eIDAS Interoperability and Cross-Border Compliance Issues
Abstract
:1. Introduction
2. The eIDAS Regulation Implementations
- Transparency and accountability: Well-defined minimal obligations for Trust Service Providers (TSP) and liability.
- A guarantee of trustworthiness of the services, together with security requirements for TSPs.
- Technological neutrality: Avoiding requirements that could only be met by a specific technology.
- Market rules and standardization certainty.
- Italy, with its SPID scheme, includes multiple eID means provided by several identity providers for low, substantial, and high assurance levels (depending on the type of eID means used).
- Estonia, with six eID schemes based on the national identity card, the resident permit card, a dedicated card (Digi-ID), the diplomatic card, and the e-resident card, and a mobile scheme based on a dedicated PKI-enabled SIM (Mobiil-ID), all for a high assurance level.
- Belgium, Croatia, Luxembourg, and Spain notified eID schemes based on their electronic national identity cards for high assurance levels.
- Portugal and the Czech Republic with eID schemes based on the electronic national identity card for a high assurance level.
- The United Kingdom (even though it is not part of the EU anymore) with GOV.UK Verify and eID means issued by private providers (bank, post office, etc.) and appointed by the UK government for low and substantial assurance levels.
- The Netherlands with a business-oriented scheme (for legal persons) for substantial and high assurance levels depending on the identity provider.
- Slovakia with an eID card-based scheme for nationals and foreigners for a high assurance level.
- Latvia with a card-based scheme and a mobile application for substantial and high assurance levels.
- Italy with a scheme based on electronic identity cards for a high assurance level.
- Belgium with the FAS/a digital identity app called Itsme, a solution provided by Belgian Mobile ID based on a smartphone application as eID means, for a high assurance level.
- Austria with its ID Austria.
- Denmark with NemID.
- France with the eID scheme “FranceConnect+/The Digital Identity La Poste”.
- Lithuania with a Lithuanian National Identity card (eID/ATK).
- Malta with Identity Malta.
- The Czech Republic updated its national identification scheme with the Mobile eGovernment Key and mojeID systems.
- The Netherlands added its DigiD solution.
- Portugal with the commercial provider Chave Móvel Digital.
3. Related Work
4. Methodology
- Is the supervisory body in the Member State providing trust services at the same time?
- Can you open a banking account in your Member State by solely identifying yourself remotely, using electronic identification? Are there any restrictions on assurance levels or trusted service providers when opening such an account? Are there any further restrictions on banking services with this account (e.g., renting a loan)?
- Can you get a qualified certificate remotely, e.g., by using remote video identification? Are there any Member State-level rules defining requirements for video identification?
- Are you familiar with any government-level electronic services that don’t require qualified electronic signatures when filing claims, reporting taxes and similar services? Do you have any regulation that specifically defines assurance levels for different procedures, at least for public services?
- Are businesses able to connect to eIDAS infrastructure? Do you have any laws that specifically allow or prohibit the use of eIDAS infrastructure for businesses? Can companies from other Member State access eIDAS services in your Member State? Are prices for using eIDAS services for companies clear? Can you provide a price list?
- Are you aware of any trust services based on biometric authentication?
- Please describe the online (remote) process of trusted service registration and its use (authentication for the use of identity).
5. Investigation of eIDAS Implementation Issues
5.1. Organizational Independence
5.2. Remote Access to the Banking Services
- eSignature—will help citizens sign legal documents and emails without printing any paper.
- Qualified Web Authentication Certificate—will let citizens know that the websites and apps they like using are trusted and safe.
- eTimestamp—will give citizens proof that they have bought concert tickets.
- eSeal—will guarantee that the football tickets are authentic and are not counterfeit.
- eID—will allow citizens to open a bank account in another country with their national ID card.
- Electronic Registered Delivery Service—will guarantee the protected exchange of data, including proof of sending and receiving the data.
5.3. Remote Video Identification
5.4. The Use of Electronic Signatures in Public Administration
5.5. Commercial Access to the eIDAS Network
5.6. Biometrics as Authentication Mechanism—BYOAD
5.7. Technical Authentication and Onboarding Security Requirements
- Signer authentication.
- A signing key.
- The data to be signed (DTBSR).
- Directly, where the SAM verifies the signee’s authentication factor(s).
- Indirectly, where an external authentication service (e.g., one that is part of the TW4S or delegated party) verifies the signer’s authentication factor(s) and issues an assertion that the signer has been authenticated. The SAM then verifies the assertion.
- Through a combination of two direct or indirect schemes, where the SAM performs part of the signer authentication directly, and another part is performed indirectly by the SAM.
- Trust service providers managing signature creation data on behalf of the user to support the creation of qualified electronic signatures/seals.
- Trust service providers are creating qualified electronic signatures/seals on their own behalf.
- The low assurance level requires the electronic identification scheme to use at least one authentication factor, including username and password.
- The substantial assurance level requires the electronic identification scheme to use at least two authentication factors from different categories (possession, knowledge, or inherent). In total, there are three different factors for authentication: Something you are (inherent), something you have (possession), and something you know (knowledge). Two-factor authentication necessitates two different authentication factors: Something you have (e.g., a mobile device) and something you know (e.g., a PIN code). The user should be in control of or possess the authentication factors, and the authentication process shall include dynamic authentication. An example of a substantial assurance level is the use of one-time passwords that are distributed by text messages to mobile phones.
- The high assurance level requires a substantial assurance level and additional means to protect the electronic identification scheme against duplication and tampering. A high assurance level states the following requirements: Multi-factor authentication, private data/keys stored on tamper-resistant hardware tokens, and cryptographic protection of personally identifying information. An example of a high assurance level is a PKI-based authentication scheme with a hardware authentication token, such as a PKI (Public Key Infrastructure) certificate stored on a smart card plus a PIN.
5.8. SMS as the Second Factor in Multi-Factor Authentication
5.9. Security Questions as a Form of Authentication
- Secret questions have poor security and memorability.
- Statistical attacks and answer distribution prediction are real threats.
- Questions with an expected higher level of differences between users are not as unique as imagined because people provide false answers.
- Potentially more secure questions have a worse recall rate (i.e., less memorable) than less secure counterparts.
- Memorability decreases significantly over time (which is a problem because if security questions are used to reset passwords, they will not be used often).
- Untrue/False answers have worse memorability than truthful answers.
- Other password recovery methods (SMS and email) have a significantly higher chance of success.
- Questions with common answers: Many questions have common answers shared by many users (especially in similar geographical locations).
- Questions with few possible answers: Some questions just do not have many possible answers and can be brute-forced/guessed easily.
- Publicly available answers: Information on the answers can be obtained from public (possibly leaked) records or social network profiles.
- Social engineering: Because the answers are typically not secrets by themselves and users do not perceive them as real passwords, they are more likely to be revealed inadvertently by the users to social engineering methods (e.g., phishing).
- Social guessing attack: Some answers might be easily guessable to people who know the account owner.
5.10. Notability of Changes by Hash Algorithms in Digital Signatures
6. Discussion
- eIDAS 2 should follow the best practices of other certification and supervisory schemes regarding the organizational independence of the supervisory body.
- Essential services for the single market (e.g., banking) should be allowed explicitly in all Member States under the provisions of eIDAS 2 to avoid local limitations and even the prohibition of the use of eIDAS services.
- A security baseline should be established for the remote identification services to avoid degradation of remote identification because of the market competition and to avoid excluding specific services or the Member States from the network based on inadequate security standards.
- Higher market penetration of the highest assurance level needs to be achieved to empower citizens to use any service anytime without additional effort. Promoting or even requiring the use of a substantial assurance level in the public sector wherever possible would support this effort.
- Access to the eIDAS network should be allowed explicitly to the private sector in all Member States. Any limitation to access the eIDAS network through another Member State should at least be discouraged to promote competition between the Member States.
- A strategy for the “Bring Your Own Authentication Device” solution needs to be built, as this approach is gaining traction. At the same time, it represents a “grey area,” at least when combined with biometrics. We propose further research in current state-of-the-art use cases with the intent to identify best practices and definitions of the feasible legal framework for such use of biometric devices.
- An increase in the speed of security standards development is vital as current standards are falling behind the latest cybersecurity developments.
7. Conclusions
Author Contributions
Funding
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- EU. Regulation (Eu) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on Electronic Identification and Trust Services for Electronic Transactions in the Internal Market and Repealing Directive 1999/93/Ec. 2014. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=uriserv%3AOJ.L_.2014.257.01.0073.01.ENG (accessed on 1 December 2022).
- Guillaume, M.; Bounjoua, S.; Clemot, C. eIDAS compliant eID Solutions. ENISA. 2020. Available online: https://www.enisa.europa.eu/publications/eidas-compliant-eid-solutions (accessed on 1 December 2022).
- Kirova, M.; Eichholtzer, M. Overview of Pre-Notified and Notified Eid Schemes under Eidas. Eid User Community. 2019. Available online: https://ec.europa.eu/digital-building-blocks/wikis/display/EIDCOMMUNITY/Overview+of+pre-notified+and+notified+eID+schemes+under+eIDAS (accessed on 1 December 2022).
- Resende, J. D3.13 - Updated Version of Enablers and Components, Cybersec4europe. 2021. Available online: https://cybersec4europe.eu/wp-content/uploads/2022/02/D3.13-Updated-version-of-enablers-and-components-v3.0-submitted.pdf (accessed on 1 December 2022).
- EU. Proposal gor a Regulation of the European Parliament and of the Council Amending Regulation (Eu) No 910/2014 As Regards Establishing a Framework for a European Digital Identity. 2021. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A52021PC0281 (accessed on 1 December 2022).
- EU. Compilation of Information Provided by Member States with Regard to The Implementation of the Trust Services Chapter of the Eidas Regulation. 2017. Available online: https://ec.europa.eu/futurium/en/content/information-member-states-regard-implementation-trust-services-chapter-eidas-regulation.html (accessed on 1 December 2022).
- EU. Eid Documentation—Country Overview. 2020. Available online: https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/Country+overview (accessed on 1 December 2022).
- EU. eID Documentation—eID for You. 2020. Available online: https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/eID+for+You#eIDforYou-eid (accessed on 1 December 2022).
- Pedroli, M.; O’Neill, G.; Fravolini, A.; Marcon, L. Overview of Member States’ Eid Strategies. 2021. Available online: https://ec.europa.eu/cefdigital/wiki/display/EIDCOMMUNITY/National+Strategies (accessed on 1 December 2022).
- Lips, S.; Bharosa, N.; Draheim, D. eIDAS Implementation Challenges: The Case of Estonia and the Netherlands. Commun. Comput. Inform. Sci. 2020, 1349, 75–89. [Google Scholar] [CrossRef]
- Rocha, J. Spanish and Portuguese eIDAS node evolution for electronic identification of European citizens. In Proceedings of the EATIS ’20: Proceedings of the 10th Euro-American Conference on Telematics and Information Systems, Aveiro, Portugal, 25–27 November 2020; pp. 1–5. [Google Scholar] [CrossRef]
- Tsap, V.; Lips, S.; Draheim, D. eID Public Acceptance in Estonia: Towards Understanding the Citizen. In Proceedings of the 21st Annual International Conference on Digital Government Research, Seoul, Korea, 15–19 June 2020. [Google Scholar] [CrossRef]
- Kubicek, H. Introduction: Conceptual framework and research design for a comparative analysis of national eID Management Systems in selected European countries. Ident. Inform. Soc. 2010, 3, 5–26. [Google Scholar] [CrossRef] [Green Version]
- Berbecaru, D.; Atzeni, A.; De Benedictis, M.; Smiraglia, P. Towards Stronger Data Security in An Eid Management Infrastructure. In Proceedings of the 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP), St. Petersburg, Russia, 6–8 March 2017; pp. 391–395. [Google Scholar] [CrossRef]
- Shrishak, K.; Erkin, Z.; Schaar, R. Enhancing User Privacy in Federated eID Schemes. In Proceedings of the 8th IFIPInternational Conference on New Technologies, Mobility and Security (Ntms), Larnaca, Cyprus, 21–23 November 2016. [Google Scholar] [CrossRef]
- Lenz, T.; Zwattendorfer, B. Towards cross-border authorisation in European eID federations. In Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 23–26 August 2016. [Google Scholar] [CrossRef]
- Carretero, J.; Izquierdo-Moreno, G.; Vasile-Cabezas, M.; Garcia-Blas, J. Federated Identity Architecture of the European eID System. IEEE Access 2018, 6, 75302–75326. [Google Scholar] [CrossRef]
- Morgner, F.; Bastian, P.; Fischlin, M. Securing Transactions with the eIDAS Protocols, Information Security Theory and Practice. Lecture Notes Comput. Sci. 2016, 9895, 3–18. [Google Scholar] [CrossRef] [Green Version]
- Phn, D.; Grabatin, M.; Hommel, W. eID and Self-Sovereign Identity Usage: An Overview. Electronics 2021, 10, 2811. [Google Scholar] [CrossRef]
- Roelofs, F. Analysis and Comparison of Identification and Authentication Systems Under the Eidas Regulation, Msc Radbound University. 2019. Available online: https://www.ru.nl/publish/pages/769526/z02_masterthesis_floris_roelofs_final.pdf (accessed on 1 December 2022).
- IFAC. International Standard on Auditing 200: Overall objectives of the independent auditor and the conduct o fan audit in accordance with international standards on auditing, IFAC. 2009. Available online: https://www.ifac.org/system/files/meetings/files/3393.pdf (accessed on 1 December 2022).
- ISO. 19011:2018; Guidelines for Auditing Management Systems. Available online: https://www.iso.org/standard/70017.html/.
- EU. Electronic Identification (Eid) and Trust Eervices for Citizens: Eidas Solutions. Available online: http://ec.europa.eu/newsroom/dae/document.cfm?doc_id=54410 (accessed on 1 December 2022).
- EU. Electronic Id and Trust Services in Action: Open A Bank Account. Available online: http://ec.europa.eu/newsroom/dae/document.cfm?doc_id=54412 (accessed on 1 December 2022).
- Slovenia. Rules on the System for the Exchange of Information on the Indebtedness of Natural Persons (Sisbon). No. 65/17, 6/18, 68/18 and 97/21.18. Available online: http://www.pisrs.si/Pis.web/pregledPredpisa?id=DRUG4429 (accessed on 18 June 2021).
- Spain. Autorización De Procedimientos De Vídeo-Identificación. Madrid: Servicio Ejecutivo de la Comisión de Prevención del Blanqueo de Capitales e Infracciones Monetarias. 2017. Available online: https://www.sepblac.es/wp-content/uploads/2018/02/Autorizacion_video_identificacion.pdf (accessed on 1 December 2022).
- Spain, Ley 10/2010, De 28 De Abril, De Prevención Del Blanqueo De Capitales Y De La Financiación Del Terrorismo. BOE No. 236. Available online: https://www.boe.es/buscar/act.php?id=BOE-A-2010-6737 (accessed on 1 December 2022).
- Turner, D.M. Understanding ZertES - the Swiss Federal Law on Electronic Signatures. Cryptomathic. 2016. Available online: https://www.cryptomathic.com/news-events/blog/understanding-zertes-the-swiss-federal-law-on-electronic-signatures (accessed on 1 December 2022).
- Spain. Orden Etd/465/2021, De 6 De Mayo, Por La Que Se Regulan Los Métodos De Identificación Remota Por Vídeo Para La Expedición De Certificados Electrónicos Cualificados. BOE No. 115. Madrid: MINISTERIO DE ASUNTOS ECONÓMICOS Y TRANSFORMACIÓN DIGITAL. 2021. Available online: https://www.boe.es/eli/es/o/2021/05/06/etd465/dof/spa/pdf (accessed on 1 December 2022).
- ENISA. Assessment of Standards related to eIDAS," ENISA. 2018. Available online: https://www.enisa.europa.eu/publications/assessment-of-standards-related-to-eidas (accessed on 1 December 2022).
- Spain. Prevention of Money Laundering and Terrorist Financing Act. No. 68/16, 81/19, 91/20 and 2/21. Available online: http://www.pisrs.si/Pis.web/pregledPredpisa?id=ZAKO7132 (accessed on 7 January 2021).
- Spain. Electronic Identification and Trust Services Act. No. 121/21 and 189/21. Available online: http://www.pisrs.si/Pis.web/pregledPredpisa?id=ZAKO7550 (accessed on 3 December 2021).
- Spain. Ley 6/2020, De 11 De Noviembre, Reguladora De Determinados Aspectos De Los Servicios Electrónicos De Confianza. BOE No. 298. Available online: https://www.boe.es/buscar/act.php?id=BOE-A-2020-14046 (accessed on 1 December 2022).
- Switzerland. Due Diligence Requirements for Client Onboarding Via Digital Channels, Finma Circular 2016/7: Video And Online Identification. 2016. Available online: https://www.finma.ch/~/media/finma/dokumente/dokumentencenter/myfinma/rundschreiben/finma-rs-2016-07-20210506.pdf?sc_lang=en (accessed on 1 December 2022).
- Spain. Ley 39/2015, de 1 de octubre, del Procedimiento Administrativo Común de las Administraciones Públicas. BOE No. 236. Available online: https://www.boe.es/buscar/act.php?id=BOE-A-2015-10565 (accessed on 1 December 2022).
- Italy. Cos’è SPID. Rome: Agenzia per I’Italia digitale. Available online: https://www.spid.gov.it/cos-e-spid/ (accessed on 1 December 2022).
- Italy. How to Enable Eidas Login for Public Service Providers Participating In The Public Digital Identity System (Spid). Rome: Agenzia Per I’italia Digitale. Available online: https://www.eid.gov.it/abilita-eidas (accessed on 1 December 2022).
- Spain. Real Decreto 203/2021, De 30 De Marzo, Por El Que Se Aprueba El Reglamento De Actuación Y Funcionamiento Del Sector Público Por Medios Electrónicos BOE No. 77. Available online: https://www.boe.es/buscar/act.php?id=BOE-A-2021-5032 (accessed on 1 December 2022).
- ETSI Technical Specification, ETSI TS 119 431-1 - V1.2.1, Electronic Signatures and Infrastructures (Esi); Policy and Security Requirements for Trust Service Providers; Part 1: Tsp Service Components Operating a Remote Qscd Scdev. 2021. Available online: https://www.etsi.org/deliver/etsi_ts/119400_119499/11943101/01.02.01_60/ts_11943101v010201p.pdf (accessed on 1 December 2022).
- ETSI Technical Specification, ETSI TS 119 432 V1.2.1 (2020-10), Electronic Signatures and Infrastructures (Esi); Protocols for Remote Digital Signature Creation. 2020. Available online: https://www.etsi.org/deliver/etsi_ts/119400_119499/119432/01.02.01_60/ts_119432v010201p.pdf (accessed on 1 December 2022).
- Italy. How To Choose Between Digital Identity Providers. Agenzia Per I’italia Digitale. Available online: https://www.spid.gov.it/en/what-is-spid/how-to-choose-between-digital-identity-providers/ (accessed on 1 December 2022).
- NIST; Grassi, P.A.; Garcia, M.E.; Fenton, J.L. Digital Identity Guidelines. 2017. Available online: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-3.pdf (accessed on 1 December 2022).
- NIST. Questions…and buzz surrounding draft NIST Special Publication 800-63-3. Available online: https://www.nist.gov/blogs/cybersecurity-insights/questionsand-buzz-surrounding-draft-nist-special-publication-800-63-3 (accessed on 1 December 2022).
- Dudley, W. Rollback! The United States NIST NO LONGER recommends "Deprecating SMS for 2FA". 2017. Available online: https://blogs.sap.com/2017/07/06/rollback-the-united-states-nist-no-longer-recommends-deprecating-sms-for-2fa/ (accessed on 1 December 2022).
- ENISA. Beware of the Sim Swapping Fraud! 2021. Available online: https://www.enisa.europa.eu/news/enisa-news/beware-of-the-sim-swapping-fraud (accessed on 1 December 2022).
- Positive Technologies, Ss7 Network Security Analysis Report. 2020. Available online: https://www.ptsecurity.com/upload/iblock/3fc/3fce640add5eb5ba9476d416eb0c7f4d.pdf (accessed on 1 December 2022).
- Cox, J. Hackers Are Breaking Directly Into AT&T, T-Mobile, and Sprint to Take Over Customer Phone Numbers, VICE. 2020. Available online: https://www.vice.com/en/article/5dmbjx/how-hackers-are-breaking-into-att-tmobile-sprint-to-sim-swap-yeh (accessed on 1 December 2022).
- Cox, J. A Hacker Got All My Texts for $16, VICE. 2021. Available online: https://www.vice.com/en/article/y3g8wb/hacker-got-my-texts-16-dollars-sakari-netnumber (accessed on 1 December 2022).
- Bonneau, J.; Bursztein, E.; Caron, I.; Jackson, R.; Williamson, M. Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google. In Proceedings of the WWW’15 - Proceedings of the 22nd international conference on World Wide Web, Rio de Janeiro, Brazil, 13–17 May 2015; pp. 141–15010114527362772741691. [Google Scholar]
- Schechter, S.; Brush, A.J.B.; Egelman, S. It’s no secret Measuring the security and reliability of authentication via ’secret’ questions. In Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, Oakland, CA, USA, 17–20 May 2009; pp. 375–390. [Google Scholar] [CrossRef]
- Gontovnikas, M. Are Your Security Questions as Safe as You Think?, auth0 Blog. 2017. Available online: https://auth0.com/blog/are-your-security-questions-as-safe-as-you-think/ (accessed on 1 December 2022).
- Haber, H. Security Questions Pose a High Risk: Learn Tips & Tricks to Mitigate the Threat, BeyondTrust Blog. 2022. Available online: https://www.beyondtrust.com/blog/entry/reused-security-questions-can-pose-a-high-risk-learn-tips-tricks-to-mitigate-the-threat (accessed on 1 December 2022).
- Grassi, P. NIST Special Publication 800-63B - Digital Identity Guidelines: Authentication and Lifecycle Management," National Institute of Standards and Technology (NIST). 2017. Available online: https://csrc.nist.gov/publications/detail/sp/800-63b/final (accessed on 1 December 2022).
- Grassi, P.A. NIST Special Publication 800-63A - Digital identity guidelines: Enrollment and Identity Proofing Requirements, National Institute of Standards and Technology (Nist). 2017. Available online: https://pages.nist.gov/800-63-3/sp800-63a.html (accessed on 1 December 2022).
- NIST. NIST SP 800-63 Digital Identity Guidelines-FAQ. 2022. Available online: https://pages.nist.gov/800-63-FAQ/ (accessed on 1 December 2022).
- Preshing, J. Hash Collision Probabilities, Preshing on Programming. 2011. Available online: https://preshing.com/20110504/hash-collision-probabilities/ (accessed on 1 December 2022).
- Stevens, M.; Bursztein, E.; Karpman, P.; Albertini, A.; Markov, Y. The First Collision for Full SHA-1. Lect. Notes Comput. Sci. 2011, 10401, 570–596. [Google Scholar] [CrossRef]
Member State | Findings |
---|---|
Italy | The supervisory authority for trust services provides qualified trust services simultaneously. The National Register of the Resident Population, Administrative Procedure Management System, Storage |
Slovenia | The supervisory authority is itself providing qualified trust services. The Ministry of Public Administration |
Spain | The supervisory authority for trust services provides non-qualified trust services simultaneously. The Ministry of Economic Affairs and Digital Transformation |
Switzerland | The system is decentralized, and there is no apparent single, centralized supervisory authority. |
Member State | Findings |
---|---|
Italy | Currently, no matter if you are a resident, a temporary worker, a student, a tourist, or a professional traveling often for business—you have to provide the local branch of an Italian bank with the same set of documents as the Italians do: Identification, such as a valid passport, identity card, or driver’s license The Italian tax code called “codice fiscal” and the “Certificato di Attribuzione del Codice Fiscale”, which both come with the Italian tax code. Proof of address in Italy, student enrollment in the university program, or residence permit or work contract. The proposals using the system for payments to the Public Administration are similar to pagoPA, which is the national platform. It allows users to choose how to pay taxes and fees to the Public Administration and other participating entities that provide services to citizens. |
Slovenia | There were rules from 2018 to 2021 that prohibited the use of eIDAS certificates from the other Member States when accessing the central database of credit information (SISBON), defined in “Rules on the system for the exchange of information on the indebtedness of natural persons (SISBON)—article 18” [25]. That meant that even if the bank allowed remote identifications, there were many restrictions on what services the bank could provide to such customers. This changed in June 2021 with the latest changes to the before-mentioned Regulation, including eIDAS, trusted service providers that are now equal to Slovenian trusted service providers. Electronic identification must meet the requirements for a high assurance level. Regardless of the legal basis, none of the Slovenian banks currently provide a remote onboarding service. The bank would have to be included in the eIDAS network to provide such a service to access the identity attributes provided. Even though the new Electronic Identification and Trust Services Act envisions using the eIDAS network for private entities, this access has yet to find its way into actual use. |
Spain | The SEPBLAC (Servicio Ejecutivo de la Comisión de Prevención del Blanqueo de Capitales e Infracciones Monetarias) authorized the use of video-identification processes by financial entities in 2017 [26].It defines a high assurance level, as required by Law 10/2010 [27], on the prevention of money laundering and financing of terrorism. The process involves the presentation of identity documents and a set of technical and organizational measures. |
Switzerland | Previously, a bank account was only possible when a personal identification document and a handwritten signature were provided on-site. As of 1 January 2016, the entire process can be completed electronically: Article 49 (2) of the fully revised FINMA Anti-Money Laundering Ordinance stipulates that a copy of an identification document from a recognized provider of certification services in accordance with the Swiss Electronic Signature Act (ZertES) of 19 December 2003, suffices as authentication [28]. For example, when opening an account at UBS Bank, there are two options available. However, Credit Suisse Bank offers the ability to open an account remotely in full via an app. CIM Bank also allows opening bank accounts online and collaborates with a Swisscom trusted service provider to authenticate signatures. |
Member State | Findings |
---|---|
Italy | The digital signature can be obtained with Video Recognition or with SPID (Sistema Pubblico di identità Digitale) Online Recognition. It is possible to perform Online Video Recognition from a PC or Smartphone with the support of an operator. Online recognition can be performed via SPID every day, 24 h a day, through a PC or Smartphone. |
Slovenia | Slovenia has a Prevention of Money Laundering and Terrorist Financing Act [31]. The intent of the provision is the prevention of money laundering. It is not directly relevant for remote video identification for the issuance of identities, but it is the only Act that defines special requirements for it. Currently, none of the trusted service providers in Slovenia provides remote video identification services that would result in the issuance of electronic identification (either low, substantial, or high assurance levels). Under the Electronic Identification and Trust Services Act [32], electronic identities issued by the Republic of Slovenia can be issued only to Slovenian citizens at least six years old or to foreigners with a domicile or temporary residence in the Republic of Slovenia. There are no other special requirements for any private, trusted service providers. |
Spain | Law 6/2020 [33] authorizes other methods for identification, such as identification via videoconference or video-identification with a level of security equal to the physical authentication and evaluated by a conformity assessment body. To determine the conditions and technical requirements, it must refer to those determined at the EU level (e.g., ETSI TS 119 461 V1.1.1(2021-07)). Furthermore, Order ETD/465/2021 [29] applies to qualified public and private providers of trust services established in Spain or with a permanent establishment located in Spain as far as the authority of different Member States does not already supervise their services. It contains specific requirements regarding security aspects, identity documents, facilities, and the remote identification process. |
Switzerland | Since the FINMA Circular 2016/7 [34] entered into force, video identification has equal validity to in-person identification, provided the following criteria are met: Identification is made via real-time audio-visual communication between the contracting party and the financial intermediary. The latter must utilize adequate technical equipment to ensure the secure video transmission as well as the reading and decryption of the information stored in the identification document’s machine-readable format. Specially trained employees are responsible for identifying the contracting party. The interview must be audio-recorded in its entirety. Different requirements/clarifications need to be met depending on whether the video identification concerns an individual, a legal entity, or more than one contracting party. |
Member State | Findings |
---|---|
Italy | Authentication is always required. If an electronic signature is unavailable, proof of identity must be exhibited with a photocopy of an identity card or electronic signature. |
Slovenia | There is no requirement for a qualified electronic signature when filing tax-related claims electronically anymore. Clicking a button in the web application suffices but logging into the web application still requires a high assurance level. The Electronic Identification and Trust Services Act [32], Article 15, provides provisions for defining the required assurance level based on technical and legal risk analysis. Further requirements should be defined in the subordinate Regulation that does not yet exist at this time. |
Spain | Article 10 of Law 39/2015 [35] allows various options, so it can be said that in Spain, the electronic signature has not been imposed in general, except in the cases specifically envisaged in Article 11 (Administrative Procedure). Electronic signatures are mandatory only in the National Security Scheme, especially Annex II, Section 5.7.4., for information systems of security category high level in the dimensions of integrity and authenticity. |
Switzerland | Government-level electronic services do not require any qualified electronic signature. The Federal Act on the Electronic Patient Record stipulates how the Electronic Patient Record (EPR) should be organized and made secure from a technical point of view. Each EPR provider is assessed, certified, and inspected regularly. SwissID will be used during the login as a means of patient verification. In this specific example, SwissID can be obtained only via in-person verification. |
Member State | Findings |
---|---|
Italy | The Italian SPID also allows access to public services of the European Union Member States and companies or traders who have chosen it as an identification tool [36,37]. Companies from the other Member States can also access eIDAS services. |
Slovenia | Slovenia has an Electronic Identification and Trust Services Act. This Act allows organizations to provide electronic services to use electronic identities issued by the government. Executive Regulation does not yet exist; therefore, further technical and other requirements and/or pricing are still unknown. |
Spain | The Royal Decree 203/2021 [38] regulates the Electronic Identification Interoperability Node of the Kingdom of Spain, which is only aimed at public sector entities. Therefore, it seems that it would not be possible for private entities to connect to the Spanish node (except when the private entities act on behalf of a Public Administration). A different case would be the use of the middleware approach, but it would only be valid for those means of electronic identification that have implemented it. |
Switzerland | According to Zertes [28], the equivalent eIDAS Regulation in Switzerland, companies can also use certification services for electronic signatures. Presently, Swisscom Trust Services is the only Trust Service Provider offering qualified electronic signatures that comply with the European Regulation on electronic identification and trust services for electronic transactions (eIDAS) and the Swiss law on the use of certification services with electronic signatures (also known as ZertES). No pricing list is available. Under Art 3(2), when a foreign provider has already obtained recognition from a foreign recognition body, the Swiss recognition body may recognize it if it is proved that:
|
Member State | Findings |
---|---|
Italy | Italy currently does not have a trusted service provider that uses biometrics as an authentication mechanism to access/use identity. |
Slovenia | Slovenia currently does have a trusted service provider that uses biometrics as an authentication mechanism to access/use identity. |
Spain | We are not aware of any current cases in Spain. However, biometrics are used to verify the identity of the person requesting a qualified certificate (this would also be an example of biometric authentication), in accordance with the provisions of Article 7.2 of Law 6/2020 and the Order ETD/465/2021, of 6 May, regulating the methods of remote identification by video for the issuance of qualified electronic certificates. |
Switzerland | The SwissID App allows the use of Touch ID on Apple devices. |
Member State | Findings |
---|---|
Italy | In Italy, the onboarding is harmonized between providers to such a level that the recognition methods of the identity can be depicted for all available providers. After the registration, further authentication is left to the trusted service provider. In a publicly available identity provider registry [41], there is a very descriptive table of OTP mechanisms used by trusted service providers. Trusted service providers also offer OTP (One-Time Password) SMS codes. |
Slovenia | SI-PASS is a service from the Government-based trusted service provider (SI-TRUST) that works using an SMS during multi-factor authentication and provides the user with a high assurance level and the possibility to create a qualified electronic signature in the cloud. When accessing the service, the user enters a username (email address) and password in the first step. In the second step, the user enters his mobile phone number. After receiving an SMS message, the user enters the one-time password from the SMS message into the web form. The second example is SI-TRUST user registration (the basis for the SMS-PASS service). The user must enter the following information: Email, password, security question (the suggested question is “what is your tax number”), security answer, Security code for the CAPTCHA, and Checkmark to accept terms of use. Note that the tax number is not a private number in many cases. For example, this information is published automatically for a natural person with VAT business registration. Users who want to register for a new identity use the qualified certificate to open the form (not necessarily stored on a certified hardware device—QSCD). After registering and requesting a new SMS-PASS identification, the user receives a new one-time password via snail mail to his home address. After finishing the registration, the user obtains a full identity with a high assurance level and access to the qualified certificate on a certified hardware device (QSCD) in the cloud. |
Spain | According to Law 6/2020 [33] and the Order ETD/465/2021 of 6 May [29], regulating the methods of remote identification by video for the issuance of qualified electronic certificates, video identification has been regulated, and it is now possible to obtain electronic certificates in a completely remote process. In addition, there are other examples of remote identification offered by private trust services in Spain, such as the Identity validation of an ID card: Information regarding the document that needs to be validated is sent to the trust service. The trust service sends a link to the person to attach or capture their documents. Once the documentation is received, the trust service provider extracts the data and confirms their validity. The trust service generates a certificate with all the data from the process and the results from the validations and, if required, might maintain custody over the evidence. The public sector uses the Cl@ve service. Cl@ve is not a trusted service but a method for electronic identification and electronic signature based on electronic certificates managed by the Public Administration to access public services. When registering in Cl@ve, the following options are available: Registering via physical visit at a Register Office or online (Via electronic certificate or DNIe) is possible. Without any prior electronic identification means. However, while the first two options correspond to a high assurance level, online registration without prior electronic identification means will correspond to a “Basic” assurance level. Therefore, accessing certain services or using Cl@ve Firma (electronic signature) will not be possible. |
Switzerland | SwissID offers remote registration only for certain acts. For the rest, in-person identification is mandatory. First, the user needs to download the free app. Then the user creates an account by filling out a form. There are specific requirements for the password. After the user submits all the information, a verification code is sent to their email. Then, an SMS code confirmation is sent as SwissID uses two-factor authentication. The user is thus required in this step to enter their mobile number. Once this is confirmed, the user needs to insert their PIN. A PIN confirmation then appears. The user can then activate the two-factor authentication. This is not mandatory. If a touch ID is available on the user’s smartphone, there is also the option to use a Touch ID instead of a PIN. The user must then verify their identity by scanning an identity document and recording their face on a video. Specific procedures are in place if the user forgets their email or password. After 5 wrong inputs, the account is blocked. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hölbl, M.; Kežmah, B.; Kompara, M. eIDAS Interoperability and Cross-Border Compliance Issues. Mathematics 2023, 11, 430. https://doi.org/10.3390/math11020430
Hölbl M, Kežmah B, Kompara M. eIDAS Interoperability and Cross-Border Compliance Issues. Mathematics. 2023; 11(2):430. https://doi.org/10.3390/math11020430
Chicago/Turabian StyleHölbl, Marko, Boštjan Kežmah, and Marko Kompara. 2023. "eIDAS Interoperability and Cross-Border Compliance Issues" Mathematics 11, no. 2: 430. https://doi.org/10.3390/math11020430
APA StyleHölbl, M., Kežmah, B., & Kompara, M. (2023). eIDAS Interoperability and Cross-Border Compliance Issues. Mathematics, 11(2), 430. https://doi.org/10.3390/math11020430