Cs-Csps Qatar E-Authentication Framework Eng v1.2
Cs-Csps Qatar E-Authentication Framework Eng v1.2
Version: 1.2
User Registration User registration is defined as the processes involved in the initial
creation of an electronic identity for a user. This encompasses the
Evidence of Identity (EOI) or Evidence of Relationship (EOR)
processes.
Token Issuance and A token is something that a Claimant possesses and controls used to
Management authenticate the Claimant’s identity. A token is provided to the user
for subsequent online authentication transactions. No token is
perpetual, and the issuing agency is responsible for ensuring the
validity of token throughout its life cycle and for any subsequent
mitigation actions required, should a malfunction occur.
2. Introduction
Electronic authentication (or “e-Authentication”) is the process of determining the degree of confidence
that can be placed on assertions that a user is who he claims to be or an identity is what it declares to be.
Assertions include identity, role, delegation and value.
The Qatar e-Authentication Framework (QeAF) is primarily concerned with the electronic authentication
of assertions. Electronic transactions occur across a number of channels, including:
Internet or web-based
Telephone (IVR)
Facsimile transmissions
Similar to other authentication models, e-Authentication is based on one or more of the following:
something the user knows (e.g. password, secret questions and answers), or
something the user has (e.g. security token), or
something the user is (e.g. biometric)
The approach chosen to authenticate must balance the usability requirements (ease of use to the end
user and the cost factor) with the acceptable level of risk.
As opposed to low-risk applications, critical applications and information systems require stronger
authentication models that can accurately confirm the user's digital identity as true
Each entity should use this framework to assess and evaluate their existing e-Authentication means. They
may also use this as a guideline while designing new eAuthentication controls.
Agencies shal conduct a risk analysis to include wide range of possible scenarios to identify potential
threats associated with the process / transaction. The potential threats might result from technical
failures, malicious third parties, process failure or human error amongst other things.
The following table provides an indicative level of assurances that can be used to classify
various business transactions.
Table 2: Assurance Level, a function of Entity Registration process and Authentication Mechanism
Management Process
1. The behavior of the credential holder has the potential to adversely affect the strength of
assurance provided by the credential itself as well the management process. Due diligence shall
be carried out to ensure that such threats are factored while making any decisions regarding the
choice of authentication mechanism.
2. Provide adequate training and awareness to end users to minimize the risk of fraudulent use.
The approach to registration will depend on the nature of assertion to be authenticated. These
include
1. Registration of individuals (as themselves)
2. Registration of individuals as representatives of businesses
*Assurance level here refers to the confidence provided by the registration process
Evidence of Relationship (EoR): Also referred to as “known customer” basis, this requires
individuals to establish they have an existing relationship with the Agency. Generally the
Qatar e-Authentication Framework
Version: 1.2 Page 10 of 22
Classification: Public
establishment of the original relationship would have involved an EoI process. These could
include documents such Residence Permits, Driving Licenses etc.
5. Recommendations
The identity management services should:
Issue identification tokens based on sound criterion for verifying an individual’s entity
Be strongly resistant to identity fraud, tampering, counterfeiting, and any exploitation
The architecture for authentication system can be broadly classified into the following three
models:
1. Siloed
2. Centralized
3. Federated (Single Sign ON)
SILOED
SILOED CENTRALIZED FEDERATED
SP AO SP AO SP
Token
Token Token Issuance
Issuance Issuance
User User
Enrollment Enrollment
User
Enrollment
Credential Credential
Credential Verifications Verifications
Verifications
Look Up token
Look Up token is a form of single use one-time passwords to authorize transactions. It consists
of a list or database of shared codes provided by the Verifier to the Claimant (user). The Claimant
(user) provides an un-used code from this list / database when prompted by the verifier.
Generally, Look up tokens is used as a second layer of authentication (dual factor) above and
beyond the traditional single-password authentication. This kind of tokens include Code books,
TAN cards
Biometric token
Biometric token is a distinguishing physiological or behavioral characteristic presented for
verification against a database of such characteristics, and which is managed and maintained by
the Verifier.
For example Retina scan, IRIS scan, Finger prints, Voice etc.
Hybrid token
The term ‘Hybrid token’ is essentially not a token in itself but refers to the use of two or more
of the tokens in combination, to increase the effective level of strength of the authentication
process. This is also referred to as a Multi factor authentication.
For example, the use of Shared secret (password) or biometric token to unlock the smart card
containing user’s private cryptographic key.
Agencies should conduct a thorough analysis of all possible threats including factors such
as general failures and human behavior. The overall risk may be rated ‘low’ based on the
probability of the threat being realized, however it is still recommended to include all
possible threat scenarios during the analysis phase.
The risk from an authentication error is a function of two factors:
1. Potential Impact
2. Likelihood of the Impact
Consequences / Impacts
Likelihood
Insignificant Minor Moderate Major Severe
Almost
Nil Low Moderate High High
Certain
Likely Nil Low Moderate High High
In analyzing potential risks, the Agency must consider all of the potential direct and indirect
results of an authentication failure, including the possibility that there could be multiple failures
or impact multiple persons.
The definition of potential impact contains terms such as “serious” or “minor”, where minor will
depend on context. Agencies should consider the context and nature of the persons / entities
affected to decide the relative significance of these impacts.
Risk Management
The risk assessments should be summarized in terms of potential impact categories (Table 5).
Based on your analysis identify the severity level for the associated impact category.
Identify the likelihood of the impact or threat being realized.
The function will provide you with an risk level (Table 6).
Choose the minimum level of risk that will cover all impact / threat categories.
The chosen risk level will map to assurance level.
Benefits of Federation
Qatar e-Authentication Framework
Version: 1.2 Page 21 of 22
Classification: Public
Federation establishes a standards-based mechanism of both sharing and managing identity
information as it moves between discrete security, legal and organizational domains.
Federation enables a cost-efficient means of establishing single sign-on to cross-domain, cross-
agency information. Federated single sign-on.
Federation provides Agencies managing multiple security domains with an efficient, lightweight
mechanism of linking redundant identities and enabling single sign-on between security
domains.
Conclusion
While today's existing identity management solutions can help increase security and reduce
inefficiencies associated with managing internal users and access to internal information,
increasingly the users that require access are outside of any one agency's control. Federated
identity provides Agencies with an open-standards approach of enabling increased access to
cross-boundary information.
Notes
Further to the Resolution of the Council of Ministers No. (18) Of 2010 on the implementation
of e-Government policies, MOTC issued the Government e-Services Registration &
Authentication Policy which mandates that all government e-services whether they be hosted
and integrated (integrated services) or just accessed (pass-thru services) through the “Hukoomi”
portal shall be authenticated through the Identity management services provided by Hukoomi.