SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
Enabling Trusted and Secure
Online Access to
Government of Canada Services
July 2014
Presented by: Christine Desloges
Treasury Board of Canada Secretariat
Government of Canada
2
GC Security and Identity
Roles & Responsibilities
u Treasury Board of Canada Secretariat (TBS)
•  Management board and employer
•  Sets overall strategy and direction on policy and performance
•  E.g. Policy on Government Security, Directive on ID Management
u Shared Services Canada
•  Delivers common and shared IT services to federal departments
•  Enables horizontal policy implementation
u Departments and Agencies
•  Deliver Government of Canada programs and services
•  Apply policies set by TBS
•  Integrate to Federated Credential Solution
u Office of the Privacy Commissioner
•  Independent oversight of Canada’s Privacy Act and Personal Information
Protection and Electronic Documents Act (PIPEDA)
3
Strategic Relationships
u  Inter-jurisdictional: Joint Councils – Public Sector Service Delivery
Council and Public Sector Chief Information Officer Council
•  Identity Management Sub-Committee (IMSC)
u  International Dialogues
u  Digital ID and Authentication Council of Canada (DIACC)
•  A non-profit coalition of public and private sector leaders recommended by the
Task Force for Payments System Review
•  Committed to develop a pan-Canadian approach to digital identification and
authentication and facilitate development of interoperable policies, standards
and systems
4
Committed to Advancing e-Services
u  Committed to advancing online services
•  Economic Action Plan 2014 highlighted efforts to standardize, consolidate and
improve service delivery to achieve efficiencies
•  The Policy on Service, coming into effect in fall 2014, provides strategic
direction for GC service design and delivery, with a focus on e-services
•  Web Renewal Initiative improves effectiveness of the GC’s web presence by
streamlining and consolidating online information and services under the
Canada.ca portal
•  Cyber Authentication and Federating Identity initiatives are underway which will
further digital service delivery
u  Expectations of Clients
•  Seamless, convenient and secure e-enabled delivery channels
•  Ability to interact seamlessly with different orders of government, through
multiple channels
Pan-Canadian Collaboration
5
Principles:
ü  Respects privacy
ü  Client choice
ü  Governments have a
key role to play
ü  Collaborate with
trusted FPT (Federal,
Provincial, Territorial)
and private sector
institutions
ü  Phased approach to
evolving services and
infrastructure
Federated Approach
Trusting credentials and identities:
• Across jurisdictions
• Across sectors
• Internationally
Federating Credentials Federating Identity
‘trusting credentials
issued by other jurisdictions
and industry sectors’
‘trusting identities
that have been established
by other jurisdictions’
Collaborative	
  effort	
  between	
  jurisdictions	
  and	
  sectors	
  	
  
Private Sector
Authoritative Sources
(Financial institutions, etc.)
Government of
Canada
Authoritative Sources
(Social Insurance Register, ID
(Status) Hub, BN Hub, etc.)
Provinces /
Territories /
Municipalities
Authoritative Sources
(Vital Statistics, Driver’s Licence, etc.)
6
Federating Identity Vision
GC Online Service
Individual applying for
service or benefit
2. Enrol in program
(Provide Name, DOB, etc.
plus consent to validate)
Component CS-01 Page Credential Selector
Access Key English Modification Communications Policy Rqts
Departmental Banner
Français Home Contact Us Help Search canada.gc.ca
Breadcrumb trail >
Department Canada Resource Centre
Department specific
content…
Frequently Asked
Questions (FAQs)
Proactive Disclosure
Access My DDDDDD Account
My DDDDDD Account provides a single point of access to view and update your information.
To access your My DDDDDD account you need to log in using one of two ways:
1. Log in with a Sign-In Partner – this option allows you to log in with a User ID and password that you may already
have, such as for online banking. Tell me more. List of Sign-In Partners.
Note: When choosing this option, you will be temporarily leaving the DDDDDD. For additional information, please
see Important Notices.
2. Log in with Access Key– this option allows you to log in using a Government of Canada User ID and password.
For additional information about these services, please refer to the Frequently Asked Questions (FAQs).
To log in with a Sign-In Partner, select the Sign-­‐In	
  Partner	
  
Log	
  In	
  button below.
To log in with Access Key, select the Access Key Log In
button below.
If you do not have an Access Key and would like to obtain
one, select Register.
Date Modified: YYYY-MM-DD Important Notices
GCKey
Passport
To log in or register with GCKey, select the GCKey
button below
GCKey
If you do not have a GCKey and would like to obtain
Passport Canada
Passport
Passport
Passport Canada. For additional information, please
1. Authenticate to
access service
e-Validation
Service
(Broker)
Operational
Today
Federated
Credentials
Beyond documents, beyond channel
3. Real-time
request for
validation of
information
(e.g Name, DOB)
4. Real-time validation
of information
enabling end-to-end
service fulfillment
Federating Identity Strategy
A Phased Approach
u Phase 1 – Federation of Credentials
•  Privacy central to design with use of anonymous credentials
•  Innovative relationship with the private sector provides client choice and
convenience
•  Ensured access for all GC clients through a GC-issued credential (GCKey)
•  Use of online banking credentials (Credential Broker Service & Sign-In Partners)
•  Cost effective, standards-based solution
u Phase 2 – Federating Identity
•  A whole-of-government approach for seamless e-service delivery
•  Enables departments to form a Federation of trusted organizations and
leverage each others’ identity and credential assurance processes
•  Reduces identity management administration costs
•  Enables improved client experience and user convenience by supporting a
“tell-us-once” approach
•  Anchored in the Policy on Government Security and aligned with Pan-Canadian
assurance model
7
8
Bring Your Own Credentials
u  Credential Broker Service (CBS) - An innovative relationship with
the private sector
•  Enhances service to clients by enabling access to Government of Canada
online services using commercially available credentials
•  Operational since April 2012 with a growing list of Sign-In-Partners
•  Leverages private sector investments in cyber security and infrastructure
•  Respects privacy through use of minimal, non-personally identifiable
information and anonymous credentials
•  Positions the Government of Canada to benefit from ongoing industry
investments in secure cyber authentication technology
u  GCKey Service – Provides option to use a Government of Canada
credential
•  Ensures all Government of Canada clients have the ability to securely log in to
e-services
Cyber Authentication Renewal
•  Foundational to the GC’s
Federating Identity Strategy
•  Leverages private sector
investment in secure
infrastructure
•  A growing list of Sign-In
Partners
•  BMO Financial Group
•  ScotiaBank
•  TD Bank Group
•  CUETS Choice Rewards
(Credit Union Electronic
Transaction Services)
•  Tangerine
9
10
Government of Canada Policy
Architecture
Policy on
Government Security (PGS)
Directive on
Identity Management
Directive on Departmental Security Management
Directive on IM Roles & Responsibilities
Controlled Goods Directive
Standard on Identity and
Credential Assurance
Guideline on Defining
Authentication Requirements
Guideline on Identity Assurance*
Protocol for Federating Identity*
Cyber Authentication
Technology Solutions (CATS)
User Authentication Guidance
for IT Systems (CSEC ITSG-31)
5 supporting
documents
developed by TBS
& Communications
Security
Establishment
Canada
Mandatory
instruments for
all departments
and agencies
* Currently in draft
11
Moving Forward
u  Treasury Board of Canada Secretariat (TBS) – Chief Information
Officer Branch is leading discussions on federating identity within
the Government of Canada, building on the solid foundation of
cyber authentication
u  Privacy remains central to the federating identity strategy
u  Policy positions will evolve through continuing engagement and
consultation with Government of Canada departments and
agencies
u  TBS is engaging other jurisdictions and the private sector to
ensure consistency and a Pan-Canadian approach
Pan-Canadian Identity Messaging Hub
u  Feasibility study in progress for a proposed Pan-Canadian ID
Messaging Hub which would enable Canadians to inform all
orders of government once about important life events :
•  A real time, cost-effective service
•  Enables the secure confirmation of identity (personal)
information
•  Federal, provincial, territorial and municipal (FPTM)
partners
12
Questions & Discussion
13

Contenu connexe

Tendances

The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010SC Leung
 
B17: U.S. Chamber of Commerce, the Thai Chamber of Commerce, and AmCham Thail...
B17: U.S. Chamber of Commerce, the Thai Chamber of Commerce, and AmCham Thail...B17: U.S. Chamber of Commerce, the Thai Chamber of Commerce, and AmCham Thail...
B17: U.S. Chamber of Commerce, the Thai Chamber of Commerce, and AmCham Thail...Kullarat Phongsathaporn
 
Blue Badge Improvement Service
Blue Badge Improvement ServiceBlue Badge Improvement Service
Blue Badge Improvement Servicetransportscotland
 
Exploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in HealthcareExploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in HealthcareIonixx Technologies Inc.
 
S17: Thai BMA | Digital asset and STO (24 May 2019)
S17: Thai BMA | Digital asset and STO (24 May 2019)S17: Thai BMA | Digital asset and STO (24 May 2019)
S17: Thai BMA | Digital asset and STO (24 May 2019)Kullarat Phongsathaporn
 
A7: Chulalongkorn University | E-Payment and FinTech (2018)
A7: Chulalongkorn University | E-Payment and FinTech (2018)A7: Chulalongkorn University | E-Payment and FinTech (2018)
A7: Chulalongkorn University | E-Payment and FinTech (2018)Kullarat Phongsathaporn
 
Securing eHealth, eGovernment and eBanking with Java - JCON Conference
 Securing eHealth, eGovernment and eBanking with Java - JCON Conference Securing eHealth, eGovernment and eBanking with Java - JCON Conference
Securing eHealth, eGovernment and eBanking with Java - JCON ConferenceThodoris Bais
 
S2: FinTech Markets and Laws in Thailand (20 Oct 2021)
S2: FinTech Markets and Laws in Thailand (20 Oct 2021)S2: FinTech Markets and Laws in Thailand (20 Oct 2021)
S2: FinTech Markets and Laws in Thailand (20 Oct 2021)Kullarat Phongsathaporn
 
S26: Techsauce | A New World of FinTech Regulation: What the Future Holds (23...
S26: Techsauce | A New World of FinTech Regulation: What the Future Holds (23...S26: Techsauce | A New World of FinTech Regulation: What the Future Holds (23...
S26: Techsauce | A New World of FinTech Regulation: What the Future Holds (23...Kullarat Phongsathaporn
 
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 ConferenceSecuring eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 ConferenceThodoris Bais
 
“KIOSK Solutions” KeyKIOSK Banking Solution
“KIOSK Solutions” KeyKIOSK Banking Solution“KIOSK Solutions” KeyKIOSK Banking Solution
“KIOSK Solutions” KeyKIOSK Banking SolutionKeyBS DMCC
 
Smarter govenrment moldova's governance etransformation strategy victor bodiu...
Smarter govenrment moldova's governance etransformation strategy victor bodiu...Smarter govenrment moldova's governance etransformation strategy victor bodiu...
Smarter govenrment moldova's governance etransformation strategy victor bodiu...moldovaictsummit
 
2016-09-16-NationalArchitectureForDigitalServices
2016-09-16-NationalArchitectureForDigitalServices2016-09-16-NationalArchitectureForDigitalServices
2016-09-16-NationalArchitectureForDigitalServicesPetteri Kivimäki
 
Various blockchain specialization domains
Various blockchain specialization domainsVarious blockchain specialization domains
Various blockchain specialization domainsBlockchain Council
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityGareth Niblett
 

Tendances (18)

The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010The Hong Kong Public Key Infrastruture 2010
The Hong Kong Public Key Infrastruture 2010
 
GHANA ToC2
GHANA ToC2GHANA ToC2
GHANA ToC2
 
B17: U.S. Chamber of Commerce, the Thai Chamber of Commerce, and AmCham Thail...
B17: U.S. Chamber of Commerce, the Thai Chamber of Commerce, and AmCham Thail...B17: U.S. Chamber of Commerce, the Thai Chamber of Commerce, and AmCham Thail...
B17: U.S. Chamber of Commerce, the Thai Chamber of Commerce, and AmCham Thail...
 
A11: TAI | FinTech (3 Aug 2020)
A11: TAI | FinTech (3 Aug 2020)A11: TAI | FinTech (3 Aug 2020)
A11: TAI | FinTech (3 Aug 2020)
 
Blue Badge Improvement Service
Blue Badge Improvement ServiceBlue Badge Improvement Service
Blue Badge Improvement Service
 
Exploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in HealthcareExploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in Healthcare
 
S17: Thai BMA | Digital asset and STO (24 May 2019)
S17: Thai BMA | Digital asset and STO (24 May 2019)S17: Thai BMA | Digital asset and STO (24 May 2019)
S17: Thai BMA | Digital asset and STO (24 May 2019)
 
PKI in Government Digital Identity Management Systems
PKI in Government Digital Identity Management SystemsPKI in Government Digital Identity Management Systems
PKI in Government Digital Identity Management Systems
 
A7: Chulalongkorn University | E-Payment and FinTech (2018)
A7: Chulalongkorn University | E-Payment and FinTech (2018)A7: Chulalongkorn University | E-Payment and FinTech (2018)
A7: Chulalongkorn University | E-Payment and FinTech (2018)
 
Securing eHealth, eGovernment and eBanking with Java - JCON Conference
 Securing eHealth, eGovernment and eBanking with Java - JCON Conference Securing eHealth, eGovernment and eBanking with Java - JCON Conference
Securing eHealth, eGovernment and eBanking with Java - JCON Conference
 
S2: FinTech Markets and Laws in Thailand (20 Oct 2021)
S2: FinTech Markets and Laws in Thailand (20 Oct 2021)S2: FinTech Markets and Laws in Thailand (20 Oct 2021)
S2: FinTech Markets and Laws in Thailand (20 Oct 2021)
 
S26: Techsauce | A New World of FinTech Regulation: What the Future Holds (23...
S26: Techsauce | A New World of FinTech Regulation: What the Future Holds (23...S26: Techsauce | A New World of FinTech Regulation: What the Future Holds (23...
S26: Techsauce | A New World of FinTech Regulation: What the Future Holds (23...
 
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 ConferenceSecuring eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
Securing eHealth, eGovernment and eBanking with Java - IT-Tage 2020 Conference
 
“KIOSK Solutions” KeyKIOSK Banking Solution
“KIOSK Solutions” KeyKIOSK Banking Solution“KIOSK Solutions” KeyKIOSK Banking Solution
“KIOSK Solutions” KeyKIOSK Banking Solution
 
Smarter govenrment moldova's governance etransformation strategy victor bodiu...
Smarter govenrment moldova's governance etransformation strategy victor bodiu...Smarter govenrment moldova's governance etransformation strategy victor bodiu...
Smarter govenrment moldova's governance etransformation strategy victor bodiu...
 
2016-09-16-NationalArchitectureForDigitalServices
2016-09-16-NationalArchitectureForDigitalServices2016-09-16-NationalArchitectureForDigitalServices
2016-09-16-NationalArchitectureForDigitalServices
 
Various blockchain specialization domains
Various blockchain specialization domainsVarious blockchain specialization domains
Various blockchain specialization domains
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - Identity
 

En vedette

OpenId Connect in Shibboleth Identity Provider
OpenId Connect in Shibboleth Identity ProviderOpenId Connect in Shibboleth Identity Provider
OpenId Connect in Shibboleth Identity ProviderMisagh Moayyed
 
CIS14: Filling the “authentication goes here” Hole in Identity
CIS14: Filling the “authentication goes here” Hole in IdentityCIS14: Filling the “authentication goes here” Hole in Identity
CIS14: Filling the “authentication goes here” Hole in IdentityCloudIDSummit
 
Microsoft Azure Identity and O365
Microsoft Azure Identity and O365Microsoft Azure Identity and O365
Microsoft Azure Identity and O365Kris Wagner
 
CIS 2015- Beyond Federation Protocols- Praerit Garg
CIS 2015- Beyond Federation Protocols- Praerit GargCIS 2015- Beyond Federation Protocols- Praerit Garg
CIS 2015- Beyond Federation Protocols- Praerit GargCloudIDSummit
 
How to CASifying PeopleSoft and Integrating CAS and ADFS
How to CASifying PeopleSoft and Integrating CAS and ADFSHow to CASifying PeopleSoft and Integrating CAS and ADFS
How to CASifying PeopleSoft and Integrating CAS and ADFSJohn Gasper
 
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365Scott Hoag
 
CIS14: Working with OAuth and OpenID Connect
CIS14: Working with OAuth and OpenID ConnectCIS14: Working with OAuth and OpenID Connect
CIS14: Working with OAuth and OpenID ConnectCloudIDSummit
 
2016 09-15 unicon-iam-update
2016 09-15 unicon-iam-update2016 09-15 unicon-iam-update
2016 09-15 unicon-iam-updateLasbrey Nwachukwu
 
Mit 2014 introduction to open id connect and o-auth 2
Mit 2014   introduction to open id connect and o-auth 2Mit 2014   introduction to open id connect and o-auth 2
Mit 2014 introduction to open id connect and o-auth 2Justin Richer
 
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...Mike Schwartz
 

En vedette (13)

OpenId Connect in Shibboleth Identity Provider
OpenId Connect in Shibboleth Identity ProviderOpenId Connect in Shibboleth Identity Provider
OpenId Connect in Shibboleth Identity Provider
 
CIS14: Filling the “authentication goes here” Hole in Identity
CIS14: Filling the “authentication goes here” Hole in IdentityCIS14: Filling the “authentication goes here” Hole in Identity
CIS14: Filling the “authentication goes here” Hole in Identity
 
Microsoft Azure Identity and O365
Microsoft Azure Identity and O365Microsoft Azure Identity and O365
Microsoft Azure Identity and O365
 
CIS 2015- Beyond Federation Protocols- Praerit Garg
CIS 2015- Beyond Federation Protocols- Praerit GargCIS 2015- Beyond Federation Protocols- Praerit Garg
CIS 2015- Beyond Federation Protocols- Praerit Garg
 
CAS IU Presentation
CAS IU PresentationCAS IU Presentation
CAS IU Presentation
 
How to CASifying PeopleSoft and Integrating CAS and ADFS
How to CASifying PeopleSoft and Integrating CAS and ADFSHow to CASifying PeopleSoft and Integrating CAS and ADFS
How to CASifying PeopleSoft and Integrating CAS and ADFS
 
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
JAXSPUG January 2016 - Microsoft Cloud Identities in Azure and Office 365
 
CIS14: Working with OAuth and OpenID Connect
CIS14: Working with OAuth and OpenID ConnectCIS14: Working with OAuth and OpenID Connect
CIS14: Working with OAuth and OpenID Connect
 
2016 09-15 unicon-iam-update
2016 09-15 unicon-iam-update2016 09-15 unicon-iam-update
2016 09-15 unicon-iam-update
 
Mit 2014 introduction to open id connect and o-auth 2
Mit 2014   introduction to open id connect and o-auth 2Mit 2014   introduction to open id connect and o-auth 2
Mit 2014 introduction to open id connect and o-auth 2
 
Standard-based Identity (1)
Standard-based Identity (1)Standard-based Identity (1)
Standard-based Identity (1)
 
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
 
Kantara OTTO slides
Kantara OTTO slidesKantara OTTO slides
Kantara OTTO slides
 

Similaire à CIS14: Kantara - Enabling Trusted and Secure Online Access to Government of Canada Services

Identity Summit 2015: 2Keys Canadian Digital Identity
Identity Summit 2015: 2Keys Canadian Digital Identity Identity Summit 2015: 2Keys Canadian Digital Identity
Identity Summit 2015: 2Keys Canadian Digital Identity ForgeRock
 
Oix local government mydex platform overview 2nd july 2013
Oix local government mydex platform overview 2nd july 2013Oix local government mydex platform overview 2nd july 2013
Oix local government mydex platform overview 2nd july 2013Mydex CIC
 
Myaccount case-study
Myaccount case-studyMyaccount case-study
Myaccount case-studyManoj Sharma
 
Hp 17 s-bbo-1350-brian-reed
Hp 17 s-bbo-1350-brian-reedHp 17 s-bbo-1350-brian-reed
Hp 17 s-bbo-1350-brian-reedSatya Harish
 
Team Rocket, International Blockchain Olympiad 2021, Slide Deck
Team Rocket, International Blockchain Olympiad 2021, Slide DeckTeam Rocket, International Blockchain Olympiad 2021, Slide Deck
Team Rocket, International Blockchain Olympiad 2021, Slide DeckAfnan Faruk
 
Update from the Province of Prince Edward Island - Laura Stanford
Update from the Province of Prince Edward Island  - Laura StanfordUpdate from the Province of Prince Edward Island  - Laura Stanford
Update from the Province of Prince Edward Island - Laura StanfordIdentityNorthEvents
 
5 Digital Onboarding Trends To Watch In 2024.pdf
5 Digital Onboarding Trends To Watch In 2024.pdf5 Digital Onboarding Trends To Watch In 2024.pdf
5 Digital Onboarding Trends To Watch In 2024.pdfVeri5digital
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified IdentitiesUbisecure
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lrFuture Agenda
 
Modernizing the Supply Chain into the 21st Century
Modernizing the Supply Chain into the 21st CenturyModernizing the Supply Chain into the 21st Century
Modernizing the Supply Chain into the 21st CenturyAnil John
 
Electronic identification - digital identities
Electronic identification - digital identitiesElectronic identification - digital identities
Electronic identification - digital identitiesPPI AG
 
Update from the Province of Nova Scotia - Arlene Williams
Update from the Province of Nova Scotia - Arlene WilliamsUpdate from the Province of Nova Scotia - Arlene Williams
Update from the Province of Nova Scotia - Arlene WilliamsIdentityNorthEvents
 
E governance vision and Strategy
E governance vision and StrategyE governance vision and Strategy
E governance vision and Strategyashfaqahammed
 
Household identification for telcos by exacaster
Household identification for telcos by exacasterHousehold identification for telcos by exacaster
Household identification for telcos by exacasterJolita Bernotiene
 
A Survey on e-KYC Verifier Using Blockchain
A Survey on e-KYC Verifier Using BlockchainA Survey on e-KYC Verifier Using Blockchain
A Survey on e-KYC Verifier Using BlockchainIRJET Journal
 

Similaire à CIS14: Kantara - Enabling Trusted and Secure Online Access to Government of Canada Services (20)

Identity Summit 2015: 2Keys Canadian Digital Identity
Identity Summit 2015: 2Keys Canadian Digital Identity Identity Summit 2015: 2Keys Canadian Digital Identity
Identity Summit 2015: 2Keys Canadian Digital Identity
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
 
Oix local government mydex platform overview 2nd july 2013
Oix local government mydex platform overview 2nd july 2013Oix local government mydex platform overview 2nd july 2013
Oix local government mydex platform overview 2nd july 2013
 
Myaccount case-study
Myaccount case-studyMyaccount case-study
Myaccount case-study
 
Hp 17 s-bbo-1350-brian-reed
Hp 17 s-bbo-1350-brian-reedHp 17 s-bbo-1350-brian-reed
Hp 17 s-bbo-1350-brian-reed
 
MISMO / eMortgage Update
MISMO / eMortgage UpdateMISMO / eMortgage Update
MISMO / eMortgage Update
 
Team Rocket, International Blockchain Olympiad 2021, Slide Deck
Team Rocket, International Blockchain Olympiad 2021, Slide DeckTeam Rocket, International Blockchain Olympiad 2021, Slide Deck
Team Rocket, International Blockchain Olympiad 2021, Slide Deck
 
Update from the Province of Prince Edward Island - Laura Stanford
Update from the Province of Prince Edward Island  - Laura StanfordUpdate from the Province of Prince Edward Island  - Laura Stanford
Update from the Province of Prince Edward Island - Laura Stanford
 
5 Digital Onboarding Trends To Watch In 2024.pdf
5 Digital Onboarding Trends To Watch In 2024.pdf5 Digital Onboarding Trends To Watch In 2024.pdf
5 Digital Onboarding Trends To Watch In 2024.pdf
 
Kantara Overview June 2013
Kantara Overview June 2013Kantara Overview June 2013
Kantara Overview June 2013
 
The taxation of digital financial services – Christopher Wales
The taxation of digital financial services – Christopher WalesThe taxation of digital financial services – Christopher Wales
The taxation of digital financial services – Christopher Wales
 
Using Strong / Verified Identities
Using Strong / Verified IdentitiesUsing Strong / Verified Identities
Using Strong / Verified Identities
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
 
Modernizing the Supply Chain into the 21st Century
Modernizing the Supply Chain into the 21st CenturyModernizing the Supply Chain into the 21st Century
Modernizing the Supply Chain into the 21st Century
 
Electronic identification - digital identities
Electronic identification - digital identitiesElectronic identification - digital identities
Electronic identification - digital identities
 
Update from the Province of Nova Scotia - Arlene Williams
Update from the Province of Nova Scotia - Arlene WilliamsUpdate from the Province of Nova Scotia - Arlene Williams
Update from the Province of Nova Scotia - Arlene Williams
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
 
E governance vision and Strategy
E governance vision and StrategyE governance vision and Strategy
E governance vision and Strategy
 
Household identification for telcos by exacaster
Household identification for telcos by exacasterHousehold identification for telcos by exacaster
Household identification for telcos by exacaster
 
A Survey on e-KYC Verifier Using Blockchain
A Survey on e-KYC Verifier Using BlockchainA Survey on e-KYC Verifier Using Blockchain
A Survey on e-KYC Verifier Using Blockchain
 

Plus de CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

Plus de CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Dernier

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Dernier (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

CIS14: Kantara - Enabling Trusted and Secure Online Access to Government of Canada Services

  • 1. Enabling Trusted and Secure Online Access to Government of Canada Services July 2014 Presented by: Christine Desloges Treasury Board of Canada Secretariat Government of Canada
  • 2. 2 GC Security and Identity Roles & Responsibilities u Treasury Board of Canada Secretariat (TBS) •  Management board and employer •  Sets overall strategy and direction on policy and performance •  E.g. Policy on Government Security, Directive on ID Management u Shared Services Canada •  Delivers common and shared IT services to federal departments •  Enables horizontal policy implementation u Departments and Agencies •  Deliver Government of Canada programs and services •  Apply policies set by TBS •  Integrate to Federated Credential Solution u Office of the Privacy Commissioner •  Independent oversight of Canada’s Privacy Act and Personal Information Protection and Electronic Documents Act (PIPEDA)
  • 3. 3 Strategic Relationships u  Inter-jurisdictional: Joint Councils – Public Sector Service Delivery Council and Public Sector Chief Information Officer Council •  Identity Management Sub-Committee (IMSC) u  International Dialogues u  Digital ID and Authentication Council of Canada (DIACC) •  A non-profit coalition of public and private sector leaders recommended by the Task Force for Payments System Review •  Committed to develop a pan-Canadian approach to digital identification and authentication and facilitate development of interoperable policies, standards and systems
  • 4. 4 Committed to Advancing e-Services u  Committed to advancing online services •  Economic Action Plan 2014 highlighted efforts to standardize, consolidate and improve service delivery to achieve efficiencies •  The Policy on Service, coming into effect in fall 2014, provides strategic direction for GC service design and delivery, with a focus on e-services •  Web Renewal Initiative improves effectiveness of the GC’s web presence by streamlining and consolidating online information and services under the Canada.ca portal •  Cyber Authentication and Federating Identity initiatives are underway which will further digital service delivery u  Expectations of Clients •  Seamless, convenient and secure e-enabled delivery channels •  Ability to interact seamlessly with different orders of government, through multiple channels
  • 5. Pan-Canadian Collaboration 5 Principles: ü  Respects privacy ü  Client choice ü  Governments have a key role to play ü  Collaborate with trusted FPT (Federal, Provincial, Territorial) and private sector institutions ü  Phased approach to evolving services and infrastructure Federated Approach Trusting credentials and identities: • Across jurisdictions • Across sectors • Internationally Federating Credentials Federating Identity ‘trusting credentials issued by other jurisdictions and industry sectors’ ‘trusting identities that have been established by other jurisdictions’ Collaborative  effort  between  jurisdictions  and  sectors    
  • 6. Private Sector Authoritative Sources (Financial institutions, etc.) Government of Canada Authoritative Sources (Social Insurance Register, ID (Status) Hub, BN Hub, etc.) Provinces / Territories / Municipalities Authoritative Sources (Vital Statistics, Driver’s Licence, etc.) 6 Federating Identity Vision GC Online Service Individual applying for service or benefit 2. Enrol in program (Provide Name, DOB, etc. plus consent to validate) Component CS-01 Page Credential Selector Access Key English Modification Communications Policy Rqts Departmental Banner Français Home Contact Us Help Search canada.gc.ca Breadcrumb trail > Department Canada Resource Centre Department specific content… Frequently Asked Questions (FAQs) Proactive Disclosure Access My DDDDDD Account My DDDDDD Account provides a single point of access to view and update your information. To access your My DDDDDD account you need to log in using one of two ways: 1. Log in with a Sign-In Partner – this option allows you to log in with a User ID and password that you may already have, such as for online banking. Tell me more. List of Sign-In Partners. Note: When choosing this option, you will be temporarily leaving the DDDDDD. For additional information, please see Important Notices. 2. Log in with Access Key– this option allows you to log in using a Government of Canada User ID and password. For additional information about these services, please refer to the Frequently Asked Questions (FAQs). To log in with a Sign-In Partner, select the Sign-­‐In  Partner   Log  In  button below. To log in with Access Key, select the Access Key Log In button below. If you do not have an Access Key and would like to obtain one, select Register. Date Modified: YYYY-MM-DD Important Notices GCKey Passport To log in or register with GCKey, select the GCKey button below GCKey If you do not have a GCKey and would like to obtain Passport Canada Passport Passport Passport Canada. For additional information, please 1. Authenticate to access service e-Validation Service (Broker) Operational Today Federated Credentials Beyond documents, beyond channel 3. Real-time request for validation of information (e.g Name, DOB) 4. Real-time validation of information enabling end-to-end service fulfillment
  • 7. Federating Identity Strategy A Phased Approach u Phase 1 – Federation of Credentials •  Privacy central to design with use of anonymous credentials •  Innovative relationship with the private sector provides client choice and convenience •  Ensured access for all GC clients through a GC-issued credential (GCKey) •  Use of online banking credentials (Credential Broker Service & Sign-In Partners) •  Cost effective, standards-based solution u Phase 2 – Federating Identity •  A whole-of-government approach for seamless e-service delivery •  Enables departments to form a Federation of trusted organizations and leverage each others’ identity and credential assurance processes •  Reduces identity management administration costs •  Enables improved client experience and user convenience by supporting a “tell-us-once” approach •  Anchored in the Policy on Government Security and aligned with Pan-Canadian assurance model 7
  • 8. 8 Bring Your Own Credentials u  Credential Broker Service (CBS) - An innovative relationship with the private sector •  Enhances service to clients by enabling access to Government of Canada online services using commercially available credentials •  Operational since April 2012 with a growing list of Sign-In-Partners •  Leverages private sector investments in cyber security and infrastructure •  Respects privacy through use of minimal, non-personally identifiable information and anonymous credentials •  Positions the Government of Canada to benefit from ongoing industry investments in secure cyber authentication technology u  GCKey Service – Provides option to use a Government of Canada credential •  Ensures all Government of Canada clients have the ability to securely log in to e-services
  • 9. Cyber Authentication Renewal •  Foundational to the GC’s Federating Identity Strategy •  Leverages private sector investment in secure infrastructure •  A growing list of Sign-In Partners •  BMO Financial Group •  ScotiaBank •  TD Bank Group •  CUETS Choice Rewards (Credit Union Electronic Transaction Services) •  Tangerine 9
  • 10. 10 Government of Canada Policy Architecture Policy on Government Security (PGS) Directive on Identity Management Directive on Departmental Security Management Directive on IM Roles & Responsibilities Controlled Goods Directive Standard on Identity and Credential Assurance Guideline on Defining Authentication Requirements Guideline on Identity Assurance* Protocol for Federating Identity* Cyber Authentication Technology Solutions (CATS) User Authentication Guidance for IT Systems (CSEC ITSG-31) 5 supporting documents developed by TBS & Communications Security Establishment Canada Mandatory instruments for all departments and agencies * Currently in draft
  • 11. 11 Moving Forward u  Treasury Board of Canada Secretariat (TBS) – Chief Information Officer Branch is leading discussions on federating identity within the Government of Canada, building on the solid foundation of cyber authentication u  Privacy remains central to the federating identity strategy u  Policy positions will evolve through continuing engagement and consultation with Government of Canada departments and agencies u  TBS is engaging other jurisdictions and the private sector to ensure consistency and a Pan-Canadian approach
  • 12. Pan-Canadian Identity Messaging Hub u  Feasibility study in progress for a proposed Pan-Canadian ID Messaging Hub which would enable Canadians to inform all orders of government once about important life events : •  A real time, cost-effective service •  Enables the secure confirmation of identity (personal) information •  Federal, provincial, territorial and municipal (FPTM) partners 12