Public Sector Internal Identity Federation

Last updated

Public Sector Internal Identity Federation, or PSIIF, is an IT service developed by the British government.

Service

PSIIF is an identity federation service, to allow civil servants and other public-sector actors to authenticate against other public sector IT systems; potentially offering single sign on across multiple departments and agencies, and on the G-cloud. This allows better sharing of information and services. [1]

PSIIF offers several "levels of assurance" of identity:

Level of assuranceIdentity verificationCredentialsAccreditation
0NoneNot applicableNot applicable
1 BPSS and photographic IDUser ID and passwordSelf-assessment
2 BPSS and photographic IDUser ID and password; additional controls around the client deviceSelf-assessment
3 BPSS and photographic IDStrong authentication, such as two-factor Independent accreditation
4National ID schemeNot appropriate for PSIIF

Access to systems with higher-impact data would usually require higher levels of assurance. PSIIF is designed to support services handling OFFICIAL information, with business impact levels from IL1 to IL3.

PSIIF will use SAML2. [2]

Project

Related Research Articles

E-government is the use of technological communications devices, such as computers and the Internet, to provide public services to citizens and other persons in a country or region. E-government offers new opportunities for more direct and convenient citizen access to government and for government provision of services directly to citizens.

<span class="mw-page-title-main">Classified information</span> Material that government claims requires confidentiality

Classified information is material that a government body deems to be sensitive information that must be protected. Access is restricted by law or regulation to particular groups of people with the necessary security clearance and need to know, and mishandling of the material can incur criminal penalties.

<span class="mw-page-title-main">Energy conservation</span> Reducing energy consumption

Energy conservation is the effort made to reduce the consumption of energy by using less of an energy service. This can be achieved either by using energy more efficiently or by reducing the amount of service used. Energy conservation is a part of the concept of Eco-sufficiency. Energy conservation measures (ECMs) in buildings reduce the need for energy services and can result in increased environmental quality, national security, personal financial security and higher savings. It is at the top of the sustainable energy hierarchy. It also lowers energy costs by preventing future resource depletion.

<span class="mw-page-title-main">Quality Assurance Agency for Higher Education</span> British non-profit organization

The Quality Assurance Agency for Higher Education (QAA) is the independent body that checks on standards and quality in UK higher education. It conducts quality assessment reviews, develops reference points and guidance for providers, and conducts or commissions research on relevant issues.

<span class="mw-page-title-main">Liberty Alliance</span> Computer trade group

The Liberty Alliance Project was an organization formed in September 2001 to establish standards, guidelines and best practices for identity management in computer systems. It grew to more than 150 organizations, including technology vendors, consumer-facing companies, educational organizations and governments. It released frameworks for federation, identity assurance, an Identity Governance Framework, and Identity Web Services.

A federated identity in information technology is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.

A credential service provider (CSP) is a trusted entity that issues security tokens or electronic credentials to subscribers. A CSP forms part of an authentication system, most typically identified as a separate entity in a Federated authentication system. A CSP may be an independent third party, or may issue credentials for its own use. The term CSP is used frequently in the context of the US government's eGov and e-authentication initiatives. An example of a CSP would be an online site whose primary purpose may be, for example, internet banking - but whose users may be subsequently authenticated to other sites, applications or services without further action on their part.

<span class="mw-page-title-main">Education in Egypt</span> Overview of education in Egypt

In the 21st century, the Government of Egypt has given greater priority to improving the education system. According to the Human Development Index (HDI), Egypt is ranked 115 in the HDI, and 9 in the lowest 10 HDI countries in the Middle East and Northern Africa, in 2014. With the help of the World Bank and other multilateral organizations Egypt aims to increase access in early childhood to care and education and the inclusion of Information and Communication Technology (ICT) at all levels of education, especially at the tertiary level. The government is responsible for offering free education at all levels. The current overall expenditure on education is about 12.6 percent as of 2007. Investment in education as a percentage of GDP rose to 4.8 in 2005 but then fell to 3.7 in 2007. The Ministry of Education is also tackling a number of issues: trying to move from a highly centralized system to offering more autonomy to individual institutions, thereby increasing accountability.

<span class="mw-page-title-main">Critical infrastructure protection</span>

Critical infrastructure protection (CIP) is a concept that relates to the preparedness and response to serious incidents that involve the critical infrastructure of a region or nation.

Information assurance (IA) is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information. Information assurance includes protection of the integrity, availability, authenticity, non-repudiation and confidentiality of user data. IA encompasses not only digital protections but also physical techniques. These protections apply to data in transit, both physical and electronic forms, as well as data at rest. IA is best thought of as a superset of information security, and as the business outcome of information risk management.

Electronic authentication is the process of establishing confidence in user identities electronically presented to an information system. Digital authentication, or e-authentication, may be used synonymously when referring to the authentication process that confirms or certifies a person's identity and works. When used in conjunction with an electronic signature, it can provide evidence of whether data received has been tampered with after being signed by its original sender. Electronic authentication can reduce the risk of fraud and identity theft by verifying that a person is who they say they are when performing transactions online.

Internal control, as defined by accounting and auditing, is a process for assuring of an organization's objectives in operational effectiveness and efficiency, reliable financial reporting, and compliance with laws, regulations and policies. A broad concept, internal control involves everything that controls risks to an organization.

<span class="mw-page-title-main">University of the Aegean</span>

The University of the Aegean is a public, multi-campus university located in Lesvos, Chios, Samos, Rhodes, Syros and Lemnos, Greece. It was founded on March 20, 1984, by the Presidential Act 83/1984 and its administrative headquarters are located in the town of Mytilene, on the island of Lesvos.

All European countries show eGovernment initiatives, mainly related to the improvement of governance at the national level. Significant eGovernment activities also take place at the European Commission level as well. There is an extensive list of eGovernment Fact Sheets maintained by the European Commission.

Identity assurance in the context of federated identity management is the ability for a party to determine, with some level of certainty, that an electronic credential representing an entity with which it interacts to effect a transaction, can be trusted to actually belong to the entity.

Higher education accreditation is a type of quality assurance process under which services and operations of post-secondary educational institutions or programs are evaluated to determine if applicable standards are met. If standards are met, accredited status is granted by the agency.

The Tertiary Education Quality and Standards Agency (TEQSA) is Australia's independent national quality assurance and regulatory agency for higher education.

The Government Digital Service is a unit of the Government of the United Kingdom's Cabinet Office tasked with transforming the provision of online public services. It was formed in April 2011 to implement the "Digital by Default" strategy proposed by a report produced for the Cabinet Office in 2010 called 'Directgov 2010 and beyond: revolution not evolution'. It is overseen by the Public Expenditure Executive. GDS is primarily based in the Whitechapel Building, London. Its CEO is Tom Read.

The Open Identity Exchange (OIX) is a membership organisation that works to accelerate the adoption of digital identity services based on open standards. It is a non-profit organisation and is technology agnostic. It is collaborative, and works across the private and public sectors.

GOV.UK Verify is an identity assurance system developed by the British Government Digital Service (GDS). The system is intended to provide a single trusted login across all British government digital services, verifying the user’s identity in 15 minutes. It allows users to choose one of several companies to verify their identity to a standard level of assurance before accessing 22 central government online services.

References

  1. "Public Sector Internal Identity Federation (PSIIF)". HM Government. Archived from the original on 14 October 2013. Retrieved 12 October 2013.
  2. "Cabinet Office to publish PSN identity federation details". Kable. Retrieved 12 October 2013.[ dead link ]