SlideShare une entreprise Scribd logo
1  sur  23
EIDAS REGULATION
10/13/2016 1
10/13/2016 2
Legal definition for ICT “jargon”:
Electronic identification
Election authentication
Electronic Signature (simple,
advanced, qualified)
Web site authentication
Electronic Time Stamping
Electronic Document delivery
Electronic Seal
…
Qualified Electronic Signature in
the Cloud :
AKA Server Signing
Authentication level to the Cloud is
becoming key
Re-use of Stork results for:
Authentication Assurance Level
EU PKI model based on:
 PEPS
 VIDP
Electronic identification + electronic authentication =
EU Digital Identity
Scope
10/13/2016 3
10/13/2016 4
10/13/2016 5
MIIJxwYJKoZIhvcNAQcCoIIJuDCCCbQCAQExCzAJBgUrDgMCGgUAMDoGCSqGSIb3DQEHAaAtBCtUaGlzIHRleHQgd2FzIGxvYWRlZCBmcm9tIGEgcGxhaW4gdGV4dCBmaWxloIIHwDCC
A9owggNDoAMCAQICAQIwDQYJKoZIhvcNAQEEBQAwgZQxFTATBgNVBAMTDEVkZW1vIFN1YiBDQTEfMB0GCSqGSIb3DQEJARYQaW5mb0BnZW1hdXRoLmNvbTELMAkGA1UEBhMC
VVMxFTATBgNVBAgTDFBlbm5zeWx2YW5pYTEQMA4GA1UEBxMHSG9yc2hhbTEQMA4GA1UEChMHR2VtcGx1czESMBAGA1UECxQJTk9SQU0gUiZEMB4XDTA0MDMxODE3MjgzMVo
XDTE0MDMxNjE3MjgzMVowgZMxFDASBgNVBAMTC0VkZW1vIEFsaWNlMR8wHQYJKoZIhvcNAQkBFhBpbmZvQGdlbWF1dGguY29tMQswCQYDVQQGEwJVUzEVMBMGA1UECBMM
UGVubnN5bHZhbmlhMRAwDgYDVQQHEwdIb3JzaGFtMRAwDgYDVQQKEwdHZW1wbHVzMRIwEAYDVQQLFAlOT1JBTSBSJkQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBALZg
QPhOOF3cejp2VjWC0HrmG2xSP7s%2B2vQmfHT1D8gfpFr2f5eCJEn4GyOp4PJxLUlXRK5GheUXvFZcpX7NCR35Qhnfm978EhQ4EIBDjdhevLWsjv3oeei%2BbvzUymTHWDB0zeB5UJA0
M%2B%2BxO6%2BWluLZ16ctTkWJk9PaTvO0fpavAgMBAAGjggE5MIIBNTAhBglghkgBhvhCAQ0EFBYSQ2xpZW50IGNlcnRpZmljYXRlMAwGA1UdEwEB%2FwQCMAAwHQYDVR0OBBY
EFBYpejZfj966yRyue%2BRxS4NcR9vYMIHCBgNVHSMEgbowgbeAFBnk2hBUF9dgh7OuLL11nf62RSEIoYGbpIGYMIGVMQswCQYDVQQGEwJVUzEVMBMGA1UECBMMUGVubnN5bHZ
hbmlhMRAwDgYDVQQHEwdIb3JzaGFtMRYwFAYDVQQDEw1FZGVtbyBSb290IENBMR8wHQYJKoZIhvcNAQkBFhBpbmZvQGdlbWF1dGguY29tMRAwDgYDVQQKEwdHZW1wbHVzMRI
wEAYDVQQLFAlOT1JBTSBSJkSCAQEwCwYDVR0PBAQDAgXgMBEGCWCGSAGG%2BEIBAQQEAwIFoDANBgkqhkiG9w0BAQQFAAOBgQByaKGrjynQMJc3lJ9ZMZyjDMy7lfcne2cVphj18
GGJpsC8dzPR4y6uNl1BQ7MrYPUV9HH0rR5Onw02wMo5bnmyiGyPPE7YvXa0US1feOI0Ls3aCyCs2wbJ2ko7Z72j2scO%2FwZH7g8LBb7%2BepFftguH92YLE1Q2MgjEZX%2Fmqv5NfDC
CA94wggNHoAMCAQICAQEwDQYJKoZIhvcNAQEEBQAwgZUxCzAJBgNVBAYTAlVTMRUwEwYDVQQIEwxQZW5uc3lsdmFuaWExEDAOBgNVBAcTB0hvcnNoYW0xFjAUBgNVBAMTDUV
kZW1vIFJvb3QgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9AZ2VtYXV0aC5jb20xEDAOBgNVBAoTB0dlbXBsdXMxEjAQBgNVBAsUCU5PUkFNIFImRDAeFw0wNDAzMTgxNzI2MzVaFw0x
NDAzMTYxNzI2MzVaMIGUMRUwEwYDVQQDEwxFZGVtbyBTdWIgQ0ExHzAdBgkqhkiG9w0BCQEWEGluZm9AZ2VtYXV0aC5jb20xCzAJBgNVBAYTAlVTMRUwEwYDVQQIEwxQZW5uc3
lsdmFuaWExEDAOBgNVBAcTB0hvcnNoYW0xEDAOBgNVBAoTB0dlbXBsdXMxEjAQBgNVBAsUCU5PUkFNIFImRDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAxL%2B6ZgyvWPID
Sh07N8XKht0mqAyj%2BmGcTvCTtKv1JJCZIPtNjJ3T5lHSjldwLlfpuoYkQApG%2FGyo1Cox0oKlyKbD%2FsAQsFbHIIGM75xLyjeqXHO0UzkHb9RMFdNsiBuak4dV%2B3mINmzFMv7Ex4M
zVcMw2G2%2F1Z%2BFEt6%2BqNqC88ECAwEAAaOCATswggE3MB0GCWCGSAGG%2BEIBDQQQFg5DQSBjZXJ0aWZpY2F0ZTASBgNVHRMBAf8ECDAGAQH%2FAgEAMB0GA1UdDgQ
WBBQZ5NoQVBfXYIezriy9dZ3%2BtkUhCDCBwgYDVR0jBIG6MIG3gBRDPGZtLIsqyiRlY39t2wGlK3Z3KKGBm6SBmDCBlTELMAkGA1UEBhMCVVMxFTATBgNVBAgTDFBlbm5zeWx2YW5
pYTEQMA4GA1UEBxMHSG9yc2hhbTEWMBQGA1UEAxMNRWRlbW8gUm9vdCBDQTEfMB0GCSqGSIb3DQEJARYQaW5mb0BnZW1hdXRoLmNvbTEQMA4GA1UEChMHR2VtcGx1czES
MBAGA1UECxQJTk9SQU0gUiZEggEAMAsGA1UdDwQEAwIBBjARBglghkgBhvhCAQEEBAMCAQYwDQYJKoZIhvcNAQEEBQADgYEAuWSCUQ9%2ByUVtKCUXm4W64XePDcRIlS32nLrHv
bREi7%2BMQt%2BKGtkH00eZa9wxTrp0QgVCo4H03YptQWQJgxBKb7dLB5EtFpBienrKnkfLlbdhjHZWXB03i%2FcgPjC7xgudgmooKcLWNJz7a5iOfHUf%2B3GxveRezBSa76iaRzUcM5wx
ggGgMIIBnAIBATCBmjCBlDEVMBMGA1UEAxMMRWRlbW8gU3ViIENBMR8wHQYJKoZIhvcNAQkBFhBpbmZvQGdlbWF1dGguY29tMQswCQYDVQQGEwJVUzEVMBMGA1UECBMMU
GVubnN5bHZhbmlhMRAwDgYDVQQHEwdIb3JzaGFtMRAwDgYDVQQKEwdHZW1wbHVzMRIwEAYDVQQLFAlOT1JBTSBSJkQCAQIwCQYFKw4DAhoFAKBdMBgGCSqGSIb3DQEJAzELBg
kqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTEwMDkxMzE2NDY0MlowIwYJKoZIhvcNAQkEMRYEFFctKwKOBQXuRz1LPNvXWH2EHnm3MA0GCSqGSIb3DQEBAQUABIGArpBqvMgz
cSYFGzEDXLU%2FMRehztIPBDuVpk8fk1KH%2Be6ZXmg1uUKiYAY5Tj3XlrMJbroH5tYb1dM7bH%2Brlp8F5lxpP1d%2FMQPc0tzFVC8XyvSahvuASjF0zXOmmuY1zYIF%2FA%2Fvsv%2FU
xkjytOBZ6oow1UcNHwjhLY93cC7seT1RZ2A%3D
Certificate Info
Unique Serial Number,
format, crypto info, validity
date, usage (verif, encrypt)…
Holder identification
Name, mail address…
Public key
Issuer identification
CA name, DP address…
Extensions
Additional standard or
proprietary info
Certificate Signature
Using Issuer’s private key
Public certificate
Electronic Signature
Privacy by Design within a PKI infrastructure?
Public information as it is a public
certificate
10/13/2016 6
1999
10/13/2016 7
10/13/2016 8
Upcoming US/EU free trade zone
agreement - in 2013 = 649 B USD
10/13/2016 9
national prerogative.
mutual recognition
unambiguity
Trusted Identities in Cyberspace.
and
authenticate their digital identities
10/13/2016 10
10/13/2016 11
 Application and registration.
 Identity proofing and verification.
 Binding between the electronic identification means of
natural and legal persons.
Enrolment
 eID means characteristics and design.
 Issuance, delivery and activation.
 Suspension, revocation and reactivation.
 Renewal and replacement.
Electronic identification
means management
 Authentication mechanism.Authentication
 General provisions.
 Published notices and user information.
 Information security management.
 Record keeping, facilities and staff, technical controls,
compliance and audit.
Management and
organization
eID LoA is based on the reliability and
quality of each element*
*Article 1 of Implementing Act
10/13/2016 12
Assurance
level
Characterisitics and design Authentication
Substantial  At least two authentication factors from
different categories.
 Can be assumed to be used only if under
the control or possession of the person.
 Dynamic authentication.
 It is highly unlikely that guessing,
eavesdropping, replay or manipulation of
communication by an attacker with
moderate attack potential can subvert the
authentication mechanisms.
High Level substantial, plus:
 Protects against duplication, tampering
and attackers with high attack potential.
 It can be reliably protected by the person
against use by others.
Level substantial, plus:
 It is highly unlikely that guessing,
eavesdropping, replay or manipulation of
communication by an attacker with high
attack potential can subvert the
authentication mechanisms.
10/13/2016 13
10/13/2016 14
LEVEL 1
LEVEL 2
LEVEL 3 LEVEL 3
LEVEL 4
Token
OTP
Legacy
Password
2FA
Token
+ pw
Token OTP + pw
Token
PIN PAD
Token OTP
(PIN + certified
TEE or SE)
PKI ID (PIN +
SE, SIM/eSE)
Weak
Authentication
Secure
Authentication
Strong
Authentication
Strong
Authentication
w/secure devices
Strong
Authentication
w/secure devices
with tamper
resistance capability
Risk extremely high Risk mitigated Low risk Low risk Minimal riskRisk level
PKI eID
(PIN)
No Identity Proofing Presentation of
Identity Information Verification of Identity Information Face to face
registration
LOW SUBSTANTIAL HIGH
EnrolmentAuthenticationElectronicIDmeans
Out of
Regulation
scope
Levels of Assurance
10/13/2016 15
eIDAS Regulation vs eIDAS token specifications
Legal frame for Trusted services
Electronic
signature
ElectronicSeal
ElectronicStamp
Electronic
registereddelivery
service
Qualifiedcertificate
forwebsite
authentication
eIDAS Regulation
Perform a
qualified
signature
Without GAP
With GAP
EAC V2.05
backward
compatible
Pseudo ID
with ERA
Common electronic
identification : e-ID LDS
Common
electronic
authentication:
GAP
Standard API to use Biometry as User
Authentication method (Finger Print, Voice,
Iris, Face)
Legal frame for: electronic
identification, authentication
eIDAS token specifications
TR Signature
TR Physical User Authentication
10/13/2016 16
Timeline
•In line with the Implementing acts with eIDAS token
specifications - July 2014-July 2016.
•First pre-notification of eID: mid 2016.
•Mutual recognition (voluntary) between 2 MS: mid 2017.
•Obligation of Mutual recognition : 1st of January 2019.
Greek
P.
Italian
P.
Latvia
P.
Lux.
P.
NL
P.
Slovakia
P.
Malta
P.
UK
P.
Estonia
P.
Bulgaria
P.
Austria
P.
Romania
P.
Directive 99/93/EC (and PPSCD)
10/13/2016 17
10/13/2016 18
Contact only
Contactless
only
Hybrid
Dual
interface
Estonia
Germany eIDAS
Cyprus eIDAS
Netherlands (ICAO only)
Slovakia (eIDAS)
Poland
Netherlands (privacy
card)
Italy
Greece
Eurosmart
customers
New
projects
Finland
Belgium
Portugal
Czech Republic
Luxembourg
Bulgaria (EAC V2.05
/ eIDAS)
Malta
Sweden
Lithuania
Latvia (IAS ECC à ICAO)
Spain
WHAT EUROSMART IS
19
10/13/2016 20
What Eurosmart is
About us
Eurosmart is a non-profit association located in Brussels and
representing the smart security industry. Founded in 1995, the
association advocates the use of smart secure devices and smart
security solutions to enhance the usability of digital services while
protecting privacy and combatting fraud.
The association is fully involved in political and technical initiatives as
well as R&D at the European and international levels.
About our members
 Members are manufacturers of smart cards, semiconductors,
academics, laboratories and associations.
 They share common European root:
– Annual turnover of over 15 billion euros of which over 40% is
generated in Europe.
– Close to 60.000 employees worldwide, of whom more than 50%
work in the EU.
10/13/2016 21
Eurosmart members
What Eurosmart is
Associate members
10/13/2016 22
Our mission
CONTACTS
23
STEFANE MOUILLE
Vice-President
timothee.mangenot@eurosmart.com
PIERRE-JEAN VERRANDO
Director of operations
pierrejean.verrando@eurosmart.com
Eurosmart | Rue du Luxembourg 19-21 | 1000 Brussels | Belgium
Tél. +32 2 506 88 38
FOLLOW-US

Contenu connexe

Tendances

Cybersecurity in Oil Gas Industry
Cybersecurity in Oil Gas IndustryCybersecurity in Oil Gas Industry
Cybersecurity in Oil Gas IndustryTunde Ogunkoya
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited ResourcesLogRhythm
 
Tata Advanced Systems Limited- Cyber Security Practice Services
Tata Advanced Systems Limited- Cyber Security Practice ServicesTata Advanced Systems Limited- Cyber Security Practice Services
Tata Advanced Systems Limited- Cyber Security Practice ServicesTata Advanced Systems Limited
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Webinar - Automotive SOC - Security Data Analytics for Connected Vehicles
Webinar - Automotive SOC - Security Data Analytics for Connected VehiclesWebinar - Automotive SOC - Security Data Analytics for Connected Vehicles
Webinar - Automotive SOC - Security Data Analytics for Connected VehiclesHARMAN Connected Services
 
Roles and responsibilities of a CISO
Roles and responsibilities of a CISORoles and responsibilities of a CISO
Roles and responsibilities of a CISOEC-Council
 
ESTUDO DE MERCADO - ELLUS
ESTUDO DE MERCADO - ELLUSESTUDO DE MERCADO - ELLUS
ESTUDO DE MERCADO - ELLUSOdair Tuono
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivSentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivNOAH Advisors
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewTandhy Simanjuntak
 
Getting Started with Azure Sentinel
Getting Started with Azure SentinelGetting Started with Azure Sentinel
Getting Started with Azure SentinelSamik Roy
 
Big Data Analytics for the Industrial Internet of Things
Big Data Analytics for the Industrial Internet of ThingsBig Data Analytics for the Industrial Internet of Things
Big Data Analytics for the Industrial Internet of ThingsAnthony Chen
 
Proactive security: The Opensource Security Testing Methodology Manual (OSSTM...
Proactive security: The Opensource Security Testing Methodology Manual (OSSTM...Proactive security: The Opensource Security Testing Methodology Manual (OSSTM...
Proactive security: The Opensource Security Testing Methodology Manual (OSSTM...DATA SECURITY SOLUTIONS
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
EC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogEC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogNetCom Learning
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 

Tendances (20)

Cybersecurity in Oil Gas Industry
Cybersecurity in Oil Gas IndustryCybersecurity in Oil Gas Industry
Cybersecurity in Oil Gas Industry
 
Cloud security
Cloud security Cloud security
Cloud security
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
Tata Advanced Systems Limited- Cyber Security Practice Services
Tata Advanced Systems Limited- Cyber Security Practice ServicesTata Advanced Systems Limited- Cyber Security Practice Services
Tata Advanced Systems Limited- Cyber Security Practice Services
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Webinar - Automotive SOC - Security Data Analytics for Connected Vehicles
Webinar - Automotive SOC - Security Data Analytics for Connected VehiclesWebinar - Automotive SOC - Security Data Analytics for Connected Vehicles
Webinar - Automotive SOC - Security Data Analytics for Connected Vehicles
 
Roles and responsibilities of a CISO
Roles and responsibilities of a CISORoles and responsibilities of a CISO
Roles and responsibilities of a CISO
 
ESTUDO DE MERCADO - ELLUS
ESTUDO DE MERCADO - ELLUSESTUDO DE MERCADO - ELLUS
ESTUDO DE MERCADO - ELLUS
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
SentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel AvivSentinelOne - NOAH19 Tel Aviv
SentinelOne - NOAH19 Tel Aviv
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
Getting Started with Azure Sentinel
Getting Started with Azure SentinelGetting Started with Azure Sentinel
Getting Started with Azure Sentinel
 
Big Data Analytics for the Industrial Internet of Things
Big Data Analytics for the Industrial Internet of ThingsBig Data Analytics for the Industrial Internet of Things
Big Data Analytics for the Industrial Internet of Things
 
Proactive security: The Opensource Security Testing Methodology Manual (OSSTM...
Proactive security: The Opensource Security Testing Methodology Manual (OSSTM...Proactive security: The Opensource Security Testing Methodology Manual (OSSTM...
Proactive security: The Opensource Security Testing Methodology Manual (OSSTM...
 
Connecting to AWS IoT
Connecting to AWS IoTConnecting to AWS IoT
Connecting to AWS IoT
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Soc
SocSoc
Soc
 
EC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course CatalogEC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course Catalog
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 

En vedette

eIDAS Reference Guide
eIDAS Reference GuideeIDAS Reference Guide
eIDAS Reference GuideSafeNet
 
E-government eIDAS - June 2016
E-government eIDAS - June 2016E-government eIDAS - June 2016
E-government eIDAS - June 2016Link to WhatsApp
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Whitepaper E-Signing at the Inhouse Pos
Whitepaper E-Signing at the Inhouse PosWhitepaper E-Signing at the Inhouse Pos
Whitepaper E-Signing at the Inhouse PosNamirial GmbH
 
eIDAS Regulation (Reg. No. 910/2014)
eIDAS Regulation (Reg. No. 910/2014) eIDAS Regulation (Reg. No. 910/2014)
eIDAS Regulation (Reg. No. 910/2014) Cosetta Masi
 
e-Idenity-and-e-Government_ELAK-Code-Camp-Lecture_I
e-Idenity-and-e-Government_ELAK-Code-Camp-Lecture_Ie-Idenity-and-e-Government_ELAK-Code-Camp-Lecture_I
e-Idenity-and-e-Government_ELAK-Code-Camp-Lecture_IConnected Islands
 
OpenShift: Java EE in the clouds
OpenShift: Java EE in the cloudsOpenShift: Java EE in the clouds
OpenShift: Java EE in the cloudsMax Andersen
 
Case study: JBoss Developer Studio, an IDE for Web, Mobile and Cloud applicat...
Case study: JBoss Developer Studio, an IDE for Web, Mobile and Cloud applicat...Case study: JBoss Developer Studio, an IDE for Web, Mobile and Cloud applicat...
Case study: JBoss Developer Studio, an IDE for Web, Mobile and Cloud applicat...Max Andersen
 
DevOps on Steroids Featuring Red Hat & Alantiss - Pop-up Loft Tel Aviv
DevOps on Steroids Featuring Red Hat & Alantiss - Pop-up Loft Tel AvivDevOps on Steroids Featuring Red Hat & Alantiss - Pop-up Loft Tel Aviv
DevOps on Steroids Featuring Red Hat & Alantiss - Pop-up Loft Tel AvivAmazon Web Services
 
Présentation de la protection sociale française
Présentation de la protection sociale françaisePrésentation de la protection sociale française
Présentation de la protection sociale françaiseStefane Mouille
 
Consulta Stati Generali dell'Innovazione
Consulta Stati Generali dell'InnovazioneConsulta Stati Generali dell'Innovazione
Consulta Stati Generali dell'InnovazioneAndrea Caccia
 
Whitepaper Online E-Signing
Whitepaper Online E-SigningWhitepaper Online E-Signing
Whitepaper Online E-SigningNamirial GmbH
 
Whitepaper Mobile E-Signing
Whitepaper Mobile E-SigningWhitepaper Mobile E-Signing
Whitepaper Mobile E-SigningNamirial GmbH
 
Mobile Internet Moscow
Mobile Internet MoscowMobile Internet Moscow
Mobile Internet MoscowMikhail Zarin
 
SIGNificant ColorPad 6
SIGNificant ColorPad 6SIGNificant ColorPad 6
SIGNificant ColorPad 6Namirial GmbH
 
xyzmo Overview Russian
xyzmo Overview Russianxyzmo Overview Russian
xyzmo Overview RussianNamirial GmbH
 
Docker Tooling for Eclipse
Docker Tooling for EclipseDocker Tooling for Eclipse
Docker Tooling for EclipseMax Andersen
 
xyzmo Company Overview
xyzmo Company Overviewxyzmo Company Overview
xyzmo Company OverviewNamirial GmbH
 

En vedette (20)

eIDAS Reference Guide
eIDAS Reference GuideeIDAS Reference Guide
eIDAS Reference Guide
 
E-government eIDAS - June 2016
E-government eIDAS - June 2016E-government eIDAS - June 2016
E-government eIDAS - June 2016
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Whitepaper E-Signing at the Inhouse Pos
Whitepaper E-Signing at the Inhouse PosWhitepaper E-Signing at the Inhouse Pos
Whitepaper E-Signing at the Inhouse Pos
 
eIDAS Regulation (Reg. No. 910/2014)
eIDAS Regulation (Reg. No. 910/2014) eIDAS Regulation (Reg. No. 910/2014)
eIDAS Regulation (Reg. No. 910/2014)
 
e-Idenity-and-e-Government_ELAK-Code-Camp-Lecture_I
e-Idenity-and-e-Government_ELAK-Code-Camp-Lecture_Ie-Idenity-and-e-Government_ELAK-Code-Camp-Lecture_I
e-Idenity-and-e-Government_ELAK-Code-Camp-Lecture_I
 
OpenShift: Java EE in the clouds
OpenShift: Java EE in the cloudsOpenShift: Java EE in the clouds
OpenShift: Java EE in the clouds
 
Case study: JBoss Developer Studio, an IDE for Web, Mobile and Cloud applicat...
Case study: JBoss Developer Studio, an IDE for Web, Mobile and Cloud applicat...Case study: JBoss Developer Studio, an IDE for Web, Mobile and Cloud applicat...
Case study: JBoss Developer Studio, an IDE for Web, Mobile and Cloud applicat...
 
DevOps on Steroids Featuring Red Hat & Alantiss - Pop-up Loft Tel Aviv
DevOps on Steroids Featuring Red Hat & Alantiss - Pop-up Loft Tel AvivDevOps on Steroids Featuring Red Hat & Alantiss - Pop-up Loft Tel Aviv
DevOps on Steroids Featuring Red Hat & Alantiss - Pop-up Loft Tel Aviv
 
Présentation de la protection sociale française
Présentation de la protection sociale françaisePrésentation de la protection sociale française
Présentation de la protection sociale française
 
Consulta Stati Generali dell'Innovazione
Consulta Stati Generali dell'InnovazioneConsulta Stati Generali dell'Innovazione
Consulta Stati Generali dell'Innovazione
 
Smau 2016 Presentazione Nicola Savino Solution
Smau 2016 Presentazione Nicola Savino SolutionSmau 2016 Presentazione Nicola Savino Solution
Smau 2016 Presentazione Nicola Savino Solution
 
Whitepaper Online E-Signing
Whitepaper Online E-SigningWhitepaper Online E-Signing
Whitepaper Online E-Signing
 
Whitepaper Mobile E-Signing
Whitepaper Mobile E-SigningWhitepaper Mobile E-Signing
Whitepaper Mobile E-Signing
 
Mobile Internet Moscow
Mobile Internet MoscowMobile Internet Moscow
Mobile Internet Moscow
 
SIGNificant ColorPad 6
SIGNificant ColorPad 6SIGNificant ColorPad 6
SIGNificant ColorPad 6
 
xyzmo Overview Russian
xyzmo Overview Russianxyzmo Overview Russian
xyzmo Overview Russian
 
Docker Tooling for Eclipse
Docker Tooling for EclipseDocker Tooling for Eclipse
Docker Tooling for Eclipse
 
Electronic identification
Electronic identificationElectronic identification
Electronic identification
 
xyzmo Company Overview
xyzmo Company Overviewxyzmo Company Overview
xyzmo Company Overview
 

Similaire à Eurosmart presentation on the eidas regulation

Authentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User AuthenticationAuthentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User AuthenticationKelly Colbert
 
Authentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User AuthenticationAuthentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User AuthenticationTransUnion
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lectureynamoto
 
Authentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationAuthentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationSylvain Maret
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays
 
Authentication means in electronic environments
Authentication means in electronic environmentsAuthentication means in electronic environments
Authentication means in electronic environmentsStevenSegaert
 
Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Pierre-Jean Verrando
 
Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001Qafis
 
ePassport reloaded goes mobile
ePassport reloaded goes mobileePassport reloaded goes mobile
ePassport reloaded goes mobileJeroen van Beek
 
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009wegdam
 
Authentifusion: Clarifying the Future of Customer Authentication
Authentifusion: Clarifying the Future of Customer AuthenticationAuthentifusion: Clarifying the Future of Customer Authentication
Authentifusion: Clarifying the Future of Customer AuthenticationMichael Thelander
 
2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacementTELKOMNIKA JOURNAL
 
Mobile Solutions and Market Trends
Mobile Solutions and Market TrendsMobile Solutions and Market Trends
Mobile Solutions and Market TrendsForgeRock
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CloudIDSummit
 
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementMartijn Oostdijk
 

Similaire à Eurosmart presentation on the eidas regulation (20)

Authentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User AuthenticationAuthentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User Authentication
 
Authentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User AuthenticationAuthentifusion: Clarifying the Future of User Authentication
Authentifusion: Clarifying the Future of User Authentication
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lecture
 
Authentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationAuthentication and strong authentication for Web Application
Authentication and strong authentication for Web Application
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
 
Authentication means in electronic environments
Authentication means in electronic environmentsAuthentication means in electronic environments
Authentication means in electronic environments
 
Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...
 
An Online secure ePassport Protocol
An Online secure ePassport ProtocolAn Online secure ePassport Protocol
An Online secure ePassport Protocol
 
Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001Qafis, Regular smartcards 150313001
Qafis, Regular smartcards 150313001
 
ePassport reloaded goes mobile
ePassport reloaded goes mobileePassport reloaded goes mobile
ePassport reloaded goes mobile
 
Encap security
Encap security  Encap security
Encap security
 
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009
 
Authentifusion: Clarifying the Future of Customer Authentication
Authentifusion: Clarifying the Future of Customer AuthenticationAuthentifusion: Clarifying the Future of Customer Authentication
Authentifusion: Clarifying the Future of Customer Authentication
 
E banking security
E banking securityE banking security
E banking security
 
2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement
 
Mobile Solutions and Market Trends
Mobile Solutions and Market TrendsMobile Solutions and Market Trends
Mobile Solutions and Market Trends
 
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
CIS14: FIDO 101 (What, Why and Wherefore of FIDO)
 
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
 
120 i143
120 i143120 i143
120 i143
 
5 nov gsma_eema
5 nov gsma_eema5 nov gsma_eema
5 nov gsma_eema
 

Dernier

Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Hasting Chen
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxmohammadalnahdi22
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrsaastr
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024eCommerce Institute
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...NETWAYS
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesPooja Nehwal
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Krijn Poppe
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Kayode Fayemi
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...NETWAYS
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfhenrik385807
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxFamilyWorshipCenterD
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...henrik385807
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxNikitaBankoti2
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝soniya singh
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024eCommerce Institute
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...NETWAYS
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AITatiana Gurgel
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...NETWAYS
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...NETWAYS
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 

Dernier (20)

Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStrSaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
SaaStr Workshop Wednesday w: Jason Lemkin, SaaStr
 
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
Andrés Ramírez Gossler, Facundo Schinnea - eCommerce Day Chile 2024
 
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
OSCamp Kubernetes 2024 | Zero-Touch OS-Infrastruktur für Container und Kubern...
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
Presentation for the Strategic Dialogue on the Future of Agriculture, Brussel...
 
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
Governance and Nation-Building in Nigeria: Some Reflections on Options for Po...
 
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
OSCamp Kubernetes 2024 | A Tester's Guide to CI_CD as an Automated Quality Co...
 
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdfOpen Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
Open Source Strategy in Logistics 2015_Henrik Hankedvz-d-nl-log-conference.pdf
 
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptxGenesis part 2 Isaiah Scudder 04-24-2024.pptx
Genesis part 2 Isaiah Scudder 04-24-2024.pptx
 
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
CTAC 2024 Valencia - Sven Zoelle - Most Crucial Invest to Digitalisation_slid...
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
Call Girls in Sarojini Nagar Market Delhi 💯 Call Us 🔝8264348440🔝
 
George Lever - eCommerce Day Chile 2024
George Lever -  eCommerce Day Chile 2024George Lever -  eCommerce Day Chile 2024
George Lever - eCommerce Day Chile 2024
 
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
Open Source Camp Kubernetes 2024 | Running WebAssembly on Kubernetes by Alex ...
 
Microsoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AIMicrosoft Copilot AI for Everyone - created by AI
Microsoft Copilot AI for Everyone - created by AI
 
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
OSCamp Kubernetes 2024 | SRE Challenges in Monolith to Microservices Shift at...
 
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
Open Source Camp Kubernetes 2024 | Monitoring Kubernetes With Icinga by Eric ...
 
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Vaishnavi 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Vaishnavi 🤌 8250192130 🚀 Vip Call Girls Kolkata
 

Eurosmart presentation on the eidas regulation