM database. Since biometrics do not
depend on the possession of a physical object or the memorisation of a
password, they may offer a potentially attractive option to strongly
authenticate the identity of persons who have been enrolled in IdM systems
designed to use them.
Some types of biometrics may be vulnerable to being copied (e.g.
fingerprints) or otherwise subject to errors having consequences for
individuals. These risks may be reduced by advances in technology. For
maximum authentication strength, biometrics may be used in conjunction
with other credentials, including additional types of biometrics (“multiple
biometrics”).
Because of their sensitivity, more frequent use of biometric data for
online authentication would require careful balancing of the rights of
individuals, interests of organisations and responsibilities of law
enforcement agencies. For individuals, a higher degree of control could
result from limiting the use of biometrics to those that remain under the
local control of the individual (e.g. securely stored in an encrypted format on
a device over which the person maintains control).
Healthcare
IdM-enabled electronic health records can assist patient care by
providing timely access to patients’ medical and treatment history and
connecting records held in multiple locations. Developments such as tele-
medicine can help provide medical care in remote areas but depend on
accurately and securely linking patients and their medical information. The
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY – 149
Education
IdM also opens up opportunities in the area of education. The distributed
nature of education and research means that resources are commonly
scattered across different institutions around the world. Distance education
and collaborative e-learning may require the establishment of authenticated
relationships between students, institutions, and sometimes parents and
guardians. IdM can help to address the problem of managing identities
throughout a person’s educational life-cycle, as well as multiple interactions
with both educational systems and educational officers, within and across
establishments.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
150 – ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY
Travel industry
Some of the more innovative examples of IdM have emerged from the
travel industry. For example, service providers can use information
contained in flight reservations to offer hotel or rental car bookings by third
parties. This reduces password administration for travel agencies and
travellers. With alliances and protocols in place, airlines can also offer
travellers single sign-on access to multiple providers and common use of
passenger profile information, such as seat preferences.
Communications services
In the area of communications, a shift is occurring from number-based
connections to person-based connections, with a different type of IdM
framework required to manage these communications. From a communica-
tions provider’s viewpoint it is necessary to develop service architectures
that enable users to be provided with services over different platforms
(Internet and mobile platforms, for example) and to provide a basis for users
to access their chosen applications over multiple platforms in ways that are
customised to their own preferences.
Electronic payments
Perhaps the most successful use of IdM in the commercial sector today
is in the area of electronic payments for e-commerce transactions. Payment
cards offered by financial services organisations and other online payment
systems facilitate the exchange of funds. Through proprietary networks, a
number of parties work together to make this possible (e.g. merchants, card
networks, third party processors), exchanging information relating to
consumers’ payment card accounts.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY – 151
Social networks
A number of social networking sites are currently exploring options for
sharing authentication information and in some cases user data, such as
“friend” lists and profile information. This could make it easier for
individuals to bring aspects of their social networking profiles to their activi-
ties at affiliated sites and in turn to have information about those activities
exported back to their social networks. Ensuring the individual’s privacy
preferences are exchanged between organisations along with the personal
data is important, along with sufficient transparency and accountability to
facilitate effective user control.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
152 – ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY
4.1 Innovation
Innovative technology developments ultimately have to be tied back to
actual uses in order to bring a return on investment. Recent experience in
IdM has shown that, although ideas may have sufficient merit to be
developed into products, the investments are unlikely to pay off unless
embraced by a critical mass of participants in the Internet economy. The
promise of the technologies depends not just on their development, but also
on actual uptake in the context of different value transactions. For
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY – 153
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
154 – ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY – 155
One of the main public policy goals for governments is working with all
stakeholders to create favourable conditions for the development of IdM to
benefit users. Given the broad spectrum of IdM applications – which can
combine different identity attributes, apply different standards and technical
processes, and provide different levels of assurance – the challenge for
policymakers is to make available sufficient high-level guidance on user
empowerment, security, the protection of privacy, and interoperability as
they apply to IdM.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
156 – ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY – 157
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
158 – ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY
6. Conclusion
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY – 159
Notes
1
OECD, “The Seoul Declaration for the Future of the Internet Economy” (2008),
available at: www.oecd.org/futureinternet.
2
The use of the term “Internet” is intended to be broad, and reflect the convergence
of digital networks, devices, applications and services.
3
The OECD has done significant work on the privacy and security issues associated
with RFID tags. See, OECD, “Radio-Frequency Identification (RFID): a Focus on
Information Security and Privacy” (2008), available at:
www.olis.oecd.org/olis/2007doc.nsf/linkto/dsti-iccp-reg(2007)9-final. It is now
undertaking work on sensor-based networks.
4
OECD consideration of IdM began with a workshop held in Trondheim, Norway
in May 2007. See,
www.oecd.org/document/41/0,3343,en_2649_34255_38327849_1_1_1_1,00.html.
5
OECD Recommendation on Electronic Authentication (2007). This
Recommendation builds on an e-authentication report providing policy and
practical guidance. Both are available at:
www.oecd.org/dataoecd/32/45/38921342.pdf.
6
OECD Guidelines on the Protection of Privacy and Transborder Flows of
Personal Data (1980), available at:
www.oecd.org/document/20/0,3343,en_2649_34255_15589524_1_1_1_1,00.html;
OECD, Information and Network Security Guidelines (2002), available at:
www.oecd.org/sti/cultureofsecurity
7
OECD, “Online Identity Theft: Measuring the Threat to Consumers” (2008),
available at:
www.oecd.org/document/59/0,3343,en_2649_34267_40830139_1_1_1_1,00.html.
8
OECD, “The Future of the Internet: A Statistical Profile” (2008), available at:
www.oecd.org/dataoecd/44/56/40827598.pdf.
9
OECD “Shaping Policies for the Future of the Internet Economy” (2008), at page.
26, available at: www.oecd.org/futureinternet.
10
OECD Guidance for Electronic Authentication (2007), at page. 12, available at:
www.oecd.org/dataoecd/32/45/38921342.pdf.
11
The ISO IdM standard is ISO/IEC 24760. Other ISO standards that may be
relevant include: Information Security Management (ISO/IEC 27001 and 27002);
A Privacy Framework (ISO/IEC 29100); A Privacy Reference Architecture (ISO
IEC 29101); Authentication Context for Biometrics (ISO/IEC 24761); Biometric
Template Protection (ISO/IEC 24745).
12
See, www2.icao.int/en/mrtd/Pages/default.aspx.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
160 – ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY
Appendix I
Technical models
Historically, computerised identity systems kept identity-related
information in separate “silos” that did not allow it to flow between different
organisations and accounts. Over time, technical models have emerged to
provide innovative ways for identity data to flow across silos. Continuous
evolution has brought about hybrids and will likely give rise to new models.
The first part of this appendix presents a brief overview of the models as
though they are completely distinct so as to highlight their different features.
It is followed by a table describing the models’ characteristics and a figure
of each model showing the links between the parties to indicate who may
hold personal data.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY – 161
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
162 – ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY
Single sign-on
Single sign-on technology (SSO) reduces the number of times a user must
remember and use a password. In a typical deployment, single sign-on does
not usually reduce the number of logon events; instead, it uses client-side
technology to automate logons and hide them from the user, while still
protecting the security of user passwords and account information. Single
sign–on can be used in both federated and user-centric systems.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY – 163
To close the gap when a user and relying party distrust each other, an
identity provider can also serve as a trusted third-party broker. A user will
typically only trust a broker if s/he can control it; relying parties will not
trust a broker if the claims asserted are actually self-vouched by the user. To
respond to this dilemma, approaches are being developed with appropriate
steps used to prove identity so that all relying parties are assured that the
information is correct before engaging with the user, while leaving the
individual in control. Cryptography and other technologies can play a part
in this process.
Table A2.1. Features of Technology Models for IdM systems
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
164 – ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY – 165
Provider of Provider of
Service Service
Provider Provider
Holder of Some Holder of Some of Service of Service
Personal Data Personal Data
Provider of
Identifiers Provider of Provider of
Claims Claims
Holder of Some Holder of Some
Personal Data Personal Data
Provider of Provider of
Service & Claims Service & Claims
Holder of Some Holder of Some Provider of
Personal Data Provider Claims Provider
Personal Data
of of
Service Holder of Some Service
Personal Data
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
166 – ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY
Appendix II
International organisations
ENISA, “Privacy Features of European eID Card Specifications” (2009),
available at:
www.enisa.europa.eu/doc/pdf/deliverables/enisa_privacy_features_eID.
pdf.
ENISA, “Security Issues of Authentication Using Mobile Devices” (2008),
available at:
www.enisa.europa.eu/doc/pdf/deliverables/enisa_pp_mobile_eid.pdf.
FIDIS, Identity in a Networked World” (2006), available at:
www.fidis.net/resources/networked-world/
ITU-T Focus Group on Identity Management “Report on Requirements for
Global Interoperable Identity Management” (2007) available at:
ftp3.itu.ch/fgidm/Deliverables/0296-att-1.doc. Additional information is
available here: www.itu.int/ITU-T/studygroups/com17/fgidm/index.html.
ITU-T Study Group 13, “Framework architecture for interoperable identity
management systems” (2009).
PRIME, “Prime White Paper” (2008) available at: https://www.prime-
project.eu/prime_products/whitepaper/index_html.
PrimeLife, “First Report on Standardisation and Interoperability” (2008),
available at:
www.primelife.eu/images/stories/deliverables/d3.3.1_d3.4.1-public.pdf.
Governments
Australia, “National Identity Security Strategy” and “Documents
Verification Service”,
www.ag.gov.au/www/agd/agd.nsf/Page/Crimeprevention_Identitysecurit
y#q1.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY – 167
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
168 – ANNEX 2: THE ROLE OF DIGITAL IDENTITY MANAGEMENT IN THE INTERNET ECONOMY
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 3: REPORT OF THE OECD WORKSHOP ON DIGITAL IDENTITY MANAGEMENT – 169
Annex 3
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
170 – ANNEX 3: REPORT OF THE OECD WORKSHOP ON DIGITAL IDENTITY MANAGEMENT
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 3: REPORT OF THE OECD WORKSHOP ON DIGITAL IDENTITY MANAGEMENT – 171
The presentation also noted that distinctions can be drawn between organisation
models for IMD systems and their technical architectures.
Mr. Greenwood observed that digital identity is a key component of the
transformation to an information society/economy, noting that existing
processes for handling digital identity are not sufficient. ID theft, for
example, has social impacts – sense of violation, loss of self-confidence –
the economic consequences of which are difficult to measure. Key
short-term needs for improved IDM can be seen in areas like social
networking, aggregate intelligence, group decision making, and reputation
engines. Noting that special protections are needed for protecting the core
element of identity, Mr. Greenwood called for the creation of an
international identity bill of rights (inspired by the OECD Privacy
Guidelines) as well as a global infrastructure for the interoperability and
integrity of identity and authentications in all sectors. There is, he
explained, a unique need for international co-operation in this area.
The second keynote address was delivered by Andreas Pfitzmann, who
focused his presentation on the concept of digital identity itself. Digital identity
primarily is a set of attributes, some of which change over time and some of
which may be certified by third parties. Given the increasing collection and use
of digital data, a digital identity is only growing – never shrinking.
One of the key concepts introduced by Mr. Pfitzmann is that of the
partial identity (pID). Achieving security and privacy, he explained, requires
users to subset their digital identity into pIDs, each of which might have its
own name, identifier, and means of authentication. Using pIDs requires at
least one personal computer administrating personal data and executing
cryptographic protocols that is controlled by the user; digital pseudonyms
for secure authentication, and anonymous credentials to transfer certified
attributes from one pID to another pID of the same digital identity.
Mr. Pfizmann offered a variety of ways to classify identity attributes,
including whether they are authenticated by third parties; easy to change;
varying over time; given vs. chosen; and pure attributes vs. attributes
containing side information. Attributes that are not easy to change, that do
not vary over time, are given, or contain side information require greater
protection than others and may be considered “core ID”. For online use, Mr.
Pfizmann recommended that users manage their own IDs, presenting pIDs
via digital pseudonyms. He also noted the importance of having the right
tools and communications partners. He concluded his keynote explaining at
the present we have an identity management patchwork. Just as security is
only as good as the weakest link of the chain, privacy is at most as good as
the most privacy-invasive “layer” you are using. What is needed therefore is
an identity management framework to address both security and privacy.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
172 – ANNEX 3: REPORT OF THE OECD WORKSHOP ON DIGITAL IDENTITY MANAGEMENT
The discussion that followed the keynotes was oriented around the
degree to which individuals should be thought of as “owning” their identity,
as an antidote to the view of many organisations who consider that they
“own” the personal data they have accumulated on their customers. It was
suggested that ownership is not a particularly useful concept in this context,
and that a discussion oriented around the notion of “control” is more likely
to be constructive.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 3: REPORT OF THE OECD WORKSHOP ON DIGITAL IDENTITY MANAGEMENT – 173
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
174 – ANNEX 3: REPORT OF THE OECD WORKSHOP ON DIGITAL IDENTITY MANAGEMENT
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 3: REPORT OF THE OECD WORKSHOP ON DIGITAL IDENTITY MANAGEMENT – 175
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
176 – ANNEX 3: REPORT OF THE OECD WORKSHOP ON DIGITAL IDENTITY MANAGEMENT
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 3: REPORT OF THE OECD WORKSHOP ON DIGITAL IDENTITY MANAGEMENT – 177
which can be accomplished by using the user to link things back together.
Users have many partial identities, each in its own context or silo. All these
separate contexts can be linked via a metaphor called an i-card, with each
partial identity having a separate i-card. The i-cards in turn are managed by
an identity agent (e.g. Microsoft Cardspace) which can run on a computer or
a mobile device in the Internet cloud. Once the user is authenticated to the
agent, there is no further need for passwords. The agent projects and protects
identity attributes for authentication and personalisation. Attributes can be
blinded using PRIME/Idemix technology. As an interoperability framework
Higgins also provides a common data model that enables linking across
heterogeneous contexts.
Moving the discussion from interoperability to security, Ben Laurie,
Google, presented his ideas on selective disclosure, a technique for
minimising the privacy risks associated with the use of digital signature in
connection with an IDM system. More precisely, Mr. Laurie’s objective was
to be privacy protective by ensuring that data a user shares with one website
is not linkable to data shared with any other site with which the user
interacts. For an IDM system to be both useful and privacy protective it
must permit assertions that are verifiable, minimal, and unlinkable. The
challenges arise when traditional digital signatures are used to authenticate a
user or make a verifiable assertion that permits replying parties and assertion
issuers to collude to link the assertions and therefore the identifiers. The
solution proposed by Mr. Laurie, involves the use of a cryptography
technology that permits zero-knowledge and selective disclosure proofs.
These can allow a user to prove an assertion and link that proof to an
identity, but to do so in a way that does not provide the relying party access
to material that could be later linked to other assertions. Of course, some
assertions will contain inherently identifying information, like a physical
address, which will usually be linkable. But selective disclosure can prevent
users from being exposed to the risk that less obvious kinds of information
be linked.
The second speaker on security, Bob Blakley of the Burton Group,
highlighted what he considers to be the absurdity of “owning” your own
identity. A lot of identity information is owned by others. And a person
cannot sell her identity, or access services without disclosing it. Even if my
records are de-identified, data mining can reconstruct them. The problems
relate to asymmetry and risks posed by aggregation of data. What needs to
be abandoned is the notion of privacy as secrecy. A person can retain
his/her dignity even if people know something about him/her. The key, Mr.
Blakey concluded, is to ensure that people who receive personal information
treat it with respect and are held accountable.
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
178 – ANNEX 3: REPORT OF THE OECD WORKSHOP ON DIGITAL IDENTITY MANAGEMENT
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 3: REPORT OF THE OECD WORKSHOP ON DIGITAL IDENTITY MANAGEMENT – 179
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
180 – ANNEX 3: REPORT OF THE OECD WORKSHOP ON DIGITAL IDENTITY MANAGEMENT
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
ANNEX 3: REPORT OF THE OECD WORKSHOP ON DIGITAL IDENTITY MANAGEMENT – 181
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011
182 – ANNEX 3: REPORT OF THE OECD WORKSHOP ON DIGITAL IDENTITY MANAGEMENT
DIGITAL IDENTITY MANAGEMENT: ENABLING INNOVATION AND TRUST IN THE INTERNET ECONOMY – © OECD 2011