Service Provider
Service Provider
Austria
Member State
ZOLL
DOUANE
VIDP
VIDP
eMandate
IDP
eMandate
IDP
Mandate
Service
eMandate
Trust
Austrian
Citizen
Austrian
Citizen
Figure 8: Our IDP solution used as V-IDP with modified
attribute plug-in.
deployment, a request to the Austrian infrastructure
is only necessary if requested authentication informa-
tion cannot be provided by the V-IDP directly. The
advantage of this solution is obtained by combining
the benefits of the middleware model with the entire
functionality of an Austrian identity provider.
By combining the inbound and outbound process
flow, our solution can also be used to authenticate
an European citizen to an European service provider.
According to this, our implemented solution is also
directly usable in other European states and not only
in the Austrian national eID infrastructure.
6 CONCLUSIONS
Identification and authentication of citizens is an in-
tegral component for a variety of Internet services
and online applications. The capability for secure
and reliably identification and authentication accord-
ing to national legal requirements is important for ser-
vice providers, which process private and individual-
related data, like eGovernment applications. In
this paper, we have presented a new architecture
for identity-management systems, to provide a flex-
ible, interoperable and easy-to-use identity provider
for service provider identification and authentication.
Our solution relies on an adaptable and modular ar-
chitecture that facilitates future extensions. Although
the presented solution has been developed to meet
special requirements of the Austrian eID infrastruc-
ture and Austrian legal requirements, its general ar-
chitectural design and implementation is also appli-
cable in other contexts.
We have demonstrated the practical applicability
and flexibility of the architectural design by imple-
menting solutions for different use cases, which need
to be covered by an Austrian identity provider. These
use cases cover the use of the presented solution to
identify and authenticate Austrian citizens and pub-
lic officials in various ways and assure interoperabil-
ity of our solution in a European context. Actually,
the practical implementation of use case 1 is used for
productive applications in the Austrian eGovernment.
The implementation of the use cases 2 and 3 are actu-
ally evaluated in different national and European pilot
programs. The realization of further use cases or addi-
tional functionality, like two-factor authentication in
case of single sign-on, that make use of the presented
architecture is regarded as future work.
REFERENCES
Bauer, M., Meints, M., and Hansen, M. (2005). D3.1:
Structured overview on prototypes and concepts of
identity management systems.
Cantor, S., Moreh, J., Philpott, R., and Maler, E. (2005).
Metadata for the OASIS Security Assertion Markup
Language (SAML) V2.0. Technical report.
European Union (2005). Ministerial declaration, Manch-
ester, United Kingdom, on 24 november 2005. Euro-
pean Union.
European Union (2006). Directive 2006/123/ec of the euro-
pean parliament and of the council of 12 december
2006 on services in the internal market. European
Union.
European Union (2014). Regulation (eu) no 910/2014 of
the european parliament and of the council of 23 july
2014 on electronic identification and trust services for
electronic transactions in the internal market and re-
pealing directive 1999/93/ec. European Union.
Ferdous, M. S. and Poet, R. (2012). A comparative analysis
of identity management systems. In Smari, W. W. and
Zeljkovic, V., editors, HPCS, pages 454–461. IEEE.
Hughes, J., Cantor, S., Hodges, J., Hirsch, F., Mishra, P.,
Philpott, R., and Maler, E. (2005). Profiles for the OA-
SIS Security Assertion Markup Language (SAML)
V2.0. Technical report.
Kaler, C. and McIntosh, M. (2009). Web Services Federa-
tion Language (WS-Federation) Version 1.2.
K
¨
olsch, T., Zibuschka, J., and Rannenberg, K. (2011). Pri-
vacy and identity management requirements: An ap-
plication prototype perspective. In Camenisch, J.,
Leenes, R., and Sommer, D., editors, Digital Privacy,
volume 6545 of Lecture Notes in Computer Science,
pages 735–749. Springer Berlin Heidelberg.
Leitold, H., Hollosi, A., and Posch, R. (2002). Secu-
rity architecture of the austrian citizen card concept.
In Computer Security Applications Conference, 2002.
Proceedings. 18th Annual, pages 391–400.
Leitold, H., Lioy, A., and Ribeiro, C. (2014). Stork 2.0:
Breaking new grounds on eid and mandates. In
GmbH, M. M. F., editor, Proceedings of ID World In-
ternational Congress, pages 1 – 8.
Lockhart, H. and Campbell, B. (2008). Security As-
sertion Markup Language (SAML) V2.0 Technical
Overview. Technical report.
WEBIST2015-11thInternationalConferenceonWebInformationSystemsandTechnologies
330